OSA's Digital Library

Applied Optics

Applied Optics

APPLICATIONS-CENTERED RESEARCH IN OPTICS

  • Editor: Joseph N. Mait
  • Vol. 51, Iss. 25 — Sep. 1, 2012
  • pp: 6076–6083

Interference-based optical image encryption using three-dimensional phase retrieval

Wen Chen and Xudong Chen  »View Author Affiliations


Applied Optics, Vol. 51, Issue 25, pp. 6076-6083 (2012)
http://dx.doi.org/10.1364/AO.51.006076


View Full Text Article

Enhanced HTML    Acrobat PDF (1105 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

In recent years, optical image encryption has attracted more and more attention in information security due to its unique advantages, such as parallel processing and multiple-parameter characteristics. In this paper, we propose a new method using three-dimensional (3D) processing strategy for interference-based optical image encryption. The plaintext is considered as a series of particles distributed in 3D space, and any one sectional extraction cannot render information about the plaintext during image decryption. In addition, the silhouette problem in the conventional interference-based optical encryption method is effectively suppressed, and the proposed optical cryptosystem can achieve higher security compared with the previous work. A numerical experiment is conducted to demonstrate the feasibility and effectiveness of the proposed method.

© 2012 Optical Society of America

OCIS Codes
(100.2000) Image processing : Digital image processing
(100.5070) Image processing : Phase retrieval
(100.6890) Image processing : Three-dimensional image processing
(100.4998) Image processing : Pattern recognition, optical security and encryption

ToC Category:
Image Processing

History
Original Manuscript: May 30, 2012
Revised Manuscript: July 26, 2012
Manuscript Accepted: August 1, 2012
Published: August 27, 2012

Citation
Wen Chen and Xudong Chen, "Interference-based optical image encryption using three-dimensional phase retrieval," Appl. Opt. 51, 6076-6083 (2012)
http://www.opticsinfobase.org/ao/abstract.cfm?URI=ao-51-25-6076


Sort:  Author  |  Year  |  Journal  |  Reset  

References

  1. P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995). [CrossRef]
  2. B. L. Volodin, B. Kippelen, K. Meerholz, B. Javidi, and N. Peyghambarian, “A polymeric optical pattern-recognition system for security verification,” Nature 383, 58–60 (1996). [CrossRef]
  3. B. Javidi, “Securing information with optical technologies,” Phys. Today 50, 27–32 (1997). [CrossRef]
  4. G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000). [CrossRef]
  5. G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586 (2004). [CrossRef]
  6. Z. Liu, L. Xu, C. Lin, and S. Liu, “Image encryption by encoding with a nonuniform optical beam in gyrator transform domains,” Appl. Opt. 49, 5632–5637 (2010). [CrossRef]
  7. X. Peng, L. Yu, and L. Cai, “Double-lock for image encryption with virtual optical wavelength,” Opt. Express 10, 41–45 (2002).
  8. N. Zhou, Y. Wang, and L. Gong, “Novel optical image encryption scheme based on fractional Mellin transform,” Opt. Commun. 284, 3234–3242 (2011). [CrossRef]
  9. A. Carnicer, M. M. Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys,” Opt. Lett. 30, 1644–1646 (2005). [CrossRef]
  10. X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044–1046 (2006). [CrossRef]
  11. X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31, 3261–3263 (2006). [CrossRef]
  12. R. K. Wang, I. A. Watson, and C. Chatwin, “Random phase encoding for optical security,” Opt. Eng. 35, 2464–2469 (1996). [CrossRef]
  13. Y. Li, K. Kreske, and J. Rosen, “Security and encryption optical systems based on a correlator with significant output images,” Appl. Opt. 39, 5295–5301 (2000). [CrossRef]
  14. H. T. Chang, W. C. Lu, and C. J. Kuo, “Multiple-phase retrieval for optical security systems by use of random-phase encoding,” Appl. Opt. 41, 4825–4834 (2002). [CrossRef]
  15. X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, “Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain,” J. Opt. A Pure Appl. Opt. 9, 1070–1075 (2007). [CrossRef]
  16. Y. L. Xiao, X. Zhou, S. Yuan, Q. Liu, and Y. C. Li, “Multiple-image optical encryption: an improved encoding approach,” Appl. Opt. 48, 2686–2692 (2009). [CrossRef]
  17. H. E. Hwang, H. T. Chang, and W. N. Lie, “Multiple-image encryption and multiplexing using a modified Gerchberg–Saxton algorithm and phase modulation in Fresnel-transform domain,” Opt. Lett. 34, 3917–3919 (2009). [CrossRef]
  18. H. T. Chang, H. E. Hwang, C. L. Lee, and M. T. Lee, “Wavelength multiplexing multiple-image encryption using cascaded phase-only masks in the Fresnel transform domain,” Appl. Opt. 50, 710–716 (2011). [CrossRef]
  19. H. T. Chang, H. E. Hwang, and C. L. Lee, “Position multiplexing multiple-image encryption using cascaded phase-only masks in Fresnel transform domain,” Opt. Commun. 284, 4146–4151 (2011). [CrossRef]
  20. R. W. Gerchberg and W. O. Saxton, “A practical algorithm for the determination of phase from image and diffraction plane pictures,” Optik 35, 237–246 (1972).
  21. Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33, 2443–2445 (2008). [CrossRef]
  22. W. Chen, C. Quan, and C. J. Tay, “Optical color image encryption based on Arnold transform and interference method,” Opt. Commun. 282, 3680–3685 (2009). [CrossRef]
  23. P. Kumar, J. Joseph, and K. Singh, “Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator,” Appl. Opt. 50, 1805–1811 (2011). [CrossRef]
  24. Y. Zhang, B. Wang, and Z. Dong, “Enhancement of image hiding by exchanging two phase masks,” J. Opt. A Pure Appl. Opt. 11, 125406 (2009). [CrossRef]
  25. B. Yang, Z. Liu, B. Wang, Y. Zhang, and S. Liu, “Optical stream-cipher-like system for image encryption based on Michelson interferometer,” Opt. Express 19, 2634–2642 (2011). [CrossRef]
  26. H. M. Ozaktas, Z. Zalevsky, and M. A. Kutay, The Fractional Fourier Transform With Applications in Optics and Signal Processing (Wiley, 2001).
  27. Y. Zhang, C. H. Zheng, and N. Tanno, “Optical encryption based on iterative fractional Fourier transform,” Opt. Commun. 202, 277–285 (2002). [CrossRef]
  28. W. Chen, X. Chen, and C. J. R. Sheppard, “Optical image encryption based on diffractive imaging,” Opt. Lett. 35, 3817–3819 (2010). [CrossRef]
  29. W. Chen and X. Chen, “Optical cryptography topology based on a three-dimensional particle-like distribution and diffractive imaging,” Opt. Express 19, 9008–9019 (2011). [CrossRef]
  30. B. Wang and Y. Zhang, “Double images hiding based on optical interference,” Opt. Commun. 282, 3439–3443 (2009). [CrossRef]
  31. N. Zhu, Y. T. Wang, J. Liu, J. H. Xie, and H. Zhang, “Optical image encryption based on interference of polarized light,” Opt. Express 17, 13418–13424 (2009). [CrossRef]
  32. C. H. Niu, X. L. Wang, N. G. Lv, Z. H. Zhou, and X. Y. Li, “An encryption method with multiple encrypted keys based on interference principle,” Opt. Express 18, 7827–7834 (2010). [CrossRef]
  33. W. Chen and X. Chen, “Optical multiple-image encryption based on multiplane phase retrieval and interference,” J. Opt. 13, 115401 (2011). [CrossRef]
  34. C. F. Ying, H. Pang, C. J. Fan, and W. D. Zhou, “New method for the design of a phase-only computer hologram for multiplane reconstruction,” Opt. Eng. 50, 055802 (2011). [CrossRef]
  35. W. Chen, X. Chen, and C. J. R. Sheppard, “Optical image encryption based on phase retrieval combined with three-dimensional particle-like distribution,” J. Opt. 14, 075402 (2012). [CrossRef]
  36. W. Chen and X. Chen, “Space-based optical image encryption,” Opt. Express 18, 27095–27104 (2010). [CrossRef]
  37. W. Chen, X. Chen, and C. J. R. Sheppard, “Optical double-image cryptography based on diffractive imaging with a laterally-translated phase grating,” Appl. Opt. 50, 5750–5757(2011). [CrossRef]
  38. W. Chen and X. Chen, “Optical image encryption using multilevel Arnold transform and noninterferometric imaging,” Opt. Eng. 50, 117001 (2011). [CrossRef]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited