OSA's Digital Library

Applied Optics

Applied Optics

APPLICATIONS-CENTERED RESEARCH IN OPTICS

  • Editor: Joseph N. Mait
  • Vol. 48, Iss. 11 — Apr. 10, 2009
  • pp: 2099–2104

Wavelength multiplexing encryption using joint transform correlator architecture

Dafne Amaya, Myrian Tebaldi, Roberto Torroba, and Néstor Bolognini  »View Author Affiliations


Applied Optics, Vol. 48, Issue 11, pp. 2099-2104 (2009)
http://dx.doi.org/10.1364/AO.48.002099


View Full Text Article

Enhanced HTML    Acrobat PDF (742 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

We show that multiple secure data recording under a wavelength multiplexing technique is possible in a joint transform correlator (JTC) arrangement. We evaluate both the performance of the decrypting procedure and the influence of the input image size when decrypting with a wavelength different from that employed in the encryption step. This analysis reveals that the wavelength is a valid parameter to conduct image multiplexing encoding with the JTC architecture. In addition, we study the influence of the minimum wavelength change that prevents decoding cross talk. Computer simulations confirm the performance of the proposed technique.

© 2009 Optical Society of America

OCIS Codes
(070.0070) Fourier optics and signal processing : Fourier optics and signal processing
(070.4560) Fourier optics and signal processing : Data processing by optical means

ToC Category:
Fourier Optics and Signal Processing

History
Original Manuscript: December 11, 2008
Manuscript Accepted: February 20, 2009
Published: April 3, 2009

Citation
Dafne Amaya, Myrian Tebaldi, Roberto Torroba, and Néstor Bolognini, "Wavelength multiplexing encryption using joint transform correlator architecture," Appl. Opt. 48, 2099-2104 (2009)
http://www.opticsinfobase.org/ao/abstract.cfm?URI=ao-48-11-2099


Sort:  Author  |  Year  |  Journal  |  Reset  

References

  1. H.-Y. S. Li, Y. Qiao, and D. Psaltis, “Optical network for real-time face recognition,” Appl. Opt. 32, 5026-5035 (1993). [CrossRef] [PubMed]
  2. P. Refregier and B. Javidi, “Optical image encryption using input and Fourier plane random phase encoding,” Opt. Lett. 20, 767-769 (1995). [CrossRef] [PubMed]
  3. B. Javidi and T. Nomura, “Securing information by use of digital holography,” Opt. Lett. 25, 28-30 (2000). [CrossRef]
  4. T. Nomura and B. Javidi, “Optical encryption system with a binary key code,” Appl. Opt. 39, 4783-4787 (2000). [CrossRef]
  5. E. Tajahuerce, O. Matoba, S. C. Verrall, and B. Javidi, “Optoelectronic information encryption with phase-shifting interferometry,” Appl. Opt. 39, 2313-2320 (2000). [CrossRef]
  6. E. Tajahuerce and B. Javidi, “Encrypting three-dimensional information with digital holography,” Appl. Opt. 39, 6595-6601 (2000). [CrossRef]
  7. G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887-889 (2000). [CrossRef]
  8. B. Wang, C. Sun, W. Su, and A. E. T. Chiou, “Shift tolerance of a double random phase encryption system,” Appl. Opt. 39, 4788-4793 (2000). [CrossRef]
  9. J. F. Heanue, M. C. Bashaw, and L. Hesselink, “Encrypted holographic data storage based on orthogonal-phase-code multiplexing,” Appl. Opt. 34, 6012-6015 (1995). [CrossRef] [PubMed]
  10. F. H. Mok, “Angle-multiplexed storage of 5000 holograms in lithium niobate,” Opt. Lett. 18, 915-917 (1993). [CrossRef] [PubMed]
  11. O. Matoba and B. Javidi, “Encrypted optical storage with wavelength-key and random phase codes,” Appl. Opt. 38, 6785-6790 (1999).
  12. X. Tan, O. Matoba, T. Shimura, K. Kuroda, and B. Javidi, “Secure optical storage that uses fully phase encryption,” Appl. Opt. 39, 6689-6694 (2000). [CrossRef]
  13. B. M. Hennelly and J. B. Sheridan, “Image encryption and the fractional Fourier transform,” Optik (Jena) 114, 251-265(2003).
  14. G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584-1586 (2004). [CrossRef] [PubMed]
  15. B. M. Hennelly and J. T. Sheridan, “Random phase and jigsaw encryption in the Fresnel domain,” Opt. Eng. 43, 2239-2249(2004). [CrossRef]
  16. T. Nomura and B. Javidi, “Optical encryption using a joint transform correlator architecture,” Opt. Eng. 39, 2031-2035 (2000). [CrossRef]
  17. J. F. Barrera, R. Henao, M. Tebaldi, N. Bolognini, and R. Torroba, “Multiplexing encryption-decryption via lateral shifting of a random phase mask,” Opt. Commun. 259, 532-536 (2006). [CrossRef]
  18. J. F. Barrera, R. Henao, M. Tebaldi, N. Bolognini, and R. Torroba, “Multiplexing encrypted data by using polarized light,” Opt. Commun. 260, 109-112 (2006). [CrossRef]
  19. J. F. Barrera, R. Henao, M. Tebaldi, N. Bolognini, and R. Torroba, “Multiple image encryption using an aperture-modulated optical system,” Opt. Commun. 261, 29-33(2006). [CrossRef]
  20. J. F. Barrera, R. Henao, M. Tebaldi, R. Torroba, and N. Bolognini, “Code retrieval via undercover multiplexing,” Optik (Jena) 119, 139-142 (2008).
  21. G. Situ and J. Zhang, “Multiple-image encryption by wavelength multiplexing,” Opt. Lett. 30, 1306-1308 (2005). [CrossRef] [PubMed]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.

Figures

Fig. 1 Fig. 2 Fig. 3
 
Fig. 4 Fig. 5
 

« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited