OSA's Digital Library

Optics Express

Optics Express

  • Editor: C. Martijn de Sterke
  • Vol. 20, Iss. 4 — Feb. 13, 2012
  • pp: 3853–3865

Optical color-image encryption and synthesis using coherent diffractive imaging in the Fresnel domain

Wen Chen, Xudong Chen, and Colin J. R. Sheppard  »View Author Affiliations


Optics Express, Vol. 20, Issue 4, pp. 3853-3865 (2012)
http://dx.doi.org/10.1364/OE.20.003853


View Full Text Article

Enhanced HTML    Acrobat PDF (3875 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

We propose a new method using coherent diffractive imaging for optical color-image encryption and synthesis in the Fresnel domain. An optical multiple-random-phase-mask encryption system is applied, and a strategy based on lateral translations of a phase-only mask is employed during image encryption. For the decryption, an iterative phase retrieval algorithm is applied to extract high-quality decrypted color images from diffraction intensity maps (i.e., ciphertexts). In addition, optical color-image synthesis is also investigated based on coherent diffractive imaging. Numerical results are presented to demonstrate feasibility and effectiveness of the proposed method. Compared with conventional interference methods, coherent diffractive imaging approach may open up a new research perspective or can provide an effective alternative for optical color-image encryption and synthesis.

© 2012 OSA

OCIS Codes
(100.2000) Image processing : Digital image processing
(100.3190) Image processing : Inverse problems
(110.1650) Imaging systems : Coherence imaging
(060.4785) Fiber optics and optical communications : Optical security and encryption
(100.4998) Image processing : Pattern recognition, optical security and encryption

ToC Category:
Image Processing

History
Original Manuscript: October 25, 2011
Revised Manuscript: December 7, 2011
Manuscript Accepted: January 3, 2012
Published: February 1, 2012

Citation
Wen Chen, Xudong Chen, and Colin J. R. Sheppard, "Optical color-image encryption and synthesis using coherent diffractive imaging in the Fresnel domain," Opt. Express 20, 3853-3865 (2012)
http://www.opticsinfobase.org/oe/abstract.cfm?URI=oe-20-4-3853


Sort:  Author  |  Year  |  Journal  |  Reset  

References

  1. P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett.20(7), 767–769 (1995). [CrossRef] [PubMed]
  2. B. Javidi, “Securing information with optical technologies,” Phys. Today50(3), 27–32 (1997). [CrossRef]
  3. O. Matoba, T. Nomura, E. Perez-Cabre, M. Í. S. Millan, and B. Javidi, “Optical techniques for information security,” Proc. IEEE97(6), 1128–1148 (2009). [CrossRef]
  4. T. J. Naughton, B. M. Hennelly, and T. Dowling, “Introducing secure modes of operation for optical encryption,” J. Opt. Soc. Am. A25(10), 2608–2617 (2008). [CrossRef] [PubMed]
  5. A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys,” Opt. Lett.30(13), 1644–1646 (2005). [CrossRef] [PubMed]
  6. X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett.31(8), 1044–1046 (2006). [CrossRef] [PubMed]
  7. O. Matoba and B. Javidi, “Encrypted optical memory system using three-dimensional keys in the Fresnel domain,” Opt. Lett.24(11), 762–764 (1999). [CrossRef] [PubMed]
  8. G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett.29(14), 1584–1586 (2004). [CrossRef] [PubMed]
  9. G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett.25(12), 887–889 (2000). [CrossRef] [PubMed]
  10. H. M. Ozaktas, Z. Zalevsky, and M. A. Kutay, The Fractional Fourier Transform with Applications in Optics and Signal Processing (Wiley, 2001).
  11. H. Li, “Image encryption based on gyrator transform and two-step phase-shifting interferometry,” Opt. Lasers Eng.47(1), 45–50 (2009). [CrossRef]
  12. Z. Liu, L. Xu, C. Lin, and S. Liu, “Image encryption by encoding with a nonuniform optical beam in gyrator transform domains,” Appl. Opt.49(29), 5632–5637 (2010). [CrossRef] [PubMed]
  13. X. Peng, L. Yu, and L. Cai, “Double-lock for image encryption with virtual optical wavelength,” Opt. Express10(1), 41–45 (2002). [PubMed]
  14. H. Kim, D. H. Kim, and Y. H. Lee, “Encryption of digital hologram of 3-D object by virtual optics,” Opt. Express12(20), 4912–4921 (2004). [CrossRef] [PubMed]
  15. L. Yu and L. Cai, “Multidimensional data encryption with digital holography,” Opt. Commun.215(4-6), 271–284 (2003). [CrossRef]
  16. B. Zhu, H. Zhao, and S. Liu, “Image encryption based on pure intensity random coding and digital holography technique,” Optik (Stuttg.)114(2), 95–99 (2003). [CrossRef]
  17. E. Tajahuerce and B. Javidi, “Encrypting three-dimensional information with digital holography,” Appl. Opt.39(35), 6595–6601 (2000). [CrossRef] [PubMed]
  18. X. Wang, D. Zhao, F. Jing, and X. Wei, “Information synthesis (complex amplitude addition and subtraction) and encryption with digital holography and virtual optics,” Opt. Express14(4), 1476–1486 (2006). [CrossRef] [PubMed]
  19. S. Q. Zhang and M. A. Karim, “Color image encryption using double random phase encoding,” Microw. Opt. Technol. Lett.21(5), 318–323 (1999). [CrossRef]
  20. L. Chen and D. Zhao, “Optical color image encryption by wavelength multiplexing and lensless Fresnel transform holograms,” Opt. Express14(19), 8552–8560 (2006). [CrossRef] [PubMed]
  21. G. Situ and J. Zhang, “Multiple-image encryption by wavelength multiplexing,” Opt. Lett.30(11), 1306–1308 (2005). [CrossRef] [PubMed]
  22. L. Chen and D. Zhao, “Color information processing (coding and synthesis) with fractional Fourier transforms and digital holography,” Opt. Express15(24), 16080–16089 (2007). [CrossRef] [PubMed]
  23. F. Mosso, M. Tebaldi, J. F. Barrera, N. Bolognini, and R. Torroba, “Pure optical dynamical color encryption,” Opt. Express19(15), 13779–13786 (2011). [CrossRef] [PubMed]
  24. S. Lai and M. A. Neifeld, “Digital wavefront reconstruction and its application to image encryption,” Opt. Commun.178(4-6), 283–289 (2000). [CrossRef]
  25. U. Schnars and W. Jüptner, Digital Holography: Digital Hologram Recording, Numerical Reconstruction, and Related Techniques (Springer, 2005).
  26. X. F. Meng, L. Z. Cai, X. F. Xu, X. L. Yang, X. X. Shen, G. Y. Dong, and Y. R. Wang, “Two-step phase-shifting interferometry and its application in image encryption,” Opt. Lett.31(10), 1414–1416 (2006). [CrossRef] [PubMed]
  27. R. W. Gerchberg and W. O. Saxton, “A practical algorithm for the determination of phase from image and diffraction plane pictures,” Optik (Stuttg.)35, 237–246 (1972).
  28. J. R. Fienup, “Phase retrieval algorithms: a comparison,” Appl. Opt.21(15), 2758–2769 (1982). [CrossRef] [PubMed]
  29. F. C. Zhang, G. Pedrini, and W. Osten, “Phase retrieval of arbitrary complex-valued fields through aperture-plane modulation,” Phys. Rev. A75(4), 043805 (2007). [CrossRef]
  30. J. Miao, P. Charalambous, J. Kirz, and D. Sayre, “Extending the methodology of X-ray crystallography to allow imaging of micrometer-sized non-crystalline specimens,” Nature400(6742), 342–344 (1999). [CrossRef]
  31. J. M. Zuo, I. Vartanyants, M. Gao, R. Zhang, and L. A. Nagahara, “Atomic resolution imaging of a carbon nanotube from diffraction intensities,” Science300(5624), 1419–1421 (2003). [CrossRef] [PubMed]
  32. M. A. Pfeifer, G. J. Williams, I. A. Vartanyants, R. Harder, and I. K. Robinson, “Three-dimensional mapping of a deformation field inside a nanocrystal,” Nature442(7098), 63–66 (2006). [CrossRef] [PubMed]
  33. L. De Caro, C. Giannini, A. Cedola, D. Pelliccia, S. Lagomarsino, and W. Jark, “Phase retrieval in X-ray coherent Fresnel projection-geometry diffraction,” Appl. Phys. Lett.90(4), 041105 (2007). [CrossRef]
  34. I. Johnson, K. Jefimovs, O. Bunk, C. David, M. Dierolf, J. Gray, D. Renker, and F. Pfeiffer, “Coherent diffractive imaging using phase front modifications,” Phys. Rev. Lett.100(15), 155503 (2008). [CrossRef] [PubMed]
  35. J. W. Goodman, Introduction to Fourier Optics, 2nd ed. (McGraw-Hill, 1996).
  36. W. Chen and X. Chen, “Quantitative phase retrieval of a complex-valued object using variable function orders in the fractional Fourier domain,” Opt. Express18(13), 13536–13541 (2010). [CrossRef] [PubMed]
  37. W. Chen and X. Chen, “Space-based optical image encryption,” Opt. Express18(26), 27095–27104 (2010). [CrossRef] [PubMed]
  38. W. Chen and X. Chen, “Quantitative phase retrieval of complex-valued specimens based on noninterferometric imaging,” Appl. Opt.50(14), 2008–2015 (2011). [CrossRef] [PubMed]
  39. W. Chen and X. Chen, “Optical cryptography topology based on a three-dimensional particle-like distribution and diffractive imaging,” Opt. Express19(10), 9008–9019 (2011). [CrossRef] [PubMed]
  40. D. Wang, J. Zhao, F. Zhang, G. Pedrini, and W. Osten, “High-fidelity numerical realization of multiple-step Fresnel propagation for the reconstruction of digital holograms,” Appl. Opt.47(19), D12–D20 (2008). [CrossRef] [PubMed]
  41. W. Chen and X. Chen, “Optical asymmetric cryptography using a three-dimensional space-based model,” J. Opt.13(7), 075404 (2011). [CrossRef]
  42. K. Matsushima and T. Shimobaba, “Band-limited angular spectrum method for numerical simulation of free-space propagation in far and near fields,” Opt. Express17(22), 19662–19673 (2009). [CrossRef] [PubMed]
  43. Original color image or plaintext (Peppers): http://sipi.usc.edu/database .
  44. H. T. Chang, W. C. Lu, and C. J. Kuo, “Multiple-phase retrieval for optical security systems by use of random-phase encoding,” Appl. Opt.41(23), 4825–4834 (2002). [CrossRef] [PubMed]
  45. X. F. Meng, L. Z. Cai, X. L. Yang, X. X. Shen, and G. Y. Dong, “Information security system by iterative multiple-phase retrieval and pixel random permutation,” Appl. Opt.45(14), 3289–3297 (2006). [CrossRef] [PubMed]
  46. X. Yong-Liang, Z. Xin, W. Qiong-Hua, Y. Sheng, and C. Yao-Yao, “Optical image encryption topology,” Opt. Lett.34(20), 3223–3225 (2009). [CrossRef] [PubMed]
  47. H. E. Hwang, H. T. Chang, and W. N. Lie, “Multiple-image encryption and multiplexing using a modified Gerchberg-Saxton algorithm and phase modulation in Fresnel-transform domain,” Opt. Lett.34(24), 3917–3919 (2009). [CrossRef] [PubMed]
  48. W. Chen, X. Chen, and C. J. R. Sheppard, “Optical image encryption based on diffractive imaging,” Opt. Lett.35(22), 3817–3819 (2010). [CrossRef] [PubMed]
  49. J. Miao, D. Sayre, and H. N. Chapman, “Phase retrieval from the magnitude of the Fourier transforms of nonperiodic objects,” J. Opt. Soc. Am. A15(6), 1662–1669 (1998). [CrossRef]
  50. M. He, Q. Tan, L. Cao, Q. He, and G. Jin, “Security enhanced optical encryption system by random phase key and permutation key,” Opt. Express17(25), 22462–22473 (2009). [CrossRef] [PubMed]
  51. X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, “Security enhancement of double-random phase encryption by amplitude modulation,” Opt. Lett.33(14), 1575–1577 (2008). [CrossRef] [PubMed]
  52. P. Kumar, A. Kumar, J. Joseph, and K. Singh, “Impulse attack free double-random-phase encryption scheme with randomized lens-phase functions,” Opt. Lett.34(3), 331–333 (2009). [CrossRef] [PubMed]
  53. W. Chen, C. Quan, and C. J. Tay, “Optical color image encryption based on Arnold transform and interference method,” Opt. Commun.282(18), 3680–3685 (2009). [CrossRef]
  54. X. Shi and D. Zhao, “Color image hiding based on the phase retrieval technique and Arnold transform,” Appl. Opt.50(14), 2134–2139 (2011). [CrossRef] [PubMed]
  55. W. Qin and X. Peng, “Vulnerability to known-plaintext attack of optical encryption schemes based on two fractional Fourier transform order keys and double random phase keys,” J. Opt. A, Pure Appl. Opt.11(7), 075402 (2009). [CrossRef]
  56. G. Situ, U. Gopinathan, D. S. Monaghan, and J. T. Sheridan, “Cryptanalysis of optical security systems with significant output images,” Appl. Opt.46(22), 5257–5262 (2007). [CrossRef] [PubMed]
  57. U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, “A known-plaintext heuristic attack on the Fourier plane encryption algorithm,” Opt. Express14(8), 3181–3186 (2006). [CrossRef] [PubMed]
  58. W. McBride, N. L. O’Leary, K. A. Nugent, and L. J. Allen, “Astigmatic electron diffraction imaging: a novel mode for structure determination,” Acta Crystallogr. A61(3), 321–324 (2005). [CrossRef] [PubMed]
  59. W. Chen, X. Chen, and C. J. R. Sheppard, “Optical double-image cryptography based on diffractive imaging with a laterally-translated phase grating,” Appl. Opt.50(29), 5750–5757 (2011). [CrossRef] [PubMed]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited