Abstract

We propose an optical encryption technique where the encrypted field and the decrypting key are obtained by three-step phase-shifting interferometry and registered as digital Fresnel holograms in a joint transform correlator architecture. Decryption can be achieved by digital or optical means. The technique allows the complete process to be achieved at high speed and data to be transfered via digital communication channels. Experimental implementation is performed in a system based on a programmable liquid-crystal TV display working in pure phase mode to represent the input data and to introduce the required phase shifts. A CCD is used to register the output data.

© 2006 Optical Society of America

Full Article  |  PDF Article

References

  • View by:
  • |
  • |
  • |

  1. P. Refregier and B. Javidi, Opt. Lett. 20, 767 (1995).
    [CrossRef] [PubMed]
  2. E. Tajahuerce, O. Matoba, S. Verrall, and B. Javidi, Appl. Opt. 39, 2313 (2000).
    [CrossRef]
  3. O. Matoba and B. Javidi, Opt. Lett. 27, 321 (2002).
    [CrossRef]
  4. T. Nomoura and B. Javidi, Appl. Opt. 39, 4783 (2000).
    [CrossRef]
  5. T. Nomoura and B. Javidi, Opt. Eng. 39, 2031 (2000).
    [CrossRef]
  6. S. Lai and M. A. Neifeld, Opt. Commun. 178, 283 (2000).
    [CrossRef]
  7. B. Javidi and T. Nomura, Opt. Lett. 25, 28 (2000).
    [CrossRef]
  8. T. Nomura, S. Mikan, Y. Morimoto, and B. Javidi, Appl. Opt. 42, 1508 (2003).
    [CrossRef] [PubMed]
  9. H. J. Caulfield, ed., Handbook of Optical Holography (Academic, 1979).
  10. U. Schnars, J. Opt. Soc. Am. A 11, 2011 (1994).
    [CrossRef]
  11. J. H. Burning, D. H. Herriott, J. E. Gallagher, D. P. Rosenfeld, A. D. White, and D. J. Barangaccio, Appl. Opt. 13, 2693 (1974).
    [CrossRef]
  12. C. S. Weaver and J. W. Goodman, Appl. Opt. 5, 1248 (1966).
    [CrossRef] [PubMed]
  13. G. Lu, Z. Zhang, S. Wu, and F. T. S. Yu, Appl. Opt. 36, 470 (1997).
    [CrossRef] [PubMed]
  14. O. Matoba, T. J. Naughton, Y. Frauel, N. Bertaux, and B. Javidi, Appl. Opt. 41, 6187 (2002).
    [CrossRef] [PubMed]
  15. A. Marquez, C. Iemmi, C. Moreno, J. Davis, J. Campos, and M. Yzuel, Opt. Eng. 40, 2558 (2001).
    [CrossRef]

2003

2002

2001

A. Marquez, C. Iemmi, C. Moreno, J. Davis, J. Campos, and M. Yzuel, Opt. Eng. 40, 2558 (2001).
[CrossRef]

2000

1997

1995

1994

1974

1966

Barangaccio, D. J.

Bertaux, N.

Burning, J. H.

Campos, J.

A. Marquez, C. Iemmi, C. Moreno, J. Davis, J. Campos, and M. Yzuel, Opt. Eng. 40, 2558 (2001).
[CrossRef]

Caulfield, H. J.

H. J. Caulfield, ed., Handbook of Optical Holography (Academic, 1979).

Davis, J.

A. Marquez, C. Iemmi, C. Moreno, J. Davis, J. Campos, and M. Yzuel, Opt. Eng. 40, 2558 (2001).
[CrossRef]

Frauel, Y.

Gallagher, J. E.

Goodman, J. W.

Herriott, D. H.

Iemmi, C.

A. Marquez, C. Iemmi, C. Moreno, J. Davis, J. Campos, and M. Yzuel, Opt. Eng. 40, 2558 (2001).
[CrossRef]

Javidi, B.

Lai, S.

S. Lai and M. A. Neifeld, Opt. Commun. 178, 283 (2000).
[CrossRef]

Lu, G.

Marquez, A.

A. Marquez, C. Iemmi, C. Moreno, J. Davis, J. Campos, and M. Yzuel, Opt. Eng. 40, 2558 (2001).
[CrossRef]

Matoba, O.

Mikan, S.

Moreno, C.

A. Marquez, C. Iemmi, C. Moreno, J. Davis, J. Campos, and M. Yzuel, Opt. Eng. 40, 2558 (2001).
[CrossRef]

Morimoto, Y.

Naughton, T. J.

Neifeld, M. A.

S. Lai and M. A. Neifeld, Opt. Commun. 178, 283 (2000).
[CrossRef]

Nomoura, T.

T. Nomoura and B. Javidi, Opt. Eng. 39, 2031 (2000).
[CrossRef]

T. Nomoura and B. Javidi, Appl. Opt. 39, 4783 (2000).
[CrossRef]

Nomura, T.

Refregier, P.

Rosenfeld, D. P.

Schnars, U.

Tajahuerce, E.

Verrall, S.

Weaver, C. S.

White, A. D.

Wu, S.

Yu, F. T. S.

Yzuel, M.

A. Marquez, C. Iemmi, C. Moreno, J. Davis, J. Campos, and M. Yzuel, Opt. Eng. 40, 2558 (2001).
[CrossRef]

Zhang, Z.

Cited By

OSA participates in CrossRef's Cited-By Linking service. Citing articles from OSA journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (4)

Fig. 1
Fig. 1

Scheme of the system for (a) encryption process and (b) decryption process. SF, L, P s , and WP s denote spatial filter, lens, polarizers, and wave plates, respectively. A personal computer is used to drive the LCTV and the CCD.

Fig. 2
Fig. 2

Images used for the encryption process.

Fig. 3
Fig. 3

Results obtained when the complete encryption–decryption process is numerically simulated. The decrypted image is shown when (a) the correct key is used and (b) the incorrect key is used.

Fig. 4
Fig. 4

Results obtained when the encryption has been optically performed and decryption has been achieved (a) digitally and (b) optically.

Equations (7)

Equations on this page are rendered with MathJax. Learn more.

e ( x , y ) = exp { i 2 π [ f ( x , y ) n ( x , y ) ] } exp { l ( x a , y b ) [ 1 f ( x , y ) ] } .
e ( x , y ) = f ( x , y ) exp [ i 2 π n ( x , y ) ] .
I 0 ( p , q ) = E ( p , q ) + R ( p , q ) 2 ,
I j ( p , q ) = E ( p , q ) 2 + R ( p , q ) 2 + 2 E ( p , q ) R ( p , q ) cos [ φ R ( p , q ) φ E ( p , q ) + j π 2 c p ] ,
φ R ( p , q ) φ E ( p , q ) 2 c p = arctan { [ I 4 3 I 2 3 ] 3 2 I 0 I 4 3 I 2 3 } .
I j ( p , q ) = 1 + R ( p , q ) 2 + 2 R ( p , q ) cos [ φ R ( p , q ) φ C + j π 2 c p ] ,
φ R ( p , q ) φ C 2 c p = arctan { [ I 4 3 I 2 3 ] 3 2 I 0 I 4 3 I 2 3 } ,

Metrics