OSA's Digital Library

Applied Optics

Applied Optics


  • Editor: Joseph N. Mait
  • Vol. 51, Iss. 10 — Apr. 1, 2012
  • pp: 1446–1452

Image encryption based on interference that uses fractional Fourier domain asymmetric keys

Sudheesh K. Rajput and Naveen K. Nishchal  »View Author Affiliations

Applied Optics, Vol. 51, Issue 10, pp. 1446-1452 (2012)

View Full Text Article

Enhanced HTML    Acrobat PDF (1505 KB)

Browse Journals / Lookup Meetings

Browse by Journal and Year


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools



We propose an image encryption technique based on the interference principle and phase-truncation approach in the fractional Fourier domain. The proposed scheme offers multiple levels of security with asymmetric keys and is free from the silhouette problem. Multiple input images bonded with random phase masks are independently fractional Fourier transformed. Amplitude truncation of obtained spectrum helps generate individual and universal keys while phase truncation generates two phase-only masks analytically. For decryption, these two phase-only masks optically interfere, and this results in the phase-truncated function in the output. After using the correct random phase mask, universal key, individual key, and fractional orders, the original image is retrieved successfully. Computer simulation results with four gray-scale images validate the proposed method. To measure the effectiveness of the proposed method, we calculated the mean square error between the original and the decrypted images. In this scheme, the encryption process and decryption keys formation are complicated and should be realized digitally. For decryption, an optoelectronic scheme has been suggested.

© 2012 Optical Society of America

OCIS Codes
(070.0070) Fourier optics and signal processing : Fourier optics and signal processing
(100.1160) Image processing : Analog optical image processing
(090.1995) Holography : Digital holography
(070.2575) Fourier optics and signal processing : Fractional Fourier transforms
(070.2615) Fourier optics and signal processing : Frequency filtering
(060.4785) Fiber optics and optical communications : Optical security and encryption

ToC Category:
Fourier Optics and Signal Processing

Original Manuscript: November 28, 2011
Revised Manuscript: January 14, 2012
Manuscript Accepted: January 14, 2012
Published: March 22, 2012

Sudheesh K. Rajput and Naveen K. Nishchal, "Image encryption based on interference that uses fractional Fourier domain asymmetric keys," Appl. Opt. 51, 1446-1452 (2012)

Sort:  Author  |  Year  |  Journal  |  Reset  


  1. P. Refregier and B. Javidi, “Optical image encryption based on input plane encoding and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995). [CrossRef]
  2. O. Matoba and B. Javidi, “Encrypted optical memory system using three-dimensional keys in the Fresnel domain,” Opt. Lett. 24, 762–764 (1999). [CrossRef]
  3. G. Situ and J. Zhang, “Multiple image encryption by wavelength multiplexing,” Opt. Lett. 30, 1306–1308 (2005). [CrossRef]
  4. J. F. Barrera, R. Henao, R. Torroba, M. Tebaldi, and N. Bolognini, “Multiplexing encryption-decryption via lateral shifting of a random phase mask,” Opt. Commun. 259, 532–536 (2006). [CrossRef]
  5. H.-E. Hwang, H. T. Chang, and W.-N. Lie, “Multiple-image encryption and multiplexing using a modified Gerchberg-Saxton algorithm and phase modulation in Fresnel-transform domain,” Opt. Lett. 34, 3917–3919 (2009). [CrossRef]
  6. G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000). [CrossRef]
  7. B. Hennelly and J. T. Sheridan, “Optical image encryption by random shifting in fractional Fourier domains,” Opt. Lett. 28, 269–271 (2003). [CrossRef]
  8. N. Singh and A. Sinha, “Optical image encryption using fractional Fourier transform and chaos,” Opt. Lasers Eng. 46, 117–123 (2008). [CrossRef]
  9. A. Alfalou and C. Brosseau, “Optical image compression and encryption methods,” Opt. Photon. 1, 589–636 (2009). [CrossRef]
  10. B. Zhu, S. Liu, and Q. Ran, “Optical image encryption based on multifractional Fourier transforms,” Opt. Lett. 25, 1159–1161 (2000). [CrossRef]
  11. N. K. Nishchal and T. J. Naughton, “Flexible optical encryption with multiple users and multiple security levels,” Opt. Commun. 284, 735–739 (2011). [CrossRef]
  12. Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33, 2443–2445 (2008). [CrossRef]
  13. Y. Zhang, B. Wang, and Z. Dong, “Enhancement of image hiding by exchanging two phase masks,” J. Opt. A: Pure Appl. Opt. 11, 125406 (2009). [CrossRef]
  14. Y. Han and Y. Zhang, “Optical image encryption based on two beams interference,” Opt. Commun. 283, 1690–1692 (2010). [CrossRef]
  15. C. H. Niu, X. L. Wang, N. G. Lv, Z. H Zhou, and X. Y. Li, “An encryption method with multiple encrypted keys based on interference principle,” Opt. Express 18, 7827–7834(2010). [CrossRef]
  16. D. Weng, N. Zhu, Y. Wang, J. Xie, and J. Liu, “Experimental verification of optical image encryption based on interference,” Opt. Commun. 284, 2485–2487 (2011). [CrossRef]
  17. P. Kumar, J. Joseph, and K. Singh, “Optical image encryption using jigsaw transform for silhouette removal in interference-based methods and decryption with single spatial light modulator,” Appl. Opt. 50, 1805–1811 (2011). [CrossRef]
  18. B. Yang, Z. Liu, B. Wang, Y. Zhang, and S. Liu, “Optical stream-cipher-like system for image encryption based on Michelson interferometer,” Opt. Express 19, 2634–2642 (2011). [CrossRef]
  19. S. Yuan, S.-X. Yao, Y.-H. Xin, and M.-T. Liu, “Information hiding based on the optical interference principle,” Opt. Commun. 284, 5078–5083 (2011). [CrossRef]
  20. W. Stallings, Cryptography and Network Security: Principles and Practice, 5th ed. (Prentice-Hall, 2011).
  21. X. Peng, H. Wie, and P. Zhang, “Asymmetric cryptography based on wavefront sensing,” Opt. Lett. 31, 3579–3581 (2006). [CrossRef]
  22. W. Qin and X. Peng, “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35, 118–120 (2010). [CrossRef]
  23. W. Qin, X. Peng, X. Meng, and B. Gao, “Universal and special keys based on phase-truncated Fourier transform,” Opt. Eng. 50, 080501 (2011). [CrossRef]
  24. X. Wang and D. Zhao, “Multiple-image encryption based on nonlinear amplitude-truncation and phase-truncation in Fourier domain,” Opt. Commun. 284, 148–152 (2011). [CrossRef]
  25. X. Wang and D. Zhao, “Security enhancement of a phase-truncation based image encryption algorithm,” Appl. Opt. 50, 6645–6651 (2011). [CrossRef]
  26. A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of the optical encryption schemes based on double random phase keys,” Opt. Lett. 30, 1644–1646 (2005). [CrossRef]
  27. X. Peng, P. Chang, H. Wei, and B. Yu, “Known plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044–1046 (2006). [CrossRef]
  28. Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15, 10253–10265 (2007). [CrossRef]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.

« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited