Photon counting imaging and polarized light encoding for secure image verification and hologam watermarking

We propose an optical image security scheme based on polarized light encoding and the photon counting technique. An input image is encoded using the concept of polarized light, which is parameterized using Stokes–Mueller formalism. The encoded image is further encrypted by applying the photon counting imaging technique to obtain a photon limited image. For decryption, the photon limited decrypted image is obtained by using a polarized light decoding scheme with the help of appropriate keys. The decrypted image has sparse representation, which contains sufficient information for verification. This photon counted decrypted image can be verified using correlation filters. The proposed encryption technique offers benefits over the double random phase encoding in that it does not require active elements such as a lens and provides flexibility in the design of encryption keys. The proposed encryption scheme has also been used for hologram watermarking. The computer simulation results for secure image verification and the hologram watermarking scheme have been presented.

[1]  Bahram Javidi,et al.  Full-phase photon-counting double-random-phase encryption. , 2014, Journal of the Optical Society of America. A, Optics, image science, and vision.

[2]  Peng Zhang,et al.  Known-plaintext attack on optical encryption based on double random phase keys. , 2006, Optics letters.

[3]  Wen Chen,et al.  Double random phase encoding using phase reservation and compression , 2014 .

[4]  Arturo Carnicer,et al.  Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. , 2005, Optics letters.

[5]  Naveen K. Nishchal,et al.  Flexible optical encryption with multiple users and multiple security levels , 2011 .

[6]  Naveen K. Nishchal,et al.  Image encryption and authentication verification using fractional nonconventional joint transform correlator , 2012 .

[7]  B. Javidi Nonlinear joint power spectrum based optical correlation. , 1989, Applied optics.

[8]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[9]  Isha Mehra,et al.  Image fusion using wavelet transform and its application to asymmetric cryptosystem and hiding. , 2014, Optics express.

[10]  Ayman Alfalou,et al.  Dual encryption scheme of images using polarized light. , 2010, Optics letters.

[11]  A. Stern,et al.  Phase-Modulated Optical System With Sparse Representation for Information Encoding and Authentication , 2013, IEEE Photonics Journal.

[12]  Bahram Javidi,et al.  Photon-counting double-random-phase encoding for secure image verification and retrieval , 2012 .

[13]  Wen Chen,et al.  Marked ghost imaging , 2014 .

[14]  Naveen K Nishchal,et al.  An optical encryption and authentication scheme using asymmetric keys. , 2014, Journal of the Optical Society of America. A, Optics, image science, and vision.

[15]  G. Unnikrishnan,et al.  A polarization encoded optical encryption system using ferroelectric spatial light modulator , 2000 .

[16]  J. Glückstad,et al.  A phase-based optical encryption system with polarisation encoding , 2000 .

[17]  Bahram Javidi,et al.  Advances in optical security systems , 2014 .

[18]  Naveen K Nishchal,et al.  Image encryption based on interference that uses fractional Fourier domain asymmetric keys. , 2012, Applied optics.

[19]  Xiang Peng,et al.  Asymmetric cryptosystem based on phase-truncated Fourier transforms. , 2010, Optics letters.

[20]  Zhengjun Liu,et al.  Image watermarking by using phase retrieval algorithm in gyrator transform domain , 2010 .

[21]  Bahram Javidi,et al.  Watermarking of three-dimensional objects by digital holography. , 2003, Optics letters.

[22]  O Matoba,et al.  Secure optical memory system with polarization encryption. , 2001, Applied optics.

[23]  Xiang Peng,et al.  Vulnerability to known-plaintext attack of optical encryption schemes based on two fractional Fourier transform order keys and double random phase keys , 2009 .

[24]  Ayman Alfalou,et al.  Robustness against attacks of dual polarization encryption using the Stokes–Mueller formalism , 2012 .

[25]  Myungjin Cho,et al.  Information authentication using photon-counting double-random-phase encrypted images. , 2011, Optics letters.

[26]  Myungjin Cho,et al.  Three-dimensional photon counting double-random-phase encryption. , 2013, Optics letters.

[27]  Naveen K Nishchal,et al.  Image encryption using polarized light encoding and amplitude and phase truncation in the Fresnel domain. , 2013, Applied optics.

[28]  Naveen K. Nishchal,et al.  Fresnel domain nonlinear optical image encryption scheme based on Gerchberg-Saxton phase-retrieval algorithm. , 2014, Applied optics.

[29]  Chau-Jern Cheng,et al.  Optical image encryption based on polarization encoding by liquid crystal spatial light modulators , 2004 .

[30]  Chao Lin,et al.  Optical image encoding based on digital holographic recording on polarization state of vector wave. , 2013, Applied optics.

[31]  C. Brosseau Fundamentals of Polarized Light: A Statistical Optics Approach , 1998 .

[32]  Myungjin Cho,et al.  3D passive photon counting automatic target recognition using advanced correlation filters. , 2011, Optics letters.

[33]  Pramod Kumar,et al.  Known-plaintext attack-free double random phase-amplitude optical encryption: vulnerability to impulse function attack , 2012 .

[34]  Jingjuan Zhang,et al.  Double random-phase encoding in the Fresnel domain. , 2004, Optics letters.

[35]  Bahram Javidi,et al.  Information hiding technique with double phase encoding. , 2002, Applied optics.

[36]  Naveen K Nishchal,et al.  Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask. , 2012, Applied optics.