OSA's Digital Library

Applied Optics

Applied Optics

APPLICATIONS-CENTERED RESEARCH IN OPTICS

  • Editor: Joseph N. Mait
  • Vol. 52, Iss. 21 — Jul. 20, 2013
  • pp: 5133–5142

Information authentication system using interference of two beams in gyrator transform domain

Muhammad Rafiq Abuturab  »View Author Affiliations


Applied Optics, Vol. 52, Issue 21, pp. 5133-5142 (2013)
http://dx.doi.org/10.1364/AO.52.005133


View Full Text Article

Enhanced HTML    Acrobat PDF (1433 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

A novel information authentication system, i.e., an asymmetric optical interference of two beams in the gyrator transform (GT) domain, is proposed. In this algorithm, the input color image is divided into R, G, and B channels. The complex field of each channel is constructed by the inverse Fourier transform of the channel attached with a random phase function. The phase-only mask (POM) and amplitude-only mask (AOM) are analytically derived from the complex field. The POM and AOM are separately gyrator transformed. The two asymmetric phase keys and two encrypted images are obtained by the amplitude truncations and phase truncations of the transform images, respectively. Finally, the encoded image is produced by the interference of two encrypted images. The two asymmetric keys and two angle parameters of the GT are regarded as additional keys for each channel to enhance the security level of the cryptosystem. The noniterative authentication procedure is devoid of any silhouette problem. The proposed system can be implemented digitally or optically, and its architecture is free from optical misalignment problems. The theoretical analysis and numerical simulation results both validate the proposed technique.

© 2013 Optical Society of America

OCIS Codes
(050.0050) Diffraction and gratings : Diffraction and gratings
(070.0070) Fourier optics and signal processing : Fourier optics and signal processing
(100.2000) Image processing : Digital image processing
(070.2615) Fourier optics and signal processing : Frequency filtering
(060.4785) Fiber optics and optical communications : Optical security and encryption

ToC Category:
Fourier Optics and Signal Processing

History
Original Manuscript: May 9, 2013
Revised Manuscript: June 13, 2013
Manuscript Accepted: June 21, 2013
Published: July 15, 2013

Citation
Muhammad Rafiq Abuturab, "Information authentication system using interference of two beams in gyrator transform domain," Appl. Opt. 52, 5133-5142 (2013)
http://www.opticsinfobase.org/ao/abstract.cfm?URI=ao-52-21-5133


Sort:  Author  |  Year  |  Journal  |  Reset  

References

  1. P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995). [CrossRef]
  2. G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000). [CrossRef]
  3. B. Hennelly and J. T. Sheridan, “Optical image encryption by random shifting in fractional Fourier domains,” Opt. Lett. 28, 269–271 (2003). [CrossRef]
  4. G. Situ and J. Zhang, “Multiple-image encryption by wavelength multiplexing,” Opt. Lett. 30, 1306–1308 (2005). [CrossRef]
  5. H.-E. Hwang, H. T. Chang, and W.-N. Lie, “Multiple-image encryption and multiplexing using a modified Gerchberg–Saxton algorithm and phase modulation in Fresnel-transform domain,” Opt. Lett. 34, 3917–3919 (2009). [CrossRef]
  6. A. Alfalou and C. Brosseau, “Exploiting root-mean-square time-frequency structure for multiple-image optical compression and encryption,” Opt. Lett. 35, 1914–1916 (2010). [CrossRef]
  7. H. Di, K. Zheng, X. Zhang, E. Y. Lam, T. Kim, Y. S. Kim, T.-C. Poon, and C. Zhou, “Multiple-image encryption by compressive holography,” Appl. Opt. 51, 1000–1009 (2012). [CrossRef]
  8. S. Q. Zhang and M. A. Karim, “Color image encryption using double random phase encoding,” Microwave Opt. Technol. Lett. 21, 318–323 (1999). [CrossRef]
  9. W. Chen, C. Quan, and C. J. Tay, “Optical color image encryption based on Arnold transform and interference method,” Opt Commun. 282, 3680–3685 (2009). [CrossRef]
  10. M. Joshi, C. Shakher, and K. Singh, “Logarithms-based RGB image encryption in the fractional Fourier domain: a non-linear approach,” Opt. Lasers Eng. 47, 721–727 (2009). [CrossRef]
  11. Z. Liu, J. Dai, X. Sun, and S. Liu, “Color image encryption by using the rotation of color vector in Hartley transform domains,” Opt. Lasers Eng. 48, 800–805 (2010). [CrossRef]
  12. C. J. Tay, C. Quan, W. Chen, and Y. Fu, “Color image encryption based on interference and virtual optics,” Opt. Laser Technol. 42, 409–415 (2010). [CrossRef]
  13. F. Mosso, M. Tebaldi, J. F. Barrera, N. Bolognini, and R. Torroba, “Pure optical dynamical color encryption,” Opt. Express 19, 13779–13786 (2011). [CrossRef]
  14. Z. Liu, L. Xu, T. Liu, H. Chen, P. Li, C. Lin, and S. Liu, “Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains,” Opt. Commun. 284, 123–128 (2011). [CrossRef]
  15. M. R. Abuturab, “Color image security system using double random-structured phase encoding in gyrator transform domain,” Appl. Opt. 51, 3006–3016 (2012). [CrossRef]
  16. M. R. Abuturab, “Securing color information using Arnold transform in gyrator transform domain,” Opt. Lasers Eng. 50, 772–779 (2012). [CrossRef]
  17. M. R. Abuturab, “Color information security system using discrete cosine transform in gyrator transform domain radial-Hilbert phase encoding,” Opt. Lasers Eng. 50, 1209–1216 (2012). [CrossRef]
  18. M. R. Abuturab, “Securing color image using discrete cosine transform in gyrator transform domain structured-phase encoding,” Opt. Lasers Eng. 50, 1383–1390 (2012). [CrossRef]
  19. M. R. Abuturab, “Color information security system using Arnold transform and double structured phase encoding in gyrator transform domain,” Opt. Laser Technol. 45, 525–532 (2013). [CrossRef]
  20. M. R. Abuturab, “Noise-free recovery of color information using a joint-extended gyrator transform correlator,” Opt. Lasers Eng. 51, 230–239 (2013). [CrossRef]
  21. M. R. Abuturab, “Color image security system based on discrete Hartley transform in gyrator transform domain,” Opt. Lasers Eng. 51, 317–324 (2013). [CrossRef]
  22. W. Qin and X. Peng, “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35, 118–120 (2010). [CrossRef]
  23. X. Wang and D. Zhao, “A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Commun. 285, 1078–1081 (2012). [CrossRef]
  24. W. Qin, X. Peng, X. F. Meng, and B. Gao, “Universal and special keys based on phase-truncated Fourier transform,” Opt Eng. 50, 080501 (2011).
  25. M. R. Abuturab, “Color information cryptosystem based on optical superposition principle and phase-truncated gyrator transform,” Appl. Opt. 51, 7994–8002 (2012). [CrossRef]
  26. Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33, 2443–2445 (2008). [CrossRef]
  27. D. Weng, N. Zhu, Y. Wang, J. Xie, and J. Liu, “Experimental verification of optical image encryption based on interference,” Opt. Commun. 284, 2485–2487 (2011). [CrossRef]
  28. P. Kumar, J. Joseph, and K. Singh, “Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator,” Appl. Opt. 50, 1805–1811 (2011). [CrossRef]
  29. N. Zhu, Y. T. Wang, J. Liu, J. H. Xie, and H. Zhang, “Optical image encryption based on interference of polarized light,” Opt. Express 17, 13418–13424 (2009). [CrossRef]
  30. Y. J. Han and Y. H. Zhang, “Optical image encryption based on two beams’ interference,” Opt. Commun. 283, 1690–1692 (2010). [CrossRef]
  31. B. Yang, Z. Liu, B. Wang, Y. Zhang, and S. Liu, “Optical streamcipher-like system for image encryption based on Michelson interferometer,” Opt. Express 19, 2634–2642 (2011). [CrossRef]
  32. W. Jia, F. J. Wen, Y. T. Chow, and C. Zhou, “Binary image encryption based on interference of two phase-only masks,” Appl. Opt. 51, 5253–5258 (2012). [CrossRef]
  33. W. Chen and X. Chen, “Interference-based optical image encryption using three-dimensional phase retrieval,” Appl. Opt. 51, 6076–6083 (2012). [CrossRef]
  34. W. He, X. Peng, X. Meng, and X. Liu, “Optical hierarchical authentication based on interference and hash function,” Appl. Opt. 51, 7750–7757 (2012). [CrossRef]
  35. X. Wang and D. Zhao, “Optical image hiding with silhouette removal based on the optical interference principle,” Appl. Opt. 51, 686–691 (2012). [CrossRef]
  36. Q. Wang, “Optical image encryption with silhouette removal based on interference and phase blend processing,” Opt. Commun. 285, 4294–4301 (2012). [CrossRef]
  37. M. R. Abuturab, “Security enhancement of color image cryptosystem by optical interference principle and spiral phase encoding,” Appl. Opt. 52, 1555–1563 (2013). [CrossRef]
  38. J. A. Rodrigo, T. Alieva, and M. L. Calvo, “Gyrator transform: properties and applications,” Opt. Express 15, 2190–2203 (2007). [CrossRef]
  39. J. A. Rodrigo, T. Alieva, and M. L. Calvo, “Experimental implementation of the gyrator transform,” J. Opt. Soc. Am. A 24, 3135–3139 (2007). [CrossRef]
  40. Z. Liu, L. Xu, C. Chin, and S. Liu, “Image encryption by encoding with a non-uniform optical beam in gyrator transform domains,” Appl. Opt. 49, 5632–5637 (2010). [CrossRef]
  41. Z. Liu, Q. Guo, L. Xu, M. A. Ahmad, and S. Liu, “Double image encryption by using iterative random binary encoding in gyrator domains,” Opt. Express 18, 12033–12043 (2010). [CrossRef]
  42. Z. Liu, S. Li, W. Liu, W. Liu, and S. Liu, “Image hiding scheme by use of rotating squared sub-image in the gyrator transform domains,” Opt. Laser Technol. 45, 198–203 (2013). [CrossRef]
  43. V. Arrizón, U. Ruiz, R. Carrada, and L. A. González, “Pixelated phase computer holograms for the accurate encoding of scalar complex fields,” J. Opt. Soc. Am. A 24, 3500–3507 (2007). [CrossRef]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited