OSA's Digital Library

Optics Express

Optics Express

  • Editor: C. Martijn de Sterke
  • Vol. 19, Iss. 23 — Nov. 7, 2011
  • pp: 22619–22627

Optically-induced-potential-based image encryption

Bing-Chu Chen and He-Zhou Wang  »View Author Affiliations


Optics Express, Vol. 19, Issue 23, pp. 22619-22627 (2011)
http://dx.doi.org/10.1364/OE.19.022619


View Full Text Article

Enhanced HTML    Acrobat PDF (4930 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

We present a technique of nonlinear image encryption by use of virtual optics. The image to be encrypted is superposed on a random intensity image. And this superposed image propagates through a nonlinear medium and a 4-f system with single phase key. The image is encrypted to a stationary white noise. The decryption process is sensitive to the parameters of the encryption system and the phase key in 4-f system. This sensitivity makes attackers hard to access the phase key. In nonlinear medium, optically-induced potentials, which depend on intensity of optical wave, make the superposition principle frustrated. This nonlinearity based on optically induced potentials highly improves the secrecy level of image encryption. Resistance against attacks based on the phase retrieval technique proves that it has the high secrecy level. This nonlinear image encryption based on optically induced potentials is proposed and demonstrated for the first time.

© 2011 OSA

OCIS Codes
(070.0070) Fourier optics and signal processing : Fourier optics and signal processing
(070.4340) Fourier optics and signal processing : Nonlinear optical signal processing
(100.0100) Image processing : Image processing

ToC Category:
Image Processing

History
Original Manuscript: July 26, 2011
Revised Manuscript: October 4, 2011
Manuscript Accepted: October 10, 2011
Published: October 25, 2011

Citation
Bing-Chu Chen and He-Zhou Wang, "Optically-induced-potential-based image encryption," Opt. Express 19, 22619-22627 (2011)
http://www.opticsinfobase.org/oe/abstract.cfm?URI=oe-19-23-22619


Sort:  Author  |  Year  |  Journal  |  Reset  

References

  1. C. Barsi and J. W. Fleischer, “Digital reconstruction of optically-induced potentials,” Opt. Express17(25), 23338–23343 (2009), http://www.opticsinfobase.org/oe/abstract.cfm?URI=oe-17-25-23338 . [CrossRef] [PubMed]
  2. C. Barsi, W. Wan, and J. W. Fleischer, “Imaging through nonlinear media using digital holography,” Nat. Photonics3(4), 211–215 (2009). [CrossRef]
  3. I. Yamaguchi and T. Zhang, “Phase-shifting digital holography,” Opt. Lett.22(16), 1268–1270 (1997). [CrossRef] [PubMed]
  4. X. F. Meng, L. Z. Cai, X. F. Xu, X. L. Yang, X. X. Shen, G. Y. Dong, and Y. R. Wang, “Two-step phase-shifting interferometry and its application in image encryption,” Opt. Lett.31(10), 1414–1416 (2006). [CrossRef] [PubMed]
  5. P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett.20(7), 767–769 (1995). [CrossRef] [PubMed]
  6. G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett.25(12), 887–889 (2000). [CrossRef] [PubMed]
  7. G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett.29(14), 1584–1586 (2004). [CrossRef] [PubMed]
  8. X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, “Security enhancement of double-random phase encryption by amplitude modulation,” Opt. Lett.33(14), 1575–1577 (2008). [CrossRef] [PubMed]
  9. M. He, Q. Tan, L. Cao, Q. He, and G. Jin, “Security enhanced optical encryption system by random phase key and permutation key,” Opt. Express17(25), 22462–22473 (2009), http://www.opticsinfobase.org/oe/abstract.cfm?URI=oe-17-25-22462 . [CrossRef] [PubMed]
  10. X. Peng, L. Yu, and L. Cai, “Double-lock for image encryption with virtual optical wavelength,” Opt. Express10(1), 41–45 (2002), http://www.opticsinfobase.org/oe/abstract.cfm?URI=oe-10-1-41 . [PubMed]
  11. H. Kim, D. H. Kim, and Y. Lee, “Encryption of digital hologram of 3-D object by virtual optics,” Opt. Express12(20), 4912–4921 (2004), http://www.opticsinfobase.org/oe/abstract.cfm?URI=oe-12-20-4912 . [CrossRef] [PubMed]
  12. X. Wang, D. Zhao, F. Jing, and X. Wei, “Information synthesis (complex amplitude addition and subtraction) and encryption with digital holography and virtual optics,” Opt. Express14(4), 1476–1486 (2006), http://www.opticsinfobase.org/oe/abstract.cfm?URI=oe-14-4-1476 . [CrossRef] [PubMed]
  13. A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys,” Opt. Lett.30(13), 1644–1646 (2005). [CrossRef] [PubMed]
  14. X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett.31(8), 1044–1046 (2006). [CrossRef] [PubMed]
  15. Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express15(16), 10253–10265 (2007), http://www.opticsinfobase.org/oe/abstract.cfm?URI=oe-15-16-102532 . [CrossRef] [PubMed]
  16. W. Liu, G. Yang, and H. Xie, “A hybrid heuristic algorithm to improve known-plaintext attack on Fourier plane encryption,” Opt. Express17(16), 13928–13938 (2009), http://www.opticsinfobase.org/oe/abstract.cfm?URI=oe-17-16-13928 . [CrossRef] [PubMed]
  17. N. V. Kukhtarev, V. B. Markov, S. G. Odulov, M. S. Soskin, and V. L. Vinetskii, “Holographic storage in electrooptic crystals 1. Steady-state,” Ferroelectrics22(1), 949–960 (1978). [CrossRef]
  18. W. L. She, C. C. Xu, B. Guo, and W. K. Lee, “Formation of photovoltaic bright spatial soliton in photorefractive LiNbO3 crystal by a defocused laser beam induced by a background laser beam,” J. Opt. Soc. Am. B23(10), 2121–2126 (2006). [CrossRef]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited