2006
DOI: 10.1364/ol.31.002562
|View full text |Cite
|
Sign up to set email alerts
|

Optical encryption using phase-shifting interferometry in a joint transform correlator

Abstract: We propose an optical encryption technique where the encrypted field and the decrypting key are obtained by three-step phase-shifting interferometry and registered as digital Fresnel holograms in a joint transform correlator architecture. Decryption can be achieved by digital or optical means. The technique allows the complete process to be achieved at high speed and data to be transfered via digital communication channels. Experimental implementation is performed in a system based on a programmable liquid-cry… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0
2

Year Published

2011
2011
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 60 publications
(18 citation statements)
references
References 16 publications
0
16
0
2
Order By: Relevance
“…The SLM , PZT and CCD are controlled by a computer. [1,30]. It should be pointed out that in the path of the reference wave the PZT is used to change the phase of the reference wave.…”
Section: Methods Descriptionmentioning
confidence: 99%
“…The SLM , PZT and CCD are controlled by a computer. [1,30]. It should be pointed out that in the path of the reference wave the PZT is used to change the phase of the reference wave.…”
Section: Methods Descriptionmentioning
confidence: 99%
“…Then the complex amplitude distribution of the reference beam at the exit of the interferometer can be expressed by URfalse(x,y;αfalse)=expfalse(iαfalse)·FRTλ,zfalse{expfalse[iϕ2false(x,yfalse)false]false}, where FRT λ, d {·} denotes the Fresnel diffraction with the illumination wavelength of λ and the distance of z. α is the relative phase changes introduced by the retarder plates on the reference beam. Let U O ( x, y ) = A O exp [iϕ O ( x, y )], U R ( x , y , α) = A R exp { i [ ϕ R ( x, y ) + α]}, then the intensity pattern recorded by the CCD camera is given by Ifalse(x,y;αfalse)=false|UOfalse(x,yfalse)+URfalse(x,y;αfalse)|2=false[AOfalse(x,yfalse)false]2+false[ARfalse(x,yfalse)false]2+2AOfalse(x,yfalse)ARfalse(x,yfalse)×cosfalse[ϕOfalse(x,yfalse)ϕRfalse(x,yfalse)αfalse]. In this way, the phase ϕ E ( x , y ) and the amplitude A E ( x, y ) of the ciphertext can be recorded with the interferograms as follows: 22,23 ϕEfalse(x,yfalse)=arctantrue[Ifalse(x,y;3π/2false)Ifalse(x,y;π/2false)Ifalse(x,y;0false)Ifalse(x,y;πfalse)true], AEfalse(x,yfalse)=14Ifalse(x,y;0false)Ifalse(x,y;πfalse)cosfalse[ϕOfalse(x,yfalse)ϕRfalse(x,yfalse)…”
Section: Security Analysis Of the Encryption And Decryption Proceduresmentioning
confidence: 99%
“…Much effort has been made on the construction of high-security-level and feasible cryptosystems based on the PSI technique, 1922 owing to the following advantages: 1. The complex-value ciphertext is recorded with a group of intensity-only interferograms, which facilitate the storage and transmission; 2.…”
Section: Introductionmentioning
confidence: 99%
“…Subsequently, JTC systems have been thoroughly studied and elaborate structures have been proposed [2,3]. Further, Mela and Lemmi introduced an optical encryption technique using three-step phase-shifting interferometry based on JTC in the Fresnel domain [4]. The technique allows a high-speed encryption-decryption process for binary data and is able to operate in a robust and extremely simple optoelectronic system.…”
Section: Introductionmentioning
confidence: 99%