OSA's Digital Library

Applied Optics

Applied Optics


  • Editor: James C. Wyant
  • Vol. 45, Iss. 14 — May. 10, 2006
  • pp: 3289–3297

Information security system by iterative multiple-phase retrieval and pixel random permutation

Xiang-Feng Meng, Lu-Zhong Cai, Xiu-Lun Yang, Xiao-Xia Shen, and Guo-Yan Dong  »View Author Affiliations

Applied Optics, Vol. 45, Issue 14, pp. 3289-3297 (2006)

View Full Text Article

Enhanced HTML    Acrobat PDF (1158 KB)

Browse Journals / Lookup Meetings

Browse by Journal and Year


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools



A novel information security system based on multiple-phase retrieval by an iterative Fresnel-transform algorithm and pixel random permutation (PRP) technique is proposed. In this method a series of phase masks cascaded in free space are employed and the phase distributions of all the masks are adjusted simultaneously in each iteration. It can achieve faster convergence and better quality of the recovered image compared with double-phase encoding and a similar approach in the spatial-frequency domain with the same number of phase masks and can provide a higher degree of freedom in key space with more geometric parameters as supplementary keys. Furthermore, the security level of this method is greatly improved by the introduction of the PRP technique. The feasibility of this method and its robustness against occlusion and additional noise attacks are verified by computer simulations. The performance of this technique for different numbers of phase masks and quantized phase levels is investigated systematically with the correlation coefficient and mean square error as convergence criterions.

© 2006 Optical Society of America

OCIS Codes
(050.1970) Diffraction and gratings : Diffractive optics
(100.2000) Image processing : Digital image processing
(100.3010) Image processing : Image reconstruction techniques
(100.5070) Image processing : Phase retrieval

Original Manuscript: August 24, 2005
Revised Manuscript: November 8, 2005
Manuscript Accepted: December 5, 2005

Xiang-Feng Meng, Lu-Zhong Cai, Xiu-Lun Yang, Xiao-Xia Shen, and Guo-Yan Dong, "Information security system by iterative multiple-phase retrieval and pixel random permutation," Appl. Opt. 45, 3289-3297 (2006)

Sort:  Author  |  Year  |  Journal  |  Reset  


  1. P. Refrégier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995). [CrossRef] [PubMed]
  2. O. Matoba and B. Javidi, "Encrypted optical memory system using three-dimensional keys in the Fresnel domain," Opt. Lett. 24, 762-764 (1999). [CrossRef]
  3. S. Kishk and B. Javidi, "Information hiding technique with double phase encoding," Appl. Opt. 41, 5462-5470 (2002). [CrossRef] [PubMed]
  4. T. Nomura, S. Mikan, Y. Morimoto, and B. Javidi, "Secure optical data storage with random phase key codes by use of a configuration of a joint transform correlator," Appl. Opt. 42, 1508-1514 (2003). [CrossRef] [PubMed]
  5. B. Javidi, Optical and Digital Techniques for Information Security (Springer, 2005). [CrossRef]
  6. T. Nomura, K. Uota, and Y. Morimoto, "Hybrid optical encryption of a 3-D object using a digital holographic technique," Opt. Eng. 43, 2228-2232 (2004). [CrossRef]
  7. E. Tajahuerce and B. Javidi, "Encrypting three dimensional information with digital holography," Appl. Opt. 39, 6595-6601 (2000). [CrossRef]
  8. B. Javidi and T. Nomura, "Securing information by use of digital holography," Opt. Lett. 25, 28-30 (2000). [CrossRef]
  9. N. Takai and Y. Mifune, "Digital watermarking by a holographic technique," Appl. Opt. 41, 865-873 (2002). [CrossRef] [PubMed]
  10. G. Unnikrishnan, J. Joseph, and K. Singh, "Optical encryption by double-random phase encoding in the fractional Fourier domain," Opt. Lett. 25, 887-889 (2000). [CrossRef]
  11. B. Hennelly and J. T. Sheridan, "Optical image encryption by random shifting in fractional Fourier domains," Opt. Lett. 28, 269-271 (2003). [CrossRef] [PubMed]
  12. L. Yu, X. Peng, and L. Cai, "Parameterized multi-dimensional data encryption by digital optics," Opt. Commun. 203, 67-77 (2002). [CrossRef]
  13. H. Kim, D. H. Kim, and Y. H. Lee, "Encryption of digital hologram of 3-D object by virtual optics," Opt. Express 12, 4912-4921 (2004). [CrossRef] [PubMed]
  14. B. Javidi and T. Nomura, "Polarization encoding for optical security systems," Opt. Eng. 39, 2439-2443 (2000). [CrossRef]
  15. X. Tan, O. Matoba, Y. Okada-Shudo, M. Ide, T. Shimura, and K. Kuroda, "Secure optical memory system with polarization encryption," Appl. Opt. 40, 2310-2315 (2001). [CrossRef]
  16. R. K. Wang, I. A. Watson, and C. Chatwin, "Random phase encoding for optical security," Opt. Eng. 35, 2464-2468 (1996). [CrossRef]
  17. Y. Li, K. Kreske, and J. Rosen, "Security and encryption optical systems based on a correlator with significant output images," Appl. Opt. 39, 5295-5301 (2000). [CrossRef]
  18. H. T. Chang, "Image encryption using separable amplitude-based virtual image and iteratively retrieved phase information," Opt. Eng. 40, 2165-2171 (2001). [CrossRef]
  19. J. Rosen, "Learning in correlators based on projections onto constraint sets," Opt. Lett. 18, 1183-1185 (1993). [CrossRef] [PubMed]
  20. H. T. Chang, W. C. Lu, and C. J. Kuo, "Multiple-phase retrieval for optical security systems by use of random-phase encoding," Appl. Opt. 41, 4825-4834 (2002). [CrossRef] [PubMed]
  21. G. Situ and J. Zhang, "Image hiding with computer-generated phase codes for optical authentication," Opt. Commun. 245, 55-65 (2005). [CrossRef]
  22. G. Situ and J. Zhang, "A cascaded iterative Fourier transform algorithm for optical security applications," Optik (Stuttgart) 114, 473-477 (2003). [CrossRef]
  23. G. Situ and J. Zhang, "A lensless optical security system based on computer-generated phase only masks," Opt. Commun. 232, 115-122 (2004). [CrossRef]
  24. J. Rosen and B. Javidi, "Hidden images in halftone pictures," Appl. Opt. 40, 3346-3353 (2001). [CrossRef]
  25. D. Abookasis, O. Arazi, J. Rosen, and B. Javidi, "Security optical systems based on a joint transform correlator with significant output images," Opt. Eng. 40, 1584-1589 (2001). [CrossRef]
  26. H. T. Chang and C. T. Chen, "Asymmetric-image verification for security optical system based on joint transform correlator architecture," Opt. Commun. 239, 43-54 (2004). [CrossRef]
  27. C. H. Yeh, H. T. Chang, H. C. Chien, and C. J. Kuo, "Design of cascaded phase keys for a hierarchical security system," Appl. Opt. 41, 6128-6134 (2002). [CrossRef] [PubMed]
  28. J. R. Flenup, "Phase retrieval algorithms: a comparison," Appl. Opt. 21, 2758-2769 (1982). [CrossRef]
  29. J. Zhao, H. Lu, X. Song, J. Li, and Y. Ma, "Optical image encryption based on multistage fractional Fourier transforms and pixel scrambling technique," Opt. Commun. 249, 493-499 (2005). [CrossRef]
  30. G. S. Spagnolo, C. Simonetti, and L. Cozzella, "Content fragile watermarking based on a computer generated hologram coding technique," J. Opt. 7, 333-342 (2005). [CrossRef]
  31. J. N. Mait, "Understanding diffractive optic design in the scalar domain," J. Opt. Soc. Am. A 12, 2145-2158 (1995). [CrossRef]
  32. L. Z. Cai, M. Z. He, Q. Liu, and X. L. Yang, "Digital image encryption and watermarking by phase-shifting interferometry," Appl. Opt. 43, 3078-3084 (2004). [CrossRef] [PubMed]
  33. X. F. Meng, L. Z. Cai, M. Z. He, G. Y. Dong, and X. X. Shen, "Cross-talk-free double-image encryption and watermarking with amplitude-phase separate modulations," J. Opt. 7, 624-631 (2005). [CrossRef]
  34. M. Z. He, L. Z. Cai, Q. Liu, W. C. Wang, and X. F. Meng, "Multiple image encryption and watermarking by random phase matching," Opt. Commun. 247, 29-37 (2005). [CrossRef]
  35. M. Z. He, L. Z. Cai, Q. Liu, and X. L. Yang, "Phase-only encryption and watermarking based on phase-shifting interferometry," Appl. Opt. 44, 2600-2606 (2005). [CrossRef] [PubMed]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.

« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited