Optical image encryption with silhouette removal based on interference and phase blend processing

Abstract To completely eliminate the silhouette problem that inherently exists in the earlier interference-based encryption scheme with two phase-only masks (POMs), we propose a simple new encryption method based on optical interference of one random POM and two analytically obtained POMs. Different from the previous methods which require time-consuming iterative computation or postprocessing of the POMs for silhouette removal, our method can resolve the problem during the production of the POMs based on interference principle. Information associated with the original image is smoothed away by modulation of the random POM. Illegal deciphers cannot retrieve the primitive image using only one or two of the POMs. Incorporated with the linear phase blend operation, our method can provide higher robustness against brute force attacks. Simulation results are presented to support the validity and feasibility of our method.

[1]  G. Unnikrishnan,et al.  Optical encryption by double-random phase encoding in the fractional Fourier domain. , 2000, Optics letters.

[2]  Naveen K Nishchal,et al.  Image encryption based on interference that uses fractional Fourier domain asymmetric keys. , 2012, Applied optics.

[3]  Wen-Nung Lie,et al.  Fast double-phase retrieval in Fresnel domain using modified Gerchberg-Saxton algorithm for lensless optical security systems. , 2009, Optics express.

[4]  Bahram Javidi,et al.  Resistance of the double random phase encryption against various attacks. , 2007, Optics express.

[5]  Juan Liu,et al.  Experimental verification of optical image encryption based on interference , 2011 .

[6]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[7]  Zhengjun Liu,et al.  Image encryption based on random scrambling of the amplitude and phase in the frequency domain , 2009 .

[8]  Chenggen Quan,et al.  Optical color image encryption based on Arnold transform and interference method , 2009 .

[9]  Peng Zhang,et al.  Known-plaintext attack on optical encryption based on double random phase keys. , 2006, Optics letters.

[10]  Hsuan T Chang,et al.  Multiple-phase retrieval for optical security systems by use of random-phase encoding. , 2002, Applied optics.

[11]  Pramod Kumar,et al.  Optical image encryption based on interference under convergent random illumination , 2010 .

[12]  Kehar Singh,et al.  Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator. , 2011, Applied optics.

[13]  Jingjuan Zhang,et al.  Double random-phase encoding in the Fresnel domain. , 2004, Optics letters.

[14]  Bo Wang,et al.  Optical image encryption based on interference. , 2008, Optics letters.

[15]  Peng Zhang,et al.  Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain. , 2006, Optics letters.

[16]  John T. Sheridan,et al.  Optical image encryption by random shifting in fractional Fourier domains. , 2003, Optics letters.

[17]  S Liu,et al.  Optical image encryption based on multifractional Fourier transforms. , 2000, Optics letters.

[18]  Arturo Carnicer,et al.  Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. , 2005, Optics letters.

[19]  A. Alfalou,et al.  Exploiting root-mean-square time-frequency structure for multiple-image optical compression and encryption. , 2010, Optics letters.

[20]  Xiaogang Wang,et al.  Optical image hiding with silhouette removal based on the optical interference principle. , 2012, Applied optics.

[21]  Juan Liu,et al.  Holographic projection based on interference and analytical algorithm , 2010 .

[22]  Yan Zhang,et al.  Enhancement of image hiding by exchanging two phase masks , 2009 .

[23]  Yan Zhang,et al.  Double images hiding based on optical interference , 2009 .

[24]  Ayman Alfalou,et al.  Optical image compression and encryption methods , 2009 .