Multiple-encoding retrieval for optical security

We propose a method for image encryption by multiple-step random phase encoding with an undercover multiplexing operation. The true image is stored in a multiple record we call encodegram; and then we can reconstruct it by the use of the appropriate random phase masks and a retrieval protocol. To increase the security of the true hidden image and confuse unauthorized receivers, we add to the encodegram an encoded fake image with different content. This fake image has only a small effect on the retrieval of the true hidden image, owing to the specific property of this protocol. In the decryption step, we can reveal the true image by applying the inverse protocol to two cyphertexts, one the encodegram containing the true image along with the fake image; and the other helping to get the random phase key to achieve the true image. Computer simulations verify the validity of this method for image encryption. Digital implementation of the method makes it particularly suitable for the remote transmission of information.

[1]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[2]  Hyun Kim,et al.  Optimal watermarking of digital hologram of 3-D object. , 2005, Optics express.

[3]  Myrian Tebaldi,et al.  Multiple image encryption using an aperture-modulated optical system , 2006 .

[4]  Ricardo Arizaga,et al.  Fully digital encryption technique , 2003 .

[5]  Ricardo Arizaga,et al.  Validation through a binary key code and a polarization sensitive digital technique , 2003 .

[6]  B Javidi,et al.  Securing information by use of digital holography. , 2000, Optics letters.

[7]  Peng Zhang,et al.  Known-plaintext attack on optical encryption based on double random phase keys. , 2006, Optics letters.

[8]  B Javidi,et al.  Encrypted optical memory system using three-dimensional keys in the Fresnel domain. , 1999, Optics letters.

[9]  Myrian Tebaldi,et al.  Multiplexing encrypted data by using polarized light , 2006 .

[10]  Nobukatsu Takai,et al.  Digital watermarking by a holographic technique. , 2002, Applied optics.

[11]  B. Javidi,et al.  Encrypting three-dimensional information with digital holography. , 2000, Applied optics.

[12]  Arturo Carnicer,et al.  Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. , 2005, Optics letters.

[13]  Y Guo,et al.  Decomposition storage of information based on computer-generated hologram interference and its application in optical image encryption. , 2001, Applied optics.