OSA's Digital Library

Optics Express

Optics Express

  • Editor: Andrew M. Weiner
  • Vol. 21, Iss. 16 — Aug. 12, 2013
  • pp: 19395–19400
« Show journal navigation

A simple optical encryption based on shape merging technique in periodic diffraction correlation imaging

Mengjie Sun, Jianhong Shi, Hu Li, and Guihua Zeng  »View Author Affiliations


Optics Express, Vol. 21, Issue 16, pp. 19395-19400 (2013)
http://dx.doi.org/10.1364/OE.21.019395


View Full Text Article

Acrobat PDF (920 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

In Periodic diffraction correlation imaging (PDCI), the images of several objects located in different spatial positions can be integrated into one image following certain rules, which is named shape merging. In this paper, we proposed and demonstrated this new technique. It can be realized without SLM or beam-splitter. And this effect can find novel application in optical encryption, enabling transmission of object information to a remote place secretly.

© 2013 OSA

1. Introduction

Since the first ghost imaging experiment [1

1. D. V. Strekalov, A. V. Sergienko, D. N. Klyshko, and Y. H. Shih, “Observation of Two-Photon “Ghost” Interference and Diffraction,” Phys. Rev. Lett. 74(18), 3600–3603 (1995). [CrossRef] [PubMed]

] based on quantum entangled photon pairs was performed in 1995, over the past decade the phenomenon had attracted much interest in the field of quantum optics. More recently, ghost imaging had been investigated from different aspects, including compressive sensing in ghost imaging [2

2. O. Katz, Y. Bromberg, and Y. Silberberg, “Compressive ghost imaging,” Phys. Rev. Lett. 95, 131110 (2009).

], high order ghost imaging [3

3. Y. F. Bai and S. S. Han, “Ghost imaging with thermal light by third-order correlation,” Phys. Rev. A 76(4), 043828 (2007). [CrossRef]

6

6. Y. Zhou, J. Simon, J. B. Liu, and Y. H. Shih, “Third-order correlation function and ghost imaging of chaotic thermal light in the photon counting regime,” Phys. Rev. A 81(4), 043831 (2010). [CrossRef]

], ghost imaging by measuring reflected photons [7

7. R. Meyers, K. S. Deacon, and H. C. Kandpal, “Ghost Imaging Experiment by measuring reflected photons,” Phys. Rev. A 77(4), 041801 (2008). [CrossRef]

9

9. L. Basano and P. Ottonello, “Diffuse-reflection ghost imaging from a double-strip illuminated by pseudoth-ermal light,” Opt. Commun. 283(13), 2657–2661 (2010). [CrossRef]

], periodic diffraction ghost imaging [10

10. H. Li, Z. P. Chen, J. Xiong, and G. H. Zeng, “Periodic diffraction correlation imaging without a beam-splitter,” Opt. Express 20(3), 2956–2966 (2012). [CrossRef] [PubMed]

], ghost imaging under Talbot effect [11

11. X. B. Song, J. Xiong, X. D. Zhang, and K. G. Wang, “Second –order Talbot self-imaging with pseudother- mal,” Phys. Rev. A 82(3), 033823 (2010). [CrossRef]

, 12

12. K. H. Luo, X. H. Chen, Q. Liu, and L. A. Wu, “Nonlocal Talbot self-imaging with pseudo-thermal light,” Phys. Rev. A 82(3), 033803 (2010). [CrossRef]

], ghost imaging through turbulent [13

13. J. Cheng, “Ghost imaging through turbulent atmosphere,” Opt. Express 17(10), 7916–7921 (2009). [CrossRef] [PubMed]

, 14

14. P. Zhang, W. Gong, X. Shen, and S. Han, “Correlated imaging through atmospheric turbulence,” Phys. Rev. A 82(033817), 1–4 (2010).

] and computational ghost imaging (CGI) [15

15. Y. Bromberg, O. Katz, and Y. Silberberg, “Ghost imaging with a single detector,” Phys. Rev. A 79(5), 053840 (2009). [CrossRef]

, 16

16. J. H. Shapiro, “Computational ghost imaging,” Phys. Rev. A 78(061802), 1–4 (2008).

], etc.

Lately a novel correlation imaging mechanism called periodic diffraction correlation imaging (PDCI) [10

10. H. Li, Z. P. Chen, J. Xiong, and G. H. Zeng, “Periodic diffraction correlation imaging without a beam-splitter,” Opt. Express 20(3), 2956–2966 (2012). [CrossRef] [PubMed]

] is proposed. This mechanism is based on periodic diffraction effect, in which a periodic intensity pattern is generated at a diffraction plane after a periodic point source array. PDCI can be realized without a beam-splitter, so the complexity of correlation imaging scheme can be reduced sharply comparing with the traditional ghost imaging. Therefore, PDCI can easily realize high-resolution, Nth-order ghost imaging without a beam-splitter and correlation microscopy.

Many optical encryption methods have been proposed recently to secure, store, and decrypt information by using phase, wavelength, spatial frequency and polarization [17

17. P. Clemente, V. Durán, V. Torres-Company, E. Tajahuerce, and J. Lancis, “Optical encryption based on computational ghost imaging,” Opt. Lett. 35(14), 2391–2393 (2010). [CrossRef] [PubMed]

20

20. P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20(7), 767–769 (1995). [CrossRef] [PubMed]

]. The advantages of optical encryption are its high-speed operation and possibility of hiding data in multiple dimensions. One approach is optical encryption based on CGI. In this method, the encrypted version of the object image is simply an intensity vector, rather than complex-valued matrix, which dramatically reduces the number of bits transmitted by the sender to the receiver. And this approach might benefit from compressive sampling techniques applied to CGI to improve reconstruction quality by using even a fewer number of realizations. This scheme has shown robustness to eavesdropping even when using only a small number of key components. However it is still lack of security features in encrypted images [18

18. M. Tanha, R. Kheradmand, and S. Ahmadi-Kandjani, “Gray-scale and color optical encryption based on co-mputational ghost imaging,” Appl. Phys. Lett. 101(10), 101108 (2012). [CrossRef]

] and the SLM is relatively expensive. So simplifying execution in applications and decreasing the time for encryption are focuses of current research.

In this paper, we demonstrate a novel technique called shape merging which is a useful function of PDCI. We use a periodic point source array to generate the intensity pattern we need. And the achieved intensity is also periodic according to the periodic diffraction effect. Each point source is a sub-source; the objects illuminated by this light source can be merged into one image and appeared in the detecting plane periodically. Based on this technique, a new optical encryption method is proposed, which can realize encryption without SLM or beam-splitter. This method has a smaller computation complexity than that based on CGI.

The paper is organized as follows. In section 2, the shape merging technique is studied experimentally. In section 3, the new optical encryption method is proposed, and its features are demonstrated. And in section 4, the conclusion is made.

2. Shape merging technique

In the classical scheme of second-order correlation imaging, pseudo-thermal light is generated by a rotating ground glass located after a laser. Then the light is separated by a beam-splitter into two spatially correlated beams. One is the reference beam, impinging on a multipixel detector, without ever passing through the object. And the other is the object beam, which, after illuminating the object is collected by a bucket detector, with no spatial resolution. The intensity patterns recorded by the object charge-coupled-device (CCD) and the reference CCD are denoted byI1and, I2respectively. Then by calculatingΔG(2), the ghost image is retrieved, whereΔG(2)=ΔI1ΔI2=I1I2I1I2. In this scheme, the beam-splitter is an indispensable optical component for creating point-to-point correlation. While in the PDCI scheme shown in Fig. 1
Fig. 1 Experiment scheme of shape merging.
, a beam-splitter is not required, so the complexity of the system is reduced, what’s more, without the use of SLM, it has a rather lower cost than that of CGI. An object CCD placed after the object is used as a bucket detector, while a reference CCD is used for recording the reference diffraction intensity patterns. The schematic diagram shown in Fig. 2
Fig. 2 Schematic diagram of imaging plane.
indicates the proper positions for CCDs in this experiment. In Fig. 2, the object CCD is placed at a place marked as a solid line square, and the reference CCD can be placed at any place marked as dotted line squares with shadow. According to the periodic diffraction effect, the intensity pattern generated by a periodic point source array is also periodic. Therefore, the object could be retrieved with a period of T in the image plane, and the T [10

10. H. Li, Z. P. Chen, J. Xiong, and G. H. Zeng, “Periodic diffraction correlation imaging without a beam-splitter,” Opt. Express 20(3), 2956–2966 (2012). [CrossRef] [PubMed]

] is found to be
T=λza,
(1)
where λ is the central wavelength of the source array which is composed of N × N point sources, a is the distance between adjacent point sources, and z is the distance between the CCD used for recording the intensity information and the source array.

Then we demonstrate the shape merging technique in the PDCI and its useful application. In order to explain this technique clearly, firstly we make a definition of the non-repeated diffraction pattern (NDP) [8

8. N. S. Bisht, E. K. Sharma, and H. C. Kandpal, “Experimental observation of lensless ghost imaging by mea- suring reflected photons,” Opt. Lasers Engineer. 48, 671C675 (2010).

]. An arbitrary square area with its side length equal to the period T in the periodic intensity pattern is named a NDP. As mentioned above, the image of the object in the PDCI reappears in the image plane with a period of T. If the size of the object is larger than that of a NDP, and the components of the object have a relative position relation with each other, then a shape-merged image which is different from the original objects is obtained in each NDP, this is named shape merging technique.

In our experiment, light from a He-Ne laser emitting at 632.8 nm passed through a rotating ground glass to generate pseudo-thermal light. Then this beam illuminates a periodic array board which consists of 100 × 100 points and has a = 50μm. We use a transmission object which was placed after the array board, shown in the Fig. 3(a)
Fig. 3 Object and its merged image retrieved by shape merging with 5000 records.
.This object has an English letter ‘c’ at upper left corner, another ‘c’ at upper right corner and an English letter ‘s’ at lower right corner. The three letters ‘c’, ‘c’ and ‘s’ have a relative position relation with each other. Then the transmitted light was collected by a CCD of size 1392 × 1040 pixels which has a distance z = 410 mm with the array board. By using correlation measurement, a shape-merged ‘ccs’ which is the logotype of our lab was retrieved, shown in Fig. 3(b), the function of image is given by
ΔG(2)(x)|t(x)sinc(2πRλzx)|2,
(2)
where R is the radius of the source, t(x) denotes the transmission function of the object, function sinc(x) = sin(x)/x andis convolution operator. We can clearly see that the components of the original object merged into a new sequence in the result image. And there are four ‘ccs’ images obtained in Fig. 3(b), this depends on the period T and the size of the CCD.

In this experiment, we use only one CCD. We choose one of the NDPs, the information contained in this NDP can be thought of detected by the object CCD. While other NDPs seen as the reference beam. Hence this scheme has a lower complexity than that of traditional correlation imaging.

3. Optical encryption

The shape merging technique extends the PDCI to a novel application, optical encryption. The idea is illustrated in Fig. 4
Fig. 4 Scheme of the encryption method
. The sender transmits an encrypted image to the receiver. We assume that they transmit the information of object1 through a private channel, consisting of a vector of N components, {Si}, which are detected by a CCD used as a bucket detector. The information of object2 is encoded in another vector of N components, {Bi}, containing the transmission intensity values. These values are also shared with the receiver privately and recorded by another CCD. These two private channels have different encryption methods. The reference intensity distribution is transmitted to the receiver through a public channel. Then by using coincidence measurement, the complete image can only be obtained between the sum of total signal intensity values and the reference intensity distribution through the following linear operation:
O(x,y)=1Ni=1N[(SiS)+(BiB)]Ii(x,y),
(3)
where Ii(x,y)denotes the intensity distribution that would be achieved in the reference arm, S and Bare the average value for the measured intensity values {Si} and{Bi}, respectively.

In this mechanism, if the position relationship between these two objects is changed, the result will be different, as shown in Fig. 5(d)-5(f). And if we change any parameter among the wavelength λ, the distance between adjacent point sources a, the distance along the transmission axis z and the size of the detection area of the CCD, the number of images appearing in the image plane will also change. Hence this mechanism is controllable; the sender can change the parameters with the receiver to improve the confidentiality of the system. What’s more, in the encryption method based on CGI mentioned above, the reference intensity pattern has to be computed according to the phase distribution modulated on the SLM for each iteration. Therefore the computation complexity of the encryption based on CGI is remarkably high. Whereas, in the encryption based on PDCI, the reference intensity patterns are measured directly. Consequently, its computation complexity is smaller than that of former.

4. Conclusion

In this paper, a useful application named shape merging technique is studied. This technique is based on periodic diffraction correlation imaging and can be realized without a beam-splitter at a lower cost comparing with traditional ghost imaging. It can merge several objects into one image with only one CCD periodically. Then we demonstrate a potential application of shape merging technique, optical encryption, which can be used to encrypt and transmit object information to the destination secretly. This method is controllable and has a lower computation complexity comparing with the encryption method based on CGI. In summary, this mechanism provides a flexible way to realize image merging and encryption with a low cost and simple experiment scheme.

Acknowledgments

This work is supported by the Natural Science Foundation of China (Grants No: 60970109, 61170228).

References and links

1.

D. V. Strekalov, A. V. Sergienko, D. N. Klyshko, and Y. H. Shih, “Observation of Two-Photon “Ghost” Interference and Diffraction,” Phys. Rev. Lett. 74(18), 3600–3603 (1995). [CrossRef] [PubMed]

2.

O. Katz, Y. Bromberg, and Y. Silberberg, “Compressive ghost imaging,” Phys. Rev. Lett. 95, 131110 (2009).

3.

Y. F. Bai and S. S. Han, “Ghost imaging with thermal light by third-order correlation,” Phys. Rev. A 76(4), 043828 (2007). [CrossRef]

4.

J. B. Liu and Y. H. Shih, “Nth-order coherence of thermal light,” Phys. Rev. A 79(2), 023819 (2009). [CrossRef]

5.

Q. Liu, X. H. Chen, K. H. Luo, W. Wu, and L. A. Wu, “Role of multiphoton bunching in high-order ghost imaging with thermal light sources,” Phys. Rev. A 79(5), 053844 (2009). [CrossRef]

6.

Y. Zhou, J. Simon, J. B. Liu, and Y. H. Shih, “Third-order correlation function and ghost imaging of chaotic thermal light in the photon counting regime,” Phys. Rev. A 81(4), 043831 (2010). [CrossRef]

7.

R. Meyers, K. S. Deacon, and H. C. Kandpal, “Ghost Imaging Experiment by measuring reflected photons,” Phys. Rev. A 77(4), 041801 (2008). [CrossRef]

8.

N. S. Bisht, E. K. Sharma, and H. C. Kandpal, “Experimental observation of lensless ghost imaging by mea- suring reflected photons,” Opt. Lasers Engineer. 48, 671C675 (2010).

9.

L. Basano and P. Ottonello, “Diffuse-reflection ghost imaging from a double-strip illuminated by pseudoth-ermal light,” Opt. Commun. 283(13), 2657–2661 (2010). [CrossRef]

10.

H. Li, Z. P. Chen, J. Xiong, and G. H. Zeng, “Periodic diffraction correlation imaging without a beam-splitter,” Opt. Express 20(3), 2956–2966 (2012). [CrossRef] [PubMed]

11.

X. B. Song, J. Xiong, X. D. Zhang, and K. G. Wang, “Second –order Talbot self-imaging with pseudother- mal,” Phys. Rev. A 82(3), 033823 (2010). [CrossRef]

12.

K. H. Luo, X. H. Chen, Q. Liu, and L. A. Wu, “Nonlocal Talbot self-imaging with pseudo-thermal light,” Phys. Rev. A 82(3), 033803 (2010). [CrossRef]

13.

J. Cheng, “Ghost imaging through turbulent atmosphere,” Opt. Express 17(10), 7916–7921 (2009). [CrossRef] [PubMed]

14.

P. Zhang, W. Gong, X. Shen, and S. Han, “Correlated imaging through atmospheric turbulence,” Phys. Rev. A 82(033817), 1–4 (2010).

15.

Y. Bromberg, O. Katz, and Y. Silberberg, “Ghost imaging with a single detector,” Phys. Rev. A 79(5), 053840 (2009). [CrossRef]

16.

J. H. Shapiro, “Computational ghost imaging,” Phys. Rev. A 78(061802), 1–4 (2008).

17.

P. Clemente, V. Durán, V. Torres-Company, E. Tajahuerce, and J. Lancis, “Optical encryption based on computational ghost imaging,” Opt. Lett. 35(14), 2391–2393 (2010). [CrossRef] [PubMed]

18.

M. Tanha, R. Kheradmand, and S. Ahmadi-Kandjani, “Gray-scale and color optical encryption based on co-mputational ghost imaging,” Appl. Phys. Lett. 101(10), 101108 (2012). [CrossRef]

19.

E. Tajahuerce and B. Javidi, “Encrypting three-dimensional information with digital holography,” Appl. Opt. 39(35), 6595–6601 (2000). [CrossRef] [PubMed]

20.

P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20(7), 767–769 (1995). [CrossRef] [PubMed]

OCIS Codes
(030.1670) Coherence and statistical optics : Coherent optical effects
(110.1650) Imaging systems : Coherence imaging

ToC Category:
Imaging Systems

History
Original Manuscript: April 26, 2013
Revised Manuscript: June 23, 2013
Manuscript Accepted: June 26, 2013
Published: August 8, 2013

Citation
Mengjie Sun, Jianhong Shi, Hu Li, and Guihua Zeng, "A simple optical encryption based on shape merging technique in periodic diffraction correlation imaging," Opt. Express 21, 19395-19400 (2013)
http://www.opticsinfobase.org/oe/abstract.cfm?URI=oe-21-16-19395


Sort:  Author  |  Year  |  Journal  |  Reset  

References

  1. D. V. Strekalov, A. V. Sergienko, D. N. Klyshko, and Y. H. Shih, “Observation of Two-Photon “Ghost” Interference and Diffraction,” Phys. Rev. Lett.74(18), 3600–3603 (1995). [CrossRef] [PubMed]
  2. O. Katz, Y. Bromberg, and Y. Silberberg, “Compressive ghost imaging,” Phys. Rev. Lett.95, 131110 (2009).
  3. Y. F. Bai and S. S. Han, “Ghost imaging with thermal light by third-order correlation,” Phys. Rev. A76(4), 043828 (2007). [CrossRef]
  4. J. B. Liu and Y. H. Shih, “Nth-order coherence of thermal light,” Phys. Rev. A79(2), 023819 (2009). [CrossRef]
  5. Q. Liu, X. H. Chen, K. H. Luo, W. Wu, and L. A. Wu, “Role of multiphoton bunching in high-order ghost imaging with thermal light sources,” Phys. Rev. A79(5), 053844 (2009). [CrossRef]
  6. Y. Zhou, J. Simon, J. B. Liu, and Y. H. Shih, “Third-order correlation function and ghost imaging of chaotic thermal light in the photon counting regime,” Phys. Rev. A81(4), 043831 (2010). [CrossRef]
  7. R. Meyers, K. S. Deacon, and H. C. Kandpal, “Ghost Imaging Experiment by measuring reflected photons,” Phys. Rev. A77(4), 041801 (2008). [CrossRef]
  8. N. S. Bisht, E. K. Sharma, and H. C. Kandpal, “Experimental observation of lensless ghost imaging by mea- suring reflected photons,” Opt. Lasers Engineer.48, 671C675 (2010).
  9. L. Basano and P. Ottonello, “Diffuse-reflection ghost imaging from a double-strip illuminated by pseudoth-ermal light,” Opt. Commun.283(13), 2657–2661 (2010). [CrossRef]
  10. H. Li, Z. P. Chen, J. Xiong, and G. H. Zeng, “Periodic diffraction correlation imaging without a beam-splitter,” Opt. Express20(3), 2956–2966 (2012). [CrossRef] [PubMed]
  11. X. B. Song, J. Xiong, X. D. Zhang, and K. G. Wang, “Second –order Talbot self-imaging with pseudother- mal,” Phys. Rev. A82(3), 033823 (2010). [CrossRef]
  12. K. H. Luo, X. H. Chen, Q. Liu, and L. A. Wu, “Nonlocal Talbot self-imaging with pseudo-thermal light,” Phys. Rev. A82(3), 033803 (2010). [CrossRef]
  13. J. Cheng, “Ghost imaging through turbulent atmosphere,” Opt. Express17(10), 7916–7921 (2009). [CrossRef] [PubMed]
  14. P. Zhang, W. Gong, X. Shen, and S. Han, “Correlated imaging through atmospheric turbulence,” Phys. Rev. A82(033817), 1–4 (2010).
  15. Y. Bromberg, O. Katz, and Y. Silberberg, “Ghost imaging with a single detector,” Phys. Rev. A79(5), 053840 (2009). [CrossRef]
  16. J. H. Shapiro, “Computational ghost imaging,” Phys. Rev. A78(061802), 1–4 (2008).
  17. P. Clemente, V. Durán, V. Torres-Company, E. Tajahuerce, and J. Lancis, “Optical encryption based on computational ghost imaging,” Opt. Lett.35(14), 2391–2393 (2010). [CrossRef] [PubMed]
  18. M. Tanha, R. Kheradmand, and S. Ahmadi-Kandjani, “Gray-scale and color optical encryption based on co-mputational ghost imaging,” Appl. Phys. Lett.101(10), 101108 (2012). [CrossRef]
  19. E. Tajahuerce and B. Javidi, “Encrypting three-dimensional information with digital holography,” Appl. Opt.39(35), 6595–6601 (2000). [CrossRef] [PubMed]
  20. P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett.20(7), 767–769 (1995). [CrossRef] [PubMed]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.

Figures

Fig. 1 Fig. 2 Fig. 3
 
Fig. 4 Fig. 5
 

« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited