OSA's Digital Library

Applied Optics

Applied Optics

APPLICATIONS-CENTERED RESEARCH IN OPTICS

  • Editor: Joseph N. Mait
  • Vol. 52, Iss. 17 — Jun. 10, 2013
  • pp: 3987–3992

Interference-based multiple-image encryption with silhouette removal by position multiplexing

Yi Qin and Qiong Gong  »View Author Affiliations


Applied Optics, Vol. 52, Issue 17, pp. 3987-3992 (2013)
http://dx.doi.org/10.1364/AO.52.003987


View Full Text Article

Enhanced HTML    Acrobat PDF (690 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

An approach for multiple-image encryption based on interference and position multiplexing is proposed. In the encryption process, multiple images are analytically hidden into three phase-only masks (POMs). The encryption algorithm for this method is quite simple and does not need iterative encoding. For decryption, both the digital method and optical method could be employed. Also, we analyze the multiplexing capacity through the correlation coefficient. In addition, the silhouette problem that exists in previous interference-based encryption methods with two POMs can be eliminated during the generation procedure of POMs based on the interference principle. Simulation results are presented to verify the validity of the proposed approach.

© 2013 Optical Society of America

OCIS Codes
(070.0070) Fourier optics and signal processing : Fourier optics and signal processing
(100.0100) Image processing : Image processing

ToC Category:
Image Processing

History
Original Manuscript: April 2, 2013
Revised Manuscript: May 12, 2013
Manuscript Accepted: May 13, 2013
Published: June 6, 2013

Citation
Yi Qin and Qiong Gong, "Interference-based multiple-image encryption with silhouette removal by position multiplexing," Appl. Opt. 52, 3987-3992 (2013)
http://www.opticsinfobase.org/ao/abstract.cfm?URI=ao-52-17-3987


Sort:  Author  |  Year  |  Journal  |  Reset  

References

  1. A. Alfalou and C. Brosseau, “Optical image compression and encryption methods,” Adv. Opt. Photon. 1, 589–636 (2009). [CrossRef]
  2. P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995). [CrossRef]
  3. G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000). [CrossRef]
  4. G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586 (2004). [CrossRef]
  5. X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044–1046 (2006). [CrossRef]
  6. X. Peng, H. Q. Tang, and J. D. Tian, “Ciphertext only attack on double random phase encoding optical encryption system,” Acta. Phys. Sin. 56, 2629–2636 (2007).
  7. H. T. Chang, W. C. Lu, and C. J. Kuo, “Multiple-phase retrieval for optical security systems by use of random-phase encoding,” Appl. Opt. 41, 4825–4834 (2002). [CrossRef]
  8. Y. Li, K. Kreske, and J. Rosen, “Security and encryption optical systems based on a correlator with significant output images,” Appl. Opt. 39, 5295–5301 (2000). [CrossRef]
  9. Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33, 2443–2445 (2008). [CrossRef]
  10. X. Wang and D. Zhao, “Optical image hiding with silhouette removal based on the optical interference principle,” Appl. Opt. 51, 686–691 (2012). [CrossRef]
  11. G. Situ and J. Zhang, “Position multiplexing for multiple-image encryption,” J. Opt. A 8, 391–397 (2006). [CrossRef]
  12. G. Situ and J. Zhang, “Multiple-image encryption by wavelength multiplexing,” Opt. Lett. 30, 1306–1308 (2005). [CrossRef]
  13. D. Amaya, M. Tebaldi, R. Torroba, and N. Bolognini, “Wavelength multiplexing encryption using joint transform correlator architecture,” Appl. Opt. 48, 2099–2104 (2009). [CrossRef]
  14. H. Hwang, H. T. Chang, and W. Lie, “Multiple-image encryption and multiplexing using a modified Gerchberg–Saxton algorithm and phase modulation in Fresnel-transform domain,” Opt. Lett. 34, 3917–3919 (2009). [CrossRef]
  15. B. Wang and Y. Zhang, “Double images hiding based on optical interference,” Opt. Commun. 282, 3439–3443 (2009). [CrossRef]
  16. W. Chen and X. Chen, “Optical multiple-image encryption based on multi-plane phase retrieval and interference,” J. Opt. 13, 115401 (2011). [CrossRef]
  17. D. Mas, J. Garcia, C. Ferreria, L. M. Bernardo, and F. Marinho, “Fast algorithms for free-space diffraction patterns calculation,” Opt. Commun. 164, 233–245 (1999). [CrossRef]
  18. Y. Zhang, B. Wang, and Z. Dong, “Enhancement of image hiding by exchanging two phase masks,” J. Opt. A 11, 125406 (2009). [CrossRef]
  19. P. Kumar, J. Joseph, and K. Singh, “Optical image encryption based on interference under convergent random illumination,” J. Opt. 12, 095402 (2010). [CrossRef]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited