KEYWORDS: Computer programming, Interferometry, Digital holography, Information security, Computer security, Holograms, Near field diffraction, Digital recording, Charge-coupled devices, Fourier transforms
An encoding algorithm is proposed for three-dimensional (3-D) information using optical asymmetric cryptosystem and
the digital interferometry. 3-D information can be treated as an ensemble composed of multiple points, and every point
spreads in a spatial limited field. Due to the free space coordinates, the encryption system of 3-D information can be
regarded as an optical asymmetric cryptosystem. We encrypt 3-D information with the double random phase-truncated
encoding, and then record the amplitude of ciphertext by digital interferometry. Computer simulations demonstrate the
feasibility and effective of the proposed method. This cryptosystem is also numerically tested with the incorrect keys, the
addition noise to the ciphertext, and spatial information occluded ciphertext. The proposed algorithm has three
advantages: the high efficiency of encryption, the safety provided by one added dimension, the increasing information
quantity and the optical asymmetric cryptosystems. The high robustness to the system is also achieved.
Multiple-image encryption by spatial information prechoosing and cascaded blocks scrambling is proposed. The
spatial information of secret multiple-image is pre-chosen in advance to effectively reduce the capacity burden of
following encryption system. It is conveniently achieved by selecting or compressing the spatial information of multiple
images to meet practical demands. Spatially pre-chosen multiple images are reformed to a new image. Cascaded double
random phase encoding system is used to encrypt the new image, and the blocks scrambling is operated at the input of
each sub-encoding system. Two main advantages are obtained: 1. Since the spatial information prechoosing enables the
whole system to afford much larger information capacity, the effective multiplexing capacity is improved greatly; 2. The
combination of blocks scrambling and cascaded random phase encoding not only ensure the much higher system
security, but also save the key space and easy the key to save and release compared with the methods by each pixel
scrambling. Computer simulations have shown the effectiveness of this method.
A new scheme for multiple binary image hiding is proposed. The digital methods of the bit-plane composition and
the jigsaw transform are both introduced into the double phase modulated system. By the combination of the digital and
the optical methods, the direct superposition of multiple images in most of present techniques is easily avoided. As a
result, the proposed scheme is available to hide sixteen binary images without any noises. It implies that a quite
satisfactory trade-off between the fidelity and the multiplexing capacity is achieved. According to the results of computer
simulations, we also analyze the performances of the proposed scheme including the security, the complexity and the
flexibility.
Three-dimensional information encryption based on the phase extraction and phase shifting interferometry is
proposed. The three-dimensional information with the pure amplitude and pure phase are constructed as the encryption
target. First the complex amplitude of the three-dimensional information is calculated under the scalar diffraction theory,
and its phase distribution is extracted independently. Then it is encrypted by the double random phase encoding, the
complex amplitude is recorded by using two-step of phase shifting interferometry. Computer simulations demonstrate
the feasibility, the robustness and the security of the proposed method. We analyze and simulate its resistance against the
known plaintext attack as well. Furthermore, it is implied the potential of applying this method for the three-dimensional
information encryption with much larger information quantity.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.