DOI QR코드

DOI QR Code

Image Encryption Using Phase-Based Virtual Image and Interferometer

  • Seo, Dong-Hoan (Dept. of Electronic Engineering, Kyungpook National University) ;
  • Kim, Soo-Joong (Dept. of Electronic Engineering, Kyungpook National University)
  • Received : 2002.09.10
  • Published : 2002.12.01

Abstract

In this paper, we propose an improved optical security system using three phase-encoded images and the principle of interference. This optical system based on a Mach-Zehnder interferometer consists of one phase-encoded virtual image to be encrypted and two phase-encoded images, en-crypting image and decrypting image, where every pixel in the three images has a phase value of '0'and'$\pi$'. The proposed encryption is performed by the multiplication of an encrypting image and a phase-encoded virtual image which dose not contain any information from the decrypted im-age. Therefore, even if the unauthorized users steal and analyze the encrypted image, they cannot reconstruct the required image. This virtual image protects the original image from counterfeiting and unauthorized access. The decryption of the original image is simply performed by interfering between a reference wave and a direct pixel-to-pixel mapping image of the en crypted image with a decrypting image. Computer simulations confirmed the effectiveness of the proposed optical technique for optical security applications.

Keywords

References

  1. B. Javidi and J. L. Horner, Opt. Eng. 33, 1752 (1994) https://doi.org/10.1117/12.170736
  2. P. Refregier and B. Javidi, Opt. Lett. 20, 767 (1995) https://doi.org/10.1364/OL.20.000767
  3. B. Javidi, G. Zhang, and Jian Li, Opt. Eng. 35, 2506 (1996) https://doi.org/10.1117/1.600854
  4. R. K. Wang, I. A. Watson, and C. Chatwin, Opt. Eng. 35, 2464 (1996) https://doi.org/10.1117/1.600849
  5. S. Lai, Opt. Eng. 35, 2470 (1996) https://doi.org/10.1117/1.600850
  6. L. G. Neto, Proc. SPIE 3386, 284 (1998) https://doi.org/10.1117/12.304774
  7. B. Javidi and E. Ahouzi, Appl. Opt. 37, 6247 (1998) https://doi.org/10.1364/AO.37.006247
  8. J. W. Han, D. H. Ryu. D. S. Park, and E. S. Kim Opt. Eng. 38, 47 (1999) https://doi.org/10.1117/1.602060
  9. T. Nomura and B. Javidi, Opt. Eng. 39, 2031 (2000) https://doi.org/10.1117/1.1304844
  10. B. javidi and T. nomura, Opt. Lett. 25, 28 (2000) https://doi.org/10.1364/OL.25.000028
  11. T.Sasaki, H. Togo, J. Tnida, and Y. Ichioka, Appl. Opt. 39, 2340 (2000) https://doi.org/10.1364/AO.39.002340
  12. Hsuan T. Chang, Opt. Eng. 40, 2165 (2001) https://doi.org/10.1117/1.1402124

Cited by

  1. Optical encryption system using random divided image and joint transform correlator vol.14, pp.6, 2003, https://doi.org/10.3807/KJOP.2003.14.6.636
  2. Optical encryption system using visual cryptography and virtual phase images vol.14, pp.6, 2003, https://doi.org/10.3807/KJOP.2003.14.6.630