OSA's Digital Library

Applied Optics

Applied Optics


  • Vol. 43, Iss. 20 — Jul. 9, 2004
  • pp: 4011–4016

Shift-tolerance property of fully phase encryption that uses a joint transform correlator

Dong-Hoan Seo, Chang-Mok Shin, and Soo-Joong Kim  »View Author Affiliations

Applied Optics, Vol. 43, Issue 20, pp. 4011-4016 (2004)

View Full Text Article

Enhanced HTML    Acrobat PDF (321 KB)

Browse Journals / Lookup Meetings

Browse by Journal and Year


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools



We technically investigate the robustness of an image encryption technique that uses a virtual phase image and a joint transform correlator (JTC) in the frequency domain. An encrypted image is obtained by the Fourier transform of the product of a virtual phase image, which camouflages the original image, and a random phase image. The resulting image is then decrypted by use of a decrypting key made from the proposed phase assignment rule in order to enhance the level of security. We demonstrate that the encrypted image generated by the proposed JTC-based decryption technique is robust to data loss and image shift.

© 2004 Optical Society of America

OCIS Codes
(070.1170) Fourier optics and signal processing : Analog optical signal processing
(070.4560) Fourier optics and signal processing : Data processing by optical means
(100.1160) Image processing : Analog optical image processing
(100.3010) Image processing : Image reconstruction techniques

Original Manuscript: September 15, 2003
Revised Manuscript: March 15, 2004
Published: July 10, 2004

Dong-Hoan Seo, Chang-Mok Shin, and Soo-Joong Kim, "Shift-tolerance property of fully phase encryption that uses a joint transform correlator," Appl. Opt. 43, 4011-4016 (2004)

Sort:  Author  |  Year  |  Journal  |  Reset  


  1. B. Javidi, J. L. Horner, “Optical pattern recognition for validation and security verification,” Opt. Eng. 33, 1752–1756 (1994). [CrossRef]
  2. P. Réfrégier, B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995). [CrossRef] [PubMed]
  3. B. Javidi, G. Zhang, J. Li, “Experimental demonstration of the random phase encoding technique for image encryption and security verification,” Opt. Eng. 35, 2506–2512 (1996). [CrossRef]
  4. B. Javidi, E. Ahouzi, “Optical security system with Fourier plane encoding,” Appl. Opt. 37, 6247–6255 (1998). [CrossRef]
  5. N. Towghi, B. Javidi, Z. Luo, “Fully phase encrypted image processor,” J. Opt. Soc. Am. A 16, 1915–1927 (1999). [CrossRef]
  6. P. C. Mogensen, J. Glückstad, “Phase-only optical decryption of a fixed mask,” Appl. Opt. 40, 1226–1235 (2001). [CrossRef]
  7. H. T. Chang, “Image encryption using separable amplitude-based virtual image and iteratively retrieved phase information,” Opt. Eng. 40, 2165–2171 (2001). [CrossRef]
  8. B. Javidi, A. Sergent, G. Zhang, L. Guibert, “Fault tolerance properties of a double phase encoding encryption technique,” Opt. Eng. 36, 992–998 (1997). [CrossRef]
  9. B. Javidi, A. Sergent, E. Ahouzi, “Performance of double phase encoding encryption technique using binarized encrypted images,” Opt. Eng. 37, 565–569 (1998). [CrossRef]
  10. B. Wang, C. C. Sun, W. C. Su, A. E. T. Chiou, “Shift-tolerance property of an optical double-random phase-encoding encryption system,” Appl. Opt. 39, 4788–4793 (2000). [CrossRef]
  11. B. Wang, C. C. Sun, “Enhancement of signal-to-noise ratio of a double random phase encoding encryption system,” Opt. Eng. 40, 1502–1506 (2001). [CrossRef]
  12. T. Nomura, B. Javidi, “Optical encryption using a joint transform correlator architecture,” Opt. Eng. 39, 2031–2035 (2000). [CrossRef]
  13. T. Nomura, B. Javidi, “Optical encryption system with a binary key code,” Appl. Opt. 39, 4783–4787 (2000). [CrossRef]
  14. M. Yamazaki, J. Ohtsubo, “Optimization of encrypted holograms in optical security systems,” Opt. Eng. 40, 132–137 (2001). [CrossRef]
  15. J. Ohtsubo, A. Fujimoto, “Practical image encryption and decryption by phase-coding technique for optical security systems,” Appl. Opt. 41, 4848–4855 (2002). [CrossRef] [PubMed]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.

« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited