Role of phase key in the double random phase encoding technique: an error analysis.

School of Electrical, Electronic and Mechanical Engineering, College of Engineering, Mathematics and Physical Sciences, Optoelectronic Research Centre, University College Dublin, Belfield, Dublin 4, Ireland.
Applied Optics (Impact Factor: 1.69). 07/2008; 47(21):3808-16. DOI: 10.1364/AO.47.003808
Source: PubMed

ABSTRACT We perform a numerical analysis of the double random phase encryption-decryption technique to determine how, in the case of both amplitude and phase encoding, the two decryption keys (the image- and Fourier-plane keys) affect the output gray-scale image when they are in error. We perform perfect encryption and imperfect decryption. We introduce errors into the decrypting keys that correspond to the use of random distributions of incorrect pixel values. We quantify the effects that increasing amounts of error in the image-plane key, the Fourier-plane key, and both keys simultaneously have on the decrypted image. Quantization effects are also examined.

  • [Show abstract] [Hide abstract]
    ABSTRACT: In recent years, various studies have been conducted to illustrate the vulnerability of double random phase encoding (DRPE). In this paper, we propose a novel method via phase reservation and compression to enhance DRPE security. Only a compressed phase distribution is available in the CCD plane, and the amplitude component is not available or requested for optical decryption. Since only noise-like distributions can be obtained by using the correct security keys during optical decryption, a nonlinear correlation algorithm is further applied for authenticating the decrypted image. It is demonstrated that valid conditions for attack algorithms are broken and high security can be achieved for the DRPE system.
    Journal of optics 01/2014; 16(2). · 2.01 Impact Factor
  • [Show abstract] [Hide abstract]
    ABSTRACT: Information security with optical means, such as double random phase encoding, has been investigated by various researchers. It has been demonstrated that optical technology possesses several unique characteristics for securing information compared with its electronic counterpart, such as many degrees of freedom. In this paper, we present a review of optical technologies for information security. Optical security systems are reviewed, and theoretical principles and implementation examples are presented to illustrate each optical security system. In addition, advantages and potential weaknesses of each optical security system are analyzed and discussed. It is expected that this review not only will provide a clear picture about current developments in optical security systems but also may shed some light on future developments.
    Advances in Optics and Photonics 06/2014; 6(2). · 9.69 Impact Factor
  • [Show abstract] [Hide abstract]
    ABSTRACT: In this paper, we propose a novel input wave front modulation method to enhance the security level of a Mach-Zender interferometer-based Fourier encryption system. The input data is encoded in the two wave fronts propagated in the arms of the interferometer. Both arms contain a 4f setup, and two independent Fourier keys are used to encrypt these wave fronts. During decryption the encrypted wave fronts are propagated through the interferometer. In the case when correct Fourier keys are used for decryption, the reconstructed data page is shown by the interference pattern of the output. We propose a method to synthesize two phase modulated input images for this cryptosystem. The modulation method has a user defined phase parameter. We prove that the security level of the proposed cryptosystem can be significantly improved compared with previous solutions, by using an optimally chosen phase parameter.
    Applied Optics 02/2014; 53(5):798-805. · 1.69 Impact Factor