Robust multidepth object encryption based on a computer-generated hologram with a cascaded structure.

A robust, asymmetric, multidepth, three-dimensional object encryption scheme based on a computer-generated Fresnel hologram in the cascaded fractional Fourier domain is proposed. A layer-based Fresnel transform is used to generate a computer-generated hologram, which is then decomposed into two phase-only masks with a random phase distribution using matrix composition and decomposition methods. Encryption is implemented by using the created phase-only masks in two cascaded fractional Fourier transform domains, and a pair of private keys is generated in the encryption process. The cryptosystem is asymmetric and possesses high resistance against various potential attacks, such as brute-force, chosen-plaintext, known-plaintext, and ciphertext-only attacks. The simulation results and cryptanalysis confirmed the feasibility and effectiveness of the proposed encryption scheme.

[1]  Liangcai Cao,et al.  Computer-generated hologram with occlusion effect using layer-based processing. , 2017, Applied optics.

[2]  Xiang Peng,et al.  Asymmetric cryptosystem based on phase-truncated Fourier transforms. , 2010, Optics letters.

[3]  Wen Chen Optical cryptosystem based on single-pixel encoding using the modified Gerchberg-Saxton algorithm with a cascaded structure. , 2016, Journal of the Optical Society of America. A, Optics, image science, and vision.

[4]  Aloka Sinha,et al.  Nonlinear optical cryptosystem resistant to standard and hybrid attacks , 2016 .

[5]  Peng Zhang,et al.  Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain. , 2006, Optics letters.

[6]  Weimin Jin,et al.  Symmetric and asymmetric hybrid cryptosystem based on compressive sensing and computer generated holography , 2018 .

[7]  Bahram Javidi,et al.  Three-dimensional scene encryption and display based on computer-generated holograms. , 2016, Applied optics.

[8]  Tomoyoshi Ito,et al.  Simple and fast calculation algorithm for computer-generated hologram with wavefront recording plane. , 2009, Optics letters.

[9]  Arturo Carnicer,et al.  Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. , 2005, Optics letters.

[10]  S Liu,et al.  Cascading the multiple stages of optical fractional Fourier transforms under different variable scales. , 1995, Optics letters.

[11]  Peter Wai Ming Tsang,et al.  Fast numerical generation and hybrid encryption of a computer-generated Fresnel holographic video sequence , 2013 .

[12]  Myungjin Cho,et al.  Three-dimensional photon counting double-random-phase encryption. , 2013, Optics letters.

[13]  G. Unnikrishnan,et al.  Optical encryption by double-random phase encoding in the fractional Fourier domain. , 2000, Optics letters.

[14]  Byung-Geun Lee,et al.  Optical image encryption via photon-counting imaging and compressive sensing based ptychography , 2015 .

[15]  B. Javidi,et al.  Encrypting three-dimensional information with digital holography. , 2000, Applied optics.

[16]  Nam Kim,et al.  Multi-depth three-dimensional image encryption based on the phase retrieval algorithm in the Fresnel and fractional Fourier transform domains. , 2018, Applied optics.

[17]  Chao-Qing Dai,et al.  Optical image encryption via reverse engineering of a modified amplitude-phase retrieval-based attack , 2014 .

[18]  Denis Lebrun,et al.  Characterization of diffraction patterns directly from in-line holograms with the fractional Fourier transform. , 2002, Applied optics.

[19]  Yixiang Chen,et al.  Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform. , 2014, Applied optics.

[20]  Yurong Wang,et al.  Optical image encryption based on binary Fourier transform computer-generated hologram and pixel scrambling technology , 2007 .

[21]  Zhengjun Liu,et al.  Image security based on iterative random phase encoding in expanded fractional Fourier transform domains , 2018, Optics and Lasers in Engineering.

[22]  Areeba Fatima,et al.  Discussion on comparative analysis and a new attack on optical asymmetric cryptosystem. , 2016, Journal of the Optical Society of America. A, Optics, image science, and vision.

[23]  Wei-Na Li,et al.  Multiple-3D-object secure information system based on phase shifting method and single interference. , 2016, Applied optics.

[24]  Jingjuan Zhang,et al.  A lensless optical security system based on computer-generated phase only masks , 2004 .

[25]  Byung-Geun Lee,et al.  Interferometry based multispectral photon-limited 2D and 3D integral image encryption employing the Hartley transform. , 2015, Optics express.

[26]  Guofan Jin,et al.  Three-dimensional information hierarchical encryption based on computer-generated holograms , 2016 .

[27]  Unnikrishnan Gopinathan,et al.  A known-plaintext heuristic attack on the Fourier plane encryption algorithm. , 2006, Optics express.

[28]  Naveen K Nishchal,et al.  Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform. , 2013, Applied optics.

[29]  Xiaolei Wang,et al.  Experimental study on optical image encryption with asymmetric double random phase and computer-generated hologram. , 2017, Optics express.

[30]  T-C Poon,et al.  Fast numerical generation and encryption of computer-generated Fresnel holograms. , 2011, Applied optics.

[31]  Bahram Javidi,et al.  Resistance of the double random phase encryption against various attacks. , 2007, Optics express.

[32]  Yu Zhao,et al.  Fast calculation method of computer-generated hologram using a depth camera with point cloud gridding , 2018 .

[33]  Byung-Geun Lee,et al.  Low photon count based digital holography for quadratic phase cryptography. , 2017, Optics letters.