Practical Encryption and Decryption System using Iterative Phase Wrapping Method

반복적인 위상 랩핑 방법을 이용한 실질적인 암호화 및 복호화 시스템

  • 서동환 (한국해양대학교 전기전자공학부) ;
  • 이성근 (한국해양대학교 전기전자공학부) ;
  • 김윤식 (한국해양대학교 전기전자공학부)
  • Published : 2008.09.30


In this paper, we propose an improved practical encryption and fault-tolerance decryption method using a non-negative value key and random function obtained with a white noise by using iterative phase wrapping method. A phase wrapping operating key, which is generated by the product of arbitrary random phase images and an original phase image. is zero-padded and Fourier transformed. Fourier operating key is then obtained by taking the real-valued data from this Fourier transformed image. Also the random phase wrapping operating key is made from these arbitrary random phase images and the same iterative phase wrapping method. We obtain a Fourier random operating key through the same method in the encryption process. For practical transmission of encryption and decryption keys via Internet, these keys should be intensity maps with non-negative values. The encryption key and the decryption key to meet this requirement are generated by the addition of the absolute of its minimum value to each of Fourier keys, respectively. The decryption based on 2-f setup with spatial filter is simply performed by the inverse Fourier transform of the multiplication between the encryption key and the decryption key and also can be used as a current spatial light modulator technology by phase encoding of the non-negative values. Computer simulations show the validity of the encryption method and the robust decryption system in the proposed technique.


  1. P. Refregier and B. Javidi, 'Optical image encryption based on input plane and Fourier plane random encoding,' Opt. Lett., Vol. 20, No. 7, pp. 767-769, 1995
  2. R. K. Wang, I. A. Watson, and C. Chatwin, 'Random phase encoding for optical security,' Opt. Eng., Vol. 35, No. 9, pp. 2464-2469, 1996
  3. B. Javidi and E. Ahouzi, 'Optical security system with Fourier plane encoding,' Appl. Opt., Vol. 37, No. 26, pp. 6247-6255, 1998
  4. J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kim, 'Optical image encrypion based on XOR operations,' Opt. Eng., Vol. 38, No. 1, pp. 47-54, 1999
  5. T. Nomura and B. Javidi, 'Optical encryption using a joint transform correlator architecture,' Opt. Eng., Vol. 39, No. 8, pp. 2031-2035, 2000
  6. B. Wang, C. C. Sun, W. C. Su, and A. E. T. Chiou, 'Shift-tolerance property of an optical double-random phase-encoding encryption system,' Appl. Opt., Vol. 39, No. 26, pp. 4788-4793, 2000
  7. P. C. Mogensen and J. Gluckstad, 'Phase-only optical encryption,' Opt. Let., Vol. 25, No. 8, pp. 566-568, 2000
  8. C. H. Yeh, H. T. Cahng, H. C. Chien, and C. J. Kuo, 'Design of caseaded phase Keys for a hierarchical security system,' Appl. Opt., Vol. 41, No. 29, pp. 6128-6314, Oct. 2002
  9. M. Z. He, L. Z. Cai, Q. Liu, X. C. Wang, X. F. Meng, 'Multiple image encryption and watermarking by random phase matching,' Opt. Commun. 247 pp. 29-37, 2005
  10. D-H Seo, C-M Shin, and K-B Cho, 'Image encryption and decryption system using frequency phase encoding and phase wrapping method ,' Hankook Kwanghak Hoeji, Vol. 17, No. 6, pp.507-513, 2006