Design of cascaded phase keys for a hierarchical security system

An image cryptosystem based on multiple phase-only masks is proposed. The proposed cryptosystem is a hierarchical security system that can use multiple phase keys to retrieve different amounts of data. In addition to the sequential order of the phase keys, the distance parameters among the phase keys are introduced to increase the system security. Even when an illegal user steals all the phase keys, the system cannot be broken without the correct sequential order and the distance parameters. However, the proposed system can verify the identities of the persons by the cascaded structure for the phase keys to generate different verification images. Simulation results are further demonstrated to verify the proposed method.

[1]  Eun-Soo Kim,et al.  Optical image encryption based on XOR operations , 1999 .

[2]  R. Gerchberg Super-resolution through Error Energy Reduction , 1974 .

[3]  Chin-Chen Chang,et al.  A virtual image cryptosystem based upon vector quantization , 1998, IEEE Trans. Image Process..

[4]  J R Fienup,et al.  Phase retrieval algorithms: a comparison. , 1982, Applied optics.

[5]  B Javidi,et al.  Optoelectronic information encryption with phase-shifting interferometry. , 2000, Applied optics.

[6]  Mark A. Neifeld,et al.  Digital wavefront reconstruction and its application to image encryption , 2000 .

[7]  A. Papoulis A new algorithm in spectral analysis and band-limited extrapolation. , 1975 .

[8]  Xiang Peng,et al.  Parameterized multi-dimensional data encryption by digital optics , 2002 .

[9]  O. Bryngdahl,et al.  Iterative Fourier-transform algorithm applied to computer holography , 1988 .

[10]  Chris Chatwin,et al.  Random phase encoding for optical security , 1996 .

[11]  James R. Fienup,et al.  Iterative Method Applied To Image Reconstruction And To Computer-Generated Holograms , 1980 .

[12]  Y Li,et al.  Security and encryption optical systems based on a correlator with significant output images. , 2000, Applied optics.

[13]  J Rosen Learning in correlators based on projections onto constraint sets. , 1993, Optics letters.

[14]  M. Hayes The reconstruction of a multidimensional sequence from the phase or magnitude of its Fourier transform , 1982 .

[15]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[16]  Bahram Javidi,et al.  Fully phase encrypted image processor , 1999 .