Abstract

We demonstrate that all parameters of optical lightwave can be simultaneously designed as keys in security system. This multi-dimensional property of key can significantly enlarge the key space and further enhance the security level of the system. The single-shot off-axis digital holography with orthogonal polarized reference waves is employed to perform polarization state recording on object wave. Two pieces of polarization holograms are calculated and fabricated to be arranged in reference arms to generate random amplitude and phase distribution respectively. When reconstruction, original information which is represented with QR code can be retrieved using Fresnel diffraction with decryption keys and read out noise-free. Numerical simulation results for this cryptosystem are presented. An analysis on the key sensitivity and fault tolerance properties are also provided.

© 2014 Optical Society of America

PDF Article
OSA Recommended Articles
Optical image encoding based on digital holographic recording on polarization state of vector wave

Chao Lin, Xueju Shen, and Qinzu Xu
Appl. Opt. 52(28) 6931-6939 (2013)

Security validation based on orthogonal polarization multiplexing in three-dimensional space

Chao Lin and Jiancun Ren
Appl. Opt. 56(34) 9583-9591 (2017)

Asymmetric information hiding and noise-free recovery based on rotating analyzer ellipsometry and quick-response code

Chao Lin, Xueju Shen, and Zhisong Wang
J. Opt. Soc. Am. A 31(8) 1895-1903 (2014)

References

  • View by:
  • |
  • |
  • |

  1. P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20(7), 767–769 (1995).
    [Crossref] [PubMed]
  2. G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25(12), 887–889 (2000).
    [Crossref] [PubMed]
  3. A. Alfalou and C. Brosseau, “Optical image compression and encryption methods,” Adv. Opt. Photon. 1(3), 589–636 (2009).
    [Crossref]
  4. X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31(8), 1044–1046 (2006).
    [Crossref] [PubMed]
  5. M. Dubreuil, A. Alfalou, and C. Brosseau, “Robustness against attacks of dual polarization encryption using the Stokes-Mueller formalism,” J. Opt. 14(9), 094004 (2012).
    [Crossref]
  6. W. Chen and X. Chen, “Optical image encryption based on multiple-region plaintext and phase retrieval in three-dimensional space,” Opt. Lasers Eng. 51(2), 128–133 (2013).
    [Crossref]
  7. J. X. Chen, Z. L. Zhu, Z. Liu, C. Fu, L. B. Zhang, and H. Yu, “A novel double-image encryption scheme based on cross-image pixel scrambling in gyrator domains,” Opt. Express 22(6), 7349–7361 (2014).
    [Crossref] [PubMed]
  8. Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15(16), 10253–10265 (2007).
    [Crossref] [PubMed]
  9. C. Lingel and J. Sheridan, “Optical cryptanalysis: Metrics of robustness and cost functions,” Opt. Lasers Eng. 49(9-10), 1131–1138 (2011).
    [Crossref]
  10. D. S. Monaghan, U. Gopinathan, T. J. Naughton, and J. T. Sheridan, “Key-space analysis of double random phase encryption technique,” Appl. Opt. 46(26), 6641–6647 (2007).
    [Crossref] [PubMed]
  11. C. Lin, X. Shen, and Z. Li, “Cryptographic analysis on the key space of optical phase encryption algorithm based on the design of discrete random phase mask,” Opt. Laser Technol. 49(C), 108–117 (2013).
    [Crossref]
  12. W. Chen and X. Chen, “Optical cryptography topology based on a three-dimensional particle-like distribution and diffractive imaging,” Opt. Express 19(10), 9008–9019 (2011).
    [Crossref] [PubMed]
  13. G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29(14), 1584–1586 (2004).
    [Crossref] [PubMed]
  14. W. Chen and X. Chen, “Space-based optical image encryption,” Opt. Express 18(26), 27095–27104 (2010).
    [Crossref] [PubMed]
  15. X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, “Security enhancement of double-random phase encryption by amplitude modulation,” Opt. Lett. 33(14), 1575–1577 (2008).
    [Crossref] [PubMed]
  16. C. Lin, X. Shen, R. Tang, and X. Zou, “Multiple images encryption based on Fourier transform hologram,” Opt. Commun. 285(6), 1023–1028 (2012).
    [Crossref]
  17. A. Alfalou and C. Brosseau, “Dual encryption scheme of images using polarized light,” Opt. Lett. 35(13), 2185–2187 (2010).
    [Crossref] [PubMed]
  18. O. Matoba and B. Javidi, “Secure holographic memory by double-random polarization encryption,” Appl. Opt. 43(14), 2915–2919 (2004).
    [Crossref] [PubMed]
  19. N. Zhu, Y. Wang, J. Liu, J. Xie, and H. Zhang, “Optical image encryption based on interference of polarized light,” Opt. Express 17(16), 13418–13424 (2009).
    [Crossref] [PubMed]
  20. J. F. Barrera, R. Henao, M. Tebaldi, N. Bolognini, and R. Torroba, “Multiplexing encrypted data by using polarized light,” Opt. Commun. 260(1), 109–112 (2006).
    [Crossref]
  21. D. Amaya, M. Tebaldi, R. Torroba, and N. Bolognini, “Multichanneled puzzle-like encryption,” Opt. Commun. 281(13), 3434–3439 (2008).
    [Crossref]
  22. C. Lin, X. Shen, and Q. Xu, “Optical image encoding based on digital holographic recording on polarization state of vector wave,” Appl. Opt. 52(28), 6931–6939 (2013).
    [Crossref] [PubMed]
  23. J. F. Barrera, A. Mira-Agudelo, and R. Torroba, “Experimental QR code optical encryption: noise-free data recovering,” Opt. Lett. 39(10), 3074–3077 (2014).
    [Crossref] [PubMed]
  24. Z. Wang, S. Zhang, H. Liu, and Y. Qin, “Single-intensity-recording optical encryption technique based on phase retrieval algorithm and QR code,” Opt. Commun. 332(2), 36–41 (2014).
  25. Z. Ren, P. Su, J. Ma, and G. Jin, “Secure and noise-free holographic encryption with a quick-response code,” Chin. Opt. Lett. 12(1), 010601 (2014).
    [Crossref]
  26. Y. Qin and Q. Gong, “Optical information encryption based on incoherent superposition with the help of the QR code,” Opt. Commun. 310(1), 69–74 (2014).
    [Crossref]
  27. J. F. Barrera, A. Mira, and R. Torroba, “Optical encryption and QR codes: Secure and noise-free information retrieval,” Opt. Express 21(5), 5373–5378 (2013).
    [Crossref] [PubMed]
  28. C. Lin, X. Shen, Z. Wang, and C. Zhao, “Optical asymmetric cryptography based on elliptical polarized light linear truncation and a numerical reconstruction technique,” Appl. Opt. 53(18), 3920–3928 (2014).
    [Crossref] [PubMed]
  29. F. Kenny, D. Lara, O. G. Rodríguez-Herrera, and C. Dainty, “Complete polarization and phase control for focus-shaping in high-NA microscopy,” Opt. Express 20(13), 14015–14029 (2012).
    [Crossref] [PubMed]
  30. J. A. Davis, D. E. McNamara, D. M. Cottrell, and T. Sonehara, “Two-dimensional polarization encoding with a phase-only liquid-crystal spatial light modulator,” Appl. Opt. 39(10), 1549–1554 (2000).
    [Crossref] [PubMed]
  31. I. Moreno, C. Iemmi, J. Campos, and M. J. Yzuel, “Jones matrix treatment for optical Fourier processors with structured polarization,” Opt. Express 19(5), 4583–4594 (2011).
    [Crossref] [PubMed]
  32. M. Fratz, D. M. Giel, and P. Fischer, “Digital polarization holograms with defined magnitude and orientation of each pixel’s birefringence,” Opt. Lett. 34(8), 1270–1272 (2009).
    [Crossref] [PubMed]
  33. T. Colomb, P. Dahlgren, D. Beghuin, E. Cuche, P. Marquet, and C. Depeursinge, “Polarization imaging by use of digital holography,” Appl. Opt. 41(1), 27–37 (2002).
    [Crossref] [PubMed]

2014 (6)

2013 (4)

J. F. Barrera, A. Mira, and R. Torroba, “Optical encryption and QR codes: Secure and noise-free information retrieval,” Opt. Express 21(5), 5373–5378 (2013).
[Crossref] [PubMed]

C. Lin, X. Shen, and Q. Xu, “Optical image encoding based on digital holographic recording on polarization state of vector wave,” Appl. Opt. 52(28), 6931–6939 (2013).
[Crossref] [PubMed]

W. Chen and X. Chen, “Optical image encryption based on multiple-region plaintext and phase retrieval in three-dimensional space,” Opt. Lasers Eng. 51(2), 128–133 (2013).
[Crossref]

C. Lin, X. Shen, and Z. Li, “Cryptographic analysis on the key space of optical phase encryption algorithm based on the design of discrete random phase mask,” Opt. Laser Technol. 49(C), 108–117 (2013).
[Crossref]

2012 (3)

C. Lin, X. Shen, R. Tang, and X. Zou, “Multiple images encryption based on Fourier transform hologram,” Opt. Commun. 285(6), 1023–1028 (2012).
[Crossref]

M. Dubreuil, A. Alfalou, and C. Brosseau, “Robustness against attacks of dual polarization encryption using the Stokes-Mueller formalism,” J. Opt. 14(9), 094004 (2012).
[Crossref]

F. Kenny, D. Lara, O. G. Rodríguez-Herrera, and C. Dainty, “Complete polarization and phase control for focus-shaping in high-NA microscopy,” Opt. Express 20(13), 14015–14029 (2012).
[Crossref] [PubMed]

2011 (3)

2010 (2)

2009 (3)

2008 (2)

2007 (2)

2006 (2)

J. F. Barrera, R. Henao, M. Tebaldi, N. Bolognini, and R. Torroba, “Multiplexing encrypted data by using polarized light,” Opt. Commun. 260(1), 109–112 (2006).
[Crossref]

X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31(8), 1044–1046 (2006).
[Crossref] [PubMed]

2004 (2)

2002 (1)

2000 (2)

1995 (1)

Alfalou, A.

Amaya, D.

D. Amaya, M. Tebaldi, R. Torroba, and N. Bolognini, “Multichanneled puzzle-like encryption,” Opt. Commun. 281(13), 3434–3439 (2008).
[Crossref]

Barrera, J. F.

Beghuin, D.

Bolognini, N.

D. Amaya, M. Tebaldi, R. Torroba, and N. Bolognini, “Multichanneled puzzle-like encryption,” Opt. Commun. 281(13), 3434–3439 (2008).
[Crossref]

J. F. Barrera, R. Henao, M. Tebaldi, N. Bolognini, and R. Torroba, “Multiplexing encrypted data by using polarized light,” Opt. Commun. 260(1), 109–112 (2006).
[Crossref]

Brosseau, C.

Cai, L. Z.

Campos, J.

Castro, A.

Chen, J. X.

Chen, W.

Chen, X.

Cheng, X. C.

Colomb, T.

Cottrell, D. M.

Cuche, E.

Dahlgren, P.

Dainty, C.

Davis, J. A.

Depeursinge, C.

Dong, G. Y.

Dubreuil, M.

M. Dubreuil, A. Alfalou, and C. Brosseau, “Robustness against attacks of dual polarization encryption using the Stokes-Mueller formalism,” J. Opt. 14(9), 094004 (2012).
[Crossref]

Fischer, P.

Fratz, M.

Frauel, Y.

Fu, C.

Giel, D. M.

Gong, Q.

Y. Qin and Q. Gong, “Optical information encryption based on incoherent superposition with the help of the QR code,” Opt. Commun. 310(1), 69–74 (2014).
[Crossref]

Gopinathan, U.

Henao, R.

J. F. Barrera, R. Henao, M. Tebaldi, N. Bolognini, and R. Torroba, “Multiplexing encrypted data by using polarized light,” Opt. Commun. 260(1), 109–112 (2006).
[Crossref]

Iemmi, C.

Javidi, B.

Jin, G.

Joseph, J.

Kenny, F.

Lara, D.

Li, Z.

C. Lin, X. Shen, and Z. Li, “Cryptographic analysis on the key space of optical phase encryption algorithm based on the design of discrete random phase mask,” Opt. Laser Technol. 49(C), 108–117 (2013).
[Crossref]

Lin, C.

C. Lin, X. Shen, Z. Wang, and C. Zhao, “Optical asymmetric cryptography based on elliptical polarized light linear truncation and a numerical reconstruction technique,” Appl. Opt. 53(18), 3920–3928 (2014).
[Crossref] [PubMed]

C. Lin, X. Shen, and Q. Xu, “Optical image encoding based on digital holographic recording on polarization state of vector wave,” Appl. Opt. 52(28), 6931–6939 (2013).
[Crossref] [PubMed]

C. Lin, X. Shen, and Z. Li, “Cryptographic analysis on the key space of optical phase encryption algorithm based on the design of discrete random phase mask,” Opt. Laser Technol. 49(C), 108–117 (2013).
[Crossref]

C. Lin, X. Shen, R. Tang, and X. Zou, “Multiple images encryption based on Fourier transform hologram,” Opt. Commun. 285(6), 1023–1028 (2012).
[Crossref]

Lingel, C.

C. Lingel and J. Sheridan, “Optical cryptanalysis: Metrics of robustness and cost functions,” Opt. Lasers Eng. 49(9-10), 1131–1138 (2011).
[Crossref]

Liu, H.

Z. Wang, S. Zhang, H. Liu, and Y. Qin, “Single-intensity-recording optical encryption technique based on phase retrieval algorithm and QR code,” Opt. Commun. 332(2), 36–41 (2014).

Liu, J.

Liu, Z.

Ma, J.

Marquet, P.

Matoba, O.

McNamara, D. E.

Meng, X. F.

Mira, A.

Mira-Agudelo, A.

Monaghan, D. S.

Moreno, I.

Naughton, T. J.

Peng, X.

Qin, Y.

Z. Wang, S. Zhang, H. Liu, and Y. Qin, “Single-intensity-recording optical encryption technique based on phase retrieval algorithm and QR code,” Opt. Commun. 332(2), 36–41 (2014).

Y. Qin and Q. Gong, “Optical information encryption based on incoherent superposition with the help of the QR code,” Opt. Commun. 310(1), 69–74 (2014).
[Crossref]

Refregier, P.

Ren, Z.

Rodríguez-Herrera, O. G.

Shen, X.

C. Lin, X. Shen, Z. Wang, and C. Zhao, “Optical asymmetric cryptography based on elliptical polarized light linear truncation and a numerical reconstruction technique,” Appl. Opt. 53(18), 3920–3928 (2014).
[Crossref] [PubMed]

C. Lin, X. Shen, and Z. Li, “Cryptographic analysis on the key space of optical phase encryption algorithm based on the design of discrete random phase mask,” Opt. Laser Technol. 49(C), 108–117 (2013).
[Crossref]

C. Lin, X. Shen, and Q. Xu, “Optical image encoding based on digital holographic recording on polarization state of vector wave,” Appl. Opt. 52(28), 6931–6939 (2013).
[Crossref] [PubMed]

C. Lin, X. Shen, R. Tang, and X. Zou, “Multiple images encryption based on Fourier transform hologram,” Opt. Commun. 285(6), 1023–1028 (2012).
[Crossref]

Shen, X. X.

Sheridan, J.

C. Lingel and J. Sheridan, “Optical cryptanalysis: Metrics of robustness and cost functions,” Opt. Lasers Eng. 49(9-10), 1131–1138 (2011).
[Crossref]

Sheridan, J. T.

Singh, K.

Situ, G.

Sonehara, T.

Su, P.

Tang, R.

C. Lin, X. Shen, R. Tang, and X. Zou, “Multiple images encryption based on Fourier transform hologram,” Opt. Commun. 285(6), 1023–1028 (2012).
[Crossref]

Tebaldi, M.

D. Amaya, M. Tebaldi, R. Torroba, and N. Bolognini, “Multichanneled puzzle-like encryption,” Opt. Commun. 281(13), 3434–3439 (2008).
[Crossref]

J. F. Barrera, R. Henao, M. Tebaldi, N. Bolognini, and R. Torroba, “Multiplexing encrypted data by using polarized light,” Opt. Commun. 260(1), 109–112 (2006).
[Crossref]

Torroba, R.

J. F. Barrera, A. Mira-Agudelo, and R. Torroba, “Experimental QR code optical encryption: noise-free data recovering,” Opt. Lett. 39(10), 3074–3077 (2014).
[Crossref] [PubMed]

J. F. Barrera, A. Mira, and R. Torroba, “Optical encryption and QR codes: Secure and noise-free information retrieval,” Opt. Express 21(5), 5373–5378 (2013).
[Crossref] [PubMed]

D. Amaya, M. Tebaldi, R. Torroba, and N. Bolognini, “Multichanneled puzzle-like encryption,” Opt. Commun. 281(13), 3434–3439 (2008).
[Crossref]

J. F. Barrera, R. Henao, M. Tebaldi, N. Bolognini, and R. Torroba, “Multiplexing encrypted data by using polarized light,” Opt. Commun. 260(1), 109–112 (2006).
[Crossref]

Unnikrishnan, G.

Wang, Y.

Wang, Y. R.

Wang, Z.

C. Lin, X. Shen, Z. Wang, and C. Zhao, “Optical asymmetric cryptography based on elliptical polarized light linear truncation and a numerical reconstruction technique,” Appl. Opt. 53(18), 3920–3928 (2014).
[Crossref] [PubMed]

Z. Wang, S. Zhang, H. Liu, and Y. Qin, “Single-intensity-recording optical encryption technique based on phase retrieval algorithm and QR code,” Opt. Commun. 332(2), 36–41 (2014).

Wei, H.

Xie, J.

Xu, Q.

Xu, X. F.

Yu, B.

Yu, H.

Yzuel, M. J.

Zhang, H.

Zhang, J.

Zhang, L. B.

Zhang, P.

Zhang, S.

Z. Wang, S. Zhang, H. Liu, and Y. Qin, “Single-intensity-recording optical encryption technique based on phase retrieval algorithm and QR code,” Opt. Commun. 332(2), 36–41 (2014).

Zhao, C.

Zhu, N.

Zhu, Z. L.

Zou, X.

C. Lin, X. Shen, R. Tang, and X. Zou, “Multiple images encryption based on Fourier transform hologram,” Opt. Commun. 285(6), 1023–1028 (2012).
[Crossref]

Adv. Opt. Photon. (1)

Appl. Opt. (6)

Chin. Opt. Lett. (1)

J. Opt. (1)

M. Dubreuil, A. Alfalou, and C. Brosseau, “Robustness against attacks of dual polarization encryption using the Stokes-Mueller formalism,” J. Opt. 14(9), 094004 (2012).
[Crossref]

Opt. Commun. (5)

C. Lin, X. Shen, R. Tang, and X. Zou, “Multiple images encryption based on Fourier transform hologram,” Opt. Commun. 285(6), 1023–1028 (2012).
[Crossref]

J. F. Barrera, R. Henao, M. Tebaldi, N. Bolognini, and R. Torroba, “Multiplexing encrypted data by using polarized light,” Opt. Commun. 260(1), 109–112 (2006).
[Crossref]

D. Amaya, M. Tebaldi, R. Torroba, and N. Bolognini, “Multichanneled puzzle-like encryption,” Opt. Commun. 281(13), 3434–3439 (2008).
[Crossref]

Z. Wang, S. Zhang, H. Liu, and Y. Qin, “Single-intensity-recording optical encryption technique based on phase retrieval algorithm and QR code,” Opt. Commun. 332(2), 36–41 (2014).

Y. Qin and Q. Gong, “Optical information encryption based on incoherent superposition with the help of the QR code,” Opt. Commun. 310(1), 69–74 (2014).
[Crossref]

Opt. Express (8)

Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15(16), 10253–10265 (2007).
[Crossref] [PubMed]

J. X. Chen, Z. L. Zhu, Z. Liu, C. Fu, L. B. Zhang, and H. Yu, “A novel double-image encryption scheme based on cross-image pixel scrambling in gyrator domains,” Opt. Express 22(6), 7349–7361 (2014).
[Crossref] [PubMed]

W. Chen and X. Chen, “Space-based optical image encryption,” Opt. Express 18(26), 27095–27104 (2010).
[Crossref] [PubMed]

I. Moreno, C. Iemmi, J. Campos, and M. J. Yzuel, “Jones matrix treatment for optical Fourier processors with structured polarization,” Opt. Express 19(5), 4583–4594 (2011).
[Crossref] [PubMed]

W. Chen and X. Chen, “Optical cryptography topology based on a three-dimensional particle-like distribution and diffractive imaging,” Opt. Express 19(10), 9008–9019 (2011).
[Crossref] [PubMed]

F. Kenny, D. Lara, O. G. Rodríguez-Herrera, and C. Dainty, “Complete polarization and phase control for focus-shaping in high-NA microscopy,” Opt. Express 20(13), 14015–14029 (2012).
[Crossref] [PubMed]

J. F. Barrera, A. Mira, and R. Torroba, “Optical encryption and QR codes: Secure and noise-free information retrieval,” Opt. Express 21(5), 5373–5378 (2013).
[Crossref] [PubMed]

N. Zhu, Y. Wang, J. Liu, J. Xie, and H. Zhang, “Optical image encryption based on interference of polarized light,” Opt. Express 17(16), 13418–13424 (2009).
[Crossref] [PubMed]

Opt. Laser Technol. (1)

C. Lin, X. Shen, and Z. Li, “Cryptographic analysis on the key space of optical phase encryption algorithm based on the design of discrete random phase mask,” Opt. Laser Technol. 49(C), 108–117 (2013).
[Crossref]

Opt. Lasers Eng. (2)

W. Chen and X. Chen, “Optical image encryption based on multiple-region plaintext and phase retrieval in three-dimensional space,” Opt. Lasers Eng. 51(2), 128–133 (2013).
[Crossref]

C. Lingel and J. Sheridan, “Optical cryptanalysis: Metrics of robustness and cost functions,” Opt. Lasers Eng. 49(9-10), 1131–1138 (2011).
[Crossref]

Opt. Lett. (8)

Supplementary Material (2)

» Media 1: MP4 (761 KB)     
» Media 2: MP4 (757 KB)     

Cited By

OSA participates in Crossref's Cited-By Linking service. Citing articles from OSA journals and other participating publishers are listed here.

Alert me when this article is cited.


Metrics