Optical encryption in the longitudinal domain of focused fields.

We develop a method for encoding information in the longitudinal component of a focused field. Focused beams display a non-zero contribution of the electric field in the direction of propagation. However, the associated irradiance is very weak and difficult to isolate from the transverse part of the beam. For these reasons, the longitudinal component of a focused field could be a good choice for encoding and securing information. Using the Richards and Wolf formalism we show how to encrypt information in the longitudinal domain of the focal area. In addition, we use quantum imaging techniques to enhance the security and to prevent unauthorized access to the information. To the best of our knowledge, this is the first report on using the longitudinal component of the focused fields in optical security.

[1]  Bahram Javidi,et al.  Resistance of the double random phase encryption against various attacks. , 2007, Optics express.

[2]  Theo Lasser,et al.  Fast focus field calculations , 2008, SPIE BiOS.

[3]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[4]  Arvind Kumar,et al.  Impulse attack free double-random-phase encryption scheme with randomized lens-phase functions. , 2009, Optics letters.

[5]  Myrian Tebaldi,et al.  Multiplexing encrypted data by using polarized light , 2006 .

[6]  E. Wolf,et al.  Electromagnetic diffraction in optical systems, II. Structure of the image field in an aplanatic system , 1959, Proceedings of the Royal Society of London. Series A. Mathematical and Physical Sciences.

[7]  Hiroyuki Suzuki,et al.  Known plaintext attack on double random phase encoding using fingerprint as key and a method for avoiding the attack. , 2010, Optics express.

[8]  O Matoba,et al.  Secure optical memory system with polarization encryption. , 2001, Applied optics.

[9]  Xudong Chen,et al.  Optical image encryption based on diffractive imaging. , 2010, Optics letters.

[10]  Q. Zhan Cylindrical vector beams: from mathematical concepts to applications , 2009 .

[11]  Myungjin Cho,et al.  Information authentication using photon-counting double-random-phase encrypted images. , 2011, Optics letters.

[12]  Myungjin Cho,et al.  Three-dimensional photon counting double-random-phase encryption. , 2013, Optics letters.

[13]  G. Unnikrishnan,et al.  Optical encryption by double-random phase encoding in the fractional Fourier domain. , 2000, Optics letters.

[14]  Bahram Javidi,et al.  Advances in optical security systems , 2014 .

[15]  Arturo Carnicer,et al.  Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. , 2005, Optics letters.

[16]  Shunichi Sato,et al.  Sharper focal spot formed by higher-order radially polarized laser beams. , 2007, Journal of the Optical Society of America. A, Optics, image science, and vision.

[17]  S. Khonina,et al.  Controlling the contribution of the electric field components to the focus of a high-aperture lens using binary phase structures. , 2010, Journal of the Optical Society of America. A, Optics, image science, and vision.

[18]  Artur Carnicer,et al.  Reconfigurable beams with arbitrary polarization and shape distributions at a given plane. , 2013, Optics express.

[19]  B Javidi,et al.  Encrypted optical memory system using three-dimensional keys in the Fresnel domain. , 1999, Optics letters.

[20]  Tom Dowling,et al.  Introducing secure modes of operation for optical encryption. , 2008, Journal of the Optical Society of America. A, Optics, image science, and vision.

[21]  Artur Carnicer,et al.  Synthesis of highly focused fields with circular polarization at any transverse plane. , 2014, Optics express.

[22]  A. Carnicer,et al.  On the longitudinal component of paraxial fields , 2012 .

[23]  Alfonso Serrano-Heredia,et al.  Computer-generated holograms with optimum bandwidths obtained with twisted-nematic liquid-crystal displays. , 2005, Applied optics.

[24]  Bahram Javidi,et al.  Optical pattern recognition for validation and security verification , 1994 .

[25]  Kazuya Nakano,et al.  Evaluations of phase-only double random phase encoding based on key-space analysis. , 2013, Applied optics.

[26]  G Leuchs,et al.  Sharper focus for a radially polarized light beam. , 2003, Physical review letters.

[27]  Masahiro Yamaguchi,et al.  Security analysis of phase-only DRPE based on known-plaintext attack using multiple known plaintext-ciphertext pairs. , 2014, Applied optics.

[28]  Luping Shi,et al.  Creation of a needle of longitudinally polarized light in vacuum using binary optics , 2008 .

[29]  Xu Liu,et al.  Phase encoding for sharper focus of the azimuthally polarized beam. , 2010, Optics letters.

[30]  Bahram Javidi,et al.  Optical encryption using photon-counting polarimetric imaging. , 2015, Optics express.

[31]  Nir Davidson,et al.  High-numerical-aperture focusing of radially polarized doughnut beams with a parabolic mirror and a flat diffractive lens. , 2004, Optics letters.

[32]  Osamu Matoba,et al.  Secure holographic memory by double-random polarization encryption. , 2004, Applied optics.

[33]  Peng Zhang,et al.  Known-plaintext attack on optical encryption based on double random phase keys. , 2006, Optics letters.

[34]  Uriel Levy,et al.  Effect of radial polarization and apodization on spot size under tight focusing conditions. , 2008, Optics express.

[35]  Osamu Matoba,et al.  Optical Techniques for Information Security Encryption of information, taking advantage of the many degrees of freedom available in optical waveforms, can be used to safely transmit, protect, store and authenticate data. , 2009 .

[36]  Artur Carnicer,et al.  On the physical realizability of highly focused electromagnetic field distributions. , 2013, Optics letters.