OSA's Digital Library

Applied Optics

Applied Optics


  • Vol. 39, Iss. 29 — Oct. 10, 2000
  • pp: 5295–5301

Security and encryption optical systems based on a correlator with significant output images

Youzhi Li, Kathi Kreske, and Joseph Rosen  »View Author Affiliations

Applied Optics, Vol. 39, Issue 29, pp. 5295-5301 (2000)

View Full Text Article

Enhanced HTML    Acrobat PDF (1799 KB)

Browse Journals / Lookup Meetings

Browse by Journal and Year


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools



An improved optical security system based on two phase-only computer-generated masks is proposed. The two transparencies are placed together in a 4f correlator so that a known output image is received. In addition to simple verification, our security system is capable of identifying the type of input mask according to the corresponding output image it generates. The two phase masks are designed with an iterative optimization algorithm with constraints in the input and the output domains. A simulation is presented with the resultant images formed by the two phase-only elements. Various mask combinations are compared to show that a combination is unique and cannot be duplicated. This uniqueness is an advantage in security systems.

© 2000 Optical Society of America

OCIS Codes
(050.1950) Diffraction and gratings : Diffraction gratings
(070.2580) Fourier optics and signal processing : Paraxial wave optics
(070.4550) Fourier optics and signal processing : Correlators
(070.6110) Fourier optics and signal processing : Spatial filtering
(100.5090) Image processing : Phase-only filters

Original Manuscript: February 29, 2000
Revised Manuscript: July 10, 2000
Published: October 10, 2000

Youzhi Li, Kathi Kreske, and Joseph Rosen, "Security and encryption optical systems based on a correlator with significant output images," Appl. Opt. 39, 5295-5301 (2000)

Sort:  Author  |  Year  |  Journal  |  Reset  


  1. B. Javidi, J. L. Horner, “Optical pattern recognition for validation and security verification,” Opt. Eng. 33, 1752–1756 (1994). [CrossRef]
  2. B. Javidi, G. S. Zhang, J. Li, “Experimental demonstration of the random phase encoding technique for image encryption and security verification,” Opt. Eng. 35, 2506–2512 (1996). [CrossRef]
  3. B. Javidi, E. Ahouzi, “Optical security system with Fourier plane encoding,” Appl. Opt. 37, 6247–6255 (1998). [CrossRef]
  4. R. K. Wang, I. A. Watson, C. Chatwin, “Random phase encoding for optical security,” Opt. Eng. 35, 2464–2469 (1996). [CrossRef]
  5. J. Rosen, “Learning in correlators based on projections onto constraint sets,” Opt. Lett. 18, 1183–1185 (1993). [CrossRef] [PubMed]
  6. H. Stark, ed., Image Recovery Theory and Application, 1st ed. (Academic, New York, 1987).
  7. P. Refregier, B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995). [CrossRef] [PubMed]
  8. B. Javidi, L. Bernard, N. Towghi, “Noise performance of double-phase encryption compared to XOR encryption,” Opt. Eng. 38, 9–19 (1999). [CrossRef]
  9. B. K. Jennison, J. P. Allebach, D. W. Sweeney, “Iterative approaches to computer-generated holography,” Opt. Eng. 28, 629–637 (1989). [CrossRef]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.

« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited