DOI QR코드

DOI QR Code

QPSK Modulation Based Optical Image Cryptosystem Using Phase-shifting Digital Holography

  • Jeon, Seok-Hee (Department of Electronic Engineering, The University of Incheon) ;
  • Gil, Sang-Keun (Department of Electronic Engineering, The University of Suwon)
  • Received : 2010.04.07
  • Accepted : 2010.06.01
  • Published : 2010.06.25

Abstract

We propose a new technique for the optical encryption of gray-level optical images digitized into 8-bits binary data by ASCII encoding followed by QPSK modulation. We made an encrypted digital hologram with a security key by using 2-step phase-shifting digital holography, and the encrypted digital hologram is recorded on a CCD camera with 256 gray-level quantized intensities. With these encrypted digital holograms, the phase values are reconstructed by the same security key and are decrypted into the original gray-level optical image by demodulation and decoding. Simulation results show that the proposed method can be used for cryptosystems and security systems.

Keywords

References

  1. N. Yoshikawa, M. Itoh, and T. Yatagai, “Binary computergenerated holograms for security applications from a synthetic double-exposure method by electron-beam lithography,” Opt. Lett. 23, 1483-1485 (1990). https://doi.org/10.1364/OL.23.001483
  2. B. Javidi and J. L. Horner, “Optical pattern recognition for validation and security verification,” Opt. Eng. 33, 1752-1756 (1994). https://doi.org/10.1117/12.170736
  3. J. F. Heanue, M. C. Bashaw, and L. Hesselink, “Encrypted holographic data storage based on orthogonal-phase-code multiplexing,” Appl. Opt. 34, 6012-6015 (1995). https://doi.org/10.1364/AO.34.006012
  4. P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767-769 (1995). https://doi.org/10.1364/OL.20.000767
  5. D. Weber and J. Trolinger, “Novel implementation of nonlinear joint transform correlators in optical security and validation,” Opt. Eng. 38, 62-68 (1999). https://doi.org/10.1117/1.602062
  6. G.-S. Lin, H. T. Chang, W.-N. Lie, and C.-H. Chuang, “Publickey-based optical image cryptosystem based on data embedding techniques,” Opt. Eng. 42, 2331-2339 (2003). https://doi.org/10.1117/1.1588660
  7. I. Yamaguchi and T. Zhang, “Phase-shifting digital holography,” Opt. Lett. 22, 610-612 (1998).
  8. E. Cuche, F. Bevilacqua, and C. Depeursinge, “Digital holography for quantitative phase-contrast imaging,” Opt. Lett. 24, 291-293 (1999). https://doi.org/10.1364/OL.24.000291
  9. E. Tajahuerce, O. Matoba, S. C. Verrall, and B. Javidi, “Optoelectronic information encryption with phase-shifting interferometry,” Appl. Opt. 39, 2313-2320 (2000). https://doi.org/10.1364/AO.39.002313
  10. G. Unnikrishnan and K. Singh, “Double random fractional Fourier domain encoding for optical security,” Opt. Eng. 39, 2853-2859 (2000). https://doi.org/10.1117/1.1313498
  11. F. Zhang, J. D. R. Valera, and I. Yamaguchi, “Vibration analysis by phase shifting digital holography,” Opt. Rev. 11, 297-299 (2004). https://doi.org/10.1007/s10043-004-0297-7
  12. S. K. Gil, S. H. Jeon, N. Kim, and J. R. Jeong, “Successive encryption and transmission with phase-shifting digital holography,” Proc. SPIE 6136, 339-346 (2006).
  13. S. K. Gil, H. J. Byun, H. J. Lee, S. H. Jeon, and J. R. Jeong, “Optical encryption of binary data information with 2-step phase-shifting digital holography,” Proc. SPIE 6488, 648812 (2007). https://doi.org/10.1117/12.699921
  14. S. H. Jeon, Y. G. Hwang, and S. K. Gil, “Optical encryption of gray-level image using on-axis and 2-f digital holography with two-step phase-shifting method,” Opt. Rev. 15, 181-186 (2008). https://doi.org/10.1007/s10043-008-0029-5
  15. P. Hariharan, “Digital phase-shifting interferometry : a simple error compensating phase calculation algorithm,” Appl. Opt. 26, 2504-2505 (1987). https://doi.org/10.1364/AO.26.002504
  16. P. Hariharan, “Error analysis for optical security by means of 4-step phase-shifting digital hologaphy,” J. Opt. Soc. Korea 10, 118-123 (2006). https://doi.org/10.3807/JOSK.2006.10.3.118
  17. M.-O. Jeong, N. Kim, and J.-H. Park, “Elemental image synthesis for integral imaging using phase-shifting digital holography,” J. Opt. Soc. Korea 12, 275-280 (2008). https://doi.org/10.3807/JOSK.2008.12.4.275
  18. D. Kim and Y. J. Cho, “3-D surface profile measurement using an acousto-optic tunable filter based on spectral phase shifting technique,” J. Opt. Soc. Korea 12, 281-287 (2008). https://doi.org/10.3807/JOSK.2008.12.4.281

Cited by

  1. Dual Optical Encryption for Binary Data and Secret Key Using Phase-shifting Digital Holography vol.16, pp.3, 2012, https://doi.org/10.3807/JOSK.2012.16.3.263
  2. 2-step Phase-shifting Digital Holographic Optical Encryption and Error Analysis vol.15, pp.3, 2011, https://doi.org/10.3807/JOSK.2011.15.3.244
  3. Three-dimensional Binocular Holographic Display Using Liquid Crystal Shutter vol.15, pp.4, 2011, https://doi.org/10.3807/JOSK.2011.15.4.345
  4. Optical image encoding based on digital holographic recording on polarization state of vector wave vol.52, pp.28, 2013, https://doi.org/10.1364/AO.52.006931
  5. 2-step Quadrature Phase-shifting Digital Holographic Optical Encryption using Orthogonal Polarization and Error Analysis vol.16, pp.4, 2012, https://doi.org/10.3807/JOSK.2012.16.4.354
  6. Embedding intensity image in grid-cross down-sampling (GCD) binary holograms based on block truncation coding vol.304, 2013, https://doi.org/10.1016/j.optcom.2013.04.019
  7. Proposal for Optical One-time Password Authentication Using Digital Holography vol.20, pp.6, 2016, https://doi.org/10.3807/JOSK.2016.20.6.722
  8. Optical Implementation of Triple DES Algorithm Based on Dual XOR Logic Operations vol.17, pp.5, 2013, https://doi.org/10.3807/JOSK.2013.17.5.362
  9. Optical Secret Key Sharing Method Based on Diffie-Hellman Key Exchange Algorithm vol.18, pp.5, 2014, https://doi.org/10.3807/JOSK.2014.18.5.477
  10. Analysis of Effect of Phase Error Sources of Polarization Components in Incoherent Triangular Holography vol.16, pp.3, 2012, https://doi.org/10.3807/JOSK.2012.16.3.256