OSA's Digital Library

Applied Optics

Applied Optics


  • Vol. 42, Iss. 32 — Nov. 10, 2003
  • pp: 6496–6503

Optical scanning cryptography for secure wireless transmission

Ting-Chung Poon, Taegeun Kim, and Kyu Doh  »View Author Affiliations

Applied Optics, Vol. 42, Issue 32, pp. 6496-6503 (2003)

View Full Text Article

Enhanced HTML    Acrobat PDF (1484 KB)

Browse Journals / Lookup Meetings

Browse by Journal and Year


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools



We propose a method for secure wireless transmission of encrypted information. By use of an encryption key, an image or document is optically encrypted by optical heterodyne scanning and hence encryption is performed on the fly. We call this technique optical scanning cryptography. The output of the heterodyne encrypted signal is at radio frequency and can be directly sent through an antenna to a secure site for digital storage to be prepared for decryption. In the secure site, an identical optical scanning system to that used for encryption is used, together with a decryption key, to generate an electrical signal. The electrical signal is then processed and sent to a computer to be used for decryption. Utilizing the stored information received from the encryption stage and the electrical information from the secure site, a digital decryption unit performs a decryption algorithm. If the encryption key and the decryption key are matched, the decryption unit will decrypt the image or document faithfully. The overall cryptosystem can perform the incoherent optical processing counterpart of the well-known coherent double-random phase-encoding technique. We present computer simulations of the idea.

© 2003 Optical Society of America

OCIS Codes
(090.0090) Holography : Holography
(110.0110) Imaging systems : Imaging systems

Original Manuscript: December 30, 2002
Revised Manuscript: June 11, 2003
Published: November 10, 2003

Ting-Chung Poon, Taegeun Kim, and Kyu Doh, "Optical scanning cryptography for secure wireless transmission," Appl. Opt. 42, 6496-6503 (2003)

Sort:  Author  |  Year  |  Journal  |  Reset  


  1. S. Singh, The Code Book (Random House, New York, 1999).
  2. S. Wiesner, “Conjugate coding,” SIGACT News 15(78), 78–88 (1983); original manuscript written and circulated in 1970. [CrossRef]
  3. C. H. Benneett, C. Brassard, A. Ekert, “Quantum cryptography,” Sci. Am. 269(10), 26–33 (1992).
  4. S. Lai, M. A. Neifeld, “Digital wavefront reconstruction and its applications to image encryption,” Opt. Commun. 178, 283–289 (2000). [CrossRef]
  5. B. Wang, C.-C. Sun, W.-C. Su, A. Chiou, “Shift-tolerance property of an optical double-random phase-encoding encryption system,” Appl. Opt. 39, 4788–4793 (2000). [CrossRef]
  6. B. Zhu, S. Liu, Q. Ran, “Optical image encryption based on multifractional Fourier transforms,” Opt. Lett. 25, 1159–1161 (2000). [CrossRef]
  7. P. C. Magensen, J. Gluckstad, “Phase-only optical decryption of a fixed mask,” Appl. Opt. 8, 1226–1235 (2001). [CrossRef]
  8. H. T. Chang, “Image encryption using separable amplitude-based virtual image and iteratively retrieved phase information,” Opt. Eng. 40, 2165–2171 (2001). [CrossRef]
  9. T. Nomura, B. Javidi, “Optical encryption system with a binary key code,” Appl. Opt. 39, 4783–4787 (2000). [CrossRef]
  10. O. Matoba, B. Javidi, “Secure ultrafast communication using spatial-temporal converters,” Appl. Opt. 39, 2975–2981 (2000). [CrossRef]
  11. E. Tajahuerce, B. Javidi, “Encrypting three-dimensional information with digital holography,” Appl. Opt. 39, 6595–6601 (2000). [CrossRef]
  12. E. Tajahuerce, J. Lancis, B. Javidi, P. Andres, “Optical security and encryption with totally incoherent light,” Opt. Lett. 26, 678–680 (2001). [CrossRef]
  13. T. Naughton, Y. Frauel, E. Tajahuerce, B. Javidi, “Compression of digital holograms for three-dimensional object reconstruction and recognition,” Appl. Opt. 41, 4124–4132 (2002). [CrossRef] [PubMed]
  14. G. Indebetouw, T.-C. Poon, “Novel approaches of incoherent image processing with emphasis on scanning methods,” Opt. Eng. 31, 2159–2167 (1992). [CrossRef]
  15. T.-C. Poon, M. Wu, K. Shinoda, Y. Suzuki, “Optical scanning holography,” Proc. IEEE 84, 753–764 (1996). [CrossRef]
  16. A. W. Lohmann, W. T. Rhodes, “Two-pupil synthesis of optical transfer functions,” Appl. Opt. 17, 1145–1151 (1978). [CrossRef]
  17. J. Mait, “Pupil-function design for complex incoherent spatial filtering,” J. Opt. Soc. Am. A 4, 1185–1193 (1987). [CrossRef]
  18. T.-C. Poon, “Three-dimensional fluorescence microscopy by optical scanning holography,” Opt. Photon. News 8(12), 22–23 (1997). [CrossRef]
  19. J. Swoger, M. Martinez-Corral, J. Huisken, E. H. K. Stelzer, “Optical scanning holography as a technique for high-resolution three-dimensional biological microscopy,” J. Opt. Soc. Am. A 19, 1910–1918 (2002). [CrossRef]
  20. T.-C. Poon, T. Kim, “Optical image recognition of three-dimensional objects,” Appl. Opt. 38, 370–381 (1999). [CrossRef]
  21. T. Kim, T.-C. Poon, G. Indebetouw, “Depth detection and image recovery in remote sensing by optical scanning holography,” Opt. Eng. 41, 1331–1338 (2002). [CrossRef]
  22. B. W. Schilling, G. C. Templeton, “Three-dimensional remote sensing by optical scanning holography,” Appl. Opt. 40, 5474–5481 (2001). [CrossRef]
  23. A. Korpel, “Acousto-optics,” in Applied Solid State Science, R. Wolfe, ed. (Academic, New York, 1972), Vol. 3, pp. 71–75.
  24. B. Schilling, T.-C. Poon, “Real-time pre-processing of holographic information,” Opt. Eng. 34, 3174–3180 (1995). [CrossRef]
  25. P. Réfrégier, B. Javidi, “Optical image encryption using input and Fourier plane random phase encoding,” Opt. Lett. 20, 767–769 (1995). [CrossRef]
  26. F. Goudail, F. Bollaro, B. Javidi, P. Réfrégier, “Influence of a perturbation in a double phase-encoding system,” J. Opt. Soc. Am. A 15, 2629–2638 (1998). [CrossRef]
  27. W. Diffe, M. Hellman, “New directions in cryptography,” IEEE Trans. Inf. Theory IT-22, 644–654 (1976). [CrossRef]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.

« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited