OSA's Digital Library

Optics Express

Optics Express

  • Editor: C. Martijn de Sterke
  • Vol. 17, Iss. 16 — Aug. 3, 2009
  • pp: 13700–13710

Fast double-phase retrieval in Fresnel domain using modified Gerchberg-Saxton algorithm for lensless optical security systems

Hone-Ene Hwang, Hsuan T. Chang, and Wen-Nung Lie  »View Author Affiliations

Optics Express, Vol. 17, Issue 16, pp. 13700-13710 (2009)

View Full Text Article

Enhanced HTML    Acrobat PDF (1221 KB)

Browse Journals / Lookup Meetings

Browse by Journal and Year


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools



A novel fast double-phase retrieval algorithm for lensless optical security systems based on the Fresnel domain is presented in this paper. Two phase-only masks are efficiently determined by using a modified Gerchberg-Saxton algorithm, in which two cascaded Fresnel transforms are replaced by one Fourier transform with compensations to reduce the consumed computations. Simulation results show that the proposed algorithm substantially speeds up the iterative process, while keeping the reconstructed image highly correlated with the original one.

© 2009 Optical Society of America

OCIS Codes
(100.3010) Image processing : Image reconstruction techniques
(100.5070) Image processing : Phase retrieval
(060.4785) Fiber optics and optical communications : Optical security and encryption

ToC Category:
Image Processing

Original Manuscript: April 20, 2009
Revised Manuscript: June 30, 2009
Manuscript Accepted: July 20, 2009
Published: July 24, 2009

Hone-Ene Hwang, Hsuan T. Chang, and Wen-Nung Lie, "Fast double-phase retrieval in Fresnel domain using modified Gerchberg-Saxton algorithm for lensless optical security systems," Opt. Express 17, 13700-13710 (2009)

Sort:  Author  |  Year  |  Journal  |  Reset  


  1. H. T. Chang, "Image encryption using separable amplitude-based virtual image and iteratively retrieved phase information," Opt. Eng. 40, 2165-2171 (2001) [CrossRef]
  2. G.-S. Lin, H. T. Chang, W.-N. Lie, and C.-H. Chuang, "A public-key-based optical image cryptosystem based on data embedding techniques," Opt. Eng. 42, 2331-2339 (2003) [CrossRef]
  3. P. Réfrégier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995) [CrossRef] [PubMed]
  4. O. Matoba and B. Javidi, "Encrypted Optical Memory Using Multi-Dimensional Keys," Opt. Lett. 24, 762-765 (1999) [CrossRef]
  5. O. Matoba and B. Javidi, "Encrypted optical storage with wavelength-key and random phase codes," Appl. Opt. 38, 6785-6790 (1999) [CrossRef]
  6. E. Tajahuerce, O. Matoba, S. C. Verrall, and B. Javidi, "Optoelectronic information encryption with phase shifting interferometry," Appl. Opt. 39, 2313-2320 (2000) [CrossRef]
  7. G. Unnikrishnan, J. Joseph, and K. Singh, "Optical encryption by double-random phase encoding in the fractional Fourier domain, " Opt. Lett. 25, 887-889 (2000) [CrossRef]
  8. B. Zhu, S. Liu, and Q. Ran, "Optical image encryption based on multifractional Fourier transforms," Opt. Lett. 25, 1159-1161 (2000) [CrossRef]
  9. Y. Zhang, C.-H. Zheng, and N. Tanno, "Optical encryption based on iterative fractional Fourier transform," Opt. Commun. 202, 277-285 (2002) [CrossRef]
  10. B. Hennelly and J. T. Sheridan, "Optical image encryption by random shifting in fractional Fourier domains," Opt. Lett. 28, 269-271 (2003) [CrossRef] [PubMed]
  11. P. C. Mogensen and J. Glückstad, "Phase-only optical encryption," Opt. Lett. 25, 566-568 (2000) [CrossRef]
  12. X. Peng, L. Yu, and L. Cai, "Double-lock for image encryption with virtual optical wavelength," Opt. Express 10, 41-45 (2002) [PubMed]
  13. S. Sinzinger, "Microoptically integrated correlators for security applications," Opt. Commun. 209, 69-74 (2002) [CrossRef]
  14. R. K. Wang, I. A. Watson, and C. Chatwin, "Random phase encoding for optical secutity," Opt. Eng. 35, 2464-2469 (1996) [CrossRef]
  15. Y. Li, K. Kreske, and J. Rosen, "Security and encryption optical systems based on a correlator with significant output image," Appl. Opt. 39, 5295-5301 (2000) [CrossRef]
  16. H. T. Chang, W. C. Lu, and C. J. Kuo, "Multiple-phase retrieval for optical security systems by use of random-phase encoding," Appl. Opt. 41, 4825-4834 (2002) [CrossRef] [PubMed]
  17. Y. C. Chang, HsuanT. Chang, and C. J. Kuo, "Hybrid image cryptosystem based on dyadic phase displacement in the Fourier domain," Opt. Commun. 236, 245-257 (2004) [CrossRef]
  18. G. Situ, and J. Zhang, "A cascaded iterative Fourier transform algorithm for optical security applications," Optik 114, 473-477 (2003) [CrossRef]
  19. L. G. Neto and Y. Sheng, "Optical implementation of image encryption using random phase encoding," Opt. Eng. 35, 2459-2463 (1996) [CrossRef]
  20. G. Situ and J. Zhang, "A lensless optical security system based on computer-generated phase only masks," Opt. Commun. 232, 115-122 (2004) [CrossRef]
  21. J. W. Goodman, Introduction to Fourier Optics (McGraw-Hill, New York, 1968)
  22. H.P. Herzig (Ed.), Micro-Optics (Taylor & Francis, London, UK, 1996)
  23. B. Javidi, G. Zhang, and J. Li, "Encrypted optical memory using double-random phase encoding," Appl. Opt. 36, 1054-1058 (1997) [CrossRef] [PubMed]
  24. X. Tan, O. Matoba, T. Shimura, K. Kuroda, and B. Javidi, "Secure optical storage that uses fully phase encryption," Appl. Opt. 39, 6689-6694 (2000) [CrossRef]
  25. X. Tan, O. Matoba, T. Shimura, and K. Kuroda, "Improvement in holographic storage capacity by use of double-random phase encryption," Appl. Opt. 40, 4721-4727 (2001) [CrossRef]
  26. R. W. Gerchberg and W. O. Saxton, "Phase determination for image and diffraction plane pictures in the electron microscope," Optik 34, 275-284 (1971)
  27. R. W. Gerchberg and W. O. Saxton, "A practical algorithm for the determination of phase from image and diffraction plane pictures," Optik 35, 237-246 (1972)
  28. S. Deng, L. Liu, H. Lang, W. Pan, and D. Zhao, "Hiding an image in cascaded Fresnel digital holograms," Chin. Opt. Lett. 4, 268-271 (2006)
  29. D. Abookasis, O. Montal, O. Abramson, and J. Rosen, "Watermarks encrypted in a concealogram and deciphered by a modified joint-transform correlator," Appl. Opt. 44, 3019-3023 (2005) [CrossRef] [PubMed]
  30. J. Rosen, "Learning in correlators based on projections onto constraint sets," Opt. Lett. 18, 1183-1815 (1993) [CrossRef] [PubMed]
  31. W. X. Cong, N. X. Chen, and B.Y. Gu, "Phase retrieval in the Fresnel transform system: a recursive algorithm," J. Opt. Soc. Am. A 16, 1827-1830 (1999) [CrossRef]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.

« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited