An encryption and verification method with multiple encrypted keys based on interference principle is proposed. The encryption process is realized on computer digitally and the verification process can be completed optically or digitally. Two different images are encoded into three diffractive phase elements (DPEs) by using two different incident wavelengths. Three DPEs have different distances from output plane. The two wavelength parameters and three distance parameters can be used as encryption keys, which will boost security degree of this system. Numerical simulation proves that the proposed encryption method is valid and has high secrecy level.
©2010 Optical Society of America
Optical technology has been widely used in information encryption and decryption application, owing to its multiple parameters and parallel processing ability. In the past decade, various algorithms and systems about optical image encryption and security have been proposed [1–4]. Refregier and Javidi  proposed a method that uses double random phases to encrypt an image to stationary white noise. Liu et al.  and Zhang et al.  extended this method into the fractional Fourier domain. The security of double random phase encoding has also been thoroughly analyzed and a few weaknesses have started to appear [7–9]. In order to make it easy to decode the encrypted image with intensity-sensitive detectors,Wang et al. have also proposed a method to encrypt the original image into a phase-only mask in the Fourier plane of a 4 f optically system . Li et al. improved this method to encrypt the image into the mask in the input plane . Recently, it has also been expanded to encrypt multiple images . However, all of the above-mentioned works used the iterative algorithm to encode the original image into the pure phase diffraction elements (DPEs). Furthermore, the basic ideas of these methods are based on the diffraction principle. The encryption methods based on the interference principle have also been investigated. Javidi and Nomura used a digital hologram to store an encrypted image and the decryption key , and Nishchal et al. proposed a method of securing information using fractional Fourier transform in digital holography . Meng et al. proposed a hybrid cryptosystem, in which one image is encrypted to two interferograms with the aid of double random-phase encoding (DRPE) and two-step phase-shifting interferometry (2-PSI) . Only recently, Zhang et al.  proposed a new encryption method that an image is encoded into two pure phase masks based on the optical interference principle. The encryption method is quite simple and does not need the iterative algorithm and the used encryption keys have high sensitivity. They encode information of an image into two pure phase masks by using only one wavelength and the two pure phase masks must have identical distances from the output plane, which make invaders easy to obtain the distance key and the wavelength key by testing repeatedly.
In this article, we proposed an encryption and verification method, which is also based on optical interference. In the new method, information of two different images are encoded into three pure phase diffraction elements (DPEs) by using two different illuminating wavelengths, respectively. The three DPEs have different distances from the output plane. The two illuminating wavelengths and the three distances can be used as encryption keys, which significantly increase security degree. For simple, we only encode image information into three DPEs in this article, more than three DPEs can also be employed to enhance performance of the encryption system. The encryption process is implemented in computer digitally and the verification process can be realized through optical system or digitally.
2. The verification optical system
The verification optical system is schematically shown in Fig. 1 . There are two methods for verification process. In Fig. 1(a), three coherent parallel light beams are modulated by three diffractive phase elements (DPEs) and then are combined by two half-mirrors (HM1 and HM2). Thus three beams interfere with each other on the output plane and generate the image encrypted in the three DPEs. Notice that three DPEs comprise two kinds of encrypted information for two different wavelengths, that is, using two groups of incident light with different wavelengths will generate two different images on the output plane. The two wavelengths can be used as encryption keys. In verification process (or, decryption process), an image detector such as Charge Coupled Device (CCD) can be used to accept image on the output plane. In order that three light beams through three DPEs have appropriate field intensities on the output plane, we use an optical attenuator (OA) on the optical path of DPE3. The distance between DPE1 and output plane is set to be the same as the distance between DPE2 and output plane , but the distance between DPE3 and output plane is different from and . So these different distance parameters can also be used as encryption keys and enhance secrecy degree. A simpler verification system is shown in Fig. 1(b). Three coherent light beams transmit in different directions through three DPEs, but the three light beams will intersect with each other on the output plane and then generate the encrypted image. In this case, if angles between three light beams α and β are small, the complex field distributions of light beams through DPE1 and DPE3 on the output plane will only need to multiply and , here, x represents vertical coordinate on the output plane and λ is wavelength of incident light beam.
The encryption process should be implemented digitally, while the decryption process can be implemented optically or digitally. For highly secure verification, three DPEs can be assigned to three different important users, and the system parameters (three distance parameters and two wavelength parameters) can also set as encryption keys, which not only can be fixed in the verification system, but also set as passwords for different users. As a result, the encrypted image can be obtained at the output plane only when three correct users put three DPEs in the verification system and input correct system parameters.
3. Digital encryption algorithm
The encryption problem is equal to separate information of an image into three phase diffractive elements (DPEs). In the present method, we use two wavelengths to encrypt the image information (here, represented by and). Firstly, we use the first wavelength .
If the encrypted image is an intensity distribution , a new complex distribution can be constructed by adding it with a random phase distribution,Eq. (2). Here, represents phase shift distribution introduced by the fourth DPE and is the distance between the fourth DPE and the output plane.
If the relationship between distance from DPE1 to the output plane and distance from DPE2 to the output plane is and set the phase distribution of DPE3 as a random phase distribution between 0 and , an equation can be obtained after a simple deduction,Eq. (4) will becomeWe set the right portion of the Eq. (4) as
Since module of the left portion of the Eq. (6) is equal to 1, we have
At last, we can achieve the phase distributions of DPE1 and DPE2 as
According to the same principle, the phase distributions of three DPEs for incident light with wavelength can be obtained. Notice that the three phase distributions ,and correspond to an interference intensity distribution on the output plane that is different with the intensity distribution for the first wavelength.
Now, we have three phase distributions for and three phase distributions for, but only three DPEs can be used to generate these phase distributions. We express the height distribution of surface-relief structure of three DPEs as, and, respectively. For DPE1, the phase distribution corresponding to incident wavelength can be expressed asEqs. (9) and (10) simultaneously. So, we enlarge the value scope of and by adding and (P and Q are two arbitrary integers), respectively, which will not influence the actual field distribution. Through carefully choosing P and Q, the equationEq. (11) are very close to each other. Based on the same method, we can achieve the height distribution of relief structure of DPE2 and DPE3.
4. Numerical simulations
Computer simulations are carried out to show validity of our proposed new method. The images to be encrypted are two pixel gray images which correspond to incident wavelengths and , respectively. As shown in Figs. 2(a) and 2(b), two images comprise different letters. The sizes of two images are both , and two wavelengths of the illuminating light are set as and , respectively. The three distances are and . According to the encryption method mentioned above, we can obtain two groups of phase distributions for two incident wavelength, then the height distributions of three DPEs can be achieved based on Eq. (11). Here, the largest height of relief structures of three DPEs is set as . The computed height distributions of three DPEs are displayed in Figs. 3 . It is obvious that no information about the original images can be found in height distributions of three DPEs.
The reconstructed images with correct height distributions of three DPEs and right system parameters are displayed in Figs. 2(c) and 2(d), respectively. It can be seen that the two primary images have been retrieved well, but only some fluctuations exist. These fluctuations can be eliminated by increasing values of P and Q in Eq. (11), i.e., enlarging the largest heights of three DPEs. However, too large height will make fabrication of DPEs difficult. If we set the height distribution of DPE3 as incorrect values, the reconstructed images for two correct wavelengths are shown as Figs. 2(e) and 2(f). It is clear that we cannot observe any useful information from the reconstructed images.
To evaluate the reliability of the encryption method quantitatively, the relative error (RE) between the two reconstructed images and two original images is introduced as
In the proposed method, the two wavelengths of the illuminating light and can be used as encryption keys. We have calculated the dependence relationship of RE on the two wavelengths, which is shown in left portion of Fig. 4(a) . It can be seen in left portion of Fig. 4(a) that only when both of the two illuminating wavelengths have correct values, RE has the smallest value ; value of RE will sharply rise with increasing of wavelength error.
More precise simulation is done to evaluate the evolution of the smallest RE value with , as shown in right portion of Fig. 4 (a). It can be seen from right figure of Fig. 4(a) that RE quickly increases with even in magnitude order of . If the first illuminating wavelength has a tiny difference from the correct value, e.g., , which corresponds to, the first reconstructed image will not display any useful information about original image, as shown in Fig. 4(b). The same phenomenon can appear for the second illuminating wavelength , whose corresponding reconstructed image is shown in Fig. 4(c) for . It can be proved that the decrypted image cannot be distinguished with the naked eye for . The wavelength sensitivity of the proposed encryption method is about .
The distances between each DPE and the output plane can also be used as encryption keys. In our proposed method, the three distances have the relationships and . In order to validate effect of the two distance encryption keys, we have also calculated the influence of change of l and on RE, as shown in left portion of Fig. 5(a) . When and , RE has smallest value 0.0095. If l and differs from correct value little, value of RE will significantly increase. More precise simulation is done to evaluate the evolution of the smallest RE value with , as shown in right portion of Fig. 5 (a). It is obvious that value of RE quickly rise increases with even in so small varying scope. The same evolution of the smallest RE value is obtained for . Figures 5(b) and 5(c) show the reconstructed images for the case of and , respectively. It is obvious that the two reconstructed images are entirely different from two original images, that is, tiny difference of distance will fail to decrypt correct information. Further simulation can obtain a conclusion that, when, there is a failure to distinguish the decrypted image. The distance sensitivity of the proposed encryption method is about .
The high wavelength and distance sensitivity will cause great difficulty in copying the encryption system, which make the proposed encryption system have high security degree. Meanwhile, a more precise mechanical supporting system for determining distance parameters l and is needed to implement the verification process. It can also be concluded from further detailed simulation that transversal displacement of three DPEs will significantly influence quality of reconstructed images. For example, a transversal displacement with one-tenth pixel of DPE1 (which corresponds to about ) can cause an increase of relative error for . Therefore, precise control of the transversal positions of three DPEs is also very important for practical optical verification system. Finally, we also calculate influence of surface-relief deviation of three DPEs on reconstructed images. Tolerance scope of surface-relief height of three DPEs is about of surface-relief height. The scope lies in the region of state of the art of optical fabrication and means that the optical encryption process can be implemented conveniently.
In conclusion, we proposed a encryption and verification method based on interference principle. The encryption process is digitally implemented on computer and the verification process can realize digitally and optically. Two different original images are encrypted into three DPEs by using two illuminating wavelengths, respectively. The three DPEs comprise encrypted information and are assigned to three different users as encryption keys. The three DPEs have different distances from the output plane. The two wavelength parameters and the three distance parameters can also be used as encryption keys. In verification process, three correct users put their own DPE in the verification system and input two wavelength parameter and three distance parameter. The verification will set correct positions of three DPEs and illuminating lights, and the correct encrypted images can be generated on the output plane only when all of encryption keys are correct. Because of multiple encryption keys in our proposed method and high sensitive of these encryption keys, the interloper will difficulty in copying the decryption system or passing through the verification system. The simulation results have shown the validity of the proposed method.
This work is supported by Project of Beijing Education Committee (Grant No. KM200910772005).
References and links
2. O. Matoba and B. Javidi, “Encrypted optical memory system using three-dimensional keys in the Fresnel domain,” Opt. Lett. 24(11), 762–764 (1999). [CrossRef]
3. J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kin, “Optical image encryption based on XOR operations,” Opt. Eng. (Bellingham) 38(1), 47–54 (1999). [CrossRef]
4. J. W. Han, S. H. Lee, and E. S. Kin, “Optical key bit stream generator,” Opt. Eng. (Bellingham) 38(1), 33–38 (1999). [CrossRef]
5. S. T. Liu, Q. L. Mi, and B. H. Zhu, “Optical image encryption with multistage and multichannel fractional Fourier-domain filtering,” Opt. Lett. 26(16), 1242–1244 (2001). [CrossRef]
6. Y. Zhang, C. H. Zheng, and N. Tanno, “Optical encryption based on iterative fractional Fourier transform,” Opt. Commun. 202(4-6), 277–285 (2002). [CrossRef]
7. A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys,” Opt. Lett. 30(13), 1644–1646 (2005). [CrossRef] [PubMed]
8. U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, “A known-plaintext heuristic attack on the Fourier plane encryption algorithm,” Opt. Express 14(8), 3181–3186 (2006). [CrossRef] [PubMed]
10. P. K. Wang, L. A. Watson, and C. Chatwin, “Random phase encoding for optical security,” Opt. Eng. (Bellingham) 35(9), 2464–2469 (1996). [CrossRef]
11. Y. Li, K. Kreske, and J. Rosen, “Security and encryption optical systems based on a correlator with significant output images,” Appl. Opt. 39(29), 5295–5301 (2000). [CrossRef]
12. Z. J. Liu and S. T. Liu, “Double image encryption based on iterative fractional Fourier transform,” Opt. Commun. 275(2), 324–329 (2007). [CrossRef]
13. B. Javidi and T. Nomura, “Securing information by use of digital holography,” Opt. Lett. 25(1), 28–30 (2000). [CrossRef]
14. N. K. Nishchal, J. Joseph, and K. Singh, “Securing information using fractional Fourier transform in digital holography,” Opt. Commun. 235(4-6), 253–259 (2004). [CrossRef]
15. X. F. Meng, X. Peng, L. Z. Cai, A. M. Li, Z. Gao, and Y. R. Wang, “Cryptosystem based on two-step phase-shifting interferometry and the RSA public-key encryption algorithm,” J. Opt. A, Pure Appl. Opt. 11(8), 085402 (2009). [CrossRef]