DOI QR코드

DOI QR Code

Image Encryption and Decryption System using Frequency Phase Encoding and Phase Wrapping Method

주파수 위상 부호화와 위상 랩핑 방법을 이용한 영상 암호화 및 복호화 시스템

  • Seo, Dong-Hoan (Division of Electrical & Electronics Engineering, Korea Maritime University) ;
  • Shin, Chang-Mok (School of Electrical Engineering & Computer Science, Kyungpook National University) ;
  • Cho, Kyu-Bo (School of Electrical Engineering & Computer Science, Kyungpook National University)
  • 서동환 (한국해양대학교 전기전자공학부) ;
  • 신창목 (경북대학교 전자전기컴퓨터학부) ;
  • 조규보 (경북대학교 전자전기컴퓨터학부)
  • Published : 2006.12.25

Abstract

In this paper, we propose an improved image encryption and fault-tolerance decryption method using phase wrapping and phase encoding in the frequency domain. To generate an encrypted image, an encrypting key which denotes the product of a phase-encoded virtual image, not an original image, and a random phase image is zero-padded and Fourier transformed and its real-valued data is phase-encoded. The decryption process is simply performed by performing the inverse Fourier transform for multiplication of the encrypted key with the decrypting key, made of the proposed phase wrapping method, in the output plane with a spatial filter. This process has the advantages of solving optical alignment and pixel-to-pixel mapping problems. The proposed method using the virtual image, which does not contain any information from the original image, prevents the possibility of counterfeiting from unauthorized people and also can be used as a current spatial light modulator technology by phase encoding of the real-valued data. Computer simulations show the validity of the encryption scheme and the robustness to noise of the encrypted key or the decryption key in the proposed technique.

References

  1. B. Javidi and J. L. Horner, 'Optical pattern recognition for validation and security verification,' Opt. Eng., vol. 33, no. 6, pp. 1752-1756, 1994 https://doi.org/10.1117/12.170736
  2. R. K. Wang, I. A. Watson, and C. Chatwin, 'Random phase encoding for optical security,' Opt. Eng., vol. 35, no. 9, pp. 2464-2469, 1996 https://doi.org/10.1117/1.600849
  3. P. Refregier and B. Javidi, 'Optical image encryption based on input plane and Fourier plane random encoding,' Opt. Lett., vol. 20, no. 7, pp. 767-769, 1995 https://doi.org/10.1364/OL.20.000767
  4. B. Javidi, G. Zhang, and Jian Li, 'Experimental demonstration of the random phase encoding technique for image encryption and security verification,' Opt. Eng., vol. 35, no. 9, pp. 2506-2512, 1996 https://doi.org/10.1117/1.600854
  5. B. Javidi and E. Ahouzi, 'Optical security system with Fourier plane encoding,' Appl. Opt., vol. 37, no. 26, pp. 6247-6255, 1998 https://doi.org/10.1364/AO.37.006247
  6. T. Nomura and B. Javidi, 'Optical encryption using a joint transform correlator architecture,' Opt. Eng., vol. 39, no. 8, pp. 2031-2035, 2000 https://doi.org/10.1117/1.1304844
  7. T. Nomura and B. Javidi, 'Optical encryption system with a binary key code,' Appl. Opt., vol. 39, no. 26, pp. 4783-4787, 2000 https://doi.org/10.1364/AO.39.004783
  8. M. Yamazaki and J. Ohtsubo, 'Optimization of encrypted holograms in optical security systems,' Opt. Eng., vol. 40, no. 1, pp. 132-137, 2001 https://doi.org/10.1117/1.1334947
  9. G. Unnikrishnan, J. Joseph, and K. Singh, 'Optical encryption system that uses phase conjugation in a photorefractive crystal,' Appl. Opt., vol. 37, no. 35, pp. 8181-8186, 1998 https://doi.org/10.1364/AO.37.008181
  10. B. Javidi, A. Sergent, G. Zhang, and L. Guibert, 'Fault tolerance properties of a double phase encoding encryption technique,' Opt. Eng., vol. 36, no. 4, pp. 992-998, 1997 https://doi.org/10.1117/1.601144
  11. B. Javidi, A. Sergent, and E. Ahouzi, 'Performance of double phase encoding encryption technique using binarized encrypted images,' Opt. Eng., vol. 37, no. 2, pp. 565-570, 1998 https://doi.org/10.1117/1.601645
  12. B. Wang, C. C. Sun, W. C. Su, and A. E. T. Chiou, 'Shift-tolerance property of an optical double-random phase-encoding encryption system,' Appl. Opt., vol. 39, no. 26, pp. 4788-4793, 2000 https://doi.org/10.1364/AO.39.004788
  13. N. Towghi, B. Javidi, and Z. Luo, 'Fully phase encrypted image processor,' J. Opt. Soc. Am. A, vol. 16, no. 8, pp. 1915-1927, 1999 https://doi.org/10.1364/JOSAA.16.001915
  14. X. Tan, O. Matoba, T. Shinura, K. Kuroda, and B. Javidi, 'Secure optical storage that uses fully phase encryption,' Appl. Opt., vol. 39, no. 35, pp. 6689-6694, 2000 https://doi.org/10.1364/AO.39.006689
  15. P. C. Mogensen and J. Gluckstad, 'Phase-only optical encryption,' Opt. Lett., vol. 25, no. 8, pp. 566-568, 2000 https://doi.org/10.1364/OL.25.000566
  16. P. C. Mogensen and J. Glückstad, 'Phase-only optical decryption of a fixed mask,' Appl. Opt., vol. 40, no. 8, pp. 1226-1235, 2001 https://doi.org/10.1364/AO.40.001226
  17. J. Ohtsubo and A. Fujimoto, 'Practical image encryption and decryption by phase-coding technique for optical security systems,' Appl. Opt., vol. 41, no. 23, pp. 4848-4855, 2002 https://doi.org/10.1364/AO.41.004848
  18. H. T. Chang, 'Image encryption using separable amplitudebased virtual image and iteratively retrieved phase information,' Opt. Eng., vol. 40, no. 10, pp. 2165-2171, 2001 https://doi.org/10.1117/1.1402124

Cited by

  1. Practical Encryption and Decryption System using Iterative Phase Wrapping Method vol.32, pp.6, 2008, https://doi.org/10.5916/jkosme.2008.32.6.955