OSA's Digital Library

Optics Express

Optics Express

  • Editor: C. Martijn de Sterke
  • Vol. 19, Iss. 3 — Jan. 31, 2011
  • pp: 2634–2642

Optical stream-cipher-like system for image encryption based on Michelson interferometer

Bing Yang, Zhengjun Liu, Bo Wang, Yan Zhang, and Shutian Liu  »View Author Affiliations

Optics Express, Vol. 19, Issue 3, pp. 2634-2642 (2011)

View Full Text Article

Enhanced HTML    Acrobat PDF (1231 KB)

Browse Journals / Lookup Meetings

Browse by Journal and Year


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools



A novel optical image encryption scheme based on interference is proposed. The original image is digitally encoded into one phase-only mask by employing an improved Gerchberg-Saxton phase retrieval algorithm together with another predefined random phase mask which serves as the encryption key. The decryption process can be implemented optically based on Michelson interferometer by using the same key. The scheme can be regarded as a stream-cipher-like encryption system, the encryption and decryption keys are the same, however the operations are different. The position coordinates and light wavelength can also be used as additional keys during the decryption. Numerical simulations have demonstrated the validity and robustness of the proposed method.

© 2011 Optical Society of America

OCIS Codes
(100.0100) Image processing : Image processing
(100.4998) Image processing : Pattern recognition, optical security and encryption

ToC Category:
Image Processing

Original Manuscript: November 30, 2010
Revised Manuscript: January 14, 2011
Manuscript Accepted: January 23, 2011
Published: January 27, 2011

Bing Yang, Zhengjun Liu, Bo Wang, Yan Zhang, and Shutian Liu, "Optical stream-cipher-like system for image encryption based on Michelson interferometer," Opt. Express 19, 2634-2642 (2011)

Sort:  Author  |  Year  |  Journal  |  Reset  


  1. P. Refregier, and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995). [CrossRef] [PubMed]
  2. D. S. Monaghan, U. Gopinathan, T. J. Naughton, and J. T. Sheridan, “Key-space analysis of double random phase encryption technique,” Appl. Opt. 46, 6641–6647 (2007). [CrossRef] [PubMed]
  3. B. Javidi, G. Zhang, and J. Li, “Encrypted optical memory using double-random phase encoding,” Opt. Eng. 36, 1054–1058 (1997).
  4. O. Matoba, and B. Javidi, “Encrypted optical memory system using three-dimensional keys in the Fresnel domain,” Opt. Lett. 24, 762–764 (1999). [CrossRef]
  5. A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys,” Opt. Lett. 30, 1644–1646 (2005). [CrossRef] [PubMed]
  6. X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044–1046 (2006). [CrossRef] [PubMed]
  7. S. Liu, Q. Mi, and B. Zhu, “Optical image encryption with multistage and multichannel fractional Fourier-domain filtering,” Opt. Lett. 26, 1242–1244 (2001). [CrossRef]
  8. Y. Zhang, C. H. Zheng, and N. Tanno, “Optical encryption based on iterative fractional Fourier transform,” Opt. Commun. 202, 277–285 (2002). [CrossRef]
  9. X. Wang, and D. Zhao, “Image encryption based on anamorphic fractional Fourier transform and three-step phase-shifting interferometry,” Opt. Commun. 268, 240–244 (2006). [CrossRef]
  10. Z. Liu, and S. Liu, “Random fractional Fourier transform,” Opt. Lett. 32, 2088–2090 (2007). [CrossRef] [PubMed]
  11. L. Chen, and D. Zhao, “Optical image encryption with Hartley transforms,” Opt. Lett. 31, 3438–3440 (2006). [CrossRef] [PubMed]
  12. H. Kim, D. H. Kim, and Y. Lee, “Encryption of digital hologram of 3-d object by virtual optics,” Opt. Express 12,Q14912–4921 (2004). [CrossRef] [PubMed]
  13. Z. Liu, and S. Liu, “Randomization of the Fourier transform,” Opt. Lett. 32, 478–480 (2007). [CrossRef] [PubMed]
  14. Z. Liu, and S. Liu, “Double image encryption based on iterative fractional Fourier transform,” Opt. Commun. 275, 324–329 (2007). [CrossRef]
  15. G. Situ, and J. Zhang, “Multiple-image encryption by wavelength multiplexing,” Opt. Lett. 30, 1306–1308 (2005). [CrossRef] [PubMed]
  16. H. Li, and Y. Wang, “Double-image encryption based on iterative gyrator transform,” Opt. Commun. 281, 5745–5749 (2008). [CrossRef]
  17. M. Z. He, L. Z. Cai, Q. Liu, X. C. Wang, and X. F. Meng, “Multiple image encryption and watermarking by random phase matching,” Opt. Commun. 247, 29–37 (2005). [CrossRef]
  18. Z. Liu, J. Dai, X. Sun, and S. Liu, “Triple image encryption scheme in fractional Fourier transform domains,” Opt. Commun. 282, 518–522 (2009). [CrossRef]
  19. Z. Liu, Q. Li, J. Dai, X. Sun, S. Liu, and M. A. Ahmad, “A new kind of double image encryption by using a cutting spectrum in the 1-D fractional Fourier transform domains,” Opt. Commun. 282, 1536–1540 (2009). [CrossRef]
  20. Y. Zhang, and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33, 2443–2445 (2008). [CrossRef] [PubMed]
  21. M. Madjarova, M. Kakuta, M. Yamaguchi, and N. Ohyama, “Optical implementation of the stream cipher based on the irreversible cellular automata algorithm,” Opt. Lett. 22, 1624–1626 (1997). [CrossRef]
  22. J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kim, “Optical image encryption based on XOR operations,” Opt. Eng. 38, 47–54 (1999). [CrossRef]
  23. J. W. Han, S. Lee, and E. S. Kim, “Optical key bit stream generator,” Opt. Eng. 38, 33–38 (1999). [CrossRef]
  24. S. Zhang, and R. Karim, “High-security optical integrated stream ciphers,” Opt. Eng. 38, 20–24 (1999). [CrossRef]
  25. T. Sasaki, H. Togo, J. Tanida, and Y. Ichioka, “Stream cipher based on pseudorandom number generation with optical affine transformation,” Appl. Opt. 39, 2340–2346 (2000). [CrossRef]
  26. R. W. Gerchberg, and W. O. Saxton, “A practical algorithm for the determination of phase from image and diffraction plane pictures,” Optik (Stuttg.) 35, 237–246 (1972).
  27. J. R. Fienup, “Phase retrieval algorithms: a comparison,” Appl. Opt. 21, 2758–2769 (1982). [CrossRef] [PubMed]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.

« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited