OSA's Digital Library

Applied Optics

Applied Optics

APPLICATIONS-CENTERED RESEARCH IN OPTICS

  • Vol. 41, Iss. 23 — Aug. 10, 2002
  • pp: 4848–4855

Practical image encryption and decryption by phase-coding technique for optical security systems

Junji Ohtsubo and Ayano Fujimoto  »View Author Affiliations


Applied Optics, Vol. 41, Issue 23, pp. 4848-4855 (2002)
http://dx.doi.org/10.1364/AO.41.004848


View Full Text Article

Enhanced HTML    Acrobat PDF (2197 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

A method of image encryption and decryption is proposed for optical security systems. A phase-coded image to be encrypted together with a random phase pattern is Fourier transformed and the result of the complex-valued data is used as an encrypted pattern. The decryption is simply performed by an inverse-Fourier transform for the addition of the encrypted pattern and the Fourier transform of the random phase. The intensity of the inverse-Fourier transformed image gives the exact result for the decryption. Further, the binarization of the encrypted pattern is performed for the easiness of the optical and electronic readout of the images, and it also gives rise to the enhancement of the degree of security for the encryption. The binary pattern is optimized by a statistical iteration technique and an excellent decryption image is obtained by the optimization.

© 2002 Optical Society of America

OCIS Codes
(070.1170) Fourier optics and signal processing : Analog optical signal processing
(090.1760) Holography : Computer holography
(100.1160) Image processing : Analog optical image processing

History
Original Manuscript: March 21, 2002
Revised Manuscript: May 15, 2002
Published: August 10, 2002

Citation
Junji Ohtsubo and Ayano Fujimoto, "Practical image encryption and decryption by phase-coding technique for optical security systems," Appl. Opt. 41, 4848-4855 (2002)
http://www.opticsinfobase.org/ao/abstract.cfm?URI=ao-41-23-4848


Sort:  Author  |  Year  |  Journal  |  Reset  

References

  1. B. Javidi, J. L. Hoener, “Optical pattern recognition for validation and security verification,” Opt. Eng. 33, 1752–1756 (1994). [CrossRef]
  2. P. Réfrégier, B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 90, 767–769 (1995). [CrossRef]
  3. L. G. Neto, Y. Sheng, “Optical implementation of image encryption using random phase encoding,” Opt. Eng. 35, 2459–2463 (1996). [CrossRef]
  4. B. Javidi, E. Ahouzi, “Optical security system with Fourier plane encoding,” Appl. Opt. 37, 6247–6255 (1998). [CrossRef]
  5. N. Towghi, B. Javidi, Z. Luo, “Fully phase encrypted image processor,” J. Opt. Soc. Am. A 16, 1915–1927 (1999). [CrossRef]
  6. X. Tan, O. Matoba, T. Shimura, K. Kuroda, B. Javidi, “Secure optical storage that uses fully phase encryption,” Appl. Opt. 39, 6689–6694 (2000). [CrossRef]
  7. P. C. Mogensen, J. Glückstad, “Phase-only optical encryption,” Opt. Lett. 25, 566–568 (2000). [CrossRef]
  8. P. C. Mogensen, J. Glückstad, “Phase-only optical encryption of a fixed mask,” Appl. Opt. 40, 1226–1235 (2001). [CrossRef]
  9. H. G. Yan, E. S. Kim, “Practical image encryption scheme by real-valued data,” Opt. Eng. 35, 2473–2478 (1996). [CrossRef]
  10. M. Yamazaki, J. Ohtsubo, “Optimization of encrypted holograms in optical security systems,” Opt. Eng. 40, 132–137 (2001). [CrossRef]
  11. S. J. Park, J. Y. Kim, J. K. Bae, S. J. Kim, “Fourier-plane encryption technique based on removing the effect of phase terms in a joint transform correlator,” Opt. Rev. 8, 413–415 (2001). [CrossRef]
  12. Y. Kobayashi, H. Toyoda, “Development of an optical joint transform correlation system for fingerprint recognition,” Opt. Eng. 38, 1205–1210 (1999). [CrossRef]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited