OSA's Digital Library

Optics Express

Optics Express

  • Editor: C. Martijn de Sterke
  • Vol. 17, Iss. 5 — Mar. 2, 2009
  • pp: 3270–3284

Information hiding based on double random-phase encoding and public-key cryptography

Yuan Sheng, Zhou Xin, Mohammad S. Alam, Lu Xi, and Li Xiao-feng  »View Author Affiliations


Optics Express, Vol. 17, Issue 5, pp. 3270-3284 (2009)
http://dx.doi.org/10.1364/OE.17.003270


View Full Text Article

Enhanced HTML    Acrobat PDF (4164 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

A novel information hiding method based on double random-phase encoding (DRPE) and Rivest-Shamir-Adleman (RSA) public-key cryptosystem is proposed. In the proposed technique, the inherent diffusion property of DRPE is cleverly utilized to make up the diffusion insufficiency of RSA public-key cryptography, while the RSA cryptosystem is utilized for simultaneous transmission of the cipher text and the two phase-masks, which is not possible under the DRPE technique. This technique combines the complementary advantages of the DPRE and RSA encryption techniques and brings security and convenience for efficient information transmission. Extensive numerical simulation results are presented to verify the performance of the proposed technique.

© 2009 Optical Society of America

OCIS Codes
(100.2960) Image processing : Image analysis
(100.3010) Image processing : Image reconstruction techniques
(100.5070) Image processing : Phase retrieval

ToC Category:
Image Processing

History
Original Manuscript: November 12, 2008
Revised Manuscript: December 28, 2008
Manuscript Accepted: January 19, 2009
Published: February 17, 2009

Citation
Yuan Sheng, Zhou Xin, Mohammed S. Alam, Lu Xi, and Li Xiao-feng, "Information hiding based on double random-phase encoding and public-key cryptography," Opt. Express 17, 3270-3284 (2009)
http://www.opticsinfobase.org/oe/abstract.cfm?URI=oe-17-5-3270


Sort:  Author  |  Year  |  Journal  |  Reset  

References

  1. P. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995). [CrossRef] [PubMed]
  2. G. Unnikrishnan, J. Joseph, and K. Singh, "Optical encryption by double-random phase encoding in the fractional Fourier domain," Opt. Lett. 25, 887-889 (2000). [CrossRef]
  3. O. Matoba and B. Javidi, "Encrypted optical memory system using three-dimensional keys in the Fresnel domain," Opt. Lett. 24, 762-764 (1999). [CrossRef]
  4. B. Javidi, A. Sergent, G. Zhang, and L. Guibert, "Fault tolerance properties of a double phase encoding encryption technique," Opt. Eng. 36, 992-998 (1997). [CrossRef]
  5. B. Javidi and T. Nomura, "Securing information by use of digital holography," Opt. Lett. 25, 28-30 (2000). [CrossRef]
  6. X. Zhou, S. Yuan, S. W. Wang, and J. Xie, "Affine cryptosystem of double-random-phase encryption based on the fractional Fourier transform," Appl. Opt. 45, 8434-8439 (2006). [CrossRef]
  7. S. Kishk and B. Javidi, "Information hiding technique with double phase encoding," Appl. Opt. 41, 5462-5470 (2002). [CrossRef] [PubMed]
  8. J. Rosen and B. Javidi, "Hidden images in halftone pictures," Appl. Opt. 40, 3346-3353 (2001). [CrossRef]
  9. Y. S. Shi, G. H. Situ, and J. J. Zhang, "Multiple-image hiding in the Fresnel domain," Opt. Lett. 32, 1914-1916 (2007). [CrossRef] [PubMed]
  10. K. T. Kim and J. H. Kim, and E. S. Kim, "Multiple information hiding technique using random sequence and Hadamard matrix," Opt. Eng. 40, 2489-2494, (2001). [CrossRef]
  11. J. J. Kim, J. H. Choi, and E. S. Kim, "Optodigital implementation of multiple information hiding and extraction system," Opt. Eng. 43, 113-125 (2004). [CrossRef]
  12. X. Zhou and J. G. Chen, "Information hiding based on double random phase encoding technology," J. Mod. Optics. 53, 1777-1783 (2006). [CrossRef]
  13. H. Zhang, L. Z. Cai, X. F. Meng, X. F. Xu, X. L. Yang, X. X. Shen, and G. Y. Dong, "Image watermarking based on an iterative phase retrieval algorithm and sine-cosine modulation in the discrete-cosine-transform domain," Opt. Commun. 278, 257-263 (2007). [CrossRef]
  14. D. R. Stinson, Cryptography: Theory and Practice (CRC Press 2002).
  15. B. Yang, Modern Cryptography (Tsinghua University Press 2007) (in Chinese).
  16. S. Yuan, X. Zhou, D. H. Li, and D. F. Zhou, "Simultaneous transmission for an encrypted image and a double random-phase encryption key," Appl. Opt. 46, 3747-3753 (2007). [CrossRef] [PubMed]
  17. Q1. R. W. Gerchberg and W. O. Saxton, "A practical algorithm for the determination of phase from image and diffraction plane pictures," Optik. 35, 237-246 (1972).
  18. J. R. Fienup, "Phase retrieval algorithms: a comparison," Appl. Opt. 21, 2758-2769 (1982). [CrossRef] [PubMed]
  19. Q2. G. H. Situ and J. J. Zhang, "A cascaded iterative Fourier transform algorithm for optical security applications," Optik. 114, 473-477 (2003). [CrossRef]
  20. Q3. G. H. Situ, J. J. Zhang, Y. Zhang, and Z. S. Zhao, "A cascaded-phase retrieval algorithm for optical image encryption," J. Optoelectron. Laser. 15, 341-343 (2004) (in Chinese).

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited