DOI QR코드

DOI QR Code

Optical Image Split-encryption Based on Object Plane for Completely Removing the Silhouette Problem

  • Li, Weina (Department of Information & Communication Engineering, Chungbuk National University) ;
  • Phan, Anh-Hoang (Department of Information & Communication Engineering, Chungbuk National University) ;
  • Jeon, Seok-Hee (Department of Electronics Engineering, Incheon National University) ;
  • Kim, Nam (Department of Information & Communication Engineering, Chungbuk National University)
  • Received : 2013.06.21
  • Accepted : 2013.09.24
  • Published : 2013.10.25

Abstract

We propose a split-encryption scheme on converting original images to multiple ciphertexts. This conversion introduces one random phase-only function (POF) to influence phase distribution of the preliminary ciphertexts. In the encryption process, the original image is mathematically split into two POFs. Then, they are modulated on a spatial light modulator one after another. And subsequently two final ciphertexts are generated by utilizing two-step phase-shifting interferometry. In the decryption process, a high-quality reconstructed image with relative error $RE=7.6061{\times}10^{-31}$ can be achieved only when the summation of the two ciphertexts is Fresnel-transformed to the reconstructed plane. During the verification process, any silhouette information was invisible in the two reconstructed images from different single ciphertexts. Both of the two single REs are more than 0.6, which is better than in previous research. Moreover, this proposed scheme works well with gray images.

Keywords

References

  1. T. V. Vu, N. Kim, J. An, and S. Hong, "Experimental demonstration of kinogram-based single-phase decryption technique for information security," Appl. Opt. 46, 7662-7669 (2007). https://doi.org/10.1364/AO.46.007662
  2. S. H. Jeon and S. K. Gil, "2-step phase-shifting digital holographic optical encryption and error analysis," J. Opt. Soc. Korea 15, 244-251 (2011). https://doi.org/10.3807/JOSK.2011.15.3.244
  3. P. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995). https://doi.org/10.1364/OL.20.000767
  4. H. J. Lee and S. K. Gil, "Error analysis for optical security by means of 4-step phase-shifting digital holography," J. Opt. Soc. Korea 10, 118-123 (2006). https://doi.org/10.3807/JOSK.2006.10.3.118
  5. L. Shen, J. Li, and H. Chang, "Double-image encryption based on joint transform correlation and phase-shifting interferometry," Chinese Opt. Lett. 5, 687-689 (2007).
  6. J. P. Liu and T. C. Poon, "Two-step-only quadrature phase-shifting digital holography," Opt. Lett. 34, 250-252 (2009). https://doi.org/10.1364/OL.34.000250
  7. S. Kishk and B. Javidi, "Information hiding technique with double phase encoding," Appl. Opt. 41, 5462- 5470 (2002). https://doi.org/10.1364/AO.41.005462
  8. S. Kishk and B. Javidi, "Watermarking of threedimensional objects by digital holography," Opt. Lett. 28, 167-169 (2003). https://doi.org/10.1364/OL.28.000167
  9. Y. Shi, G. Situ, and J. Zhang, "Multiple-image hiding in the Fresnel domain," Opt. Lett. 32, 1914-1916 (2007). https://doi.org/10.1364/OL.32.001914
  10. M. Z. He, L. Z. Cai, Q. Liu, X. C. Wang, and X. F. Meng, "Multiple image encryption and watermarking by random phase matching," Opt. Commun. 247, 29-37 (2005). https://doi.org/10.1016/j.optcom.2004.11.034
  11. G. Situ and J. Zhang, "Multiple-image encryption by wavelength multiplexing," Opt. Lett. 30, 1306-1308 (2005). https://doi.org/10.1364/OL.30.001306
  12. Z. Liu and S. Liu, "Double image encryption based on iterative fractional Fourier transform," Opt. Commun. 275, 324-329 (2007). https://doi.org/10.1016/j.optcom.2007.03.039
  13. Z. Liu, Y. Zhang, H. Zhao, M. A. Ahmad, and S. Liu, "Optical multi-image encryption based on frequency shift," Optik 122, 1010-1013 (2011). https://doi.org/10.1016/j.ijleo.2010.06.039
  14. H. T. Chang, H. E. Hwang, C. L. Lee, and M. T. Lee, "Wavelength multiplexing multiple-image encryption using cascaded phase-only masks in the Fresnel transform domain," Appl. Opt. 50, 710-716 (2011). https://doi.org/10.1364/AO.50.000710
  15. Y. Zhang and B. Wang, "Optical image encryption based on interference," Opt. Lett. 33, 2443-2445 (2008). https://doi.org/10.1364/OL.33.002443
  16. X. Wang and D. Zhao, "Optical image hiding with silhouette removal based on the optical interference principle," Appl. Opt. 51, 686-691 (2012). https://doi.org/10.1364/AO.51.000686
  17. P. Kumar, J. Joseph, and K. Singh, "Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator," Appl. Opt. 50, 1805-1811 (2011). https://doi.org/10.1364/AO.50.001805
  18. W. Jia, F. J. Wen, Y. T. Chow, and C. Zhou, "Binary image encryption based on interference of two phaseonly masks," Appl. Opt. 51, 5253-5258 (2012). https://doi.org/10.1364/AO.51.005253
  19. J. W. Goodman, Introduction to Fourier Optics, 2nd ed. (McGraw-Hill, San Francisco, CA, USA, 1996).

Cited by

  1. Multiple-3D-object secure information system based on phase shifting method and single interference vol.55, pp.15, 2016, https://doi.org/10.1364/AO.55.004052
  2. Multiple-image encryption based on triple interferences for flexibly decrypting high-quality images vol.54, pp.11, 2015, https://doi.org/10.1364/AO.54.003273
  3. Multiple-3D-object decryption based on one interference using two phase-only functions vol.56, pp.22, 2017, https://doi.org/10.1364/AO.56.006214