Encryption of volume holograms using complementary input images and a binary key
نویسنده
چکیده
Technical Group members are being offered the option of receiving the Optics in Information Systems Newsletter electronically. An e-mail is being sent to all group members with the web location for this issue, and asking members to choose between the electronic and printed version for future issues. If you are a member and have not yet received this message, then SPIE does not have your correct e-mail address. To receive future issues electronically , please send your e-mail address to: [email protected] with the word OIS in the subject line of the message and the words electronic version in the body of the message. If you prefer to receive the newsletter in the printed format, but want to send your correct e-mail address for our database, include the words print version preferred in the body of your message. While most common implementations of cryptographic techniques are performed via electronic or computer-based algorithms , using parallel optical processing provides ciphered information with extremely-fast decryption speeds. To date, most of the proposed optical cryptographic methods have used classical macro-optical systems. Miniaturizing the optical components allows us to move towards systems that are more realistic for genuine application and potentially enables us to directly interface to microelectronic devices. We have demonstrated the miniaturization of the generalized phase-contrast (GPC) method 1-3 in a pla-nar-integrated micro-optics (PO) platform. 4-6 Implementing optical processes in this way allows coupled light to undergo free-space propagation between integrated micro-optical components. The GPC-PO device is therefore particularly robust and not prone to position tolerances and alignment problems: major issues when using discrete and macro-optical components. In the miniaturized setup, the GPC-based visu-alization of the decrypted pattern is achieved in a folded optical path configuration using the device shown in Figure 1. The mi-cro-lenses of the 4-f lens setup and the phase contrast filter (PCF) at the Fourier plane are integrated into a single optical flat. First, m u l t i p l e-p h a s e-l e v e l diffractive micro-optical elements are fabricated on the top side of a glass substrate using multi-mask lithography. The micro-lenses are then reflection-coated and fabricated using two binary lithographic steps that make up a four-phase-level diffractive optical element. The first micro-lens focuses the beam onto the Fourier plane where the reflection-coated circular PCF is positioned to introduce a π phase shift to the on-axis region of the focused light. The PCF …
منابع مشابه
A stack-based chaotic algorithm for encryption of colored images
In this paper, a new method is presented for encryption of colored images. This method is based on using stack data structure and chaos which make the image encryption algorithm more efficient and robust. In the proposed algorithm, a series of data whose range is between 0 and 3 is generated using chaotic logistic system. Then, the original image is divided into four subimages, and these four i...
متن کاملImage encryption based on chaotic tent map in time and frequency domains
The present paper is aimed at introducing a new algorithm for image encryption using chaotic tent maps and the desired key image. This algorithm consists of two parts, the first of which works in the frequency domain and the second, in the time domain. In the frequency domain, a desired key image is used, and a random number is generated, using the chaotic tent map, in order to change the phase...
متن کاملImage Encryption by Using Combination of DNA Sequence and Lattice Map
In recent years, the advancement of digital technology has led to an increase in data transmission on the Internet. Security of images is one of the biggest concern of many researchers. Therefore, numerous algorithms have been presented for image encryption. An efficient encryption algorithm should have high security and low search time along with high complexity.DNA encryption is one of the fa...
متن کاملIdentity Based Color Image Cryptography
An Identity based cryptography based on visual cryptography scheme was proposed for protecting color image. A color image to be protected and authentic entities such as account number, password, signature image are given as input. The binary key image is obtained by distributing the digital signature of obtained authentic entities. A secret color image which needs to be communicated is decompos...
متن کاملDual Optical Encryption for Binary Data and Secret Key Using Phase-shifting Digital Holography
In this paper, we propose a new dual optical encryption method for binary data and secret key based on 2-step phase-shifting digital holography for a cryptographic system. Schematically, the proposed optical setup contains two Mach-Zehnder type interferometers. The inner interferometer is used for encrypting the secret key with the common key, while the outer interferometer is used for encrypti...
متن کاملA New Method for Encryption of Color Images based on Combination of Chaotic Systems
This paper presents a new method for encryption of color images based on a combination of chaotic systems, which makes the image encryption more efficient and robust. The proposed algorithm generated three series of data, ranged between 0 and 255, using a chaotic Chen system. Another Chen system was then started with different initial values, which were converted to three series of numbers from...
متن کامل