OSA's Digital Library

Applied Optics

Applied Optics

APPLICATIONS-CENTERED RESEARCH IN OPTICS

  • Editor: Joseph N. Mait
  • Vol. 50, Iss. 29 — Oct. 10, 2011
  • pp: 5750–5757

Optical double-image cryptography based on diffractive imaging with a laterally-translated phase grating

Wen Chen, Xudong Chen, and Colin J. R. Sheppard  »View Author Affiliations


Applied Optics, Vol. 50, Issue 29, pp. 5750-5757 (2011)
http://dx.doi.org/10.1364/AO.50.005750


View Full Text Article

Enhanced HTML    Acrobat PDF (1428 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

In this paper, we propose a method using structured-illumination-based diffractive imaging with a laterally-translated phase grating for optical double-image cryptography. An optical cryptosystem is designed, and multiple random phase-only masks are placed in the optical path. When a phase grating is laterally translated just before the plaintexts, several diffraction intensity patterns (i.e., ciphertexts) can be correspondingly obtained. During image decryption, an iterative retrieval algorithm is developed to extract plaintexts from the ciphertexts. In addition, security and advantages of the proposed method are analyzed. Feasibility and effectiveness of the proposed method are demonstrated by numerical simulation results.

© 2011 Optical Society of America

OCIS Codes
(050.1940) Diffraction and gratings : Diffraction
(100.2000) Image processing : Digital image processing
(100.3190) Image processing : Inverse problems
(100.5070) Image processing : Phase retrieval
(100.4998) Image processing : Pattern recognition, optical security and encryption

ToC Category:
Image Processing

History
Original Manuscript: May 19, 2011
Revised Manuscript: July 9, 2011
Manuscript Accepted: July 9, 2011
Published: October 7, 2011

Citation
Wen Chen, Xudong Chen, and Colin J. R. Sheppard, "Optical double-image cryptography based on diffractive imaging with a laterally-translated phase grating," Appl. Opt. 50, 5750-5757 (2011)
http://www.opticsinfobase.org/ao/abstract.cfm?URI=ao-50-29-5750


Sort:  Author  |  Year  |  Journal  |  Reset  

References

  1. J. R. Fienup, “Phase retrieval algorithms: a comparison,” Appl. Opt. 21, 2758–2769 (1982). [CrossRef] [PubMed]
  2. J. Miao, P. Charalambous, J. Kirz, and D. Sayre, “Extending the methodology of X-ray crystallography to allow imaging of micrometer-sized non-crystalline specimens,” Nature 400, 342–344 (1999). [CrossRef]
  3. G. J. Williams, H. M. Quiney, B. B. Dhal, C. Q. Tran, K. A. Nugent, A. G. Peele, D. Paterson, and M. D. de Jonge, “Fresnel coherent diffractive imaging,” Phys. Rev. Lett. 97, 025506(2006). [CrossRef] [PubMed]
  4. Y. Nishino, Y. Takahashi, N. Imamoto, T. Ishikawa, and K. Maeshima, “Three-dimensional visualization of a human chromosome using coherent x-ray diffraction,” Phys. Rev. Lett. 102, 018101 (2009). [CrossRef] [PubMed]
  5. B. Abbey, K. A. Nugent, G. J. Williams, J. N. Clark, A. G. Peele, M. A. Pfeifer, M. de Jonge, and I. McNulty, “Keyhole coherent diffractive imaging,” Nat. Phys. 4, 394–398 (2008). [CrossRef]
  6. P. Thibault, M. Dierolf, A. Menzel, O. Bunk, C. David, and F. Pfeiffer, “High-resolution scanning x-ray diffraction microscopy,” Science 321, 379–382 (2008). [CrossRef] [PubMed]
  7. B. Chen, R. A. Dilanian, S. Teichmann, B. Abbey, A. G. Peele, G. J. Williams, P. Hannaford, L. V. Dao, H. M. Quiney, and K. A. Nugent, “Multiple wavelength diffractive imaging,” Phys. Rev. A 79, 023809 (2009). [CrossRef]
  8. I. K. Robinson, I. A. Vartanyants, G. J. Williams, M. A. Pfeifer, and J. A. Pitney, “Reconstruction of the shapes of gold nanocrystals using coherent x-ray diffraction,” Phys. Rev. Lett. 87, 195505 (2001). [CrossRef] [PubMed]
  9. M. A. Pfeifer, G. J. Williams, I. A. Vartanyants, R. Harder, and I. K. Robinson, “Three-dimensional mapping of a deformation field inside a nanocrystal,” Nature 442, 63–66 (2006). [CrossRef] [PubMed]
  10. J. Miao, C. C. Chen, C. Song, Y. Nishino, Y. Kohmura, T. Ishikawa, D. R. Johnson, T. K. Lee, and S. H. Risbud, “Three-dimensional GaN-Ga2O3 core shell structure revealed by x-ray diffraction microscopy,” Phys. Rev. Lett. 97, 215503(2006). [CrossRef] [PubMed]
  11. J. M. Zou, I. Vartanyants, M. Gao, R. Zhang, and L. A. Nagahara, “Atomic resolution imaging of a carbon nanotube from diffraction intensities,” Science 300, 1542 (2003). [CrossRef] [PubMed]
  12. V. Elser, “Phase retrieval by iterated projections,” J. Opt. Soc. Am. A 20, 40–55 (2003). [CrossRef]
  13. W. McBride, N. L. O’Leary, and L. J. Allen, “Retrieval of a complex-valued object from its diffraction pattern,” Phys. Rev. Lett. 93, 233902 (2004). [CrossRef] [PubMed]
  14. V. Elser, I. Rankenburg, and P. Thibault, “Searching with iterated maps,” Proc. Natl. Acad. Sci. U.S.A. 104, 418–423(2007). [CrossRef] [PubMed]
  15. U. Schnars and W. Jueptner, Digital Holography: Digital Hologram Recording, Numerical Reconstruction, and Related Techniques (Springer, 2005).
  16. W. Choi, C. F. Yen, K. Badizadegan, S. Oh, N. Lue, R. R. Dasari, and M. S. Feld, “Tomographic phase microscopy,” Nat. Methods 4, 717–719 (2007). [CrossRef] [PubMed]
  17. K. A. Nugent, A. G. Peele, H. N. Chapman, and A. P. Mancuso, “Unique phase recovery for nonperiodic objects,” Phys. Rev. Lett. 91, 203902 (2003). [CrossRef] [PubMed]
  18. H. M. L. Faulkner and J. M. Rodenburg, “Movable aperture lensless transmission microscopy: a novel phase retrieval algorithm,” Phys. Rev. Lett. 93, 023903 (2004). [CrossRef] [PubMed]
  19. F. Zhang, G. Pedrini, and W. Osten, “Phase retrieval of arbitrary complex-valued fields through aperture-plane modulation,” Phys. Rev. A 75, 043805 (2007). [CrossRef]
  20. I. Johnson, K. Jefimovs, O. Bunk, C. David, M. Dierolf, J. Gray, D. Renker, and F. Pfeiffer, “Coherent diffractive imaging using phase front modifications,” Phys. Rev. Lett. 100, 155503(2008). [CrossRef] [PubMed]
  21. P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995). [CrossRef] [PubMed]
  22. B. Javidi, “Securing information with optical technologies,” Phys. Today 50, 27–32 (1997). [CrossRef]
  23. G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586 (2004). [CrossRef] [PubMed]
  24. G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000). [CrossRef]
  25. H. Kim, D. H. Kim, and Y. H. Lee, “Encryption of digital hologram of 3-D object by virtual optics,” Opt. Express 12, 4912–4921 (2004). [CrossRef] [PubMed]
  26. O. Matoba, T. Nomura, E. P. Cabré, M. S. Millán, and B. Javidi, “Optical techniques for information security,” Proc. IEEE 97, 1128–1148 (2009). [CrossRef]
  27. X. F. Meng, L. Z. Cai, X. F. Xu, X. L. Yang, X. X. Shen, G. Y. Dong, and Y. R. Wang, “Two-step phase-shifting interferometry and its application in image encryption,” Opt. Lett. 31, 1414–1416 (2006). [CrossRef] [PubMed]
  28. X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044–1046 (2006). [CrossRef] [PubMed]
  29. J. W. Goodman, Introduction to Fourier Optics, 2nd ed. (McGraw-Hill, 1996).
  30. W. Chen, C. Quan, and C. J. Tay, “Extended depth of focus in a particle field measurement using a single-shot digital hologram,” Appl. Phys. Lett. 95, 201103 (2009). [CrossRef]
  31. W. Chen and X. Chen, “Space-based optical image encryption,” Opt. Express 18, 27095–27104 (2010). [CrossRef]
  32. W. Chen and X. Chen, “Optical asymmetric cryptography using a three-dimensional space-based model,” J. Opt. 13, 075404 (2011). [CrossRef]
  33. W. Chen and X. Chen, “Optical cryptography topology based on a three-dimensional particle-like distribution and diffractive imaging,” Opt. Express 19, 9008–9019 (2011). [CrossRef] [PubMed]
  34. W. Chen and X. Chen, “Quantitative phase retrieval of complex-valued specimens based on noninterferometric imaging,” Appl. Opt. 50, 2008–2015 (2011). [CrossRef] [PubMed]
  35. K. Matsushima and T. Shimobaba, “Band-limited angular spectrum method for numerical simulation of free-space propagation in far and near fields,” Opt. Express 17, 19662–19673 (2009). [CrossRef] [PubMed]
  36. Original plaintexts (Lena and Peppers): http://sipi.usc.edu/database.
  37. J. A. Rodrigo, H. Duadi, T. Alieva, and Z. Zalevsky, “Multi-stage phase retrieval algorithm based upon the gyrator transform,” Opt. Express 18, 1510–1520 (2010). [CrossRef] [PubMed]
  38. R. P. Yu and D. M. Paganin, “Blind phase retrieval for aberrated linear shift-invariant imaging systems,” New J. Phys. 12, 073040 (2010). [CrossRef]
  39. C. Wu, T. W. Ng, and A. Neild, “Phase and amplitude retrieval of objects embedded in a sinusoidal background from its diffraction pattern,” Appl. Opt. 49, 1831–1837 (2010). [CrossRef] [PubMed]
  40. Y. J. Liu, B. Chen, E. R. Li, J. Y. Wang, A. Marcelli, S. W. Wilkins, H. Ming, Y. C. Tian, K. A. Nugent, P. P. Zhu, and Z. Y. Wu, “Phase retrieval in x-ray imaging based on using structured illumination,” Phys. Rev. A 78, 023817 (2008). [CrossRef]
  41. W. Chen, X. Chen, and C. J. R. Sheppard, “Optical image encryption based on diffractive imaging,” Opt. Lett. 35, 3817–3819 (2010). [CrossRef] [PubMed]
  42. R. K. Wang, I. A. Watson, and C. Chatwin, “Random phase encoding for optical security,” Opt. Eng. 35, 2464–2469 (1996). [CrossRef]
  43. Y. Li, K. Kreske, and J. Rosen, “Security and encryption optical systems based on a correlator with significant output images,” Appl. Opt. 39, 5295–5301 (2000). [CrossRef]
  44. H. T. Chang, W. C. Lu, and C. J. Kuo, “Multiple-phase retrieval for optical security systems by use of random-phase encoding,” Appl. Opt. 41, 4825–4834 (2002). [CrossRef] [PubMed]
  45. G. Situ and J. Zhang, “A lensless optical security system based on computer-generated phase only masks,” Opt. Commun. 232, 115–122 (2004). [CrossRef]
  46. H. E. Hwang, H. T. Chang, and W. N. Lie, “Multiple-image encryption and multiplexing using a modified Gerchberg-Saxton algorithm and phase modulation in Fresnel-transform domain,” Opt. Lett. 34, 3917–3919 (2009). [CrossRef] [PubMed]
  47. W. Stallings, Cryptography and Network Security: Principles and Practice, 4th ed. (Prentice Hall, 2006).
  48. X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31, 3261–3263 (2006). [CrossRef] [PubMed]
  49. H. M. Ozaktas, Z. Zalevsky, and M. A. Kutay, The Fractional Fourier Transform With Applications in Optics and Signal Processing (Wiley, 2001).

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited