OSA's Digital Library

Applied Optics

Applied Optics


  • Editor: Joseph N. Mait
  • Vol. 53, Iss. 14 — May. 10, 2014
  • pp: 2956–2963

Encrypted imaging based on algebraic implementation of double random phase encoding

Kazuya Nakano, Masafumi Takeda, Hiroyuki Suzuki, and Masahiro Yamaguchi  »View Author Affiliations

Applied Optics, Vol. 53, Issue 14, pp. 2956-2963 (2014)

View Full Text Article

Enhanced HTML    Acrobat PDF (1153 KB)

Browse Journals / Lookup Meetings

Browse by Journal and Year


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools



The security of important information captured by sensors and cameras is currently a growing concern as information theft via techniques such as side-channel attacks become increasingly more prevalent. Double random phase encoding (DRPE) is an optical encryption method based on optical Fourier transform that is currently being used to implement secure coherent optical systems. In this paper, we propose a new DRPE implementation for incoherent optical systems based on integral photography that can be applied to “encrypted imaging (EI)” to optically encrypt an image before it is captured by an image sensor. Because the proposed incoherent DRPE is constituted from conventional DRPE by rewriting the optical encryption via discretization and Euler’s formula, its security level is the same as that of conventional DRPE. The results of an experiment in which we encrypted a plaintext image optically and then decrypted it numerically demonstrate that our proposed incoherent optical security system is feasible.

© 2014 Optical Society of America

OCIS Codes
(070.4560) Fourier optics and signal processing : Data processing by optical means
(110.1758) Imaging systems : Computational imaging
(060.4785) Fiber optics and optical communications : Optical security and encryption

ToC Category:
Fiber Optics and Optical Communications

Original Manuscript: January 9, 2014
Revised Manuscript: March 24, 2014
Manuscript Accepted: April 4, 2014
Published: May 2, 2014

Kazuya Nakano, Masafumi Takeda, Hiroyuki Suzuki, and Masahiro Yamaguchi, "Encrypted imaging based on algebraic implementation of double random phase encoding," Appl. Opt. 53, 2956-2963 (2014)

Sort:  Author  |  Year  |  Journal  |  Reset  


  1. B. Javidi, Optical and Digital Techniques for Information Security (Advanced Sciences and Technologies for Security Applications) (Springer, 2005).
  2. P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995). [CrossRef]
  3. H. Suzuki, T. Yamaya, T. Obi, M. Yamaguchi, and N. Ohyama, “Fingerprint verification for smart card holders identification based on optical image encryption,” Jpn. J. Opt. 33, 37–44 (2004).
  4. H. Suzuki, H. Tashima, M. Yamaguchi, T. Obi, M. Yachida, and N. Ohyama, “File encryption software using fingerprint keys based on double random encoding,” in Frontiers in Optics, OSA Technical Digest Series (Optical Society of America, 2005), paper JWA50, http://www.opticsinfobase.org/abstract.cfm?URI=FiO-2005-JWA50 .
  5. H. Suzuki, M. Yamaguchi, M. Yachida, N. Ohyama, H. Tashima, and T. Obi, “Experimental evaluation of fingerprint verification system based on double random phase encoding,” Opt. Express 14, 1755–1766 (2006). [CrossRef]
  6. N. Takai and Y. Mifune, “Digital watermarking by a holographic technique,” Appl. Opt. 41, 865–873 (2002). [CrossRef]
  7. S. Kishk and B. Javidi, “3D object watermarking by a 3D hidden object,” Opt. Express 11, 874–888 (2003). [CrossRef]
  8. M. He, Q. Tan, L. Cao, Q. He, and G. Jin, “Security enhanced optical encryption system by random phase key and permutation key,” Opt. Express 17, 22462–22473 (2009). [CrossRef]
  9. N. K. Nishchal, “Hierarchical encrypted image watermarking using fractional Fourier domain random phase encoding,” Opt. Eng. 50, 097003 (2011). [CrossRef]
  10. J. Rosen and B. Javidi, “Hidden images in halftone pictures,” Appl. Opt. 40, 3346–3353 (2001). [CrossRef]
  11. S. Kishk and B. Javidi, “Information hiding technique with double phase encoding,” Appl. Opt. 41, 5462–5470 (2002). [CrossRef]
  12. Y. Hayasaki, Y. Matsuba, A. Nagaoka, H. Yamamoto, and N. Nishida, “Hiding an image with a light scattering medium and use of a contrast-discrimination method for readout,” Appl. Opt. 43, 1552–1558 (2004). [CrossRef]
  13. Y. Sheng, Z. Xin, M. S. Alam, L. Xi, and L. Xiao-feng, “Information hiding based on double random-phase encoding and public-key cryptography,” Opt. Express 17, 3270–3284 (2009). [CrossRef]
  14. O. Matoba and B. Javidi, “Encrypted optical storage with wavelength key and random codes,” Appl. Opt. 38, 6785–6790 (1999). [CrossRef]
  15. Z. Liu and S. Liu, “Double image encryption based on iterative fractional Fourier transform,” Opt. Commun. 275, 324–329 (2007). [CrossRef]
  16. R. Tao, Y. Xin, and Y. Wang, “Double image encryption based on random phase encoding in the fractional Fourier domain,” Opt. Express 15, 16067–16079 (2007). [CrossRef]
  17. H. Li and Y. Wang, “Double-image encryption based on iterative gyrator transform,” Opt. Commun. 281, 5745–5749 (2008). [CrossRef]
  18. Z. Liu, J. Dai, X. Sun, and S. Liu, “Triple image encryption scheme in fractional Fourier transform domains,” Opt. Commun. 282, 518–522 (2009). [CrossRef]
  19. Z. Liu, H. Chen, T. Liu, P. Li, J. Dai, X. Sun, and S. Liu, “Double-image encryption based on the affine transform and the gyrator transform,” J. Opt. 12, 035407 (2010). [CrossRef]
  20. M. Joshi and K. Singh, “Simultaneous encryption of a color and a gray-scale image using byte-level encoding based on single-channel double random-phase encoding architecture in fractional Fourier domain,” Opt. Eng. 50, 047007 (2011). [CrossRef]
  21. B. M. Hennelly and J. T. Sheridan, “Image encryption and fractional Fourier transform,” Optik 114, 251–265 (2003). [CrossRef]
  22. O. Matoba and B. Javidi, “Encrypted optical memory using three-dimensional keys in the Fresnel domain,” Opt. Lett. 24, 762–764 (1999). [CrossRef]
  23. X. Wang, H. Zhai, Z. Li, and Q. Ge, “Double random phase encoding based on discrete quaternion Fourier transforms,” Optik 122, 1856–1859 (2011). [CrossRef]
  24. W. Chen, X. Chen, and C. J. R. Sheppard, “Optical image encryption based on diffractive imaging,” Opt. Lett. 35, 3817–3819 (2010). [CrossRef]
  25. B. Javidi, A. Sergent, and E. Ahouzi, “Performance of double phase encoding encryption technique using binarized encrypted images,” Opt. Eng. 37, 565–569 (1998). [CrossRef]
  26. K. Gandolfi, C. Mourtel, and F. Olivier, “Electromagnetic analysis: Concrete results,” in Cryptographic Hardware and Embedded Systems (CHES2001) (Springer, 2001), pp. 251–261.
  27. X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044–1046 (2006). [CrossRef]
  28. A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys,” Opt. Lett. 30, 1644–1646 (2005). [CrossRef]
  29. K. Nakano, M. Takeda, H. Hiroyuki, and M. Yamaguchi, “Evaluations of phase-only double random phase encoding based on key-space analysis,” Appl. Opt. 52, 1276–1283 (2013). [CrossRef]
  30. J. Zang, Z. Xie, and Y. Zhang, “Optical image encryption with spatially incoherent illumination,” Opt. Lett. 38, 1289–1291 (2013). [CrossRef]
  31. P. Clemente, V. Durán, V. Torres-Company, E. Tajahuerce, and J. Lancis, “Optical encryption-based computational ghost imaging,” Opt. Lett. 35, 2391–2393 (2010). [CrossRef]
  32. R. Pappu, B. Recht, J. Taylor, and N. Gershenfeld, “Physical one-way functions,” Science 297, 2026–2030 (2002). [CrossRef]
  33. R. Horstmeyer, B. Judkewitz, I. M. Vellekoop, S. Assawaworrarit, and C. Yang, “Physical key-protected one-time pad,” Sci. Rep. 3, 3543 (2013). [CrossRef]
  34. K. Nakano, M. Takeda, H. Suzuki, and M. Yamaguchi, “Generalized model of double random phase encoding based on linear algebra,” Opt. Commun. 286, 91–94 (2013). [CrossRef]
  35. M. G. Lippmann, “Epreuves reversible donnant lasensation du relief,” J. Phys. 7, 821–825 (1908).
  36. I. Glaser, “Noncoherent parallel optical processor for discrete two-dimensional linear transformations,” Opt. Lett. 5, 449–451 (1980). [CrossRef]
  37. K. Hamanaka, H. Nemoto, M. Oikawa, E. Okuda, and T. Kishimoto, “Multiple imaging and multiple Fourier transformation using planar microlens arrays,” Appl. Opt. 29, 4064–4070 (1990). [CrossRef]
  38. Y. Hayasaki, I. Tohyama, T. Yatagai, M. Mori, and S. Ishihara, “Optical learning neural network using Selfoc microlens array,” Jpn. J. Appl. Phys. 31, 1689–1693 (1992).
  39. I. Glaser, “Lenslet array processors,” Appl. Opt. 21, 1271–1280 (1982). [CrossRef]
  40. J. W. Goodman, A. R. Dias, and L. M. Woody, “Fully parallel, high-speed incoherent optical method for performing discrete Fourier transforms,” Appl. Opt. 16, 2611–2612 (1977). [CrossRef]
  41. M. Matsumoto and T. Nishimura, “Mersenne twister: A 623-dimensionally equidistributed uniform pseudorandom number generator,” ACM Trans. Model. Comput. Simul 8, 3–30 (1998). [CrossRef]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.

« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited