OSA's Digital Library

Applied Optics

Applied Optics


  • Editor: Joseph N. Mait
  • Vol. 49, Iss. 19 — Jul. 1, 2010
  • pp: 3814–3820

Hybrid encoding method for hiding information by assembling double-random phase-encoding technique and binary encoding method

Kuang Tsan Lin  »View Author Affiliations

Applied Optics, Vol. 49, Issue 19, pp. 3814-3820 (2010)

View Full Text Article

Enhanced HTML    Acrobat PDF (1003 KB)

Browse Journals / Lookup Meetings

Browse by Journal and Year


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools



A hybrid encoding method is used to assemble the double-random phase-encoding technique and the binary encoding method. Because the double-random phase-encoding technique is robust for noises and the binary encoding method is free of using external keys, the proposed hybrid encoding method has their advantages. The hybrid encoding method first encodes a covert image to form a complex- number matrix by using the double-random phase-encoding technique, where two random real-number matrices are used to increase the security of the encoding work. Then the elements of the two random real-number matrices and the elements of the complex-number matrix are encoded to form a binary-bit string by using the binary encoding method. Finally, the binary data in the binary-bit string are encoded into a host image to form an overt image with hidden information by using a gray-value modulation method. The decoding work is easy for authorized people, but it is very difficult for unauthorized people. Therefore, the proposed hybrid encoding method is a very useful encoding method.

© 2010 Optical Society of America

OCIS Codes
(070.2590) Fourier optics and signal processing : ABCD transforms
(070.4560) Fourier optics and signal processing : Data processing by optical means
(100.2000) Image processing : Digital image processing

ToC Category:
Image Processing

Original Manuscript: February 10, 2010
Manuscript Accepted: June 4, 2010
Published: June 30, 2010

Kuang Tsan Lin, "Hybrid encoding method for hiding information by assembling double-random phase-encoding technique and binary encoding method," Appl. Opt. 49, 3814-3820 (2010)

Sort:  Author  |  Year  |  Journal  |  Reset  


  1. P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995). [CrossRef] [PubMed]
  2. R. K. Wang, I. A. Watson, and C. Chatwin, “Random phase encoding for optical security,” Opt. Eng. 35, 2464–2469 (1996). [CrossRef]
  3. B. Javidi and E. Ahouzi, “Optical security system with Fourier plane encoding,” Appl. Opt. 37, 6247–6255 (1998). [CrossRef]
  4. O. Matoba and B. Javidi, “Secure holographic memory by double-random polarization encryption,” Appl. Opt. 43, 2915–2919 (2004). [CrossRef] [PubMed]
  5. M. N. Isiam and M. S. Alam, “Optical encryption and multiplexing of personal identification information using orthogonal code,” Opt. Eng. 45, 098201 (2006). [CrossRef]
  6. B. Javidi, G. Zhang, and J. Li, “Experimental demonstration of the random phase encoding technique for image encryption and security verification,” Opt. Eng. 35, 2506–2512 (1996). [CrossRef]
  7. B. Javidi, A. Sergent, G. Zhang, and L. Guibert, “Fault tolerance properties of a double phase encoding encryption technique,” Opt. Eng. 36, 992–998 (1997). [CrossRef]
  8. B. Javidi, A. Sergent, and E. Ahouzi, “Performance of double phase encoding encryption technique using binarized encrypted images,” Opt. Eng. 37, 565–569 (1998). [CrossRef]
  9. G. Unnikrishnan, J. Joheph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000). [CrossRef]
  10. B. Wang and C. C. Sun, “Enhancement of signal-to-noise ratio of a double random phase encoding encryption system,” Opt. Eng. 40, 1502–1506 (2001). [CrossRef]
  11. N. Takai and Y. Mifune, “Digital watermarking by a holographic technique,” Appl. Opt. 41, 865–873 (2002). [CrossRef] [PubMed]
  12. S. Kishk and B. Javidi, “Information hiding technique with double phase encoding,” Appl. Opt. 41, 5462–5470 (2002). [CrossRef] [PubMed]
  13. X. Zhou and J. G. Chen, “Information hiding based on double-random phase encoding technology,” J. Mod. Opt. 53, 1777–1783 (2006). [CrossRef]
  14. X. Zhou, D. Lai, S. Yuan, D. H. Li, and J. P. Hu, “A method for hiding information utilizing double-random phase-encoding technique,” Opt. Laser Technol. 39, 1360–1363 (2007). [CrossRef]
  15. R. Tao, Y. Xin, and Y. Wang, “Double image encryption based on random phase encoding in the fraction Fourier domain,” Opt. Express 15, 16067–16079 (2007). [CrossRef] [PubMed]
  16. D. S. Monaghan, G. Situ, U. Gopinathan, T. J. Naughton, and J. T. Sheridan, “Role of phase key in the double random phase encoding technique: an error analysis,” Appl. Opt. 47, 3808–3816 (2008). [CrossRef] [PubMed]
  17. G. Situ, D. S. Monaghan, T. J. Naughton, J. T. Sheridan, G. Pedrini, and W. Osten, “Collision in double random phase encoding,” Opt. Commun. 281, 5122–5125 (2008). [CrossRef]
  18. X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, “Security enhancement of double-random phase encryption by amplitude modulation,” Opt. Lett. 33, 1575–1577 (2008). [CrossRef] [PubMed]
  19. P. Kumar, J. Joseph, and K. Singh, “Double random phase encryption with in-plane rotation of a modified Lohmann’s second-type system in the anamorphic fractional Fourier domain,” Opt. Eng. 47, 117001 (2008). [CrossRef]
  20. D. S. Monaghan, G. Situ, U. Gopinathan, T. J. Naughton, and J. T. Sheridan, “Analysis of phase encoding for optical encryption,” Opt. Commun. 282, 482–492 (2009). [CrossRef]
  21. Z. Liu, J. Dai, X. Sun, and S. Liu, “Triple image encryption scheme in fractional Fourier transform domain,” Opt. Commun. 282, 518–522 (2009). [CrossRef]
  22. S. Jun, X. Hong, F. Li, and S. Nong, “Security analysis and improvement on a double-random phase-encoding technique based information hiding method,” Opt. Commun. 282, 2307–2317 (2009). [CrossRef]
  23. P. Kumar, J. Joseph, and K. Singh, “Impulse attack-free four random phase mask encryption based on a 4f optical system,” Appl. Opt. 48, 2356–2363 (2009). [CrossRef] [PubMed]
  24. Y. L. Xiao, X. Zhou, Q. Liu, and S. Yuan, “An image reconstruction method based on the double-random phase encoding system in the Fresnel domain,” Opt. Laser Technol. 41, 449–453 (2009). [CrossRef]
  25. K. T. Lin, “Digital information encrypted in an image using binary encoding,” Opt. Commun. 281, 3447–3453 (2008). [CrossRef]
  26. S. L. Yeh, “Dot-matrix hologram with an encrypted figure,” Opt. Eng. 45, 095801 (2006). [CrossRef]
  27. S. L. Yeh, S. T. Lin, and Y. C. Tu, “A diffusion pattern composed of two-dimensional diffusion dots for encrypting a digital image,” J. Opt. A: Pure Appl. Opt. 10, 115307 (2008). [CrossRef]
  28. M. Kutter and F. A. P. Petitcolas, “A fair benchmark for image watermarking systems,” Proc. SPIE 3657, 226–239 (1999). [CrossRef]
  29. T. K. Shih, L. C. Lu, and R. C. Chang, “An automatic image inpaint tool,” in Proceedings of the Eleventh ACM International Conference on Multimedia (Association for Computing Machinery, 2003), pp. 102–103. [CrossRef]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.

« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited