Information security system by iterative multiple-phase retrieval and pixel random permutation.

A novel information security system based on multiple-phase retrieval by an iterative Fresnel-transform algorithm and pixel random permutation (PRP) technique is proposed. In this method a series of phase masks cascaded in free space are employed and the phase distributions of all the masks are adjusted simultaneously in each iteration. It can achieve faster convergence and better quality of the recovered image compared with double-phase encoding and a similar approach in the spatial-frequency domain with the same number of phase masks and can provide a higher degree of freedom in key space with more geometric parameters as supplementary keys. Furthermore, the security level of this method is greatly improved by the introduction of the PRP technique. The feasibility of this method and its robustness against occlusion and additional noise attacks are verified by computer simulations. The performance of this technique for different numbers of phase masks and quantized phase levels is investigated systematically with the correlation coefficient and mean square error as convergence criterions.

[1]  John T. Sheridan,et al.  Optical image encryption by random shifting in fractional Fourier domains. , 2003, Optics letters.

[2]  Jingjuan Zhang,et al.  A lensless optical security system based on computer-generated phase only masks , 2004 .

[3]  Bahram Javidi,et al.  Secure optical data storage with random phase key codes by use of a configuration of a joint transform correlator. , 2003, Applied optics.

[4]  Xiang Peng,et al.  Parameterized multi-dimensional data encryption by digital optics , 2002 .

[5]  Xiuwen Wang,et al.  Multiple image encryption and watermarking by random phase matching , 2005 .

[6]  Hsuan T. Chang,et al.  Design of cascaded phase keys for a hierarchical security system , 2002 .

[7]  Qing Liu,et al.  Digital image encryption and watermarking by phase-shifting interferometry. , 2004, Applied optics.

[8]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[9]  Qing Liu,et al.  Phase-only encryption and watermarking based on phase-shifting interferometry. , 2005, Applied optics.

[10]  O Matoba,et al.  Secure optical memory system with polarization encryption. , 2001, Applied optics.

[11]  Jingjuan Zhang,et al.  Image hiding with computer-generated phase codes for optical authentication , 2005 .

[12]  Chris Chatwin,et al.  Random phase encoding for optical security , 1996 .

[13]  B Javidi,et al.  Securing information by use of digital holography. , 2000, Optics letters.

[14]  Y Li,et al.  Security and encryption optical systems based on a correlator with significant output images. , 2000, Applied optics.

[15]  Bahram Javidi,et al.  Information hiding technique with double phase encoding. , 2002, Applied optics.

[16]  Giuseppe Schirripa Spagnolo,et al.  Content fragile watermarking based on a computer generated hologram coding technique , 2005 .

[17]  Jingjuan Zhang,et al.  A cascaded iterative Fourier transform algorithm for optical security applications , 2003 .

[18]  Bahram Javidi,et al.  Optical encryption using a joint transform correlator architecture , 2000 .

[19]  Hsuan T. Chang,et al.  Asymmetric-image verification for security optical systems based on joint transform correlator architecture , 2004 .

[20]  Nobukatsu Takai,et al.  Digital watermarking by a holographic technique. , 2002, Applied optics.

[21]  Xiangfeng Meng,et al.  Cross-talk-free double-image encryption and watermarking with amplitude–phase separate modulations , 2005 .

[22]  Joseph N. Mait,et al.  Understanding diffractive optical design in the scalar domain , 1995, OSA Annual Meeting.

[23]  B. Javidi,et al.  Encrypting three-dimensional information with digital holography. , 2000, Applied optics.

[24]  Takanori Nomura Hybrid Optical Encryption of a 3D Object by Use of a Digital Holographic Technique , 2004 .

[25]  B Javidi,et al.  Encrypted optical memory system using three-dimensional keys in the Fresnel domain. , 1999, Optics letters.

[26]  G. Unnikrishnan,et al.  Optical encryption by double-random phase encoding in the fractional Fourier domain. , 2000, Optics letters.

[27]  Hsuan T. Chang,et al.  Image encryption using separable amplitude-based virtual image and iteratively retrieved phase information , 2009 .

[28]  Jifeng Li,et al.  Optical image encryption based on multistage fractional Fourier transforms and pixel scrambling technique , 2005 .

[29]  Bahram Javidi,et al.  Polarization encoding for optical security systems , 2000 .

[30]  J R Fienup,et al.  Phase retrieval algorithms: a comparison. , 1982, Applied optics.

[31]  Hsuan T Chang,et al.  Multiple-phase retrieval for optical security systems by use of random-phase encoding. , 2002, Applied optics.

[32]  Yeon H. Lee,et al.  Encryption of digital hologram of 3-D object by virtual optics. , 2004, Optics express.

[33]  Bahram Javidi,et al.  Security optical systems based on a joint transform correlator with significant output images , 2001, Optical Engineering.

[34]  J Rosen Learning in correlators based on projections onto constraint sets. , 1993, Optics letters.