Abstract

A novel concept based on tilted spherical lenses for optical encryption using Lohmann’s type I systems is presented. The tilt angle of the spherical lenses is used as an encrypted key and the decryption performance is studied both qualitatively (visual image degradation) and quantitatively (mean squared error analysis) by numerical simulations. The paper presents a general mathematical framework in virtue of the dioptric power matrix formalism and oblique central refraction used in the optometry field. Computer simulations show that image information cannot be retrieved after a few degrees of tilt on both spherical lenses in the encryption system. In addition, a preliminary experiment is presented, considering a hybrid encryption/decryption process where the image is numerically encrypted but optically decrypted. The tilt in the lenses should be understood as a complementary key to the classical encryption/decryption process to increase the security.

© 2016 Optical Society of America

Full Article  |  PDF Article
OSA Recommended Articles
Optical stream-cipher-like system for image encryption based on Michelson interferometer

Bing Yang, Zhengjun Liu, Bo Wang, Yan Zhang, and Shutian Liu
Opt. Express 19(3) 2634-2642 (2011)

Image encryption by encoding with a nonuniform optical beam in gyrator transform domains

Zhengjun Liu, Lie Xu, Chuang Lin, and Shutian Liu
Appl. Opt. 49(29) 5632-5637 (2010)

Image encryption based on interference that uses fractional Fourier domain asymmetric keys

Sudheesh K. Rajput and Naveen K. Nishchal
Appl. Opt. 51(10) 1446-1452 (2012)

References

You do not have subscription access to this journal. Citation lists with outbound citation links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Supplementary Material (1)

NameDescription
» Visualization 1: MOV (1110 KB)      10 realizations in temporal sequence of the decryption process for speckle reduction

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Figures (9)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Equations (37)

You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Metrics

You do not have subscription access to this journal. Article level metrics are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription