OSA's Digital Library

Applied Optics

Applied Optics


  • Vol. 39, Iss. 23 — Aug. 10, 2000
  • pp: 4117–4130

Error-reduction techniques and error analysis for fully phase- and amplitude-based encryption

Bahram Javidi, Nasser Towghi, Nabíl Maghzi, and Steven C. Verrall  »View Author Affiliations

Applied Optics, Vol. 39, Issue 23, pp. 4117-4130 (2000)

View Full Text Article

Enhanced HTML    Acrobat PDF (1595 KB)

Browse Journals / Lookup Meetings

Browse by Journal and Year


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools



The performance of fully phase- and amplitude-based encryption processors is analyzed. The effects of noise perturbations on the encrypted information are considered. A thresholding method of decryption that further reduces the mean-squared error (MSE) for the fully phase- and amplitude-based encryption processes is provided. The proposed thresholding scheme significantly improves the performance of fully phase- and amplitude-based encryption, as measured by the MSE metric. We obtain analytical MSE bounds when thresholding is used for both decryption methods, and we also present computer-simulation results. These results show that the fully phase-based method is more robust. We also give a formal proof of a conjecture about the decrypted distribution of distorted encrypted information. This allows the analytical bounds of the MSE to be extended to more general non-Gaussian, nonadditive, nonstationary distortions. Computer simulations support this extension.

© 2000 Optical Society of America

OCIS Codes
(070.0070) Fourier optics and signal processing : Fourier optics and signal processing
(070.4560) Fourier optics and signal processing : Data processing by optical means
(100.0100) Image processing : Image processing
(110.3000) Imaging systems : Image quality assessment
(110.4280) Imaging systems : Noise in imaging systems

Original Manuscript: February 4, 2000
Published: August 10, 2000

Bahram Javidi, Nasser Towghi, Nabíl Maghzi, and Steven C. Verrall, "Error-reduction techniques and error analysis for fully phase- and amplitude-based encryption," Appl. Opt. 39, 4117-4130 (2000)

Sort:  Author  |  Year  |  Journal  |  Reset  


  1. Special Issue on Optical Security, Opt. Eng.35, 2451–2541 (1996).
  2. Special Issue on Optical Security, Opt. Eng.38, 1–119 (1999).
  3. B. Javidi, J. L. Horner, “Optical pattern recognition for validation and security verification,” Opt. Eng. 33, 1752–1756 (1994). [CrossRef]
  4. P. Réfrégier, B. Javidi, “Optical image encryption using input and Fourier plane random phase encoding,” Opt. Lett. 20, 767–769 (1995). [CrossRef]
  5. Q. Huang, J. Caulfield, “Wave guide holography and its applications,” in Practical Holography V, S. A. Benton, ed., Proc. SPIE1461, 303–312 (1991).
  6. B. Javidi, G. Zhang, J. Li, “Experimental demonstration of the random phase encoding technique for image encryption and security verification,” Opt. Eng. 35, 2506–2512 (1996). [CrossRef]
  7. K. H. Fielding, J. L. Horner, C. K. Makekau, “Optical fingerprint identification by binary joint transform correlation,” Opt. Eng. 30, 1958–1961 (1991). [CrossRef]
  8. H.-Y. Li, Y. Qiao, D. Psaltis, “Optical network for real-time face recognition,” Appl. Opt. 32, 5026–5035 (1993). [CrossRef] [PubMed]
  9. B. Javidi, J. Li, Q. Tang, “Optical implementation of neural networks for face recognition by the use of nonlinear joint transform correlators,” Appl. Opt. 34, 1752–1756 (1995). [CrossRef]
  10. J. Rodolfo, H. Rajbenbach, J.-P. Huignard, “Performance of a photorefractive joint transform correlator for fingerprint identification,” Opt. Eng. 34, 1166–1171 (1995). [CrossRef]
  11. C. L. Wilson, C. I. Watson, E. G. Paek, “Combined optical and neural network fingerprint matching,” in Optical Pattern Recognition VIII, D. Casasent, T. H. Chao, eds., Proc. SPIE3073, 373–382 (1997). [CrossRef]
  12. N. Riza, M. Howlader, “Photonics security system using spatial codes and remote coded coherent optical communications,” Opt. Eng. 35, 2487–2498 (1996). [CrossRef]
  13. M. Drake, M. Lid, M. A. Fiddy, “Wave guide hologram fingerprint entry device,” Opt. Eng. 35, 2499–2505 (1996). [CrossRef]
  14. F. Goudail, F. Bollaro, B. Javidi, P. Réfrégier, “Influence of a perturbation in a double phase-encoding system,” J. Opt. Soc. Am. A 15, 2629–2638 (1998). [CrossRef]
  15. J. Campello, J. T. Gill, M. Morf, M. J. Flynn, “Smart photonic networks and computer security for image data,” in Multimedia Networks: Security, Displays, Terminals, and Gateways, B. Derryberry, C. R. Holliday, L. S. Lome, V. Markandey, B. Vasudev, M. V. Bove, A. G. Tescher, eds., Proc. SPIE3228, 272–279 (1998).
  16. H. F. Heanue, M. C. Bashaw, L. Hesselink, “Encrypted holographic data storage based on orthogonal-phase-code multiplexing,” Appl. Opt. 34, 6012–6015 (1995). [CrossRef] [PubMed]
  17. O. Matoba, B. Javidi, “Encrypted optical memory system using three-dimensional keys in the Fresnel domain,” Opt. Lett. 24, 762–764 (1999). [CrossRef]
  18. B. Javidi, L. Bernard, N. Towghi, “Noise performance of double-phase encryption compared to xor encryption,” Opt. Eng. 38, 9–19 (1999). [CrossRef]
  19. L. O’Gorman, I. Rabinovich, “Secure identification documents via pattern recognition and public-key cryptography,” IEEE Trans. Pattern Anal. Mach. Intell. 20, 1097–1102 (1998). [CrossRef]
  20. N. Towghi, B. Javidi, Z. Luo, “Fully phase encrypted optical processor,” J. Opt. Soc. Am. A 16, 1915–1927 (1999). [CrossRef]
  21. V. Gnedenko, The Theory of Probability (Mir, Moscow, 1976).
  22. B. Javidi, A. Sergent, G. Zhang, L. Guibert, “Fault tolerance properties of a double phase encoding technique,” Opt. Eng. 36, 992–998 (1997). [CrossRef]
  23. I. I. Gikhman, A. V. Skorokhod, Introduction to the Theory of Random Process (Dover, New York, 1969).

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.

« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited