Abstract

A new method based on the concept of virtual optics for both encryption and decryption is proposed. The technique shows the possibility to encode/decode any digital information. A virtual wavelength and a pseudo-random covering mask (PRCM) are used to design “double locks” and “double keys” for image encryption. Numerical experiments are presented to test the sensitivity of the virtual wavelength. The possible dimensions of keys are roughly estimated and show a high security level.

© Optical Society of America

Full Article  |  PDF Article

References

  • View by:
  • |

  1. Ph. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995).
    [CrossRef] [PubMed]
  2. N. Yoshikawa, M. Itoh, and T. Yatagai, "Binary computer-generated holograms for security applications from a synthetic double-exposure method by electron-beam lithography," Opt. Lett. 23, 1483-1485 (1998).
    [CrossRef]
  3. J. F. Heanue, M. C. Bashaw, and L. Hesselink, "Encrypted holographic data storage based on orthogonalphase-code multiplexing," Appl. Opt. 34, 6012-6015 (1995).
    [CrossRef] [PubMed]
  4. B. Javidi and T. Nomura, "Securing information by use of digital holography," Opt. Lett. 25, 28-30 (2000).
    [CrossRef]
  5. B. Javidi and E. Tajahuerce, "Three-dimensional object recognition by use of digital holography," Opt. Lett. 25, 28-30 (2000).
    [CrossRef]
  6. S. Lai and M. A. Neifeld, "Digital wavefront reconstruction and its application to image encryption", Opt. Comm. 178, 283-289 (2000).
    [CrossRef]
  7. O. Matoba and B. Javidi, "Encrypted optical storage with wavelength-key and random phase codes," Appl. Opt. 38, 6785-90 (1999).
    [CrossRef]
  8. E. Tajahuerce, O. Matoba, S.C. Verrall, and B. Javidi, "Optoelectronic information encryption with phaseshifting interferometry," Appl. Opt. 39, 2313-2320 (2000).
    [CrossRef]
  9. O. Matoba and B. Javidi, "Encrypted Optical Memory Using Multi-Dimensional Keys," Opt. Lett. 24, 762-765 (1999).
    [CrossRef]
  10. L. Yu and L. Cai, "Iterative algorithm with a constraint condition for numerical reconstruction of a threedimensional object from its hologram," J. Opt. Soc. Am. A, 18, 1033-1045 (2001).
    [CrossRef]

Appl. Opt. (1)

Other (9)

O. Matoba and B. Javidi, "Encrypted Optical Memory Using Multi-Dimensional Keys," Opt. Lett. 24, 762-765 (1999).
[CrossRef]

L. Yu and L. Cai, "Iterative algorithm with a constraint condition for numerical reconstruction of a threedimensional object from its hologram," J. Opt. Soc. Am. A, 18, 1033-1045 (2001).
[CrossRef]

Ph. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995).
[CrossRef] [PubMed]

N. Yoshikawa, M. Itoh, and T. Yatagai, "Binary computer-generated holograms for security applications from a synthetic double-exposure method by electron-beam lithography," Opt. Lett. 23, 1483-1485 (1998).
[CrossRef]

J. F. Heanue, M. C. Bashaw, and L. Hesselink, "Encrypted holographic data storage based on orthogonalphase-code multiplexing," Appl. Opt. 34, 6012-6015 (1995).
[CrossRef] [PubMed]

B. Javidi and T. Nomura, "Securing information by use of digital holography," Opt. Lett. 25, 28-30 (2000).
[CrossRef]

B. Javidi and E. Tajahuerce, "Three-dimensional object recognition by use of digital holography," Opt. Lett. 25, 28-30 (2000).
[CrossRef]

S. Lai and M. A. Neifeld, "Digital wavefront reconstruction and its application to image encryption", Opt. Comm. 178, 283-289 (2000).
[CrossRef]

O. Matoba and B. Javidi, "Encrypted optical storage with wavelength-key and random phase codes," Appl. Opt. 38, 6785-90 (1999).
[CrossRef]

Cited By

OSA participates in CrossRef's Cited-By Linking service. Citing articles from OSA journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (4)

Fig. 1
Fig. 1

Digital holographic recording and encrypting by virtual wavelength and a pseudorandom covering mask (PRCM)

Fig.2
Fig.2

Image encryption with PRCM and secretly selected virtual wavelength: (a) Original image sheet to be hided, (b) Enlarged object in the original image, (c) Converted image

Fig.3
Fig.3

(a) The hologram of the object (both the image and the PRCM). (b) The hologram of the PRCM.

Fig.4
Fig.4

(a) Decryption without correct key for PRCM (b) Decryption with correct key for PRCM and correct wavelength (c) With correct PRCM but wavelength drifting is 0.00001nm. (d) With correct PRCM but wavelength drifting is 0.00002nm.

Equations (3)

Equations on this page are rendered with MathJax. Learn more.

1 z i = ( λ 2 λ 1 z o + 1 z c )
z i = ( λ 1 λ 2 ) z o
C ( DATA ) z = z i = C z = z i C ( PRCM ) z = z i

Metrics