Share This Article:

A Robust Optical Encryption Method for Three-Dimensional Object Based on the Fresnel Transform

Abstract Full-Text HTML XML Download Download as PDF (Size:4078KB) PP. 313-319
DOI: 10.4236/opj.2015.511029    3,940 Downloads   4,258 Views   Citations

ABSTRACT

An optical encryption of three-dimensional (3D) object with digital holography was implemented. In the process of encryption, two holograms involved recording key information and 3D object were obtained. In the process of decryption, the 3D object was reconstructed from the two holograms by extracting the object and key information, followed by multiplication of the two holograms and inverse Fresnel transform numerically. The robustness of the method was also tested for different occlusions attacks and Gaussian noises. The results showed that the method was able to encrypt and decrypt the 3D object while being robust under different occlusions attacks and Gaussian noises.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

Liu, Y. , Jin, W. , Yang, X. , Wu, D. and Zhang, H. (2015) A Robust Optical Encryption Method for Three-Dimensional Object Based on the Fresnel Transform. Optics and Photonics Journal, 5, 313-319. doi: 10.4236/opj.2015.511029.

References

[1] Vilardy, J.M., Millán, M.S. and Pérez-Cabré, E. (2014) Nonlinear Optical Security System Based on a Joint Transform Correlator in the Fresnel Domain. Applied Optics, 53, 1674-1682.
http://dx.doi.org/10.1364/AO.53.001674
[2] Nelleri, A., Joseph, J. and Singh, K. (2007) Digital Fresnel Field Encryption for Three-Dimensional Information Security. Optical Engineering, 46, Article ID: 045801.
http://dx.doi.org/10.1117/1.2727377
[3] Liu, J., Jin, H.Z., Ma, L.H., Li, Y. and Jin, W.M. (2013) Optical Color Image Encryption Based on Computer Generated Hologram and Chaotic Theory. Optics Communications, 307, 76-79.
http://dx.doi.org/10.1016/j.optcom.2013.06.009
[4] Mehra, I., Rajput, S.K. and Nishchal, N.K. (2013) Collision in Fresnel Domain Asymmetric Cryptosystem Using Phase Truncation and Authentication Verification. Optical Engineering, 52, Article ID: 028202.
http://dx.doi.org/10.1117/1.OE.52.2.028202
[5] Liu, S. and Sheridan, J.T. (2013) Optical Encryption by Combining Image Scrambling Techniques in Fractional Fourier Domains. Optics Communications, 287, 73-80.
http://dx.doi.org/10.1016/j.optcom.2012.09.033
[6] Koppa, P. (2007) Phase-to-Amplitude Data Page Conversion for Holographic Storage and Optical Encryption. Applied Optics, 46, 3561-3571.
http://dx.doi.org/10.1364/AO.46.003561
[7] Zhu, N., Wang, Y.T., Liu, J., Xie, J.H. and Zhang, H. (2009) Optical Image Encryption Based on Interference of Polarized Light. Optics Express, 17, 13418-13424.
http://dx.doi.org/10.1364/OE.17.013418
[8] Han, Y.J. and Zhang, Y.H. (2010) Optical Image Encryption Based on Two Beams’ Interference. Optics Communications, 283, 1690-1692.
http://dx.doi.org/10.1016/j.optcom.2009.12.060
[9] Nomura, T. and Javidi, B. (2000) Optical Encryption Using a Joint Transform Correlator Architecture. Optical Engineering, 39, 2031-2035.
http://dx.doi.org/10.1117/1.1304844
[10] Lu, D. and Jin, W.M. (2011) Color Image Encryption Based on Joint Fractional Fourier Transform Correlator. Optical Engineering, 50, Article ID: 068201.
http://dx.doi.org/10.1117/1.3590724
[11] Marron, J.C., Kendrick, R.L., Seldomridge, N.S., Grow, T.D. and Hoft, T.A. (2009) Atmospheric Turbulence Correction Using Digital Holographic Detection: Experimental Results. Optics Express, 17, 11638-11651.
http://dx.doi.org/10.1364/oe.17.011638
[12] Yamaguchi, I. and Zhang, T. (1997) Phase-Shifting Digital Holography. Optics Letters, 22, 1268-1270.
http://dx.doi.org/10.1364/OL.22.001268
[13] Barrera, J.F., Tebaldi, M., Ríos, C., Rueda, E., Bolognini, N. and Torroba, B. (2012) Experimental Multiplexing of Encrypted Movies Using a JTC Architecture. Optics Express, 20, 3388-3393. http://dx.doi.org/10.1364/OE.20.003388
[14] Rueda, E., Ríos, C., Barrera, J.F. and Torroba, B. (2012) Master Key Generation to Avoid the Use of an External Reference Wave in an Experimental JTC Encrypting Architecture. Applied Optics, 51, 1822-1827.
http://dx.doi.org/10.1364/AO.51.001822
[15] Wang, X.G. and Zhao, D.M. (2006) Image Encryption Based on Anamorphic Fractional Fourier Transform and Three-Step Phase-Shifting Interferometry. Optics Communications, 268, 240-244.
http://dx.doi.org/10.1016/j.optcom.2006.07.024
[16] He, M.Z., Cai, L.Z., Liu, Q. and Yang, X.L. (2005) Phase-Only Encryption and Watermarking Based on Phase-Shifting Interferometry. Applied Optics, 44, 2600-2606.
http://dx.doi.org/10.1364/AO.44.002600
[17] Meng, X.F., Cai, L.Z., Xu, X.F., Yang, X.L., Shen, X.X., Dong, G.Y. and Wang, Y.R. (2006) Two-Step Phase-Shifting Interferometry and Its Application in Image Encryption. Optics Letters, 31, 1414-1416.
http://dx.doi.org/10.1364/OL.31.001414
[18] Tajahuerce, E., Matoba, O., Verrall, S.C. and Javidi, B. (2000) Optoelectronic Information Encryption with Phase-Shifting Interferometry. Applied Optics, 39, 2313-2320.
http://dx.doi.org/10.1364/AO.39.002313
[19] Tajahuerce, E. and Javidi, B. (2000) Encrypting Three-Dimensional Information with Digital Holography. Applied Optics, 39, 6595-6601.
http://dx.doi.org/10.1364/AO.39.006595
[20] Kim, H., Kim, D.H. and Lee, Y.H. (2004) Encryption of Digital Hologram of 3D Object by Virtual Optics. Optics Express, 12, 4912-4921.
http://dx.doi.org/10.1364/OPEX.12.004912
[21] Javidi, B. and Nomura, T. (2000) Securing Information by Use of Digital Holography. Optics Letters, 25, 28-30. http://dx.doi.org/10.1364/OL.25.000028
[22] Tian, Q. (2007) Speckle Reduction and Three-Dimensional Reconstruction Image of Digital Holography (in Chinese). MS Thesis, Zhejiang Normal University, Jinhua, 16-22.

  
comments powered by Disqus

Copyright © 2018 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.