Article

Role of phase key in the double random phase encoding technique: an error analysis

School of Electrical, Electronic and Mechanical Engineering, College of Engineering, Mathematics and Physical Sciences, Optoelectronic Research Centre, University College Dublin, Belfield, Dublin 4, Ireland.
Applied Optics (Impact Factor: 1.69). 07/2008; 47(21):3808-16. DOI: 10.1364/AO.47.003808
Source: PubMed

ABSTRACT We perform a numerical analysis of the double random phase encryption-decryption technique to determine how, in the case of both amplitude and phase encoding, the two decryption keys (the image- and Fourier-plane keys) affect the output gray-scale image when they are in error. We perform perfect encryption and imperfect decryption. We introduce errors into the decrypting keys that correspond to the use of random distributions of incorrect pixel values. We quantify the effects that increasing amounts of error in the image-plane key, the Fourier-plane key, and both keys simultaneously have on the decrypted image. Quantization effects are also examined.

0 Followers
 · 
101 Views
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Selective computational ghost imaging (SCGI) is a technique which enables the reconstruction of an N-pixel image from N measurements or less. In this paper we propose an optical encryption method based on SCGI and experimentally demonstrate that this method has much higher security under eavesdropping and unauthorized accesses compared with previous reported methods.
    Journal of optics 09/2014; 16(10):105405. DOI:10.1088/2040-8978/16/10/105405 · 2.01 Impact Factor
  • [Show abstract] [Hide abstract]
    ABSTRACT: Information security with optical means, such as double random phase encoding, has been investigated by various researchers. It has been demonstrated that optical technology possesses several unique characteristics for securing information compared with its electronic counterpart, such as many degrees of freedom. In this paper, we present a review of optical technologies for information security. Optical security systems are reviewed, and theoretical principles and implementation examples are presented to illustrate each optical security system. In addition, advantages and potential weaknesses of each optical security system are analyzed and discussed. It is expected that this review not only will provide a clear picture about current developments in optical security systems but also may shed some light on future developments.
    Advances in Optics and Photonics 06/2014; 6(2). DOI:10.1364/AOP.6.000120 · 9.69 Impact Factor
  • [Show abstract] [Hide abstract]
    ABSTRACT: In this paper, we propose a novel input wave front modulation method to enhance the security level of a Mach-Zender interferometer-based Fourier encryption system. The input data is encoded in the two wave fronts propagated in the arms of the interferometer. Both arms contain a 4f setup, and two independent Fourier keys are used to encrypt these wave fronts. During decryption the encrypted wave fronts are propagated through the interferometer. In the case when correct Fourier keys are used for decryption, the reconstructed data page is shown by the interference pattern of the output. We propose a method to synthesize two phase modulated input images for this cryptosystem. The modulation method has a user defined phase parameter. We prove that the security level of the proposed cryptosystem can be significantly improved compared with previous solutions, by using an optimally chosen phase parameter.
    Applied Optics 02/2014; 53(5):798-805. DOI:10.1364/AO.53.000798 · 1.69 Impact Factor