OSA's Digital Library

Journal of the Optical Society of America A

Journal of the Optical Society of America A

| OPTICS, IMAGE SCIENCE, AND VISION

  • Editor: Franco Gori
  • Vol. 31, Iss. 8 — Aug. 1, 2014
  • pp: 1895–1903

Asymmetric information hiding and noise-free recovery based on rotating analyzer ellipsometry and quick-response code

Chao Lin, Xueju Shen, and Zhisong Wang  »View Author Affiliations


JOSA A, Vol. 31, Issue 8, pp. 1895-1903 (2014)
http://dx.doi.org/10.1364/JOSAA.31.001895


View Full Text Article

Enhanced HTML    Acrobat PDF (1116 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

We report an asymmetric optical information hiding method based on a rotating analyzer ellipsometry technique. This asymmetric hiding architecture not only avoids the interception of keys during transmission or distribution but also makes the cyphertext more inconspicuous for attackers. A new kind of one-way optical trapdoor function is constructed based on the fact that the state of polarization (SOP) of elliptical polarized light cannot be recovered with only the knowledge of intensity captured after passing through a linear polarizer. Meanwhile, the SOP of a polarization ellipse could be calculated by rotating the polarizer to record two scenes of intensity after it. Introduction of a quick response code as a container leads to noise-free recovery for original information and enhances practicality of the proposed cryptosystem with versatile key sensitivity and fault tolerance capability. Numerical simulation results that support theoretical analysis are presented. Analysis on the relationship between hiding effect or quality of decryption and parameters of the algorithm also is provided.

© 2014 Optical Society of America

OCIS Codes
(260.2130) Physical optics : Ellipsometry and polarimetry
(100.4998) Image processing : Pattern recognition, optical security and encryption
(110.5405) Imaging systems : Polarimetric imaging

ToC Category:
Image Processing

History
Original Manuscript: April 4, 2014
Revised Manuscript: June 4, 2014
Manuscript Accepted: July 2, 2014
Published: July 31, 2014

Citation
Chao Lin, Xueju Shen, and Zhisong Wang, "Asymmetric information hiding and noise-free recovery based on rotating analyzer ellipsometry and quick-response code," J. Opt. Soc. Am. A 31, 1895-1903 (2014)
http://www.opticsinfobase.org/josaa/abstract.cfm?URI=josaa-31-8-1895


Sort:  Author  |  Year  |  Journal  |  Reset  

References

  1. P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995). [CrossRef]
  2. A. Alfalou and C. Brosseau, “Optical image compression and encryption methods,” Adv. Opt. Photon. 1, 589–636 (2009).
  3. G. Unnikrishnan and K. Singh, “Optical encryption using quadratic phase systems,” Opt. Commun. 193, 51–67 (2001). [CrossRef]
  4. G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000). [CrossRef]
  5. C. Lin and X. Shen, “Multiple images encryption based on Fourier transform hologram,” Opt. Commun. 285, 1023–1028 (2012). [CrossRef]
  6. E. Tajahuerce and B. Javidi, “Encrypting three-dimensional information with digital holography,” Appl. Opt. 39, 6595–6601 (2000). [CrossRef]
  7. W. Chen and X. Chen, “Interference-based optical image encryption using three-dimensional phase retrieval,” Appl. Opt. 51, 6076–6083 (2012). [CrossRef]
  8. A. Alfalou and C. Brosseau, “Dual encryption scheme of images using polarized light,” Opt. Lett. 35, 2185–2187 (2010). [CrossRef]
  9. G. Unnikrishnan, T. Naughton, and J. Sheridan, “Polarization encoding and multiplexing of two-dimensional signals: application to image encryption,” Appl. Opt. 45, 5693–5700 (2006). [CrossRef]
  10. S. Kishk and B. Javidi, “Information hiding technique with double phase encoding,” Appl. Opt. 41, 5462–5470 (2002). [CrossRef]
  11. B. Wang and Y. Zhang, “Double images hiding based on optical interference,” Opt. Commun. 282, 3439–3443 (2009). [CrossRef]
  12. Y. Shi, G. Situ, and J. Zhang, “Multiple-image hiding by information prechoosing,” Opt. Lett. 33, 542–544 (2008). [CrossRef]
  13. X. Peng, H. Wei, and P. Zhang, “Asymmetric cryptography based on wavefront sensing,” Opt. Lett. 31, 3579–3581 (2006). [CrossRef]
  14. S. Yuan, X. Zhou, M. S. Alam, X. Lu, and X. Li, “Information hiding based on double random-phase encoding and public-key cryptography,” Opt. Express 17, 3270–3284 (2009).
  15. W. Qin and X. Peng, “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35, 118–120 (2010). [CrossRef]
  16. S. K. Rajput and N. K. Nishchal, “Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask,” Appl. Opt. 51, 5377–5386 (2012). [CrossRef]
  17. W. Chen and X. Chen, “Optical color image encryption based on an asymmetric cryptosystem in the Fresnel domain,” Opt. Commun. 284, 3913–3917 (2011). [CrossRef]
  18. X. Wang and D. Zhao, “A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Commun. 285, 1078–1081 (2012). [CrossRef]
  19. W. Liu, Z. Liu, and S. Liu, “Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang-Gu algorithm,” Opt. Lett. 38, 1651–1653 (2013). [CrossRef]
  20. S. K. Rajput and N. K. Nishchal, “Image encryption based on interference that uses fractional Fourier domain asymmetric keys,” Appl. Opt. 51, 1446–1452 (2012). [CrossRef]
  21. S. K. Rajput and N. K. Nishchal, “Image encryption using polarized light encoding and amplitude and phase truncation in the Fresnel domain,” Appl. Opt. 52, 4343–4352 (2013). [CrossRef]
  22. W. He, X. Meng, and X. Peng, “Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang-Gu algorithm: comment,” Opt. Lett. 38, 4044 (2013). [CrossRef]
  23. W. Liu, Z. Liu, and S. Liu, “Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang-Gu algorithm: reply,” Opt. Lett. 38, 4045 (2013). [CrossRef]
  24. X. Wang, Y. Chen, C. Dai, and D. Zhao, “Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform,” Appl. Opt. 53, 208–213 (2014). [CrossRef]
  25. C. Lin, X. Shen, and Q. Xu, “Optical image encoding based on digital holographic recording on polarization state of vector wave,” Appl. Opt. 52, 6931–6939 (2013). [CrossRef]
  26. R. Eriksen, P. Mogensen, and J. Gluckstad, “Elliptical polarisation encoding in two dimensions using phase-only spatial light modulators,” Opt. Commun. 187, 325–336 (2001). [CrossRef]
  27. A. Alfalou, M. Elbouz, A. Mansour, and G. Keryer, “New spectral image compression method based on an optimal phase coding and the RMS duration principle,” J. Opt. 12, 115403 (2010). [CrossRef]
  28. A. Safrani and I. Abdulhalim, “Liquid-crystal polarization rotator and a tunable polarizer,” Opt. Lett. 34, 1801–1803 (2009). [CrossRef]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


« Previous Article

OSA is a member of CrossRef.

CrossCheck Deposited