OSA's Digital Library

Applied Optics

Applied Optics

APPLICATIONS-CENTERED RESEARCH IN OPTICS

  • Editor: Joseph N. Mait
  • Vol. 49, Iss. 29 — Oct. 10, 2010
  • pp: 5632–5637

Image encryption by encoding with a nonuniform optical beam in gyrator transform domains

Zhengjun Liu, Lie Xu, Chuang Lin, and Shutian Liu  »View Author Affiliations


Applied Optics, Vol. 49, Issue 29, pp. 5632-5637 (2010)
http://dx.doi.org/10.1364/AO.49.005632


View Full Text Article

Enhanced HTML    Acrobat PDF (1131 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

Based on an optical gyrator transform system, an image encryption algorithm is designed and studied. An original secret image is regarded as the output intensity of the second gyrator transform. A coherent nonuniform optical beam is converted into the input of the first gyrator transform. A Gerchberg–Saxton phase retrieval algorithm is employed for obtaining the compensation phases in the first gyrator transform pair. The compensation phases are regarded as the encrypted image and key in this algorithm. The parameters of the laser beam and gyrator transform can serve as the additional key of encryption method. The decryption process of this encryption algorithm can be achieved with an optical system. Numerical simulations are performed to test the validity and capability of the encryption algorithm.

© 2010 Optical Society of America

OCIS Codes
(070.0070) Fourier optics and signal processing : Fourier optics and signal processing
(100.2000) Image processing : Digital image processing

ToC Category:
Image Processing

History
Original Manuscript: May 27, 2010
Manuscript Accepted: September 8, 2010
Published: October 7, 2010

Citation
Zhengjun Liu, Lie Xu, Chuang Lin, and Shutian Liu, "Image encryption by encoding with a nonuniform optical beam in gyrator transform domains," Appl. Opt. 49, 5632-5637 (2010)
http://www.opticsinfobase.org/ao/abstract.cfm?URI=ao-49-29-5632


Sort:  Author  |  Year  |  Journal  |  Reset  

References

  1. P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995). [CrossRef] [PubMed]
  2. G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000). [CrossRef]
  3. G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586 (2004). [CrossRef] [PubMed]
  4. X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044–1046 (2006). [CrossRef] [PubMed]
  5. X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31, 3261–3263 (2006). [CrossRef] [PubMed]
  6. W. Liu, G. Yang, and H. Xie, “A hybrid heuristic algorithm to improve known-plaintext attack on Fourier plane encryption,” Opt. Express 17, 13928–13938 (2009). [CrossRef] [PubMed]
  7. Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double-random phase encryption against various attacks,” Opt. Express 15, 10253–10265 (2007). [CrossRef] [PubMed]
  8. D. S. Monaghan, U. Gopinathan, T. J. Naughton, and J. T. Sheridan, “Key-space analysis of double random phase encryption technique,” Appl. Opt. 46, 6641–6647 (2007). [CrossRef] [PubMed]
  9. G. Situ, G. Pedrini, and W. Osten, “Strategy for cryptanalysis of optical encryption in the Fresnel domain,” Appl. Opt. 49, 457–462 (2010). [CrossRef] [PubMed]
  10. A. Alfalou and A. Mansour, “Double random phase encryption scheme to multiplex and simultaneous encode multiple images,” Appl. Opt. 48, 5933–5947 (2009). [CrossRef] [PubMed]
  11. X. F. Meng, L. Z. Cai, X. F. Xu, X. L. Yang, X. X. Shen, G. Y. Dong, and Y. R. Wang, “Two-step phase-shifting interferometry and its application in image encryption,” Opt. Lett. 31, 1414–1416 (2006). [CrossRef] [PubMed]
  12. S. Yuan, X. Zhou Xin, S. A. Mohammed, X. Lu, and X.-F. Li, “Information hiding based on double random-phase encoding and public-key cryptography,” Opt. Express 17, 3270–3284(2009). [CrossRef]
  13. R. Tao, Y. Xin, and Y. Wang, “Double image encryption based on random phase encoding in the fractional Fourier domain,” Opt. Express 15, 16067–16079 (2007). [CrossRef] [PubMed]
  14. L. Chen and D. Zhao, “Optical image encryption with Hartley transforms,” Opt. Lett. 31, 3438–3440 (2006). [CrossRef] [PubMed]
  15. Z. Liu, M. A. Ahmad, and S. Liu, “Image encryption scheme based on the commutation and anti-commutation rules,” Opt. Commun. 279, 285–290 (2007). [CrossRef]
  16. Y. Zhang, C.-H. Zheng, and N. Tanno, “Optical encryption based on iterative fractional Fourier transform,” Opt. Commun. 202, 277–285 (2002). [CrossRef]
  17. Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33, 2443–2445 (2008). [CrossRef] [PubMed]
  18. J. Rodrigo, T. Alieva, and M. L. Calvo, “Experimental implementation of the gyrator transform,” J. Opt. Soc. Am. A 24, 3135–3139 (2007). [CrossRef]
  19. J. Rodrigo, T. Alieva, and M. L. Calvo, “Gyrator transform: Properties and applications,” Opt. Express 15, 2190–2203(2007). [CrossRef] [PubMed]
  20. H. M. Ozaktas, Z. Zalevsky, and M. A. Kutay, Fractional Fourier Transform with Applications in Optics and Signal Processing (Wiley, 2000).
  21. H. Li and Y. Wang, “Double-image encryption based on iterative gyrator transform,” Opt. Commun. 281, 5745–5749(2008). [CrossRef]
  22. Z. Liu, H. Chen, T. Liu, P. Li, J. Dai, X. Sun, and S. Liu, “Double-image encryption based on the affine transform and the gyrator transform,” J. Opt. 12, 035407 (2010). [CrossRef]
  23. Z. Liu, Q. Guo, L. Xu, M. A. Ahmad, and S. Liu, “Double image encryption by using iterative random binary encoding in gyrator domains,” Opt. Express 18, 12033–12043 (2010). [CrossRef] [PubMed]
  24. J. A. Rodrigo, T. Alieva, M. L. Calvo, “Applications of gyrator transform for image processing,” Opt. Commun. 278, 279–284 (2007). [CrossRef]
  25. H. Li and Y. Wang, “Information security system based on iterative multiple-phase retrieval in gyrator domain,” Opt. Laser Technol. 40, 962–966 (2008). [CrossRef]
  26. R. W. Gerchberg and W. O. Saxton, “A practical algorithm for the determination of phase from image and diffraction plane pictures,” Optik (Jena) 35, 237–246 (1972).

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited