2012
DOI: 10.1364/ao.51.005253
|View full text |Cite
|
Sign up to set email alerts
|

Binary image encryption based on interference of two phase-only masks

Abstract: Optical image encryption based on interference has attracted a lot of attention recently. The technique employs two pure phase masks derived from the complex field of the image in the Fresnel diffraction domain. The image decryption procedure can be carried out by inverse Fresnel transformation of the summation of two pure phase masks. However, the silhouette of the original image, which is recovered by either of the two phase-only masks, impedes the application of this technique. In this paper, a very simple … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
7
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(7 citation statements)
references
References 23 publications
0
7
0
Order By: Relevance
“…Recently, an extremely simple method for binary image encryption based on interference of two POMs is proposed without any silhouette problem. The binary image in combination with a random phase mask is separated into two POMs directly, and the decryption by summation of the two masks can be performed digitally or optically [34].…”
Section: Introductionmentioning
confidence: 99%
“…Recently, an extremely simple method for binary image encryption based on interference of two POMs is proposed without any silhouette problem. The binary image in combination with a random phase mask is separated into two POMs directly, and the decryption by summation of the two masks can be performed digitally or optically [34].…”
Section: Introductionmentioning
confidence: 99%
“…With these methods, images can be encoded into several phase-only masks (POMs), the main underlying motivations stemming from the attempts to avoid the complexity of an all-optical implementation and improve security. Compared with those encryption methods based on iterative phase retrieval algorithms, the interference-based imagehiding method is simpler and its computing weight is much lighter [15][16][17][18][19][20][21][22][23][24][25][26][27][28][29]. Zhang and Wang first encrypted an original image into two POMs analytically based on the optical interference principle for the first time [15].…”
Section: Introductionmentioning
confidence: 99%
“…The silhouette problem arises because of the tight constraint between the two phase masks and the complex field of the Fresnel-transformed image. Several security-enhancement or silhouetteremoval methods have been developed [28][29][30][31][32][33][34][35][36][37].…”
Section: Introductionmentioning
confidence: 99%
“…In the earlier interference-based encryption methods [28][29][30][31][32][33][34], the information of the Fourier spectrum of the target image is divided into two POMs. The corresponding effects of the two parts on the silhouette problem are compared.…”
Section: Introductionmentioning
confidence: 99%