OSA's Digital Library

Optics Express

Optics Express

  • Editor: C. Martijn de Sterke
  • Vol. 18, Iss. 8 — Apr. 12, 2010
  • pp: 7827–7834

An encryption method with multiple encrypted keys based on interference principle

Chun-Hui Niu, Xiao-Ling Wang, Nai-Guang Lv, Zhe-Hai Zhou, and Xiao-Ying Li  »View Author Affiliations


Optics Express, Vol. 18, Issue 8, pp. 7827-7834 (2010)
http://dx.doi.org/10.1364/OE.18.007827


View Full Text Article

Enhanced HTML    Acrobat PDF (629 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

An encryption and verification method with multiple encrypted keys based on interference principle is proposed. The encryption process is realized on computer digitally and the verification process can be completed optically or digitally. Two different images are encoded into three diffractive phase elements (DPEs) by using two different incident wavelengths. Three DPEs have different distances from output plane. The two wavelength parameters and three distance parameters can be used as encryption keys, which will boost security degree of this system. Numerical simulation proves that the proposed encryption method is valid and has high secrecy level.

© 2010 OSA

OCIS Codes
(070.0070) Fourier optics and signal processing : Fourier optics and signal processing
(100.0100) Image processing : Image processing

ToC Category:
Fiber Optics and Optical Communications

History
Original Manuscript: November 11, 2009
Revised Manuscript: December 22, 2009
Manuscript Accepted: January 5, 2010
Published: March 31, 2010

Citation
Chun-Hui Niu, Xiao-Ling Wang, Nai-Guang Lv, Zhe-Hai Zhou, and Xiao-Ying Li, "An encryption method with multiple encrypted keys based on interference principle," Opt. Express 18, 7827-7834 (2010)
http://www.opticsinfobase.org/oe/abstract.cfm?URI=oe-18-8-7827


Sort:  Author  |  Year  |  Journal  |  Reset  

References

  1. P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20(7), 767–769 (1995). [CrossRef] [PubMed]
  2. O. Matoba and B. Javidi, “Encrypted optical memory system using three-dimensional keys in the Fresnel domain,” Opt. Lett. 24(11), 762–764 (1999). [CrossRef]
  3. J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kin, “Optical image encryption based on XOR operations,” Opt. Eng. (Bellingham) 38(1), 47–54 (1999). [CrossRef]
  4. J. W. Han, S. H. Lee, and E. S. Kin, “Optical key bit stream generator,” Opt. Eng. (Bellingham) 38(1), 33–38 (1999). [CrossRef]
  5. S. T. Liu, Q. L. Mi, and B. H. Zhu, “Optical image encryption with multistage and multichannel fractional Fourier-domain filtering,” Opt. Lett. 26(16), 1242–1244 (2001). [CrossRef]
  6. Y. Zhang, C. H. Zheng, and N. Tanno, “Optical encryption based on iterative fractional Fourier transform,” Opt. Commun. 202(4-6), 277–285 (2002). [CrossRef]
  7. A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys,” Opt. Lett. 30(13), 1644–1646 (2005). [CrossRef] [PubMed]
  8. U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, “A known-plaintext heuristic attack on the Fourier plane encryption algorithm,” Opt. Express 14(8), 3181–3186 (2006). [CrossRef] [PubMed]
  9. Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15(16), 10253–10265 (2007). [CrossRef] [PubMed]
  10. P. K. Wang, L. A. Watson, and C. Chatwin, “Random phase encoding for optical security,” Opt. Eng. (Bellingham) 35(9), 2464–2469 (1996). [CrossRef]
  11. Y. Li, K. Kreske, and J. Rosen, “Security and encryption optical systems based on a correlator with significant output images,” Appl. Opt. 39(29), 5295–5301 (2000). [CrossRef]
  12. Z. J. Liu and S. T. Liu, “Double image encryption based on iterative fractional Fourier transform,” Opt. Commun. 275(2), 324–329 (2007). [CrossRef]
  13. B. Javidi and T. Nomura, “Securing information by use of digital holography,” Opt. Lett. 25(1), 28–30 (2000). [CrossRef]
  14. N. K. Nishchal, J. Joseph, and K. Singh, “Securing information using fractional Fourier transform in digital holography,” Opt. Commun. 235(4-6), 253–259 (2004). [CrossRef]
  15. X. F. Meng, X. Peng, L. Z. Cai, A. M. Li, Z. Gao, and Y. R. Wang, “Cryptosystem based on two-step phase-shifting interferometry and the RSA public-key encryption algorithm,” J. Opt. A, Pure Appl. Opt. 11(8), 085402 (2009). [CrossRef]
  16. Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33(21), 2443–2445 (2008). [CrossRef] [PubMed]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.

Figures

Fig. 1 Fig. 2 Fig. 3
 
Fig. 4 Fig. 5
 

« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited