Acta Optica Sinica, Volume. 43, Issue 9, 0910001(2023)

Position-Multiplexing-Based Double-Image Encryption in Cascaded Double-Phase Encoding Cryptosystem

Yi Qin1,2, Yuhong Wan1、*, and Qiong Gong2
Author Affiliations
  • 1Faculty of Science, Beijing University of Technology, Beijing 100124, China
  • 2College of Mechanical and Electrical Engineering, Nanyang Normal University, Nanyang 473061, Henan , China
  • show less
    References(26)

    [1] Refregier P, Javidi B. Optical image encryption based on input plane and Fourier plane random encoding[J]. Optics Letters, 20, 767-769(1995).

    [2] Hazer A, Yildirim R. A review of single and multiple optical image encryption techniques[J]. Journal of Optics, 23, 113501(2021).

    [3] Qin Y, Wan Y H, Wan S J et al. Optical compressive encryption via deep learning[J]. IEEE Photonics Journal, 13, 7800208(2021).

    [4] Tao Y, Zhu Y P, Yang D Y et al. Remote optical information authentication system based on visual cryptography[J]. Acta Optica Sinica, 41, 1607001(2021).

    [5] Wang Y, Niu H W. Adaptive image block hiding technology based on optical spatial-frequency domain transform[J]. Laser&Optoelectronics Progress, 58, 1609001(2021).

    [6] Bao Z J, Xue R. Optical image encryption method based on autoencoder[J]. Laser&Optoelectronics Progress, 58, 2210011(2021).

    [7] Wu J, Wang G, Xu G. Color image encryption method based on computer generated hologram and chaos[J]. Acta Optica Sinica, 41, 1909001(2021).

    [8] Sun B Q, Wang Y P. Temporal ghost imaging and its application[J]. Chinese Journal of Lasers, 48, 1212001(2021).

    [9] Javidi B, Carnicer A, Yamaguchi M et al. Roadmap on optical security[J]. Journal of Optics, 18, 083001(2016).

    [10] Peng X, Wei H Z, Zhang P[M]. Introduction to optical security(2008).

    [11] Nomura T, Javidi B. Optical encryption using a joint transform correlator architecture[J]. Optical Engineering, 39, 2031-2035(2000).

    [12] Chen W, Chen X D, Sheppard C J R. Optical image encryption based on diffractive imaging[J]. Optics Letters, 35, 3817-3819(2010).

    [13] Shi Y S, Yang X B. Optical hiding with visual cryptography[J]. Journal of Optics, 19, 115703(2017).

    [14] Yang N, Gao Q K, Shi Y S. Visual-cryptographic image hiding with holographic optical elements[J]. Optics Express, 26, 31995-32006(2018).

    [15] Wu J J, Wang J C, Nie Y G et al. Multiple-image optical encryption based on phase retrieval algorithm and fractional Talbot effect[J]. Optics Express, 27, 35096-35107(2019).

    [16] Zhang Y, Wang B. Optical image encryption based on interference[J]. Optics Letters, 33, 2443-2445(2008).

    [17] Chang H T, Lu W C, Kuo C J. Multiple-phase retrieval for optical security systems by use of random-phase encoding[J]. Applied Optics, 41, 4825-4834(2002).

    [18] Wang R K, Watson I A, Chatwin C R. Random phase encoding for optical security[J]. Optical Engineering, 35, 2464-2469(1996).

    [19] Li Y, Kreske K, Rosen J. Security and encryption optical systems based on a correlator with significant output images[J]. Applied Optics, 39, 5295-5301(2000).

    [20] Situ G H, Zhang J J. A cascaded iterative Fourier transform algorithm for optical security applications[J]. Optik, 114, 473-477(2003).

    [21] Situ G H, Zhang J J. A lensless optical security system based on computer-generated phase only masks[J]. Optics Communications, 232, 115-122(2004).

    [22] Lü W J, Sun X, Yang D et al. Optical multiple information hiding via azimuth multiplexing[J]. Optics and Lasers in Engineering, 141, 106574(2021).

    [23] Lu Z, Lü W, Zhu Y et al. Optical information encryption based on partially-update iterative system with azimuth multiplexing[J]. Optics Communications, 510, 127899(2022).

    [24] Alvarez G, Li S J. Some basic cryptographic requirements for chaos-based cryptosystems[J]. International Journal of Bifurcation and Chaos, 16, 2129-2151(2006).

    [25] Yang G Z, Gu B Y. On the amplitude-phase retrieval problem in optical systems[J]. Acta Physica Sinica, 30, 410-413(1981).

    [26] Ghiglia D C, Pritt M D[M]. Two-dimensional phase unwrapping: theory, algorithms, and software(1998).

    Tools

    Get Citation

    Copy Citation Text

    Yi Qin, Yuhong Wan, Qiong Gong. Position-Multiplexing-Based Double-Image Encryption in Cascaded Double-Phase Encoding Cryptosystem[J]. Acta Optica Sinica, 2023, 43(9): 0910001

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category: Image Processing

    Received: Oct. 9, 2022

    Accepted: Nov. 25, 2022

    Published Online: May. 9, 2023

    The Author Email: Wan Yuhong (yhongw@bjut.edu.cn)

    DOI:10.3788/AOS221800

    Topics