OSA's Digital Library

Applied Optics

Applied Optics

APPLICATIONS-CENTERED RESEARCH IN OPTICS

  • Vol. 41, Iss. 29 — Oct. 10, 2002
  • pp: 6128–6134

Design of cascaded phase keys for a hierarchical security system

Chia H. Yeh, Hsuan T. Chang, Hung C. Chien, and Chung J. Kuo  »View Author Affiliations


Applied Optics, Vol. 41, Issue 29, pp. 6128-6134 (2002)
http://dx.doi.org/10.1364/AO.41.006128


View Full Text Article

Enhanced HTML    Acrobat PDF (1666 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

An image cryptosystem based on multiple phase-only masks is proposed. The proposed cryptosystem is a hierarchical security system that can use multiple phase keys to retrieve different amounts of data. In addition to the sequential order of the phase keys, the distance parameters among the phase keys are introduced to increase the system security. Even when an illegal user steals all the phase keys, the system cannot be broken without the correct sequential order and the distance parameters. However, the proposed system can verify the identities of the persons by the cascaded structure for the phase keys to generate different verification images. Simulation results are further demonstrated to verify the proposed method.

© 2002 Optical Society of America

OCIS Codes
(070.2580) Fourier optics and signal processing : Paraxial wave optics
(100.3020) Image processing : Image reconstruction-restoration
(100.5070) Image processing : Phase retrieval

History
Original Manuscript: March 16, 2002
Revised Manuscript: July 11, 2002
Published: October 10, 2002

Citation
Chia H. Yeh, Hsuan T. Chang, Hung C. Chien, and Chung J. Kuo, "Design of cascaded phase keys for a hierarchical security system," Appl. Opt. 41, 6128-6134 (2002)
http://www.opticsinfobase.org/ao/abstract.cfm?URI=ao-41-29-6128


Sort:  Author  |  Year  |  Journal  |  Reset  

References

  1. P. Refregier, B. Javidi, “Optical image encryption using input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995). [CrossRef] [PubMed]
  2. R. K. Wang, I. A. Watson, “Random phase encoding for optical security,” Opt. Eng. 35, 2464–2469 (1996). [CrossRef]
  3. Y. Li, K. Kreske, J. Rosen, “Security and encryption optical systems based on a correlator with significant output images,” Appl. Opt. 39, 5295–5301 (2000). [CrossRef]
  4. J. W. Han, C. S. Park, D. H. Ryu, E. S. Kim, “Optical image encryption based on XOR operation,” Opt. Eng. 37, 47–54 (1999). [CrossRef]
  5. T. S. Chen, C. C. Chang, M. S. Hwang, “A virtual image cryptosystem based upon vector quantization,” IEEE Trans. Image Process. 7, 1485–1488 (1998). [CrossRef]
  6. N. Towghi, B. Javidi, Z. Luo, “Fully phase encryption image processor,” J. Opt. Soc. Am. A 16, 1915–1927 (1999). [CrossRef]
  7. M. H. Hayes, “The reconstruction of a multidimensional sequence from the phase or magnitude of its Fourier transform,” IEEE Trans. Acoust. Speech Signal Proc. ASSP-30, 140–154 (1982). [CrossRef]
  8. C. J. Kuo, M. H. Tsai, Three dimensional holographic imaging (Wiley, New York, 2002). [CrossRef]
  9. A. Papouli, “A new algorithm in spectral analysis and band-limited extrapolation,” IEEE Trans. Circuits Syst. 22, 735–742 (1975). [CrossRef]
  10. G. Strang, Introduction to Applied Mathematics (Wellesley, Cambridge, Mass., 1986).
  11. J. R. Fienup, “Iterative method applied to image reconstruction and to computer-generated holograms,” Opt. Eng. 19, 297–306 (1980). [CrossRef]
  12. R. W. Gerchberg, W. O. Saxton, “A particular algorithm for the determination of phase from image plane picture,” Optik (Stuttgart) 35, 237–246 (1972).
  13. R. W. Gerchberg, “Superresolution through error energy reduction,” Opt. Acta 21, 709–720 (1974). [CrossRef]
  14. J. Rosen, “Learning in correlators based on projection onto constraint sets,” Opt. Lett. 18, 1183–1185 (1993). [CrossRef]
  15. J. W. Goodman, Introduction to Fourier Optics, 2nd ed., (McGraw-Hill, New York, 1996) Chap. 4.
  16. F. Wyrowski, O. Bryngdahl, “Iterative Fourier-transform algorithm applied to computer holograms,” J. Opt. Soc. Am. A 5, 1058–1065 (1988). [CrossRef]
  17. J. R. Fienup, “Phase retrieval algorithms: A comparison,” Appl. Opt. 21, 2758–2769 (1982). [CrossRef] [PubMed]
  18. S. Lai, M. A. Neifeld, “Digital wavefront reconstruction and its application to image encryption,” Opt. Commun. 178, 283–289 (2000). [CrossRef]
  19. L. Yu, X. Peng, L. Cai, “Parameterized multi-dimensional data encryption by digital optics,” Optical Commun. 203, 67–77 (2002). [CrossRef]
  20. E. Tajahuerce, O. Matoba, S. C. Verall, B. Javidi, “Optoelectronic information encryption using phase-shifting interferometry,” Appl. Opt. 39, 2313–2320 (2000). [CrossRef]
  21. A. D. Poularilcas, S. Seely, Signals and Systems (PWS-KENT, Boston, Mass., 1991).

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited