OSA's Digital Library

Applied Optics

Applied Optics

APPLICATIONS-CENTERED RESEARCH IN OPTICS

  • Vol. 41, Iss. 23 — Aug. 10, 2002
  • pp: 4825–4834

Multiple-Phase Retrieval for Optical Security Systems by Use of Random-Phase Encoding

Hsuan T. Chang, Wei C. Lu, and Chung J. Kuo  »View Author Affiliations


Applied Optics, Vol. 41, Issue 23, pp. 4825-4834 (2002)
http://dx.doi.org/10.1364/AO.41.004825


View Full Text Article

Acrobat PDF (1327 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

The technique of the multiple phase encoding for optical security and verification systems is presented in this paper. This technique is based on a 4-f optical correlator that is a common architecture for optical image encryption and verification systems. However, two or more phase masks are iteratively retrieved by use of the proposed multiple phases retrieval algorithm (MPRA) to obtain the target image. The convergent speed of the iteration process in the MPRA is significantly increased and the recovered image is much more similar to the target image than those in previous approaches. In addition, the quantization effects due to the finite resolution of the phase levels in practical implementation are discussed. The relationships between the number of phase masks and the quantized phase levels are also investigated. According to the simulation results, two and three phase masks are enough to design an efficient security verification system with 64 and 32 phase levels, respectively.

© 2002 Optical Society of America

OCIS Codes
(070.2590) Fourier optics and signal processing : ABCD transforms
(100.3010) Image processing : Image reconstruction techniques
(100.4550) Image processing : Correlators
(100.5070) Image processing : Phase retrieval

Citation
Hsuan T. Chang, Wei C. Lu, and Chung J. Kuo, "Multiple-Phase Retrieval for Optical Security Systems by Use of Random-Phase Encoding," Appl. Opt. 41, 4825-4834 (2002)
http://www.opticsinfobase.org/ao/abstract.cfm?URI=ao-41-23-4825


Sort:  Author  |  Year  |  Journal  |  Reset

References

  1. J. Horner and B. Javidi, Opt. Eng. 35, Special issue on Optical Security 1996.
  2. J. Horner and B. Javidi, Opt. Eng. 38, Special issue on Optical Security 1999.
  3. J.-W. Han, C.-S. Park, D.-H. Ryu, and E.-S. Kim, “Optical image encryption based on XOR operations,” Opt. Eng. 37, 47–54 (1999).
  4. B. Javidi and E. Ahouzi, “Optical security with Fourier plane encoding,” Appl. Opt. 37, 6247–6255 (1998).
  5. B. Javidi and J. L. Horner, “Optical pattern recognition for validation and security verification,” Opt. Eng. 33, 1752–1756 (1994).
  6. B. Javidi, A. Sergent, and E. Ahouzi, “Performance of double phase encoding encryption technique using binarized encrypted images,” Opt. Eng. 37, 565–569 (1998).
  7. Y. Li, K. Kreske, and J. Rosen, “Security and encryption optical systems based on a correlator with significant output images,” Appl. Opt. 39, 5295–5301 (2000).
  8. L. G. Neto and Y. Sheng, “Optical implementation of image encryption using random phase encoding,” Opt. Eng. 35, 2459–2463 (1996).
  9. T. Nomura and B. Javidi, “Optical encryption using a joint transform correlator architecture,” Opt. Eng. 39, 2031–2035 (2000).
  10. P. Réfrégier and B. Javidi, “Optical image encryption using input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).
  11. J.-L. de Bougrenet de la Tocnaye, E. Que’mener, and G. Keryer, “Principle of pattern-signature synthesis and analysis based on double optical correlators,” Appl. Opt. 39, 199–211 (2000).
  12. N. Towghi, B. Javidi, and Z. Luo, “Fully phase encrypted image processor,” J. Opt. Soc. Am. A 16, 1915–1927 (1999).
  13. R. K. Wan, I. A. Watson, and C. Chatwin, “Random phase encoding for optical security,” Opt. Eng. 35, 2464–2469 (1996).
  14. J. R. Fienup, “Phase retrieval algorithm: a comparison,” Appl. Opt. 22, 2758–2769 (1982).
  15. J.-H. Chen and A. Gersho, “Gain-adaptive vector quantization with application to speech coding,” IEEE Trans. Commun. COM-35, 918–930 (1987).
  16. J.-S. R. Jang, “ANFIS: Adaptive-network-based fuzzy inference system,” IEEE Trans. Syst. Man. Cybern. 23, 665–685 (1993).
  17. J. W. Goodman, Introduction to Fourier Optics, Second Edition, (McGraw-Hill, Singapore, 1996), pp. 243–246.
  18. C. J. Kuo, H. Chien, N. Chang, and C. H. Yeh, “Diffractive optical element design by irregular etching-depth sequence,” Appl. Opt. 40, 5894–5897 (2001).
  19. J. Rosen, “Learning in correlators based on projection onto constraint sets,” Opt. Lett. 18, 1183–1185 (1993).
  20. S. E. Broomfield, M. A. A. Neil, E. G. S. Paige, “Programmable multiple-level phase modulation that uses ferroelectric liquid-crystal spatial light modulators,” Appl. Opt. 34, 6652–6665 (1955).
  21. M. O. Freeman, T. A. Brown, and D. M. Walba, “Quantized complex ferroelectric liquid-crystal spatial light modulators,” Appl. Opt. 31, 3917–3929 (1992).
  22. H. Hamam, “Programmable multilayer diffractive optical elements,” J. Opt. Soc. Am. A 14, 2223–2230 (1997).
  23. H. Sasaki, I. Fukuzaki, Y. Katsuki, and T. Kamijoh, “Design considerations of stacked multilayers of diffractive optical elements for optical network units in optical subscriber-network applications,” Appl. Opt. 37, 3735–3745 (1998).
  24. X. Deng and R. Chen, “Design of cascaded diffractive phase elements for three-dimensional multi-wavelength optical interconnects,” Opt. Lett. 25, 1046–1048 (2000).

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited