Laser & Optoelectronics Progress, Volume. 60, Issue 10, 1010016(2023)

Multipleimage Polarization Encryption Method Based on Light Field Regulation and Frequency Shifting

Di Zhang1, Nana Yu1, Sixing Xi1、*, Liying Lang2, Xiaolei Wang3, and Huanzhen Zhang1
Author Affiliations
  • 1School of Mathematics and Physics Science and Engineering, Hebei University of Engineering, Handan 056038, Hebei , China
  • 2Advanced Laser Technology Research Center, Hebei University of Technology, Tianjin 300401, China
  • 3Institute of Modern Optics, Nankai University, Tianjin 300350, China
  • show less
    References(40)

    [1] Refregier P, Javidi B. Optical image encryption based on input plane and Fourier plane random encoding[J]. Optics Letters, 20, 767-769(1995).

    [2] Deng X P, Zhao D M. Single-channel color image encryption based on asymmetric cryptosystem[J]. Optics & Laser Technology, 44, 136-140(2012).

    [3] Liu Z J, Guo C, Tan J B et al. Securing color image by using phase-only encoding in Fresnel domains[J]. Optics and Lasers in Engineering, 68, 87-92(2015).

    [4] Abuturab M R. An asymmetric single-channel color image encryption based on Hartley transform and gyrator transform[J]. Optics and Lasers in Engineering, 69, 49-57(2015).

    [5] Qin W, Peng X. Asymmetric cryptosystem based on phase-truncated Fourier transforms[J]. Optics Letters, 35, 118-120(2010).

    [6] Rajput S K, Nishchal N K. Image encryption based on interference that uses fractional Fourier domain asymmetric keys[J]. Applied Optics, 51, 1446-1452(2012).

    [7] Wang X G, Zhao D M. A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms[J]. Optics Communications, 285, 1078-1081(2012).

    [8] Rajput S K, Nishchal N K. Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform[J]. Applied Optics, 52, 871-878(2013).

    [9] Wang X G, Chen Y X, Dai C Q et al. Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform[J]. Applied Optics, 53, 208-213(2014).

    [10] He M Z, Cai L Z, Liu Q et al. Multiple image encryption and watermarking by random phase matching[J]. Optics Communications, 247, 29-37(2005).

    [11] Situ G H, Zhang J J. Position multiplexing for multiple-image encryption[J]. Journal of Optics A Pure and Applied Optics, 8, 391-397(2006).

    [12] Shi Y S, Zhang J J. Research on the phase retrieval algorithm used for multiple-image encryption with region multiplexing[J]. Acta Optica Sinica, 29, 2705-2708(2009).

    [13] Hwang H E, Chang H T, Lie W N. Multiple-image encryption and multiplexing using a modified Gerchberg-Saxton algorithm and phase modulation in Fresnel-transform domain[J]. Optics Letters, 34, 3917-3919(2009).

    [14] Qin Y, Li J, Ma M F et al. System for optical multiple binary image encryption by random phase mask multiplexing[J]. Acta Optica Sinica, 34, 0307001(2014).

    [15] Guo F P, Li J, Gong Q et al. Color image encryption by additional key multiplexing[J]. Journal of Applied Optics, 35, 626-631(2014).

    [16] Wang H J, Qin Y, Huang Y D et al. Multiple-image encryption and authentication in interference-based scheme by aid of space multiplexing[J]. Optics & Laser Technology, 95, 63-71(2017).

    [17] Goodman J W, Lawrence R W. Digital image formation from electronically detected holograms[J]. Applied Physics Letters, 11, 77-79(1967).

    [18] Shen X J, Lin C, Kong D Z. Fresnel-transform holographic encryption based on angular multiplexing and random-amplitude mask[J]. Optical Engineering, 51, 068201(2012).

    [19] Xu D S, Lu M, Jia C Z et al. Angular-multiplexing optical multiple-image encryption based on digital holography and random amplitude mask[J]. Journal of Russian Laser Research, 38, 285-293(2017).

    [20] Di H, Zheng K F, Zhang X et al. Multiple-image encryption by compressive holography[J]. Applied Optics, 51, 1000-1009(2012).

    [21] Wan Y H, Wu F, Yang J H et al. Multiple-image encryption based on compressive holography using a multiple-beam interferometer[J]. Optics Communications, 342, 95-101(2015).

    [22] Wu J, Wang G, Xu G. Color image encryption method based on computer generated hologram and chaos[J]. Acta Optica Sinica, 41, 1909001(2021).

    [23] Liu X Y, Cao Y P, Lu P et al. Optical image encryption technique based on compressed sensing and Arnold transformation[J]. Optik, 124, 6590-6593(2013).

    [24] Deepan B, Quan C, Wang Y et al. Multiple-image encryption by space multiplexing based on compressive sensing and the double-random phase-encoding technique[J]. Applied Optics, 53, 4539-4547(2014).

    [25] Wang M T, Zhou X, Hu Y J et al. A new multiple-image encryption method based on compressive sensing[J]. Laser Journal, 37, 38-41(2016).

    [26] Fridrich J. Symmetric ciphers based on two-dimensional chaotic maps[J]. International Journal of Bifurcation and Chaos, 8, 1259-1284(1998).

    [27] Tang Z J, Song J, Zhang X Q et al. Multiple-image encryption with bit-plane decomposition and chaotic maps[J]. Optics and Lasers in Engineering, 80, 1-11(2016).

    [28] Zhou Y X, Bi M H, Teng X Y et al. Physical layer encryption and system performance enhancement algorithm based on chaos mapping in OFDM-PON[J]. Acta Optica Sinica, 41, 1606002(2021).

    [29] Wang X G, Zhao D M. Multiple-image encryption based on nonlinear amplitude-truncation and phase-truncation in Fourier domain[J]. Optics Communications, 284, 148-152(2011).

    [30] Zhang W Q, Zhou N R. Multiple-image encryption algorithm based on asymmetric cryptosystem[J]. Journal of Optoelectronics·Laser, 23, 1382-1388(2012).

    [31] Deng X P, Wen W. Optical multiple-image encryption based on fully phase encoding and interference[J]. Optik, 126, 3210-3214(2015).

    [32] Li X Y, Meng X F, Yang X L et al. Multiple-image encryption based on compressive ghost imaging and coordinate sampling[J]. IEEE Photonics Journal, 8, 3900511(2016).

    [33] Sui L S, Zhou B, Ning X J et al. Optical multiple-image encryption based on the chaotic structured phase masks under the illumination of a vortex beam in the gyrator domain[J]. Optics Express, 24, 499-515(2016).

    [34] Yuan X, Zhang L H, Chen J et al. Multiple-image encryption scheme based on ghost imaging of Hadamard matrix and spatial multiplexing[J]. Applied Physics B, 125, 174(2019).

    [35] Jiao S M, Feng J, Gao Y et al. Visual cryptography in single-pixel imaging[J]. Optics Express, 28, 7301-7313(2020).

    [36] Tang Z J, Song J, Zhang X Q et al. Multiple-image encryption with bit-plane decomposition and chaotic maps[J]. Optics and Lasers in Engineering, 80, 1-11(2016).

    [37] Zhang X Q, Wang X S. Multiple-image encryption algorithm based on mixed image element and permutation[J]. Optics and Lasers in Engineering, 92, 6-16(2017).

    [38] Guo Y, Zhou Y Y, Jing S W. Multiple-image encryption based on image recombination and bit scrambling[J]. Acta Photonica Sinica, 49, 0410002(2020).

    [39] Xu Q J, Li D L, Chang C L et al. Q-plate based dual image asymmetric polarization encryption[J]. Acta Physica Sinica, 68, 084202(2019).

    [40] Zhang Y, Wang B. Optical image encryption based on interference[J]. Optics Letters, 33, 2443-2445(2008).

    Tools

    Get Citation

    Copy Citation Text

    Di Zhang, Nana Yu, Sixing Xi, Liying Lang, Xiaolei Wang, Huanzhen Zhang. Multipleimage Polarization Encryption Method Based on Light Field Regulation and Frequency Shifting[J]. Laser & Optoelectronics Progress, 2023, 60(10): 1010016

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category: Image Processing

    Received: Jan. 28, 2022

    Accepted: Mar. 3, 2022

    Published Online: May. 10, 2023

    The Author Email: Sixing Xi (xisixing@126.com)

    DOI:10.3788/LOP220659

    Topics