2009
DOI: 10.1364/oe.17.013418
|View full text |Cite
|
Sign up to set email alerts
|

Optical image encryption based on interference of polarized light

Abstract: We proposed a novel architecture for optical image encryption based on interference between two polarized wavefronts. A polarization-selective diffractive optical element is employed to generate the desired polarized wavefronts by modulating the incident polarized light beam. The encryption algorithm for this new method is simple and does not need iterative encoding. Numerical simulation is performed to demonstrate the validity of this new proposed method.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
31
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 79 publications
(31 citation statements)
references
References 10 publications
0
31
0
Order By: Relevance
“…A popular optical encryption technique is based on double-random-phase encoding in a well-known 4-f coherent system (6), and many other optical encryption techniques, such as the use of fractional Fourier transform (7,8), Fresnel transform (9,10), gyrator transform (11,12), polarization (13) and diffractive imaging (14), have been investigated. Owing to the need to extract the amplitude and phase information, digital holography is often used to implement some of these ideas in a coherent system (15)(16)(17)(18)(19).…”
Section: Introductionmentioning
confidence: 99%
“…A popular optical encryption technique is based on double-random-phase encoding in a well-known 4-f coherent system (6), and many other optical encryption techniques, such as the use of fractional Fourier transform (7,8), Fresnel transform (9,10), gyrator transform (11,12), polarization (13) and diffractive imaging (14), have been investigated. Owing to the need to extract the amplitude and phase information, digital holography is often used to implement some of these ideas in a coherent system (15)(16)(17)(18)(19).…”
Section: Introductionmentioning
confidence: 99%
“…The main motivation for using optics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make information encryption more secure and more difficult to attack. Several methods for optical image encryption have been proposed such as those based on digital holography [11,12], virtual optics [13], diffractive imaging [14], ghost imaging [15], ptychography [16], interferometry [17], polarization [18,19], photon-counting [20], etc. In 1995, RefrĂ©gier and Javidi [21], proposed the 'double random phase encoding' (DRPE) scheme.…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, due to the high-speed processing and parallel ability, the optical information security has drawn more and more attention with the rapid development of information technology, since the double random phase encoding (DRPE) scheme was invented by Refregier and Javidi [1]; some other optical information processing techniques or transforms, such as digital holography [2,3], fractional Fourier transform [4][5][6], phase-shifting interferometry [7,8], phase retrieval [9][10][11][12], Fresnel transform [13,14], gyrator transform [15], fractional Mellin transform [16], joint transform correlator [17], two beam's interference [18,19], diffractive imaging [20], polarization encoding [21], aperture movement [22], phase reservation and compression [23], ghost imaging [24], have been combined with DRPE to build more versatile security systems.…”
Section: Introductionmentioning
confidence: 99%