Advanced Search
SHEN Xueju, LIU Xumin, XU Qinzu, LIN Chao. Multiple image encryption based on Fourier transform holography under spherical wave illumination[J]. LASER TECHNOLOGY, 2014, 38(4): 488-493. DOI: 10.7510/jgjs.issn.1001-3806.2014.04.012
Citation: SHEN Xueju, LIU Xumin, XU Qinzu, LIN Chao. Multiple image encryption based on Fourier transform holography under spherical wave illumination[J]. LASER TECHNOLOGY, 2014, 38(4): 488-493. DOI: 10.7510/jgjs.issn.1001-3806.2014.04.012

Multiple image encryption based on Fourier transform holography under spherical wave illumination

More Information
  • Received Date: August 13, 2013
  • Revised Date: September 21, 2013
  • Published Date: July 24, 2014
  • To reduce the number of binary random phase mask used in an image encryption system and simplify the effect of hidden encryption images on decryption process, an optical multiple-image encryption and hiding scheme was put forward based on Fourier transform holography under spherical wave illumination. Theoretical analysis and numerical simulation of image encryption and hiding encryption image and image decryption were made. The results show that correlation coefficient between encryption image and original image approaches 0, correlation coefficient between host image and hiding encryption image approaches 1 when superposition coefficient between host image and hiding encryption image is less than 0.3, correlation coefficient between decryption image and original image approaches 1. The encryption method can obtain good encryption effect.
  • [1]
    REFREGIER P, JAVIDI B. Optical image encryption based on in- put plane and Fourier plane random encoding[J]. Optics Letters, 1995, 20(3):767-769.
    [2]
    UNNIKRISHNAN G, JOSEPH J. Optical encryption system that uses phase conjugation in a photorefractive crystal[J]. Applied Optics, 1998, 37(18): 8181-8186.
    [3]
    MATOBA O, JAVIDI B. Encrypted optical memory system using three dimensional-keys in the fresnel domain [J]. Optics Letters, 1999, 24(4): 762-764.
    [4]
    XIAO Y L, LIU Q, YUAN Sh, et al. Study about decryption based on optical image encryption system in the Fresnel domain[J]. Laser Technology, 2009, 33(4): 433-436 (in Chinese).
    [5]
    LIN Ch,SHEN X J, YANG Sh X. Simulation analysis of random phase mask with spatial light modulator[J]. Laser Technology, 2013, 37(3): 365-370 (in Chinese).
    [6]
    FENG J B, ZHOU X. Random phase encoding achievement of color images under spotlight illumination[J]. Laser Technology, 2008, 32(6): 621-623 (in Chinese).
    [7]
    LIN Ch, SHEN X J, LI Z. cryptographic analysis on the key space of optical phase encryption algorithm based on the design of discrete random phase mask[J]. Optics and Laser Technology, 2013,49(1):108-117.
    [8]
    MATOBA O, JAVIDI B. Encrypted optical storage with angular multiplexing[J]. Applied Optics, 1999, 38(15): 7288-7293.
    [9]
    SITU G H, ZHANG J. Multiple-image encryption by wavelength multiplexing[J]. Optics Letters, 2005, 30(6): 1306-1308.
    [10]
    BARRERA J, HENAO R. Multiplexing encryption-decryption via lateral shifting of a random phase mask[J]. Optics Communications, 2006, 259(3): 532-536.
    [11]
    BARRERA J, HENAO R. Multiplexing encrypted data by using polarized light[J]. Optics Communications,2006, 260(1): 109-112.
    [12]
    RUEDA E, RIOS C. Experimental multiplexing approach via code key rotations under a joint transform correlator scheme[J]. Optics Communications, 2011, 284(7):2500-2504.
    [13]
    BARRERA J, HENAO R. Multiple image encryption using an aperture-modulated optical system[J]. Optics Communications, 2006, 261(1): 29-33.
    [14]
    SHEN X J, LIN Ch, KONG D Zh. Fresnel-transform holographic encryption based on angular ultiplexing and random-amplitude mask[J]. Optical Engineering, 2012, 51(6): 3286-3219.
    [15]
    MUNOZ-RODRIGUEZ J A. Computational cryptography based on trigonometric algorithms and intensity superposition[J]. Imaging Science Journal, 2010, 58(2): 61-80.
  • Related Articles

    [1]CHEN Song, WEN Yuxin, AN Haoming. Non-uniform illumination speckle image correction based on multi-scale bilateral filtering Retinex[J]. LASER TECHNOLOGY, 2025, 49(1): 33-40. DOI: 10.7510/jgjs.issn.1001-3806.2025.01.006
    [2]ZHANG Qiaoge, LOU Yuli, SONG Qinghe, GUI Jinbin, LI Chongguang. Comparative study on lens focal length measured with planar and spherical reference wave[J]. LASER TECHNOLOGY, 2017, 41(3): 421-426. DOI: 10.7510/jgjs.issn.1001-3806.2017.03.023
    [3]XU Guangxian, XU Shanqiang, GUO Xiaojuan, HUA Yiyang. Image compression-encryption algorithm combined DCT transform with DNA operation[J]. LASER TECHNOLOGY, 2015, 39(6): 806-810. DOI: 10.7510/jgjs.issn.1001-3806.2015.06.016
    [4]ZHANG Zhong-heng, LI Chong-guang, LI Jing-zhe, MIAO Zheng-xiang, LIU Ying. Phase compensation in lensless Fourier transform digital holography[J]. LASER TECHNOLOGY, 2013, 37(5): 596-600. DOI: 10.7510/jgjs.issn.1001-3806.2013.05.008
    [5]DING Xiang-ling. Asymmetric optical image cryptosystem based on spherical wave illumination[J]. LASER TECHNOLOGY, 2013, 37(5): 577-581. DOI: 10.7510/jgjs.issn.1001-3806.2013.05.004
    [6]ZHANG Xin-bao, LI Shou-ke. Study of laser beam deflection tolerance of divergent sphere Gaussian wave[J]. LASER TECHNOLOGY, 2008, 32(4): 437-440.
    [7]DENG Xiao-peng. Optical image encryption using double phase mask based on spherical wave illumination[J]. LASER TECHNOLOGY, 2006, 30(4): 442-444.
    [8]LIU Bo, LÜ Bai-da. Intensity distribution of converging spherical waves passing through an annular aperture[J]. LASER TECHNOLOGY, 2005, 29(1): 77-79,93.
    [9]Zeng Yangsu, Zhang Yixiao, Gao Feng, Xie Shiwei, Guo Yongkang. Double exposure fractional Fourier transform hologram[J]. LASER TECHNOLOGY, 2002, 26(1): 38-40.
    [10]Shen Xueju, Wang Yuefeng, Ren Hongyan. Fractional Fourier transformation implemented by Fresnel diffraction with converging spherical wave illumination[J]. LASER TECHNOLOGY, 1999, 23(3): 180-182.

Catalog

    Article views (6) PDF downloads (8) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return