OSA's Digital Library

Applied Optics

Applied Optics

APPLICATIONS-CENTERED RESEARCH IN OPTICS

  • Editor: Joseph N. Mait
  • Vol. 52, Iss. 36 — Dec. 20, 2013
  • pp: 8854–8863

Multiple-image encryption using polarized light encoding and the optical interference principle in the Fresnel-transform domain

Qu Wang, Qing Guo, and Jinyun Zhou  »View Author Affiliations


Applied Optics, Vol. 52, Issue 36, pp. 8854-8863 (2013)
http://dx.doi.org/10.1364/AO.52.008854


View Full Text Article

Enhanced HTML    Acrobat PDF (6903 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

We propose a multiple-image encryption scheme, based on polarized light encoding and the interference principle of phase-only masks (POMs), in the Fresnel-transform (FrT) domain. In this scheme, each secret image is converted into an intensity image by polarized light encoding, where a random key image and a pixilated polarizer with random angles are employed as keys. The intensity encrypted images produced by different secret images are convolved together and then inverse Fresnel-transformed. Phase and amplitude truncations are used to generate the asymmetric decryption keys. The phase-truncated inverse FrT spectrum is sent into an interference-based encryption (IBE) system to analytically obtain two POMs. To reduce the transmission and storage load on the keys, the chaotic mapping method is employed to generate random distributions of keys for encryption and decryption. One can recover all secret images successfully only if the corresponding decryption keys, the mechanism of FrTs, and correct chaotic conditions are known. The inherent silhouette problem can be thoroughly resolved by polarized light encoding in this proposal, without using any time-consuming iterative methods. The entire encryption and decryption process can be realized digitally, or in combination with optical means. Numerical simulation results are presented to verify the effectiveness and performance of the proposed scheme.

© 2013 Optical Society of America

OCIS Codes
(070.0070) Fourier optics and signal processing : Fourier optics and signal processing
(100.0100) Image processing : Image processing

ToC Category:
Fourier Optics and Signal Processing

History
Original Manuscript: October 7, 2013
Manuscript Accepted: November 19, 2013
Published: December 20, 2013

Citation
Qu Wang, Qing Guo, and Jinyun Zhou, "Multiple-image encryption using polarized light encoding and the optical interference principle in the Fresnel-transform domain," Appl. Opt. 52, 8854-8863 (2013)
http://www.opticsinfobase.org/ao/abstract.cfm?URI=ao-52-36-8854


Sort:  Author  |  Year  |  Journal  |  Reset  

References

  1. P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995). [CrossRef]
  2. A. Alfalou and C. Brosseau, “Optical image compression and encryption methods,” Adv. Opt. Photon. 1, 589–636 (2009). [CrossRef]
  3. G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000). [CrossRef]
  4. S. Liu, Q. Mi, and B. Zhu, “Optical image encryption with multistage and multichannel fractional Fourier-domain filtering,” Opt. Lett. 26, 1242–1244 (2001). [CrossRef]
  5. Z. Liu and S. Liu, “Double image encryption based on iterative fractional Fourier transform,” Opt. Commun. 275, 324–329 (2007). [CrossRef]
  6. G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586 (2004). [CrossRef]
  7. J. A. Rodrigo, T. Alieva, and M. L. Calvo, “Applications of gyrator transform for image processing,” Opt. Commun. 278, 279–284 (2007). [CrossRef]
  8. H. Chang, W. Lu, and C. Kuo, “Multiple-phase retrieval for optical security systems by use of random-phase encoding,” Appl. Opt. 41, 4825–4834 (2002). [CrossRef]
  9. A. Alfalou and A. Mansour, “Double random phase encryption scheme to multiplex and simultaneous encode multiple images,” Appl. Opt. 48, 5933–5947 (2009). [CrossRef]
  10. A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys,” Opt. Lett. 30, 1644–1646 (2005). [CrossRef]
  11. X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044–1046 (2006). [CrossRef]
  12. X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31, 3261–3263 (2006). [CrossRef]
  13. W. Qin and X. Peng, “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35, 118–120 (2010). [CrossRef]
  14. W. Qin, X. Peng, X. Meng, and B. Gao, “Universal and special keys based on phase-truncated Fourier transform,” Opt. Eng. 50, 080501 (2011). [CrossRef]
  15. X. Wang and D. Zhao, “Multiple image encryption based on nonlinear amplitude-truncation and phase-truncation in Fourier domain,” Opt. Commun. 284, 148–152 (2011). [CrossRef]
  16. S. K. Rajput and N. K. Nishchal, “Image encryption based on interference that uses fractional Fourier domain asymmetric keys,” Appl. Opt. 51, 1446–1452 (2012). [CrossRef]
  17. X. Wang and D. Zhao, “A special attack on the asymmetric cryptosystem based on phase-truncated fractional Fourier transforms,” Opt. Commun. 285, 1078–1081 (2012). [CrossRef]
  18. Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33, 2443–2445 (2008). [CrossRef]
  19. Y. Zhang, B. Wang, and Z. Dong, “Enhancement of image hiding by exchanging two phase masks,” J. Opt. A 11, 125406 (2009). [CrossRef]
  20. P. Kumar, J. Joseph, and K. Singh, “Optical image encryption based on interference under convergent random illumination,” J. Opt. 12, 095402 (2010). [CrossRef]
  21. P. Kumar, J. Joseph, and K. Singh, “Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator,” Appl. Opt. 50, 1805–1811 (2011). [CrossRef]
  22. X. Wang and D. Zhao, “Optical image hiding with silhouette removal based on the optical interference principle,” Appl. Opt. 51, 686–691 (2012). [CrossRef]
  23. Q. Wang, “Optical image encryption with silhouette removal based on interference and phase blend processing,” Opt. Commun. 285, 4294–4301 (2012). [CrossRef]
  24. Q. Wang, Q. Guo, L. Lei, and J. Zhou, “Multiple-image encryption based on interference principle and phase-only mask multiplexing in Fresnel transform domain,” Appl. Opt. 52, 6849–6857 (2013). [CrossRef]
  25. P. C. Mogensen and J. Gluckstad, “A phase-based optical encryption system with polarization encoding,” Opt. Commun. 173, 177–183 (2000). [CrossRef]
  26. J. A. Davis, D. E. McNamara, D. M. Cottrell, and T. Sonehara, “Two-dimensional polarization encoding with a phase-only liquid-crystal spatial light modulator,” Appl. Opt. 39, 1549–1554 (2000). [CrossRef]
  27. B. Javidi and T. Nomura, “Polarization encoding for optical security systems,” Opt. Eng. 39, 2439–2443 (2000). [CrossRef]
  28. U. Gopinathan, T. J. Naughton, and J. T. Sheridan, “Polarization encoding and multiplexing of two-dimensional signals: application to image encryption,” Appl. Opt. 45, 5693–5700 (2006). [CrossRef]
  29. A. Alfalou and C. Brosseau, “Dual encryption scheme of images using polarized light,” Opt. Lett. 35, 2185–2187 (2010). [CrossRef]
  30. M. Dubreuil, A. Aflalou, and C. Brosseau, “Robustness against attacks of dual polarization encryption using Stokes–Mueller formalism,” J. Opt. 14, 094004 (2012). [CrossRef]
  31. S. K. Rajput and N. K. Nishchal, “Image encryption using polarized light encoding and amplitude and phase truncation in the Fresnel domain,” Appl. Opt. 52, 4343–4352 (2013). [CrossRef]
  32. C. Brosseau, Fundamentals of Polarized Light: A Statistical Optics Approach (Wiley, 1998).
  33. D. Wei, Q. Ran, Y. Li, J. Ma, and L. Tan, “A convolution and product theorem for the linear canonical transform,” IEEE Signal Process. Lett. 16, 853–856 (2009). [CrossRef]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


« Previous Article

OSA is a member of CrossRef.

CrossCheck Deposited