Optical image encryption using equal modulus decomposition and multiple diffractive imaging

The equal modulus decomposition (EMD) is a novel asymmetric cryptosystem based on coherent superposition which was proposed to resist the specific attack. In a subsequent work, the scheme was shown to be vulnerable to specific attack. In this paper, we counter the vulnerability through an encoding technique which uses multiple diffraction intensity pattern recordings as the input to the EMD setup in the gyrator domain. This allows suppression of the random phase mask in the EMD path. As a result, the proposed scheme achieves resistance to specific attack. The simulation results and the security analysis demonstrate that EMD based on multiple intensity pattern recording is an effective optical asymmetric cryptosystem suitable for securing data and images.

[1]  M. L. Calvo,et al.  Gyrator transform: properties and applications. , 2007, Optics express.

[2]  Xiang Peng,et al.  Asymmetric cryptosystem based on phase-truncated Fourier transforms. , 2010, Optics letters.

[3]  Bahram Javidi,et al.  Optical encryption using multiple intensity samplings in the axial domain. , 2013, Journal of the Optical Society of America. A, Optics, image science, and vision.

[4]  Naveen K Nishchal,et al.  An optical encryption and authentication scheme using asymmetric keys. , 2014, Journal of the Optical Society of America. A, Optics, image science, and vision.

[5]  Isha Mehra,et al.  Optical asymmetric watermarking using modified wavelet fusion and diffractive imaging , 2015 .

[6]  Kuldeep Singh,et al.  Encrypting digital hologram of three-dimensional object using diffractive imaging , 2015 .

[7]  Ming Lei,et al.  Asymmetric optical cryptosystem based on coherent superposition and equal modulus decomposition. , 2015, Optics letters.

[8]  Naveen K Nishchal,et al.  Image encryption using polarized light encoding and amplitude and phase truncation in the Fresnel domain. , 2013, Applied optics.

[9]  Wen Chen,et al.  Optical color-image encryption and synthesis using coherent diffractive imaging in the Fresnel domain. , 2012, Optics express.

[10]  Xiaogang Wang,et al.  Optical image hiding with silhouette removal based on the optical interference principle. , 2012, Applied optics.

[11]  Colin J. R. Sheppard,et al.  Optical image encryption based on coherent diffractive imaging using multiple wavelengths , 2012 .

[12]  Tuo Li,et al.  Security risk of diffractive-imaging-based optical cryptosystem. , 2015, Optics express.

[13]  Qiong Gong,et al.  Diffractive-imaging-based optical image encryption with simplified decryption from single diffraction pattern. , 2014, Applied optics.

[14]  Wen Chen,et al.  Structured-illumination-based lensless diffractive imaging and its application to optical image encryption , 2012 .

[15]  Qu Wang,et al.  Optical image encryption with silhouette removal based on interference and phase blend processing , 2012 .

[16]  Xiaopeng Deng,et al.  Asymmetric optical cryptosystem based on coherent superposition and equal modulus decomposition: comment. , 2015, Optics letters.

[17]  José A Rodrigo,et al.  Experimental implementation of the gyrator transform. , 2007, Journal of the Optical Society of America. A, Optics, image science, and vision.

[18]  Xudong Chen,et al.  Optical image encryption based on diffractive imaging. , 2010, Optics letters.

[19]  Bo Wang,et al.  Optical image encryption based on interference. , 2008, Optics letters.

[20]  Naveen K Nishchal,et al.  Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask. , 2012, Applied optics.

[21]  Yi Qin,et al.  Simplified optical image encryption approach using single diffraction pattern in diffractive-imaging-based scheme. , 2014, Optics express.