OSA's Digital Library

Applied Optics

Applied Optics


  • Editor: Joseph N. Mait
  • Vol. 51, Iss. 22 — Aug. 1, 2012
  • pp: 5377–5386

Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask

Sudheesh K. Rajput and Naveen K. Nishchal  »View Author Affiliations

Applied Optics, Vol. 51, Issue 22, pp. 5377-5386 (2012)

View Full Text Article

Enhanced HTML    Acrobat PDF (1378 KB)

Browse Journals / Lookup Meetings

Browse by Journal and Year


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools



A single channel asymmetric color image encryption scheme is proposed that uses an amplitude- and phase- truncation approach with interference of polarized wavefronts. Instead of commonly used random phase masks, wavelength-dependent structured phase masks (SPM) are used in the fractional Fourier transform domain for image encoding. The primary color components bonded with different SPMs are combined into one grayscale image using convolution. We then apply the amplitude and phase truncation to the fractional spectrum, which helps generate unique decryption keys. The encrypted image bonded with a different SPM is then encoded into a polarization selective diffractive optical element. The proposed scheme alleviates the alignment problem of interference and does not need iterative encoding and offers multiple levels of security. The effect of a special attack to the proposed asymmetric cryptosystem has been studied. To measure the effectiveness of the proposed method, we calculated the mean square error between the original and the decrypted images. The computer simulation results support the proposed idea.

© 2012 Optical Society of America

OCIS Codes
(100.2000) Image processing : Digital image processing
(070.2575) Fourier optics and signal processing : Fractional Fourier transforms

ToC Category:
Fourier Optics and Signal Processing

Original Manuscript: April 16, 2012
Revised Manuscript: June 22, 2012
Manuscript Accepted: June 22, 2012
Published: July 24, 2012

Sudheesh K. Rajput and Naveen K. Nishchal, "Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask," Appl. Opt. 51, 5377-5386 (2012)

Sort:  Author  |  Year  |  Journal  |  Reset  


  1. P. Refregier and B. Javidi, “Optical image encryption based on input plane encoding and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995). [CrossRef]
  2. T. J. Naughton, B. M. Hennelly, and T. Dowling, “Introducing secure modes of operation for optical encryption,” J. Opt. Soc. Am. A 25, 2608–2617 (2008). [CrossRef]
  3. P. Clemente, V. Durán, V. Torres-Company, E. Tajahuerce, and J. Lancis, “Optical encryption based on computational ghost imaging,” Opt. Lett. 35, 2391–2393 (2010). [CrossRef]
  4. W. Chen and X. Chen, “Space-based optical image encryption,” Opt. Express 18, 27095–27104 (2010). [CrossRef]
  5. B. Yang, Z. Liu, B. Wang, Y. Zhang, and S. Liu, “Optical stream-cipher-like system for image encryption based on Michelson interferometer,” Opt. Express 19, 2634–2642 (2011). [CrossRef]
  6. E. Pérez-Cabré, M. Cho, and B. Javidi, “Information authentication using photon-counting double-random-phase encrypted images,” Opt. Lett. 36, 22–24 (2011). [CrossRef]
  7. J. F. Barerra, R. Henao, and R. Torroba, “Optical encryption method using toroidal zone plate,” Opt. Commun. 248, 35–40(2005). [CrossRef]
  8. J. F. Barerra, R. Henao, and R. Torroba, “Fault tolerances using toroidal zone plate encryption,” Opt. Commun. 256, 489–494 (2005). [CrossRef]
  9. A. Alfalou and C. Brosseau, “Optical image compression and encryption methods,” Adv. Opt. Photon. 1, 589–636 (2009). [CrossRef]
  10. N. K. Nishchal and T. J. Naughton, “Flexible optical encryption with multiple users and multiple security levels,” Opt. Commun. 284, 735–739 (2011). [CrossRef]
  11. P. Kumar, J. Joseph, and K. Singh, “Optical image encryption using jigsaw transform for silhouette removal in interference based methods and decryption with single spatial light modulator,” Appl. Opt. 50, 1805–1811 (2011). [CrossRef]
  12. S. Zhang and M. A. Karim, “Color image encryption using double random phase encoding,” Microwave Opt. Tech. Lett. 21, 318–323 (1999). [CrossRef]
  13. L. Chen and D. Zhao, “Optical color image encryption by wavelength multiplexing and lensless Fresnel transform holograms,” Opt. Express 14, 8552–8560 (2006). [CrossRef]
  14. W. Jin, L. Ma, and C. Yan, “Real color fractional Fourier transform holograms,” Opt. Commun. 259, 513–516 (2006). [CrossRef]
  15. M. Joshi, C. Shakher, and K. Singh, “Color image encryption and decryption using fractional Fourier transform,” Opt. Commun. 279, 35–42 (2007). [CrossRef]
  16. M. Joshi, C. Shakher, and K. Singh, “Phase image encryption of colored images using double random phase encoding techniques in HSV color space,” Opt. Rev. 16, 511–516 (2009). [CrossRef]
  17. Q.-p. Yuan, X.-p. Yang, L.-j. Gao, and H.-c. Zhai, “Color image single-channel encryption based on tricolor grating theory,” Optoelectron. Lett. 5, 0147–0149 (2009). [CrossRef]
  18. W. Chen, C. Quan, and C. J. Tay, “Optical color image encryption based on Arnold transform and interference method,” Opt. Commun. 282, 3680–3685 (2009). [CrossRef]
  19. Z. Liu, L. Xu, T. Liu, H. Chen, P. Li, C. Lin, and S. Liu, “Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains,” Opt. Commun. 284, 123–128 (2011). [CrossRef]
  20. X. Shi and D. Zhao, “Color image hiding based on the phase retrieval technique and Arnold transform,” Appl. Opt. 50, 2134–2139 (2011). [CrossRef]
  21. X. Li and D. Zhao, “Optical color image encryption with redefined fractional Hartley transform,” Optik 121, 673–677 (2010). [CrossRef]
  22. L. Chen and D. Zhao, “Color image encoding in dual fractional Fourier-wavelet domain with random phases,” Opt. Commun. 282, 3433–3438 (2009). [CrossRef]
  23. M. Joshi, C. Shakher, and K. Singh, “Fractional Fourier transform based image multiplexing and encryption technique for four-color images using input images as keys,” Opt. Commun. 283, 2496–2505 (2010). [CrossRef]
  24. X. Deng and D. Zhao, “Single channel color image encryption using a modified Gerchberg-Saxton algorithm and mutual encoding in the Fresnel domain,” Appl. Opt. 50, 6019–6025 (2011). [CrossRef]
  25. M. Joshi and K. Singh, “Simultaneous encryption of a color and a gray-scale image using byte-level encoding based on single-channel double random-phase encoding architecture in fractional Fourier domain,” Opt. Eng. 50, 047007 (2011). [CrossRef]
  26. H. Liu and X. Wang, “Color image encryption using spatial bit-level permutation and high-dimension chaotic system,” Opt. Commun. 284, 3895–3903 (2011). [CrossRef]
  27. N. Zhou, Y. Wang, L. Gong, H. He, and J. Wu, “Novel single channel color image encryption based on chaos and fractional Fourier transform,” Opt. Commun. 284, 2789–2796 (2011). [CrossRef]
  28. H.-E. Hwang, “Optical color image encryption based on the wavelength multiplexing using cascaded phase-only masks in Fresnel transform domain,” Opt. Commun. 285, 567–573 (2012). [CrossRef]
  29. Y. He, Y. Cao, and X. Lu, “Color image encryption based on orthogonal composite grating and double random phase encoding technique,” Optik (2012) (in press).
  30. C. J. Tay, C. Quan, W. Chen, and Y. Fu, “Color image encryption based on interference and virtual optics,” Opt. Laser Technol. 42, 409–415 (2010). [CrossRef]
  31. Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33, 2443–2445 (2008). [CrossRef]
  32. N. Zhu, Y. Wang, J. Liu, J. Xie, and H. Zhang, “Optical image encryption based on interference of polarized light,” Opt. Express 17, 13418–13424 (2009). [CrossRef]
  33. C. H. Niu, X. L. Wang, N. G. Lv, Z. H. Zhou, and X. Y. Li, “An encryption method with multiple encrypted keys based on interference principle,” Opt. Express 18, 7827–7834(2010). [CrossRef]
  34. W. Stallings, Cryptography and Network Security: Principles and Practice, 5th ed. (Prentice Hall, 2011).
  35. X. Peng, H. Wie, and P. Zhang, “Asymmetric cryptography based on wavefront sensing,” Opt. Lett. 31, 3579–3581 (2006). [CrossRef]
  36. W. Qin and X. Peng, “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35, 118–120(2010). [CrossRef]
  37. W. Qin, X. Peng, X. Meng, and B. Gao, “Universal and special keys based on phase-truncated Fourier transform,” Opt. Eng. 50, 080501 (2011). [CrossRef]
  38. S. K. Rajput and N. K. Nishchal, “Image encryption based on interference that uses fractional Fourier domains asymmetric keys,” Appl. Opt. 51, 1446–1452 (2012). [CrossRef]
  39. W. Chen and X. Chen, “Optical color image encryption based on asymmetric cryptosystem in the Fresnel domain,” Opt. Commun. 284, 3913–3917 (2011). [CrossRef]
  40. X. Deng and D. Zhao, “Single channel color image encryption based on asymmetric cryptosystem,” Opt. Laser Technol. 44, 136–140 (2012). [CrossRef]
  41. D. Wei, Q. Ran, Y. Li, J. Ma, and L. Tan, “A convolution and product theorem for the linear canonical transform,” IEEE Trans. Signal Process. Lett. 16, 853–856 (2009). [CrossRef]
  42. F. Xu, R. C. Tyan, Y. Fainman, and J. E. Ford, “Single-substrate birefringent computer generated holograms,” Opt. Lett. 21, 516–518 (1996). [CrossRef]
  43. J. E. Ford, F. Xu, K. Urquhart, and Y. Fainman, “Polarization-selective computer-generated holograms,” Opt. Lett. 18, 456–458 (1993). [CrossRef]
  44. M. Testorf, “Design of diffractive optical elements for the fractional Fourier transform domain: phase space approach,” Appl. Opt. 45, 76–82 (2006). [CrossRef]
  45. A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of the optical encryption schemes based on double random phase keys,” Opt. Lett. 30, 1644–1646 (2005). [CrossRef]
  46. X. Peng, P. Chang, H. Wei, and B. Yu, “Known plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044–1046 (2006). [CrossRef]
  47. Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15, 10253–10265 (2007). [CrossRef]
  48. X. Wang and D. Zhao, “A special attack on the asymmetric cryptosystem based on phase-truncated fractional Fourier transforms,” Opt. Commun. 285, 1078–1081 (2012). [CrossRef]
  49. P. Memmolo, A. Finizio, M. Paturzo, P. Ferraro, and B. Javidi, “Multi-wavelength digital holography: reconstruction, synthesis and display of holograms using adaptive transformation,” Opt. Lett. 37, 1445–1447 (2012). [CrossRef]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.

« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited