Abstract

We proposed a novel architecture for optical image encryption based on interference. The encryption algorithm for this new method is quite simple and does not need iterative encoding. The parameters of the configuration can also serve as additional keys for encryption. Numerical simulation results demonstrate the flexibility of this new proposed method.

© 2008 Optical Society of America

Full Article  |  PDF Article

References

  • View by:
  • |
  • |
  • |

  1. P. Refragier and B. Javidi, Opt. Lett. 20, 767 (1995).
    [CrossRef]
  2. B. Javidi, A. Sergent, G. S. Zhang, and L. Guibert, Opt. Eng. (Bellingham) 36, 992 (1997).
    [CrossRef]
  3. O. Matoba and B. Javidi, Opt. Lett. 24, 762 (1999).
    [CrossRef]
  4. J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kin, Opt. Eng. (Bellingham) 38, 47 (1999).
    [CrossRef]
  5. S. Q. Zhang and M. A. Karim, Opt. Eng. (Bellingham) 38, 20 (1999).
    [CrossRef]
  6. J. W. Han, S. H. Lee, and E. S. Kim, Opt. Eng. (Bellingham) 38, 33 (1999).
    [CrossRef]
  7. S. T. Liu, Q. L. Mi, and B. H. Zhu, Opt. Lett. 26, 1242 (2001).
    [CrossRef]
  8. Y. Zhang, C. H. Zheng, and N. Tanno, Opt. Commun. 202, 277 (2002).
    [CrossRef]
  9. A. Carbucerm, M. Montes-Usategui, S. Arcos, and I. Juvells, Opt. Lett. 30, 1644 (2005).
    [CrossRef]
  10. X. Peng, P. Zhang, H. Wei, and B. Yu, Opt. Lett. 31, 1044 (2006).
    [CrossRef] [PubMed]
  11. P. K. Wang, L. A. Watson, and C. Chatwin, Opt. Eng. (Bellingham) 35, 2464 (1996).
    [CrossRef]
  12. Y. Li, K. Kreske, and J. Rosen, Appl. Opt. 39, 5295 (2000).
    [CrossRef]
  13. H. T. Chang, W. C. Lu, and C. J. Kuo, Appl. Opt. 41, 4825 (2002).
    [CrossRef] [PubMed]
  14. G. Situ and J. Zhang, Opt. Commun. 232, 115 (2004).
    [CrossRef]
  15. Z. J. Liu and S. T. Liu, Opt. Commun. 275, 324 (2007).
    [CrossRef]
  16. Y. Shi, G. Situ, and J. Zhang, Opt. Lett. 32, 1914 (2007).
    [CrossRef] [PubMed]

2007

2006

2005

2004

G. Situ and J. Zhang, Opt. Commun. 232, 115 (2004).
[CrossRef]

2002

H. T. Chang, W. C. Lu, and C. J. Kuo, Appl. Opt. 41, 4825 (2002).
[CrossRef] [PubMed]

Y. Zhang, C. H. Zheng, and N. Tanno, Opt. Commun. 202, 277 (2002).
[CrossRef]

2001

2000

1999

O. Matoba and B. Javidi, Opt. Lett. 24, 762 (1999).
[CrossRef]

J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kin, Opt. Eng. (Bellingham) 38, 47 (1999).
[CrossRef]

S. Q. Zhang and M. A. Karim, Opt. Eng. (Bellingham) 38, 20 (1999).
[CrossRef]

J. W. Han, S. H. Lee, and E. S. Kim, Opt. Eng. (Bellingham) 38, 33 (1999).
[CrossRef]

1997

B. Javidi, A. Sergent, G. S. Zhang, and L. Guibert, Opt. Eng. (Bellingham) 36, 992 (1997).
[CrossRef]

1996

P. K. Wang, L. A. Watson, and C. Chatwin, Opt. Eng. (Bellingham) 35, 2464 (1996).
[CrossRef]

1995

Arcos, S.

Carbucerm, A.

Chang, H. T.

Chatwin, C.

P. K. Wang, L. A. Watson, and C. Chatwin, Opt. Eng. (Bellingham) 35, 2464 (1996).
[CrossRef]

Guibert, L.

B. Javidi, A. Sergent, G. S. Zhang, and L. Guibert, Opt. Eng. (Bellingham) 36, 992 (1997).
[CrossRef]

Han, J. W.

J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kin, Opt. Eng. (Bellingham) 38, 47 (1999).
[CrossRef]

J. W. Han, S. H. Lee, and E. S. Kim, Opt. Eng. (Bellingham) 38, 33 (1999).
[CrossRef]

Javidi, B.

Juvells, I.

Karim, M. A.

S. Q. Zhang and M. A. Karim, Opt. Eng. (Bellingham) 38, 20 (1999).
[CrossRef]

Kim, E. S.

J. W. Han, S. H. Lee, and E. S. Kim, Opt. Eng. (Bellingham) 38, 33 (1999).
[CrossRef]

Kin, E. S.

J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kin, Opt. Eng. (Bellingham) 38, 47 (1999).
[CrossRef]

Kreske, K.

Kuo, C. J.

Lee, S. H.

J. W. Han, S. H. Lee, and E. S. Kim, Opt. Eng. (Bellingham) 38, 33 (1999).
[CrossRef]

Li, Y.

Liu, S. T.

Liu, Z. J.

Z. J. Liu and S. T. Liu, Opt. Commun. 275, 324 (2007).
[CrossRef]

Lu, W. C.

Matoba, O.

Mi, Q. L.

Montes-Usategui, M.

Park, C. S.

J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kin, Opt. Eng. (Bellingham) 38, 47 (1999).
[CrossRef]

Peng, X.

Refragier, P.

Rosen, J.

Ryu, D. H.

J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kin, Opt. Eng. (Bellingham) 38, 47 (1999).
[CrossRef]

Sergent, A.

B. Javidi, A. Sergent, G. S. Zhang, and L. Guibert, Opt. Eng. (Bellingham) 36, 992 (1997).
[CrossRef]

Shi, Y.

Situ, G.

Tanno, N.

Y. Zhang, C. H. Zheng, and N. Tanno, Opt. Commun. 202, 277 (2002).
[CrossRef]

Wang, P. K.

P. K. Wang, L. A. Watson, and C. Chatwin, Opt. Eng. (Bellingham) 35, 2464 (1996).
[CrossRef]

Watson, L. A.

P. K. Wang, L. A. Watson, and C. Chatwin, Opt. Eng. (Bellingham) 35, 2464 (1996).
[CrossRef]

Wei, H.

Yu, B.

Zhang, G. S.

B. Javidi, A. Sergent, G. S. Zhang, and L. Guibert, Opt. Eng. (Bellingham) 36, 992 (1997).
[CrossRef]

Zhang, J.

Zhang, P.

Zhang, S. Q.

S. Q. Zhang and M. A. Karim, Opt. Eng. (Bellingham) 38, 20 (1999).
[CrossRef]

Zhang, Y.

Y. Zhang, C. H. Zheng, and N. Tanno, Opt. Commun. 202, 277 (2002).
[CrossRef]

Zheng, C. H.

Y. Zhang, C. H. Zheng, and N. Tanno, Opt. Commun. 202, 277 (2002).
[CrossRef]

Zhu, B. H.

Appl. Opt.

Opt. Commun.

G. Situ and J. Zhang, Opt. Commun. 232, 115 (2004).
[CrossRef]

Z. J. Liu and S. T. Liu, Opt. Commun. 275, 324 (2007).
[CrossRef]

Y. Zhang, C. H. Zheng, and N. Tanno, Opt. Commun. 202, 277 (2002).
[CrossRef]

Opt. Eng. (Bellingham)

B. Javidi, A. Sergent, G. S. Zhang, and L. Guibert, Opt. Eng. (Bellingham) 36, 992 (1997).
[CrossRef]

J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kin, Opt. Eng. (Bellingham) 38, 47 (1999).
[CrossRef]

S. Q. Zhang and M. A. Karim, Opt. Eng. (Bellingham) 38, 20 (1999).
[CrossRef]

J. W. Han, S. H. Lee, and E. S. Kim, Opt. Eng. (Bellingham) 38, 33 (1999).
[CrossRef]

P. K. Wang, L. A. Watson, and C. Chatwin, Opt. Eng. (Bellingham) 35, 2464 (1996).
[CrossRef]

Opt. Lett.

Cited By

OSA participates in CrossRef's Cited-By Linking service. Citing articles from OSA journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (4)

Fig. 1
Fig. 1

Schematic of the encryption setup.

Fig. 2
Fig. 2

Encryption results. (a) The primary image for encryption, (b) decryption result with matched keys, and phase distributions of masks (c) M 1 and (d) M 2 .

Fig. 3
Fig. 3

Decryption results with wrong mask (a) M 1 and (b) M 2 .

Fig. 4
Fig. 4

Dependence of RE on the change of λ and l.

Equations (9)

Equations on this page are rendered with MathJax. Learn more.

o ( m , n ) = o ( m , n ) exp [ i 2 π rand ( m , n ) ] ,
o ( m , n ) = exp ( i M 1 ) h ( x , y , l ) + exp ( i M 2 ) h ( x , y , l ) ,
h ( x , y , l ) = exp ( i 2 π l λ ) i l λ exp [ i π l λ ( x 2 + y 2 ) ]
exp ( i M 1 ) + exp ( i M 2 ) = F 1 { F { o ( m , n ) } F { h ( x , y , l ) } } ,
exp ( i M 2 ) = D exp ( i M 1 ) .
D exp ( i M 1 ) 2 = [ D exp ( i M 1 ) ] [ D exp ( i M 1 ) ] * = 1 .
M 1 = arg ( D ) arccos ( abs ( D ) 2 ) ,
M 2 = arg ( D exp ( i M 1 ) ) ,
RE = m = 1 N n = 1 N r ( m , n ) o ( m , n ) 2 m = 1 N n = 1 N o ( m , n ) 2 ,

Metrics