Abstract

Secure data transmission by use of encrypted digital holograms and an optical retrieval system for secure real-time display are proposed. Original images are encrypted by a double-random phase encryption technique and then are recorded as digital holograms in a CCD, together with a reference plane wave. This digital hologram of the encrypted image can be transmitted to receivers via any conventional electronic or digital communication channels. The decryption key is also recorded as a digital hologram. At the receiver, the original image can be retrieved by an optical correlation-based reconstruction process. Both encryption and retrieval can be performed by all-optical means, and thus a real-time secure display can be implemented. We demonstrate the proposed system numerically and experimentally.

© 2002 Optical Society of America

Full Article  |  PDF Article

References

  • View by:
  • |
  • |
  • |

  1. B. Javidi and J. L. Horner, Opt. Eng. 33, 1752 (1994).
    [CrossRef]
  2. P. Refregier and B. Javidi, Opt. Lett. 20, 767 (1995).
    [CrossRef] [PubMed]
  3. O. Matoba and B. Javidi, Opt. Lett. 24, 762 (1999).
    [CrossRef]
  4. I. Yamaguchi and T. Zhang, Opt. Lett. 22, 1268 (1997).
    [CrossRef] [PubMed]
  5. B. Javidi and T. Nomura, Opt. Lett. 25, 28 (2000).
    [CrossRef]
  6. S. Lai and M. Neifield, Opt. Commun. 178, 283 (2000).
    [CrossRef]
  7. E. Tajahuerce and B. Javidi, Appl. Opt. 39, 6595 (2000).
    [CrossRef]

2000 (3)

1999 (1)

1997 (1)

1995 (1)

1994 (1)

B. Javidi and J. L. Horner, Opt. Eng. 33, 1752 (1994).
[CrossRef]

Cited By

OSA participates in CrossRef's Cited-By Linking service. Citing articles from OSA journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (5)

Fig. 1
Fig. 1

Schematics of the (a) proposed secure data transmission and (b) optical retrieval system using an encrypted digital hologram. DH1 and DH2 denote the digital holograms of the encrypted image and the Fourier-transformed pattern of the phase mask in the Fourier plane used in the encryption process, respectively. BS, beam splitter.

Fig. 2
Fig. 2

(a) Original image to be encrypted and (b) encrypted image.

Fig. 3
Fig. 3

Optical setup for the demonstration of the optical retrieval system. BE, beam expander; P, polarizer; PC, personal computer.

Fig. 4
Fig. 4

Joint power spectrum when the (a) correct and (b) incorrect digital hologram is used as the key.

Fig. 5
Fig. 5

Experimental results image reconstruction with the optical correlation-based retrieval system when the (a) correct and (b) incorrect digital hologram is used as the key.

Equations (7)

Equations on this page are rendered with MathJax. Learn more.

ex,y=fx,ypx,yqx,y,
Isx,y=ex,y+rx,y2=ex,y2+rx,y2+e*x,yrx,y+ex,yr*x,y,
Ikx,y=qx,y+rx,y2=qx,y2+rx,y2+q*x,yrx,y+qx,yr*x,y.
sx,y=Isx+α,y+Ikx,y.
tx,y=ex+α,y+qx,y.
Tν,η2=Eν,ηexp-jαν+Qν,η2=Eν,η2+Qν,η2+Eν,η×Q*ν,ηexp-jαν+E*ν,ηQν,ηexpjαν=Eν,η2+Qν,η2+Fν,ηPν,ηexp-jαν+F*ν,ηP*ν,ηexpjαν,
ox,y=fx+αpx+α,y+f*x-αp*x-α,y.

Metrics