OSA's Digital Library

Applied Optics

Applied Optics

APPLICATIONS-CENTERED RESEARCH IN OPTICS

  • Vol. 39, Iss. 23 — Aug. 10, 2000
  • pp: 4117–4130

Error-Reduction Techniques and Error Analysis for Fully Phase- and Amplitude-Based Encryption

Bahram Javidi, Nasser Towghi, Nabíl Maghzi, and Steven C. Verrall  »View Author Affiliations


Applied Optics, Vol. 39, Issue 23, pp. 4117-4130 (2000)
http://dx.doi.org/10.1364/AO.39.004117


View Full Text Article

Acrobat PDF (1595 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

The performance of fully phase- and amplitude-based encryption processors is analyzed. The effects of noise perturbations on the encrypted information are considered. A thresholding method of decryption that further reduces the mean-squared error (MSE) for the fully phase- and amplitude-based encryption processes is provided. The proposed thresholding scheme significantly improves the performance of fully phase- and amplitude-based encryption, as measured by the MSE metric. We obtain analytical MSE bounds when thresholding is used for both decryption methods, and we also present computer-simulation results. These results show that the fully phase-based method is more robust. We also give a formal proof of a conjecture about the decrypted distribution of distorted encrypted information. This allows the analytical bounds of the MSE to be extended to more general non-Gaussian, nonadditive, nonstationary distortions. Computer simulations support this extension.

© 2000 Optical Society of America

OCIS Codes
(070.0070) Fourier optics and signal processing : Fourier optics and signal processing
(070.4560) Fourier optics and signal processing : Data processing by optical means
(100.0100) Image processing : Image processing
(110.3000) Imaging systems : Image quality assessment
(110.4280) Imaging systems : Noise in imaging systems

Citation
Bahram Javidi, Nasser Towghi, Nabíl Maghzi, and Steven C. Verrall, "Error-Reduction Techniques and Error Analysis for Fully Phase- and Amplitude-Based Encryption," Appl. Opt. 39, 4117-4130 (2000)
http://www.opticsinfobase.org/ao/abstract.cfm?URI=ao-39-23-4117


Sort:  Author  |  Year  |  Journal  |  Reset

References

  1. Special Issue on Optical Security, Opt. Eng. 35, 2451–2541 (1996).
  2. Special Issue on Optical Security, Opt. Eng. 38, 1–119 (1999).
  3. B. Javidi and J. L. Horner, “Optical pattern recognition for validation and security verification,” Opt. Eng. 33, 1752–1756 (1994).
  4. P. Réfrégier and B. Javidi, “Optical image encryption using input and Fourier plane random phase encoding,” Opt. Lett. 20, 767–769 (1995).
  5. Q. Huang and J. Caulfield, “Wave guide holography and its applications,” in Practical Holography V, S. A. Benton, ed., Proc. SPIE 1461, 303–312 (1991).
  6. B. Javidi, G. Zhang, and J. Li, “Experimental demonstration of the random phase encoding technique for image encryption and security verification,” Opt. Eng. 35, 2506–2512 (1996).
  7. K. H. Fielding, J. L. Horner, and C. K. Makekau, “Optical fingerprint identification by binary joint transform correlation,” Opt. Eng. 30, 1958–1961 (1991).
  8. H.-Y. Li, Y. Qiao, and D. Psaltis, “Optical network for real-time face recognition,” Appl. Opt. 32, 5026–5035 (1993).
  9. B. Javidi, J. Li, and Q. Tang, “Optical implementation of neural networks for face recognition by the use of nonlinear joint transform correlators,” Appl. Opt. 34, 1752–1756 (1995).
  10. J. Rodolfo, H. Rajbenbach, and J.-P. Huignard, “Performance of a photorefractive joint transform correlator for fingerprint identification,” Opt. Eng. 34, 1166–1171 (1995).
  11. C. L. Wilson, C. I. Watson, and E. G. Paek, “Combined optical and neural network fingerprint matching,” in Optical Pattern Recognition VIII, D. Casasent and T. H. Chao, eds., Proc. SPIE 3073, 373–382 (1997).
  12. N. Riza and M. Howlader, “Photonics security system using spatial codes and remote coded coherent optical communications,” Opt. Eng. 35, 2487–2498 (1996).
  13. M. Drake, M. Lid, and M. A. Fiddy, “Wave guide hologram fingerprint entry device,” Opt. Eng. 35, 2499–2505 (1996).
  14. F. Goudail, F. Bollaro, B. Javidi, and P. Réfrégier, “Influence of a perturbation in a double phase-encoding system,” J. Opt. Soc. Am. A 15, 2629–2638 (1998).
  15. J. Campello, J. T. Gill III, M. Morf, and M. J. Flynn, “Smart photonic networks and computer security for image data,” in Multimedia Networks: Security, Displays, Terminals, and Gateways, B. Derryberry, C. R. Holliday, L. S. Lome, V. Markandey, B. Vasudev, M. V. Bove, and A. G. Tescher, eds., Proc. SPIE 3228, 272–279 (1998).
  16. H. F. Heanue, M. C. Bashaw, and L. Hesselink, “Encrypted holographic data storage based on orthogonal-phase-code multiplexing,” Appl. Opt. 34, 6012–6015 (1995).
  17. O. Matoba and B. Javidi, “Encrypted optical memory system using three-dimensional keys in the Fresnel domain,” Opt. Lett. 24, 762–764 (1999).
  18. B. Javidi, L. Bernard, and N. Towghi, “Noise performance of double-phase encryption compared to xor encryption,” Opt. Eng. 38, 9–19 (1999).
  19. L. O’Gorman and I. Rabinovich, “Secure identification documents via pattern recognition and public-key cryptography,” IEEE Trans. Pattern Anal. Mach. Intell. 20, 1097–1102 (1998).
  20. N. Towghi, B. Javidi, and Z. Luo, “Fully phase encrypted optical processor,” J. Opt. Soc. Am. A 16, 1915–1927 (1999).
  21. V. Gnedenko, The Theory of Probability (Mir, Moscow, 1976).
  22. B. Javidi, A. Sergent, G. Zhang, and L. Guibert, “Fault tolerance properties of a double phase encoding technique,” Opt. Eng. 36, 992–998 (1997).
  23. I. I. Gikhman and A. V. Skorokhod, Introduction to the Theory of Random Process (Dover, New York, 1969).

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited