DOI QR코드

DOI QR Code

2-step Phase-shifting Digital Holographic Optical Encryption and Error Analysis

  • Jeon, Seok-Hee (Department of Electronic Engineering, The University of Incheon) ;
  • Gil, Sang-Keun (Department of Electronic Engineering, The University of Suwon)
  • Received : 2011.08.23
  • Accepted : 2011.09.06
  • Published : 2011.09.25

Abstract

We propose a new 2-step phase-shifting digital holographic optical encryption technique and analyze tolerance error for this cipher system. 2-step phase-shifting digital holograms are acquired by moving the PZT mirror with phase step of 0 or ${\pi}$/2 in the reference beam path of the Mach-Zehnder type interferometer. Digital hologram with the encrypted information is Fourier transform hologram and is recorded on CCD camera with 256 gray-level quantized intensities. The decryption performance of binary bit data and image data is analyzed by considering error factors. One of the most important errors is quantization error in detecting the digital hologram intensity on CCD. The more the number of quantization error pixels and the variation of gray-level increase, the more the number of error bits increases for decryption. Computer experiments show the results to be carried out encryption and decryption with the proposed method and the graph to analyze the tolerance of the quantization error in the system.

Keywords

References

  1. B. Javidi and J. L. Horner, "Optical pattern recognition for validation and security verification," Opt. Eng. 33, 1752-1756 (1994). https://doi.org/10.1117/12.170736
  2. J. F. Heanue, M. C. Bashaw, and L. Hesselink, "Encrypted holographic data storage based on orthogonal-phase-code multiplexing," Appl. Opt. 34, 6012-6015 (1995). https://doi.org/10.1364/AO.34.006012
  3. P. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995). https://doi.org/10.1364/OL.20.000767
  4. B. Javidi, A. Sergent, and E. Ahouzi, "Performance of double phase encoding encryption technique using binarized encrypted images," Opt. Eng. 37, 565-569 (1998). https://doi.org/10.1117/1.601645
  5. D. Weber and J. Trolinger, "Novel implementation of nonlinear joint transform correlators in optical security and validation," Opt. Eng. 38, 62-68 (1999). https://doi.org/10.1117/1.602062
  6. E. Cuche, F. Bevilacqua, and C. Depeursinge, "Digital holography for quantitative phase-contrast imaging," Opt. Lett. 24, 291-293 (1999). https://doi.org/10.1364/OL.24.000291
  7. B. Javidi and T. Nomura, "Securing information by means of digital holography," Opt. Lett. 25, 28-30 (2000). https://doi.org/10.1364/OL.25.000028
  8. G. Unnikrishnan and K. Singh, "Double random fractional Fourier domain encoding for optical security," Opt. Eng. 39, 2853-2859 (2000). https://doi.org/10.1117/1.1313498
  9. G.-S. Lin, H. T. Chang, W.-N. Lie, and C.-H. Chuang, "Public-key-based optical image cryptosystem based on data embedding techniques," Opt. Eng. 42, 2331-2339 (2003). https://doi.org/10.1117/1.1588660
  10. U. Schnars and W. Jueptner, "Direct recording of holograms by a CCD target and numerical reconstruction," Appl. Opt. 33, 179-181 (1994). https://doi.org/10.1364/AO.33.000179
  11. P. Hariharan, "Digital phase-shifting interferometry : a simple error compensating phase calculation algorithm," Appl. Opt. 26, 2504-0505 (1987). https://doi.org/10.1364/AO.26.002504
  12. I. Yamaguchi and T. Zhang, "Phase-shifting digital holography," Opt. Lett. 22, 610-612 (1998).
  13. H. J. Lee and S. G. Gil, "Error analysis for optical security by means of 4-step phase-shfting digital hologaphy," J. Opt. Soc. Korea 10, 118-123 (2006). https://doi.org/10.3807/JOSK.2006.10.3.118
  14. S. K. Gil, S. H. Jeon, N. Kim, and J. R. Jeong, "Successive encryption and transmission with phase-shifting digital holography," Proc. SPIE 6136, 339-346 (2006).
  15. S. K. Gil, H. J. Byun, H. J. Lee, S. H. Jeon, and J. R. Jeong, "Optical encryption of binary data information with 2-step phase-shifting digital holography," Proc. SPIE 6488, 648812 (2007).
  16. J.-P. Liu, T.-C. Poon, G.-S. Jhou, and P.-J. Chen, "Comparison of two-, three, and four-exposure guadrature phase-shifting holography," Appl. Opt. 50, 2443-2450 (2011). https://doi.org/10.1364/AO.50.002443
  17. M.-O. Jeong, N. Kim, and J.-H. Park, "Elemental image synthesis for integral imaging using phase-shifting digital holography," J. Opt. Soc. Korea 12, 275-280 (2008). https://doi.org/10.3807/JOSK.2008.12.4.275
  18. S. H. Jeon, Y. G. Hwang, and S. K. Gil, "Optical encryption of gray-level image using on-axis and 2-f digital holography with two-step phase-shifting method," Opt. Rev. 15, 181-186 (2008). https://doi.org/10.1007/s10043-008-0029-5
  19. S. H. Jeon and S. K. Gil, "Measurement of a mirror surface topography using 2-frame phase-shifting digital interferometry," J. Opt. Soc. Korea 13, 245-250 (2009). https://doi.org/10.3807/JOSK.2009.13.2.245
  20. S. H. Jeon and S. K. Gil, "QPSK modulation based optical image cryptosystem using phase-shifting digital holography," J. Opt. Soc. Korea 14, 97-103 (2010). https://doi.org/10.3807/JOSK.2010.14.2.097

Cited by

  1. 2-step Quadrature Phase-shifting Digital Holographic Optical Encryption using Orthogonal Polarization and Error Analysis vol.16, pp.4, 2012, https://doi.org/10.3807/JOSK.2012.16.4.354
  2. Image/video encryption using single shot digital holography vol.342, 2015, https://doi.org/10.1016/j.optcom.2014.12.082
  3. Optical Secret Key Sharing Method Based on Diffie-Hellman Key Exchange Algorithm vol.18, pp.5, 2014, https://doi.org/10.3807/JOSK.2014.18.5.477
  4. Optical Image Encryption Based on Mixed Chaotic Maps and Single-Shot Digital Holography vol.23, pp.2, 2017, https://doi.org/10.1007/s12209-017-0036-3
  5. Optical Implementation of Triple DES Algorithm Based on Dual XOR Logic Operations vol.17, pp.5, 2013, https://doi.org/10.3807/JOSK.2013.17.5.362
  6. Fast non-interferometric iterative phase retrieval for holographic data storage vol.25, pp.25, 2017, https://doi.org/10.1364/OE.25.030905
  7. Dual Optical Encryption for Binary Data and Secret Key Using Phase-shifting Digital Holography vol.16, pp.3, 2012, https://doi.org/10.3807/JOSK.2012.16.3.263
  8. Three-dimensional information encryption and anticounterfeiting using digital holography vol.54, pp.1, 2015, https://doi.org/10.1364/AO.54.000A84
  9. Optical Image Split-encryption Based on Object Plane for Completely Removing the Silhouette Problem vol.17, pp.5, 2013, https://doi.org/10.3807/JOSK.2013.17.5.384
  10. Proposal for Optical One-time Password Authentication Using Digital Holography vol.20, pp.6, 2016, https://doi.org/10.3807/JOSK.2016.20.6.722
  11. Cascaded Fresnel holographic image encryption scheme based on a constrained optimization algorithm and Henon map vol.88, 2017, https://doi.org/10.1016/j.optlaseng.2016.07.012
  12. Optical implementation of cipher block chaining mode algorithm using phase-shifting digital holography vol.55, pp.12, 2016, https://doi.org/10.1117/1.OE.55.12.123112