Abstract

A new method based on the concept of virtual optics for both encryption and decryption is proposed. The technique shows the possibility to encode/decode any digital information. A virtual wavelength and a pseudo-random covering mask (PRCM) are used to design “double locks” and “double keys” for image encryption. Numerical experiments are presented to test the sensitivity of the virtual wavelength. The possible dimensions of keys are roughly estimated and show a high security level.

© 2002 Optical Society of America

Full Article  |  PDF Article
OSA Recommended Articles
Optical encryption of unlimited-size images based on ptychographic scanning digital holography

Qiankun Gao, Yali Wang, Tuo Li, and Yishi Shi
Appl. Opt. 53(21) 4700-4707 (2014)

Information synthesis (complex amplitude addition and subtraction) and encryption with digital holography and virtual optics

Xiaogang Wang, Daomu Zhao, Feng Jing, and Xiaofeng Wei
Opt. Express 14(4) 1476-1486 (2006)

Digital color image watermarking based on phase-shifting interferometry and neighboring pixel value subtraction algorithm in the discrete-cosine-transform domain

Xiang-Feng Meng, Lu-Zhong Cai, Xiu-Lun Yang, Xian-Feng Xu, Guo-Yan Dong, Xiao-Xia Shen, Hao Zhang, and Yu-Rong Wang
Appl. Opt. 46(21) 4694-4701 (2007)

References

  • View by:
  • |
  • |
  • |

  1. Ph. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).
    [Crossref] [PubMed]
  2. N. Yoshikawa, M. Itoh, and T. Yatagai, “Binary computer-generated holograms for security applications from a synthetic double-exposure method by electron-beam lithography,” Opt. Lett. 23, 1483–1485 (1998).
    [Crossref]
  3. J. F. Heanue, M. C. Bashaw, and L. Hesselink, “Encrypted holographic data storage based on orthogonal-phase-code multiplexing,” Appl. Opt. 34, 6012–6015 (1995).
    [Crossref] [PubMed]
  4. B. Javidi and T. Nomura, “Securing information by use of digital holography,” Opt. Lett. 25, 28–30 (2000).
    [Crossref]
  5. B. Javidi and E. Tajahuerce, “Three-dimensional object recognition by use of digital holography,” Opt. Lett. 25, 28–30 (2000).
    [Crossref]
  6. S. Lai and M. A. Neifeld, “Digital wavefront reconstruction and its application to image encryption”, Opt. Comm. 178, 283–289 (2000).
    [Crossref]
  7. O. Matoba and B. Javidi, “Encrypted optical storage with wavelength-key and random phase codes”, Appl. Opt. 38, 6785–90 (1999).
    [Crossref]
  8. E. Tajahuerce, O. Matoba, S.C. Verrall, and B. Javidi, “Optoelectronic information encryption with phase-shifting interferometry”, Appl. Opt. 39, 2313–2320 (2000).
    [Crossref]
  9. O. Matoba and B. Javidi, “Encrypted Optical Memory Using Multi-Dimensional Keys,” Opt. Lett. 24, 762–765 (1999).
    [Crossref]
  10. L. Yu and L. Cai, “Iterative algorithm with a constraint condition for numerical reconstruction of a three-dimensional object from its hologram,” J. Opt. Soc. Am. A,  18, 1033–1045 (2001).
    [Crossref]

2001 (1)

2000 (4)

1999 (2)

1998 (1)

1995 (2)

Bashaw, M. C.

Cai, L.

Heanue, J. F.

Hesselink, L.

Itoh, M.

Javidi, B.

Lai, S.

S. Lai and M. A. Neifeld, “Digital wavefront reconstruction and its application to image encryption”, Opt. Comm. 178, 283–289 (2000).
[Crossref]

Matoba, O.

Neifeld, M. A.

S. Lai and M. A. Neifeld, “Digital wavefront reconstruction and its application to image encryption”, Opt. Comm. 178, 283–289 (2000).
[Crossref]

Nomura, T.

Refregier, Ph.

Tajahuerce, E.

Verrall, S.C.

Yatagai, T.

Yoshikawa, N.

Yu, L.

Appl. Opt. (3)

J. Opt. Soc. Am. A (1)

Opt. Comm. (1)

S. Lai and M. A. Neifeld, “Digital wavefront reconstruction and its application to image encryption”, Opt. Comm. 178, 283–289 (2000).
[Crossref]

Opt. Lett. (5)

Cited By

OSA participates in Crossref's Cited-By Linking service. Citing articles from OSA journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (4)

Fig. 1
Fig. 1

Digital holographic recording and encrypting by virtual wavelength and a pseudorandom covering mask (PRCM)

Fig.2
Fig.2

Image encryption with PRCM and secretly selected virtual wavelength: (a) Original image sheet to be hided, (b) Enlarged object in the original image, (c) Converted image

Fig.3
Fig.3

(a) The hologram of the object (both the image and the PRCM). (b) The hologram of the PRCM.

Fig.4
Fig.4

(a) Decryption without correct key for PRCM (b) Decryption with correct key for PRCM and correct wavelength (c) With correct PRCM but wavelength drifting is 0.00001nm. (d) With correct PRCM but wavelength drifting is 0.00002nm.

Equations (3)

Equations on this page are rendered with MathJax. Learn more.

1 z i = ( λ 2 λ 1 z o + 1 z c )
z i = ( λ 1 λ 2 ) z o
C ( DATA ) z = z i = C z = z i C ( PRCM ) z = z i

Metrics