Abstract

Optical image encryption based on interference has attracted a lot of attention recently. The technique employs two pure phase masks derived from the complex field of the image in the Fresnel diffraction domain. The image decryption procedure can be carried out by inverse Fresnel transformation of the summation of two pure phase masks. However, the silhouette of the original image, which is recovered by either of the two phase-only masks, impedes the application of this technique. In this paper, a very simple method for binary image encryption based on interference of two phase-only masks is proposed without any silhouette problem. The binary image in combination with a random phase mask is separated into two phase-only masks directly, and the decryption by summation of the two masks can be performed digitally or optically. In this paper, the encryption and decryption processes are analyzed, after which both the optical simulation and the experimental results based on single-beam holography are given to demonstrate the feasibility of the encryption method. As information nowadays is mainly digitized into binary codes, the proposed encryption method may find applications in the information processing field.

© 2012 Optical Society of America

PDF Article

References

  • View by:
  • |
  • |
  • |

  1. P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).
    [CrossRef]
  2. G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000).
    [CrossRef]
  3. G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586 (2004).
    [CrossRef]
  4. A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys,” Opt. Lett. 30, 1644–1646 (2005).
    [CrossRef]
  5. X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044–1046 (2006).
    [CrossRef]
  6. Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15, 10253–10265 (2007).
    [CrossRef]
  7. W. Qin and X. Peng, “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35, 118–120(2010).
    [CrossRef]
  8. X. Wang and D. Zhao, “Security enhancement of a phase-truncation based image encryption algorithm,” Appl. Opt. 50, 6645–6651 (2011).
    [CrossRef]
  9. X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, “Security enhancement of double-random phase encryption by amplitude modulation,” Opt. Lett. 33, 1575–1577 (2008).
    [CrossRef]
  10. M. He, Q. Tan, L. Cao, Q. He, and G. Jin, “Security enhanced optical encryption system by random phase key and permutation key,” Opt. Express 17, 22462–22473 (2009).
    [CrossRef]
  11. P. Kumar, A. Kumar, J. Joseph, and K. Singh, “Impulse attack free double-random-phase encryption scheme with randomized lens-phase functions,” Opt. Lett. 34, 331–333 (2009).
    [CrossRef]
  12. G. Situ and J. Zhang, “A lensless optical security system based on computer-generated phase only masks,” Opt. Commun. 232, 115–122 (2004).
    [CrossRef]
  13. W. Chen, X. Chen, and C. J. R. Sheppard, “Optical image encryption based on diffractive imaging,” Opt. Lett. 35, 3817–3819 (2010).
    [CrossRef]
  14. B. Yang, Z. Liu, B. Wang, Y. Zhang, and S. Liu, “Optical stream-cipher-like system for image encryption based on Michelson interferometer,” Opt. Express 19, 2634–2642 (2011).
    [CrossRef]
  15. Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33, 2443–2445 (2008).
    [CrossRef]
  16. D. Weng, N. Zhu, Y. Wang, J. Xie, and J. Liu, “Experimental verification of optical image encryption based on interference,” Opt. Commun. 284, 2485–2487 (2011).
    [CrossRef]
  17. Y. Zhang, B. Wang, and Z. Dong, “Enhancement of image hiding by exchanging two phase masks,” J. Opt. A 11, 125406 (2009).
    [CrossRef]
  18. P. Kumar, J. Joseph, and K. Singh, “Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator,” Appl. Opt. 50, 1805–1811 (2011).
    [CrossRef]
  19. X. Wang and D. Zhao, “Optical image hiding with silhouette removal based on the optical interference principle,” Appl. Opt. 51, 686–691 (2012).
    [CrossRef]
  20. X. Wang and D. Zhao, “Image encoding based on coherent superposition and basic vector operations,” Opt. Commun. 284, 945–951 (2011).
    [CrossRef]
  21. W. Jia, Z. Chen, F. J. Wen, C. Zhou, Y. T. Chow, and P. S. Chung, “Single-beam data encoding using a holographic angular multiplexing technique,” Appl. Opt. 50, H30–H35 (2011).
    [CrossRef]
  22. W. Jia, Z. Chen, F. J. Wen, C. Zhou, Y. T. Chow, and P. S. Chung, “Coaxial holographic encoding based on pure phase modulation,” Appl. Opt. 50, H10–H15 (2011).
    [CrossRef]
  23. W. Jia, Z. Chen, F. J. Wen, and P. S. Chung, “Implementation of single-beam multiplexing encoding with a dually modulated spatial light modulator,” Appl. Opt. 50, B12–B17(2011).
    [CrossRef]
  24. Holoeye, http://www.holoeye.com/ .

2012

2011

2010

2009

2008

2007

2006

2005

2004

G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586 (2004).
[CrossRef]

G. Situ and J. Zhang, “A lensless optical security system based on computer-generated phase only masks,” Opt. Commun. 232, 115–122 (2004).
[CrossRef]

2000

1995

Arcos, S.

Cai, L. Z.

Cao, L.

Carnicer, A.

Castro, A.

Chen, W.

Chen, X.

Chen, Z.

Cheng, X. C.

Chow, Y. T.

Chung, P. S.

Dong, G. Y.

Dong, Z.

Y. Zhang, B. Wang, and Z. Dong, “Enhancement of image hiding by exchanging two phase masks,” J. Opt. A 11, 125406 (2009).
[CrossRef]

Frauel, Y.

He, M.

He, Q.

Javidi, B.

Jia, W.

Jin, G.

Joseph, J.

Juvells, I.

Kumar, A.

Kumar, P.

Liu, J.

D. Weng, N. Zhu, Y. Wang, J. Xie, and J. Liu, “Experimental verification of optical image encryption based on interference,” Opt. Commun. 284, 2485–2487 (2011).
[CrossRef]

Liu, S.

Liu, Z.

Meng, X. F.

Montes-Usategui, M.

Naughton, T. J.

Peng, X.

Qin, W.

Refregier, P.

Shen, X. X.

Sheppard, C. J. R.

Singh, K.

Situ, G.

G. Situ and J. Zhang, “A lensless optical security system based on computer-generated phase only masks,” Opt. Commun. 232, 115–122 (2004).
[CrossRef]

G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586 (2004).
[CrossRef]

Tan, Q.

Unnikrishnan, G.

Wang, B.

Wang, X.

Wang, Y.

D. Weng, N. Zhu, Y. Wang, J. Xie, and J. Liu, “Experimental verification of optical image encryption based on interference,” Opt. Commun. 284, 2485–2487 (2011).
[CrossRef]

Wang, Y. R.

Wei, H.

Wen, F. J.

Weng, D.

D. Weng, N. Zhu, Y. Wang, J. Xie, and J. Liu, “Experimental verification of optical image encryption based on interference,” Opt. Commun. 284, 2485–2487 (2011).
[CrossRef]

Xie, J.

D. Weng, N. Zhu, Y. Wang, J. Xie, and J. Liu, “Experimental verification of optical image encryption based on interference,” Opt. Commun. 284, 2485–2487 (2011).
[CrossRef]

Xu, X. F.

Yang, B.

Yu, B.

Zhang, H.

Zhang, J.

G. Situ and J. Zhang, “A lensless optical security system based on computer-generated phase only masks,” Opt. Commun. 232, 115–122 (2004).
[CrossRef]

G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586 (2004).
[CrossRef]

Zhang, P.

Zhang, Y.

Zhao, D.

Zhou, C.

Zhu, N.

D. Weng, N. Zhu, Y. Wang, J. Xie, and J. Liu, “Experimental verification of optical image encryption based on interference,” Opt. Commun. 284, 2485–2487 (2011).
[CrossRef]

Appl. Opt.

J. Opt. A

Y. Zhang, B. Wang, and Z. Dong, “Enhancement of image hiding by exchanging two phase masks,” J. Opt. A 11, 125406 (2009).
[CrossRef]

Opt. Commun.

G. Situ and J. Zhang, “A lensless optical security system based on computer-generated phase only masks,” Opt. Commun. 232, 115–122 (2004).
[CrossRef]

X. Wang and D. Zhao, “Image encoding based on coherent superposition and basic vector operations,” Opt. Commun. 284, 945–951 (2011).
[CrossRef]

D. Weng, N. Zhu, Y. Wang, J. Xie, and J. Liu, “Experimental verification of optical image encryption based on interference,” Opt. Commun. 284, 2485–2487 (2011).
[CrossRef]

Opt. Express

Opt. Lett.

X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, “Security enhancement of double-random phase encryption by amplitude modulation,” Opt. Lett. 33, 1575–1577 (2008).
[CrossRef]

Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33, 2443–2445 (2008).
[CrossRef]

P. Kumar, A. Kumar, J. Joseph, and K. Singh, “Impulse attack free double-random-phase encryption scheme with randomized lens-phase functions,” Opt. Lett. 34, 331–333 (2009).
[CrossRef]

W. Qin and X. Peng, “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35, 118–120(2010).
[CrossRef]

W. Chen, X. Chen, and C. J. R. Sheppard, “Optical image encryption based on diffractive imaging,” Opt. Lett. 35, 3817–3819 (2010).
[CrossRef]

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000).
[CrossRef]

P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).
[CrossRef]

G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586 (2004).
[CrossRef]

A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys,” Opt. Lett. 30, 1644–1646 (2005).
[CrossRef]

X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044–1046 (2006).
[CrossRef]

Other

Holoeye, http://www.holoeye.com/ .

Cited By

OSA participates in CrossRef's Cited-By Linking service. Citing articles from OSA journals and other participating publishers are listed here.

Alert me when this article is cited.


Metrics