OSA's Digital Library

Optics Express

Optics Express

  • Editor: Michael Duncan
  • Vol. 10, Iss. 1 — Jan. 14, 2002
  • pp: 41–45

Double-lock for image encryption with virtual optical wavelength

Xiang Peng, Lingfeng Yu, and Lilong Cai  »View Author Affiliations


Optics Express, Vol. 10, Issue 1, pp. 41-45 (2002)
http://dx.doi.org/10.1364/OE.10.000041


View Full Text Article

Enhanced HTML    Acrobat PDF (947 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

A new method based on the concept of virtual optics for both encryption and decryption is proposed. The technique shows the possibility to encode/decode any digital information. A virtual wavelength and a pseudo-random covering mask (PRCM) are used to design “double locks” and “double keys” for image encryption. Numerical experiments are presented to test the sensitivity of the virtual wavelength. The possible dimensions of keys are roughly estimated and show a high security level.

© Optical Society of America

OCIS Codes
(070.4560) Fourier optics and signal processing : Data processing by optical means
(090.1760) Holography : Computer holography
(200.3050) Optics in computing : Information processing

ToC Category:
Research Papers

History
Original Manuscript: December 7, 2001
Published: January 14, 2002

Citation
Xiang Peng, Lingfeng Yu, and Lilong Cai, "Double-lock for image encryption with virtual optical wavelength," Opt. Express 10, 41-45 (2002)
http://www.opticsinfobase.org/oe/abstract.cfm?URI=oe-10-1-41


Sort:  Journal  |  Reset  

References

  1. Ph. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995). [CrossRef] [PubMed]
  2. N. Yoshikawa, M. Itoh, and T. Yatagai, "Binary computer-generated holograms for security applications from a synthetic double-exposure method by electron-beam lithography," Opt. Lett. 23, 1483-1485 (1998). [CrossRef]
  3. J. F. Heanue, M. C. Bashaw, and L. Hesselink, "Encrypted holographic data storage based on orthogonalphase-code multiplexing," Appl. Opt. 34, 6012-6015 (1995). [CrossRef] [PubMed]
  4. B. Javidi and T. Nomura, "Securing information by use of digital holography," Opt. Lett. 25, 28-30 (2000). [CrossRef]
  5. B. Javidi and E. Tajahuerce, "Three-dimensional object recognition by use of digital holography," Opt. Lett. 25, 28-30 (2000). [CrossRef]
  6. S. Lai and M. A. Neifeld, "Digital wavefront reconstruction and its application to image encryption", Opt. Comm. 178, 283-289 (2000). [CrossRef]
  7. O. Matoba and B. Javidi, "Encrypted optical storage with wavelength-key and random phase codes," Appl. Opt. 38, 6785-90 (1999). [CrossRef]
  8. E. Tajahuerce, O. Matoba, S.C. Verrall, and B. Javidi, "Optoelectronic information encryption with phaseshifting interferometry," Appl. Opt. 39, 2313-2320 (2000). [CrossRef]
  9. O. Matoba and B. Javidi, "Encrypted Optical Memory Using Multi-Dimensional Keys," Opt. Lett. 24, 762-765 (1999). [CrossRef]
  10. L. Yu and L. Cai, "Iterative algorithm with a constraint condition for numerical reconstruction of a threedimensional object from its hologram," J. Opt. Soc. Am. A, 18, 1033-1045 (2001). [CrossRef]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.

Figures

Fig. 1 Fig.2 Fig.3
 
Fig.4
 

« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited