OSA's Digital Library

Applied Optics

Applied Optics

APPLICATIONS-CENTERED RESEARCH IN OPTICS

  • Editor: Joseph N. Mait
  • Vol. 52, Iss. 8 — Mar. 10, 2013
  • pp: 1555–1563

Security enhancement of color image cryptosystem by optical interference principle and spiral phase encoding

Muhammad Rafiq Abuturab  »View Author Affiliations


Applied Optics, Vol. 52, Issue 8, pp. 1555-1563 (2013)
http://dx.doi.org/10.1364/AO.52.001555


View Full Text Article

Enhanced HTML    Acrobat PDF (1277 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

A color information cryptosystem based on optical interference principle and spiral phase encoding is proposed. A spiral phase mask (SPM) is used instead of a conventional random phase mask because it contains multiple storing keys in a single phase mask. The color image is decomposed into RGB channels. The decomposed three RGB channels can avoid the interference of crosstalks efficiently. Each channel is encoded into an SPM and analytically generates two spiral phase-only masks (SPOMs). The two SPOMs are then phase-truncated to get two encrypted images and amplitude-truncated to produce two asymmetric phase keys. The two SPOMs and the two asymmetric phase keys can be allocated to four different authorized users. The order, the wavelength, the focal length, and the radius are construction parameters of the SPM (or third SPOM) that can also be assigned to the four other different authorized users. The proposed technique can be used for a highly secure verification system, so an unauthorized user cannot retrieve the original image if only one key out of eight keys is missing. The proposed method does not require iterative encoding or postprocessing of SPOMs to overcome inherent silhouette problems, and its optical setup alleviates stringent alignment of SOPMs. The validity and feasibility of the proposed method are supported by numerical simulation results.

© 2013 Optical Society of America

OCIS Codes
(050.0050) Diffraction and gratings : Diffraction and gratings
(070.0070) Fourier optics and signal processing : Fourier optics and signal processing
(100.2000) Image processing : Digital image processing

ToC Category:
Image Processing

History
Original Manuscript: November 12, 2012
Revised Manuscript: December 31, 2012
Manuscript Accepted: January 24, 2013
Published: March 4, 2013

Citation
Muhammad Rafiq Abuturab, "Security enhancement of color image cryptosystem by optical interference principle and spiral phase encoding," Appl. Opt. 52, 1555-1563 (2013)
http://www.opticsinfobase.org/ao/abstract.cfm?URI=ao-52-8-1555


Sort:  Author  |  Year  |  Journal  |  Reset  

References

  1. P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995). [CrossRef]
  2. G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000). [CrossRef]
  3. S. Kishk and B. Javidi, “Information hiding technique with double phase encoding,” Appl. Opt. 41, 5462–5470 (2002). [CrossRef]
  4. G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586 (2004). [CrossRef]
  5. X. Meng, L. Cai, X. Yang, X. Shen, and G. Dong, “Information security system by iterative multiple-phase retrieval and pixel random permutation,” Appl. Opt. 45, 3289–3297 (2006). [CrossRef]
  6. Z. Liu and S. Liu, “Randomization of the Fourier transform,” Opt. Lett. 32, 478–480 (2007). [CrossRef]
  7. H. Di, K. Zheng, X. Zhang, E. Y. Lam, T. Kim, Y. S. Kim, T.-C. Poon, and C. Zhou, “Multiple-image encryption by compressive holography,” Appl. Opt. 51, 1000–1009 (2012). [CrossRef]
  8. Z. Liu, S. Li, M. Yang, W. Liu, and S. Liu, “Image encryption based on the random rotation operation in the fractional Fourier transform domains,” Opt. Lasers Eng. 50, 1352–1358(2012). [CrossRef]
  9. J.-J. Huang, H.-E. Hwang, C.-Y. Chen, and C.-M. Chen, “Lensless multiple-image optical encryption based on improved phase retrieval algorithm,” Appl. Opt. 51, 2388–2394 (2012). [CrossRef]
  10. Z. Liu, S. Li, W. Liu, Y. Wang, and S. Liu, “Image encryption algorithm by using fractional Fourier transform and scrambling operation based on double random phase encoding,” Opt. Lasers Eng. 51, 8–14 (2013). [CrossRef]
  11. S. Q. Zhang and M. A. Karim, “Color image encryption using double random phase encoding,” Microw. Opt. Technol. Lett. 21, 318–323 (1999). [CrossRef]
  12. M. Joshi, C. Shakher, and K. Singh, “Fractional Fourier transform based image multiplexing and encryption technique for four-color images using input images as keys,” Opt. Commun. 283, 2496–2505 (2010). [CrossRef]
  13. Z. Liu, J. Dai, X. Sun, and S. Liu, “Color image encryption by using the rotation of color vector in Hartley transform domains,” Opt. Lasers Eng. 48, 800–805 (2010). [CrossRef]
  14. X. Deng and D. Zhao, “Single-channel color image encryption using a modified Gerchberg–Saxton algorithm and mutual encoding in the Fresnel domain,” Appl. Opt. 50, 6019–6025 (2011). [CrossRef]
  15. Z. Liu, L. Xu, T. Liu, H. Chen, P. Li, C. Lin, and S. Liu, “Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains,” Opt. Commun. 284, 123–128 (2011). [CrossRef]
  16. M. R. Abuturab, “Securing color information using Arnold transform in gyrator transform domain,” Opt. Lasers Eng. 50, 772–779 (2012). [CrossRef]
  17. M. R. Abuturab, “Color image security system using double random-structured phase encoding in gyrator transform domain,” Appl. Opt. 51, 3006–3016 (2012). [CrossRef]
  18. M. R. Abuturab, “Color information security system using discrete cosine transform in gyrator transform domain radial-Hilbert phase encoding,” Opt. Lasers Eng. 50, 1209–1216 (2012). [CrossRef]
  19. M. R. Abuturab, “Securing color image using discrete cosine transform in gyrator transform domain structured-phase encoding,” Opt. Lasers Eng. 50, 1383–1390 (2012). [CrossRef]
  20. M. R. Abuturab, “Color image security system based on discrete Hartley transform in gyrator transform domain,” Opt. Lasers Eng. 51, 317–324 (2013). [CrossRef]
  21. M. R. Abuturab, “Noise-free recovery of color information using a joint-extended gyrator transform correlator,” Opt. Lasers Eng. 51, 230–239 (2013). [CrossRef]
  22. W. Qin and X. Peng, “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35, 118–120 (2010). [CrossRef]
  23. X. Wang and D. Zhao, “A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Commun. 285, 1078–1081 (2012). [CrossRef]
  24. W. Qin, X. Peng, X. F. Meng, and B. Gao, “Universal and special keys based on phase-truncated Fourier transform,” Opt. Eng. 50, 080501 (2011). [CrossRef]
  25. X. Wang and D. Zhao, “Security enhancement of a phase-truncation based image encryption algorithm,” Appl. Opt. 50, 6645–6651 (2011). [CrossRef]
  26. W. Chen and X. Chen, “Optical color image encryption based on an asymmetric cryptosystem in the Fresnel domain,” Opt. Commun. 284, 3913–3917 (2011). [CrossRef]
  27. M. R. Abuturab, “Color information cryptosystem based on optical superposition principle and phase-truncated gyrator transform,” Appl. Opt. 51, 7994–8002 (2012). [CrossRef]
  28. Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33, 2443–2445 (2008). [CrossRef]
  29. D. Weng, N. Zhu, Y. Wang, J. Xie, and J. Liu, “Experimental verification of optical image encryption based on interference,” Opt. Commun. 284, 2485–2487 (2011). [CrossRef]
  30. Y. Zhang, B. Wang, and Z. Dong, “Enhancement of image hiding by exchanging two phase masks,” J. Opt. A 11, 125406 (2009). [CrossRef]
  31. P. Kumar, J. Joseph, and K. Singh, “Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator,” Appl. Opt. 50, 1805–1811 (2011). [CrossRef]
  32. X. Wang and D. Zhao, “Optical image hiding with silhouette removal based on the optical interference principle,” Appl. Opt. 51, 686–691 (2012). [CrossRef]
  33. Q. Wang, “Optical image encryption with silhouette removal based on interference and phase blend processing,” Opt. Commun. 285, 4294–4301 (2012). [CrossRef]
  34. W. Jia, F. J. Wen, Y. T. Chow, and C. Zhou, “Binary image encryption based on interference of two phase-only masks,” Appl. Opt. 51, 5253–5258 (2012). [CrossRef]
  35. A. Sakdinawat and Y. Liu, “Soft-x-ray microscopy using spiral zone plates,” Opt. Lett. 32, 2635–2637 (2007). [CrossRef]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited