Abstract

An improved image decryption system is proposed that is based on phase-encoded images and the principle of interference and uses a reference wave. A novel technique for generating intensity patterns from the decrypted phase information consists simply of interfering a reference wave with the wave passing through the encrypted image and a phase-only decrypting key. Optical experiments have confirmed the proposed technique as a simple and robust architecture for optical encryption.

© 2003 Optical Society of America

Full Article  |  PDF Article

References

  • View by:
  • |
  • |
  • |

  1. B. Javidi and J. L. Horner, Opt. Eng. 33, 1752 (1994).
    [CrossRef]
  2. L. G. Neto, Proc. SPIE 3386, 284 (1998).
    [CrossRef]
  3. J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kim, Opt. Eng. 38, 47 (1999).
    [CrossRef]
  4. P. Refregier and B. Javidi, Opt. Lett. 20, 767 (1995).
    [CrossRef] [PubMed]
  5. B. Javidi, G. Zhang, and J. Li, Opt. Eng. 35, 2506 (1996).
    [CrossRef]
  6. B. Javidi and E. Ahouzi, Appl. Opt. 37, 6247 (1998).
    [CrossRef]
  7. G. Unnikrishnan, J. Joseph, and K. Singh, Appl. Opt. 37, 8181 (1998).
    [CrossRef]
  8. T. Nomura and B. Javidi, Opt. Eng. 39, 2031 (2000).
    [CrossRef]
  9. M. Yamaszki and J. Ohtsubo, Opt. Eng. 40, 132 (2001).
    [CrossRef]
  10. X. Tan, O. Matoba, T. Shinura, K. Kuroda, and B. Javidi, Appl. Opt. 39, 6689 (2000).
    [CrossRef]
  11. N. Towghi, B. Javidi, and Z. Luo, J. Opt. Soc. Am. A 16, 1915 (1999).
    [CrossRef]
  12. P. C. Mogensen and J. Glückstad, Opt. Lett. 25, 566 (2000).
    [CrossRef]
  13. P. C. Mogensen and J. Glückstad, Appl. Opt. 40, 1226 (2001).
    [CrossRef]
  14. T. Nomura and B. Javidi, Appl. Opt. 39, 4783 (2000).
    [CrossRef]

2001 (2)

M. Yamaszki and J. Ohtsubo, Opt. Eng. 40, 132 (2001).
[CrossRef]

P. C. Mogensen and J. Glückstad, Appl. Opt. 40, 1226 (2001).
[CrossRef]

2000 (4)

1999 (2)

J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kim, Opt. Eng. 38, 47 (1999).
[CrossRef]

N. Towghi, B. Javidi, and Z. Luo, J. Opt. Soc. Am. A 16, 1915 (1999).
[CrossRef]

1998 (3)

1996 (1)

B. Javidi, G. Zhang, and J. Li, Opt. Eng. 35, 2506 (1996).
[CrossRef]

1995 (1)

1994 (1)

B. Javidi and J. L. Horner, Opt. Eng. 33, 1752 (1994).
[CrossRef]

Ahouzi, E.

Glückstad, J.

Han, J. W.

J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kim, Opt. Eng. 38, 47 (1999).
[CrossRef]

Horner, J. L.

B. Javidi and J. L. Horner, Opt. Eng. 33, 1752 (1994).
[CrossRef]

Javidi, B.

Joseph, J.

Kim, E. S.

J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kim, Opt. Eng. 38, 47 (1999).
[CrossRef]

Kuroda, K.

Li, J.

B. Javidi, G. Zhang, and J. Li, Opt. Eng. 35, 2506 (1996).
[CrossRef]

Luo, Z.

Matoba, O.

Mogensen, P. C.

Neto, L. G.

L. G. Neto, Proc. SPIE 3386, 284 (1998).
[CrossRef]

Nomura, T.

T. Nomura and B. Javidi, Appl. Opt. 39, 4783 (2000).
[CrossRef]

T. Nomura and B. Javidi, Opt. Eng. 39, 2031 (2000).
[CrossRef]

Ohtsubo, J.

M. Yamaszki and J. Ohtsubo, Opt. Eng. 40, 132 (2001).
[CrossRef]

Park, C. S.

J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kim, Opt. Eng. 38, 47 (1999).
[CrossRef]

Refregier, P.

Ryu, D. H.

J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kim, Opt. Eng. 38, 47 (1999).
[CrossRef]

Shinura, T.

Singh, K.

Tan, X.

Towghi, N.

Unnikrishnan, G.

Yamaszki, M.

M. Yamaszki and J. Ohtsubo, Opt. Eng. 40, 132 (2001).
[CrossRef]

Zhang, G.

B. Javidi, G. Zhang, and J. Li, Opt. Eng. 35, 2506 (1996).
[CrossRef]

Cited By

OSA participates in CrossRef's Cited-By Linking service. Citing articles from OSA journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (4)

Fig. 1
Fig. 1

Experimental setup: M1, M2, mirrors; BS1, BS2, beam splitters; L1, beam expander; L2, imaging lens.

Fig. 2
Fig. 2

Inversion of decrypted images for phase error caused by differences between the two waves of (a) 0, (b) π/3, (c) 2π/3, and (d) π, respectively.

Fig. 3
Fig. 3

Computer simulations for (a) the correct decrypting key, (b) an incorrect decrypting key, (c) the SNRs for phase noise when (a) and (b) are used.

Fig. 4
Fig. 4

Image used in the experiment and resultant patterns: (a) original image, (b) mapping image, (c) reconstructed image.

Equations (6)

Equations on this page are rendered with MathJax. Learn more.

fpx,y=expjπfx,y,rpx,y=expjπrx,y,ex,y=expjπfx,y+rx,y,
mx,y=ex,ydpx,y=expjπfx,yexpjπrx,yexpjπdx,y=expjπfx,y,
Ix,y=Rx,y+Rx,ymx,y2=Rx,y21+expjπfx,y2,
Rx,y=E expjφ,Rx,y2=E expjφ2=E2.
Ix,y=Rx,y2×1+nax,yexpjπfx,y+npx,y2,
SNR=x,yfox,y2x,yfox,y-fdx,y2,

Metrics