Image encryption based on a grating generated by a reflection intensity map

A virtual optical technique for image encryption and decryption is presented in this paper. The technique is carried out using optical operation and computational algorithms. In this technique, a grey-level image is captured by a charge-coupled device camera and encrypted using a linear grating superposed on the reflected intensity map of the object. The grating is generated as a fringe pattern by a computer algorithm. The reflected intensity map is determined using the grey level of the image. This reflected intensity map is included in the fringe pattern as an optical phase. It generates a grating, which is represented as a fringe pattern deformed according to the reflected intensity map. The decryption method is performed by a phase recovery method. The technique used here is a spatial synchronous method. This encryption and decryption technique has been used to encrypt real face images. To describe the accuracy of results obtained by this technique, the rms of error is calculated using decrypted and original data images. This encrypting technique is a virtual optical method because all the optical operations are performed by computer processes, and optical components are not required, which are advantages over optical methods, where some physical optical components are used. Simulated images are used in order to assess the technique. Finally, results on real images are presented.

[1]  Hsuan-Ting Chang Image encryption using amplitutde-based virtual image and separable iteratively retrieved phase , 2001 .

[2]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[3]  R. Sauerbrey,et al.  Femtosecond-pulse sequence compression by Gires-Tournois interferometers. , 2003, Optics letters.

[4]  B Javidi,et al.  Securing information by use of digital holography. , 2000, Optics letters.

[5]  Cheehang Park Park,et al.  Visual Cryptography Based on an Interferometric Encryption Technique , 2002 .

[6]  M. Takeda,et al.  Fourier-transform method of fringe-pattern analysis for computer-based topography and interferometry , 1982 .

[7]  Bahram Javidi,et al.  Fault tolerance properties of a double phase encoding encryption technique , 1997 .

[8]  John T. Sheridan,et al.  Optical image encryption by random shifting in fractional Fourier domains. , 2003, Optics letters.

[9]  Luiz Goncalves Neto Implementation of image encryption using the phase-contrast technique , 1998, Defense + Commercial Sensing.

[10]  Bahram Javidi,et al.  Optical encryption using a joint transform correlator architecture , 2000 .

[11]  Xiang Peng,et al.  Double-lock for image encryption with virtual optical wavelength. , 2002, Optics express.

[12]  Andrew J. Moore,et al.  Phase demodulation in the space domain without a fringe carrier , 1995 .

[13]  Soo-Joong Kim,et al.  Visual cryptography based on optical interference encryption technique , 2001, SPIE Defense + Commercial Sensing.

[14]  A. Dale,et al.  Simultaneous imaging of total cerebral hemoglobin concentration, oxygenation, and blood flow during functional activation. , 2003, Optics letters.

[15]  P C Mogensen,et al.  Phase-only optical encryption. , 2000, Optics letters.