Abstract

Objects acting as inputs of encrypting optical systems can be regarded as having two independent channels: amplitude and phase. In this context, we can use the term “complex objects” to refer these input objects. In this work we explore the way to perform an undercover operation where one channel (amplitude) is used to depict decoy information to confuse intruders, while the other (phase) operates with the true information. Besides, we use the Gerchberg–Saxton algorithm to transform the amplitude and phase encrypted information into pure phase data, therefore increasing the efficiency of the technique as only a single matrix containing these data needs to be sent. Finally, as an example to show the potential of the method, we combine the separate channels in a multiplexing technique with the Gerchberg–Saxton algorithm to generate an efficient multiuser secure process.

© 2009 Optical Society of America

Full Article  |  PDF Article
OSA Recommended Articles
Security enhancement of double-random phase encryption by amplitude modulation

X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong
Opt. Lett. 33(14) 1575-1577 (2008)

Simultaneous transmission for an encrypted image and a double random-phase encryption key

Sheng Yuan, Xin Zhou, Da-hai Li, and Ding-fu Zhou
Appl. Opt. 46(18) 3747-3753 (2007)

Multiple-image encryption based on interference principle and phase-only mask multiplexing in Fresnel transform domain

Qu Wang, Qing Guo, Liang Lei, and Jinyun Zhou
Appl. Opt. 52(28) 6849-6857 (2013)

References

You do not have subscription access to this journal. Citation lists with outbound citation links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Figures (9)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Equations (10)

You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Metrics

You do not have subscription access to this journal. Article level metrics are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription