Image encryption based on moiré pattern performed by computational algorithms

A technique based on optical operations for image encryption and decryption is presented by simulation and experimentally. In this method, an image is encrypted by a fringe pattern. This fringe pattern is generated by a computational algorithm as a cosine function, which added in its argument the intensity image as a reflectance map. The result of the encryption process is a fringe pattern deformed according to the image reflectance map. The decryption method is performed creating a moire fringe pattern. To carry it out, the encrypted image is overlapped with a key fringe pattern. This key code is an undeformed fringe pattern, which is generated at the same frequency of the encrypted image. The obtained moire pattern is a modulation function, whose envelope corresponds to an approximated version of the original image. To extract the envelope, a low pass filter is applied on the moire pattern. This encryption technique and decryption is applied to the face images. To describe the accuracy of this technique, a root mean square (rms) of error is calculated using data from the decrypted image and data from the original image. This technique has a great potential, because the process is performed using computational algorithms based on optical operations. In this manner, optical components are avoided. It is an advantage over optical methods for encryption and decryption, which use optical components. This technique is tested with simulated images and real images and its experimental results are presented.

[1]  R. Sauerbrey,et al.  Femtosecond-pulse sequence compression by Gires-Tournois interferometers. , 2003, Optics letters.

[2]  Soo-Joong Kim,et al.  Visual cryptography based on optical interference encryption technique , 2001, SPIE Defense + Commercial Sensing.

[3]  Cheehang Park Park,et al.  Visual Cryptography Based on an Interferometric Encryption Technique , 2002 .

[4]  Hsuan-Ting Chang Image encryption using amplitutde-based virtual image and separable iteratively retrieved phase , 2001 .

[5]  Oded Kafri,et al.  The physics of moire metrology , 1990 .

[6]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[7]  Xiang Peng,et al.  Double-lock for image encryption with virtual optical wavelength. , 2002, Optics express.

[8]  John T. Sheridan,et al.  Optical image encryption by random shifting in fractional Fourier domains. , 2003, Optics letters.

[9]  B Javidi,et al.  Securing information by use of digital holography. , 2000, Optics letters.

[10]  A. Dale,et al.  Simultaneous imaging of total cerebral hemoglobin concentration, oxygenation, and blood flow during functional activation. , 2003, Optics letters.

[11]  Luiz Goncalves Neto Implementation of image encryption using the phase-contrast technique , 1998, Defense + Commercial Sensing.

[12]  J. E. Freund,et al.  Modern elementary statistics , 1953 .

[13]  Bahram Javidi,et al.  Fault tolerance properties of a double phase encoding encryption technique , 1997 .

[14]  P C Mogensen,et al.  Phase-only optical encryption. , 2000, Optics letters.

[15]  Bahram Javidi,et al.  Optical encryption using a joint transform correlator architecture , 2000 .