Advanced
Optical Image Split-encryption Based on Object Plane for Completely Removing the Silhouette Problem
Optical Image Split-encryption Based on Object Plane for Completely Removing the Silhouette Problem
Journal of the Optical Society of Korea. 2013. Oct, 17(5): 384-391
Copyright © 2013, Journal of the Optical Society of Korea
  • Received : June 21, 2013
  • Accepted : September 24, 2013
  • Published : October 25, 2013
Download
PDF
e-PUB
PubReader
PPT
Export by style
Article
Author
Metrics
Cited by
TagCloud
About the Authors
Weina, Li
Department of Information & Communication Engineering, Chungbuk National University
Anh-Hoang, Phan
Department of Information & Communication Engineering, Chungbuk National University
Seok-Hee, Jeon
Department of Electronics Engineering, Incheon National University
Nam, Kim
Department of Information & Communication Engineering, Chungbuk National University
namkim@chungbuk.ac.kr

Abstract
We propose a split-encryption scheme on converting original images to multiple ciphertexts. This conversion introduces one random phase-only function (POF) to influence phase distribution of the preliminary ciphertexts. In the encryption process, the original image is mathematically split into two POFs. Then, they are modulated on a spatial light modulator one after another. And subsequently two final ciphertexts are generated by utilizing two-step phase-shifting interferometry. In the decryption process, a high-quality reconstructed image with relative error RE = 7.6061 -31 can be achieved only when the summation of the two ciphertexts is Fresnel-transformed to the reconstructed plane. During the verification process, any silhouette information was invisible in the two reconstructed images from different single ciphertexts. Both of the two single REs are more than 0.6, which is better than in previous research. Moreover, this proposed scheme works well with gray images.
Keywords
I. INTRODUCTION
With the development of computer calculations and network connections, more and more threats and attacks are generated in information communication systems. Optical information security has attracted a lot of attention, which offers primarily two types of benefits; the first is an inherent capability for parallel and rapid processing, and the second is a concealment in any of several dimensions, such as phase or spatial frequency [1] . Optical systems have an excellent capability to encode information. In general, there are three main classes of cryptography for implementing optical image encryption. The first is encrypting an image to one stationary white noise-like ciphertext utilizing an encryption key. The second is multiple-image encryption (MIE) which encrypts multiple images to one ciphertext by taking advantage of different encryption keys. The double random phase encoding (DRPE) method and the iterative phase-retrieval algorithm are extensively utilized in both of those encryption methods. In this paper we call the third one (encrypting one image into multiple ciphertexts) splitencryption (SE) for simplicity.
Encryption utilizing the DRPE method includes both symmetric and asymmetric cryptographic algorithms because the decryption key could be identical to or the conjugate with the encryption key. Two random phase-only functions (POFs) are utilized in this method. The first POF improves the signal of a charge-coupled device (CCD), and the second POF is the encryption key in the system [2] . However, when the complex conjugate of the information obtained in the frequency domain is considered as the ciphertext, the decryption key must be identical to the second random POF so-called symmetric cryptography. When the information obtained in the frequency domain is considered as the ciphertext, the decryption key has to be the conjugate of the second random POF-asymmetric cryptography. Indeed, the DRPE method is used in different interferometries and transforms to implement optical information security. Refregier and Javidi first suggested the DRPE method [3] that has been exhaustively developed in recent decades. As phase-shifting interferometry is developed, Lee and Gil applied the DRPE method to four-step phaseshifting interferometry for implementing optical encryption [4] . Shen et al . applied the DRPE method to three-step phase shifting interferometry to implement optical encryption [5] . Jeon and Gil applied DRPE to two-step phase-shifting interferometry to accomplish optical encryption [6] . Moreover, it is also employed in the information-hiding technique [7] and watermarking [8] . The encrypted optical field can be transmitted electronically. But DRPE cryptography is vulnerable to attack if the second phase-only function in the encrypted processing is obtained.
MIE encrypts several images into one single ciphertext. This encryption technique can hide more information, so it is more complicated. Meanwhile, most algorithms are timeconsuming. The biggest problem is crosstalk, which means how to reconstruct every single image in high quality from the only one single ciphertext. Because of this, MIE is more suitable for binary images than gray images. Shi et al . employed cascade phase retrieval algorithms to hide three different images together in the Fresnel domain [9] . He et al . proposed an MIE scheme to encrypt two objects into one ciphertext by utilizing DRPE and phase-shifting methods [10] . The crosstalk problem was depressed by thresholding and binarization. Situ and Zhang introduced the wavelength multiplexing technique into a double randomphase encoding system to encrypt multiple images [11] . Liu and Liu proposed an encryption scheme, which simultaneously encrypts two images into a single image by of the four ciphertexts and crop them to a quarter of the original size. They subsequently combined the four new quarter-size ciphertexts into one new original-size ciphertext by placing them into each quadrant [13] . Chang et al . proposed a novel wavelength-multiplexing algorithm based on the cascaded phase-only function architecture and that scheme significantly reduced the crosstalk problem [14] . fractional Fourier transform with different fractional orders [12] . Liu et al . proposed a novel MIE method to overcome the crosstalk problem, which is to abandon all high frequencies
Optical image split-encryption has been growing rapidly since Zhang and Wang suggested it for the first time [15] . The authors modulated the optical field in the Fresnel domain to two phase-only masks (POMs) to be allocated to two authorized users. In the decryption processing, if and only if the authorized users get together, the reconstructed image can be obtained by an inverse Fresnel transform. Unlike DRPE, the SE scheme does not need an explicit key for the ciphertext. In the SE scheme, one ciphertext also plays a role of the key of another ciphertext. Similarly, unlike MIE, the SE scheme does not introduce any time-consuming iterative phase-retrieval methods. Therefore, the SE scheme is more efficient and more convenient to manipulate. But there is a serious silhouette problem in the SE scheme. The silhouette information of the original image is visible (when reconstructed) in both of the two POMs. Addressing this issue, Wang and Zhao introduced a third random POM for effectively eliminating the silhouette problem [16] , but this scheme only focused on removing the silhouette problem when reconstructing a single POM. If the product of two specific POMs is reconstructed, the silhouette information will become visible. Kumar et al . inserted a chaotic algorithm jigsaw transform to postprocessing of the two POMs [17] , which can also effectively solve the silhouette problem. Even though the number of encrypted images is less than the last scheme, it also involves first inverse jigsaw transform and then inverse Fresnel transform in the decryption processing, which is the inverse manipulation of the encryption procedure, and both encryption and decryption require one extra transform. It is complicated and not distinctive. All of the above papers concentrated on the Fresnel domain. Jia et al . proposed cryptography based on the object plane to convert the original image to two phase-only functions via manipulation [18] . This can remove the silhouette problem as well. Nevertheless, it is only suitable for binary images, and cannot work on gray images.
In this paper, we propose an optical image split-encryption scheme to overcome the flaws enumerated in all the papers above. During the encryption process, the original image uses a random phase-only function introduced to influence phase distribution of the preliminary ciphertexts. Then we obtain a new complex original image and convert it to two phase-only functions that are the preliminary ciphertexts. Next, the optical fields of these two phaseonly functions can be obtained by taking advantage of a two-step phase-shifting method. These two encrypted optical fields cooperate with each other to reconstruct the original image. This proposed scheme requires no extra iterative algorithms, chaotic algorithms and random POMs in the Fresnel domain. It can be applied not only to a binary image but also to a gray image. The most important characteristic is utilizing only two ciphertexts to completely eliminate the silhouette problem.
The principles of the proposed optical image splitencryption are introduced in Section 2. In Section 3, computer simulation is described to demonstrate the feasibility of the proposed SE scheme. Error analysis is described in Section 4. Concluding comments are shown in Section 5.
II. PRINCIPLES OF THE PROPOSED OPTICAL IMAGE SPLIT-ENCRYPTION
Fresnel transforms are based on Fourier transforms, and Fourier transforms obey the distributive law, so Fresnel transforms also obey the distributive law. This induces the proposed encryption scheme, whereby f ( x 0 , y 0 ) is assumed to be the original image (real-valued data), which is multiplied by a random phase-only function to obtain a new image obj ( x 0 , y 0 ) , represented mathematically as follows:
PPT Slide
Lager Image
where M and N are sampling numbers along the x-axis and y-axis of the original image. The purpose of rand ( M,N ) is to generate an M × N random matrix distributed from 0 to 1. Throughout the remainder of this paper, the coordinates ( x 0 , y 0 ) , ( u , v ) and ( x , y ) represent the object plane, frequency plane and reconstructed plane, respectively. The essential purpose of the random POF introduced in Eq. (1) is to widen the dynamic range of the phase in the two POFs, P 1 ( x 0 , y 0 ) and P 2 ( x 0 , y 0 ). The amplitudes of these two POFs are the constant 1. The rest of the required equations are as follows:
PPT Slide
Lager Image
PPT Slide
Lager Image
PPT Slide
Lager Image
PPT Slide
Lager Image
PPT Slide
Lager Image
where obj _ in ( x 0 , y 0 ) , and obj _ phase ( x 0 , y 0 ) denote the intensity and phase of obj ( x 0 , y 0 ), respectively. P 1 ( x 0 , y 0 ) and P 2 ( x 0 , y 0 ) are essentially two split POFs that will be modulated on the spatial light modulator, and abs () and arg () denote the modulus and phase, respectively, of the new image obj ( x 0 , y 0 ) . Therefore, the new image obj ( x 0 , y 0 ) consists of P 1 ( x 0 , y 0 ) and P 2 ( x 0 , y 0 ) .
The ideal encryption system can approach both encryption and decryption manipulations in an optical manner, but just one process could be implemented optically. Most researchers investigate decryption optically owing to restrictions such as component limitations and difficulty in optical setup configuration, etc. We adopt optical encryption to obtain the final ciphertexts O _ P 1 ( u,v ) and O _ P 2 ( u, v ) in this proposed scheme. Intensity-sensitive devices, such as CCD cameras, can only capture the intensity portion and cannot capture the phase portion of an optical field. Therefore, two-step phase-shifting interferometry is needed to calculate the phase portion and subsequently accomplish the encryption manipulation of the proposed scheme. The schematic diagram of the setup is depicted in Fig. 1.
PPT Slide
Lager Image
Schematic diagram of the setup about two-step phaseshifting method. L: lens, M: mirror, SF: spatial filter, BS: beam splitter, PBS: polarizing beam splitter, HWP: half waveplate, QWP: quarter waveplate, SLM: spatial light modulator.
The mathematical expressions of the encryption process are described as follows:
PPT Slide
Lager Image
PPT Slide
Lager Image
PPT Slide
Lager Image
PPT Slide
Lager Image
PPT Slide
Lager Image
PPT Slide
Lager Image
PPT Slide
Lager Image
PPT Slide
Lager Image
where FrT denotes the Fresnel transform (Note: ∗ represents the complex conjugate). According to Euler’s formula cos θ = [exp( ) + exp(− )] / 2 , we can obtain the result of Eq. (8). In addition, the more mathematical information is introduced specifically by Goodman [19] . A P1 , A P2 and φ P1 , φ P2 are assumed to be amplitudes and phases of O _ P 1 ( u,v ) and O _ P 2 ( u,v ) , respectively. Assume the reference beam r = R × exp( i φr ) , where R represents the constant amplitude and φr represents the constant phase. Then the quarter waveplate is tilted by π / 2 and the second hologram I P12 is captured. According to Eq. (10) we can calculate O _ P 1 ( u,v ) . DC P1 in Eq. (10) denotes the zero-order light of the hologram generated from P 1 ( x 0 , y 0 ) , which consists of A P1 2 and R 2 ( DC P1 = A P1 2 + R 2 ). DC P2 in Eq. (14) denotes the zero-order light of the hologram generated from P 2 ( x 0 , y 0 ) , which is presented as DC P2 = A P2 2 + R 2 . It was introduced specifically by Shen et al . [5] . And O _ P 2 ( u,v ) generated from P 2 ( x 0 , y 0 ) , can be calculated in the identical manner. For the sake of simplicity, we assume the phase of the reference beam in the Fresnel domain φ r is 0. The encryption flow chart is depicted in Fig. 2.
PPT Slide
Lager Image
Flow chart for the encryption procedure of the proposed method.
Here, the optical fields O _ P 1 ( u,v ) and O _ P 2 ( u,v ) that are generated from POFs P 1 ( x 0 , y 0 ) and P 2 ( x 0 , y 0 ) can be obtained from the above process. Therefore,
PPT Slide
Lager Image
where IFrT denotes the inverse Fresnel transform. The intensity of obj _ re ( x, y ) is technically the reconstructed image.
The decryption flow chart represented in Eq. (15) is depicted in Fig. 3.
PPT Slide
Lager Image
Flow chart for decryption in the proposed method.
III. COMPUTER SIMULATION WORK
The feasibility of the proposed scheme was verified with a 256× 256 grayscale Baboon image ( Fig. 4 ). The phase portions of the two POFs are depicted in Fig. 5(a) and Fig. 6(a) , respectively.
PPT Slide
Lager Image
Original Baboon image ( 256×256).
PPT Slide
Lager Image
(a) Phase of P1(x0,y0) (b) Single ciphertext O_ P1(u,v) , and (c) Reconstructed image from single ciphertext O_ P1(u,v) .
PPT Slide
Lager Image
(a) Phase of P2(x0,y0) , (b) Single ciphertext O_ P2(u,v) , and (c) Reconstructed image from single ciphertext O_ P2(u,v) .
No silhouette information of the original image can be seen in Fig. 5(c) , which is the reconstructed image generated from O _ P 1 ( u,v ) in the analog. In addition, no silhouette information of the original image can be seen in Fig. 6(c) , which is generated from O _ P 2 ( u,v ) in the analog. If and only if optical fields of O _ P 1 ( u,v ) and O _ P 2 ( u,v ) are added together, can the original image be reconstructed. Fig. 7 shows the reconstructed image, decrypted correctly, looks nearly identical to the original image (shown in Fig. 4 ) .
PPT Slide
Lager Image
Decrypted image from summation of Fig. 5(b) and Fig. 6(b).
Relative error ( RE ) is introduced as the criterion of the reconstructed image’s quality and is expressed as follows [15] :
PPT Slide
Lager Image
where R ( m,n ) denotes the intensity of the reconstructed image and O ( m,n ) denotes the original image. We see that RE is smaller, and the gray-scale value of the reconstructed image is closer to the original image in terms of Eq. (16). This also means the higher the RE value of the single reconstructed image, the more irrelevant between the original image and the reconstructed image. However, when RE > 0.2 , theoretically, one cannot distinguish the decrypted image with the naked eye [15] .
The RE of the recovered image shown in Fig. 7 is 7.6061×10 -31 . The recovered image generated from a single ciphertext is shown in Fig. 5(c) and 6(c) . The RE values are both 0.6854. The two RE values are much more than 0.2, and the silhouette information is totally invisible.
For comparison, the method of Wang and Zhao [16] was simulated again for this paper. Some of the results are shown in Fig. 8 .
PPT Slide
Lager Image
(a) Original Lena image ( 256×256), (b) Product of POF1 and POF3, (c) Reconstructed image from the product of POF1 and POF3, (d) Product of POF2 and POF3, (e) Reconstructed image from the product of POF2 and POF3.
They introduced a random POF to split the complex amplitude of the optical field into POF1, POF2 and POF3; the RE value of the three images reconstructed from those three POFs is around 0.4. Silhouette information is invisible in the three reconstructed images, which have RE values that are still lower than our RE values of the single ciphertext. And the silhouette problem appears when reconstructing the product of the specific two ciphertexts, as seen in Fig. 8(c) and (e) . The RE values of Fig. 8(c) and (e) are 0.1567 and 0.1898, respectively, both of which are less than 0.2; therefore, the silhouette problem shows up.
IV. ERROR ANALYSIS
A digital hologram recorded on a CCD is quantized with 256 levels. So a gray-level error on CCD camera pixels can be generated due to a small intensity variation, which is the so-called quantization error [2] . If there is no error, the decryption equation expression should be like Eq. (7), Eq. (11) and Eq. (15). However, the error appears when the CCD camera captures the optical field O _ P 1 ( u,v ) and O _ P 2 ( u,v ) . This will introduce two amplitude errors and two phase errors, which are mathematically presented in the following equations:
PPT Slide
Lager Image
PPT Slide
Lager Image
PPT Slide
Lager Image
Where O _ P 1 real and O _ P 2 real denote the real calculated encrypted optical fields, respectively. E P1 stands for the amplitude error distributed from 0 to 255, and e P1 stands for the phase error distributed from −π to π , which probably both appear in the encrypted optical field O _ P 1 ( u,v ) . E P2 and e P2 are the amplitude error and the phase error, which appear in the encrypted optical field O _ P 2 ( u,v ). E P1 , e P1 , E P2 , and e P2 will introduce the white noise into the decrypted image. However, A P1 and A P2 are not distributed in the range [0, 255]; they should first be reset in [0,255].
The purpose of the error analysis is to calculate what amplitude error range (AER) and phase error range (PER) the reconstructed image can tolerate for the naked eye. First, a toleration criterion should be determined. The different RE value and the corresponding reconstructed images are depicted as follows, where we calculated many different images. The results of the 256× 256 grayscale image Lena and the 256× 256 grayscale image Baboon are depicted in this paper for the investigation of the tolerated boundary RE value.
All of the images depicted in Fig. 9 are the reconstructed images from the optical fields with amplitude errors or phase errors, or both. For example, the RE value is equivalent to 0.0116 in Fig. 9(a) . The RE value is equivalent to 0.0811 in Fig. 9(h) . The noise increases from Fig. 9(a) to (h) . Still acceptable to the naked eye is Fig. 9(g) , although the dimension of the noise has increased; the image quality worsens in Fig. 9(h) . In addition, all of the attached images are 43% of the original size. Therefore, the noise in Fig. 9(h) cannot be tolerated.
The results in Fig. 10 are similar to those in Fig. 9. The noise is acceptable to the naked eye from Fig. 10(a) to (f) . However, the noise increases suddenly between Fig. 10(g) and (h) , as seen in the nose of the Baboon images. Therefore, RE =0.07 is determined as a boundary criterion. The other verified images also give uniform results.
PPT Slide
Lager Image
Reconstructed Lena images with different RE values.
PPT Slide
Lager Image
Reconstructed Baboon images with different RE values.
Here, the Lena and Baboon images are both utilized to analyze the AER and PER with RE < 0.07 . However, only the curve graphs of the Baboon image are included in this paper.
In Fig. 11 , the full black line represents the threshold line RE = 0.07 . AE means amplitude error, and O_P1, O_P2 stand for single ciphertext O _ P 1 ( u,v ) and single ciphertext O _ P 2 ( u,v ) , respectively. The red line with circles represents errors that only happened in the amplitude portion of O _ P 1 ( u,v ) , which shows the tolerated AER is [-22.5, 22.5] with RE < 0.07 . The blue line with dots represents errors that only happened in the amplitude portion of O _ P 2 ( u,v ) , which shows the tolerated AER is [-24, 24] with RE < 0.07 . The magenta line with asterisks represents errors that happened in the amplitude portion of both O _ P 1 ( u,v ) and O _ P 2 ( u,v ) , which shows the tolerated AER extends to [-38, 38] with RE < 0.07 .
PPT Slide
Lager Image
RE curves along with the variations of AER in a single ciphertext or both of the two ciphertexts.
In Fig. 12 , the full black line represents the threshold line RE = 0.07 . Phase error (PE) is in rads. O_P1, O_P2 represent single ciphertext O _ P 1 ( u,v ) and single ciphertext O _ P 2 ( u,v ) , respectively. The red line with circles represents errors that only happened in the phase portion of O _ P 1 ( u,v ) , which shows the tolerated PER is [-0.28, 0.28] with RE < 0.07 . The blue line with dots represents errors that only happened in the phase portion of O _ P 2 ( u,v ) , which shows the tolerated PER is [-0.3, 0.3] on condition RE < 0.07 . The magenta line with asterisks represents errors that happened in both phase portions of O _ P 1 ( u,v ) and O _ P 2 ( u,v ) , which shows the tolerated AER extends to [-0.52, 0.52] with RE < 0.07 .
PPT Slide
Lager Image
RE curves along with the variations of PER in a single ciphertext or both of the two ciphertexts.
In Fig. 13 , the plane represents the threshold plane RE = 0.07 . The curved surface represent the PE and AE that happen in both O _ P 1 ( u,v ) and O _ P 2 ( u,v ) . When these four kinds of errors happen at the same time, the tolerated PER and AER form a closed area surrounded by the closed magenta line.
PPT Slide
Lager Image
RE curves along with the variations of AER and PER in both of the two ciphertexts.
The data in Table 1 illustrate Fig. 11 , Fig. 12 , and Fig. 13. It is worthwhile to note that the maximum AER and PER are taken from Fig. 13 , assuming there is no influence from other different categories of errors. In these three figures, the last point not exceeding the black line is taken into account. In addition, although the RE curves increase tortuously as AER or PER expands, the shapes of the curves rise steadily in the long term.
Tolerated AER and PER of the 256×256 grayscale Baboon image
PPT Slide
Lager Image
Tolerated AER and PER of the 256×256 grayscale Baboon image
We conducted the same process with the Lena image, and the results are depicted in Table 2 . According to Table 1 , Table 2 and other data not listed in this paper, different images have different tolerated PERs and AERs. However, if both of the phase errors of the optical field work together, the tolerated PER will increase to almost twice that seen when PE happens in a single optical field. If both of the amplitude errors (AEs) of the optical field work together, the tolerated AER will increase to almost twice when AE happens in single ciphertext. It means the PE in O _ P 2 ( u,v ) and PE in O _ P 1 ( u,v ) influence each other in a promotive way, as does AE in O _ P 1 ( u,v ) and AE in O _ P 2 ( u,v ) . However, if the four kinds of errors happen at the same time, the phase error and the amplitude error influence each other antagonistically, as seen from the thick magenta line in Fig. 13.
Tolerated PER and AER of the 256× 256 grayscale image of Lena
PPT Slide
Lager Image
Tolerated PER and AER of the 256× 256 grayscale image of Lena
V. CONCLUSION
The proposed optical image split-encryption scheme focuses on the optical information encryption for converting original plaintext to multiple ciphertexts. It requires no complicated iterative algorithms or chaotic transforms. Moreover, fewer phase-only functions need to be split. It can be applied to gray images, and introduces only one random POF for influencing subsequent encryption. The encryption procedure is to split the original image into two POFs mathematically, subsequently obtain two authorized ciphertexts generated from those two POFs by taking advantage of a two-step phase-shifting method. The original image can be reconstructed with an extremely small relative error RE = 7.6061×10 -31 , if and only if these two ciphertexts are combined. During the verification process, no silhouette information can be seen with the naked eye in either reconstructed image generated from a single POF. In addition, both RE values of the reconstructed image generated from a single POF are around 0.68, which is much better than previous SE schemes. We also demonstrate that solo phase errors or amplitude errors in two ciphertexts can influence each other in a promotive way, but when the four kinds of errors happen at the same time, PE and AE influence each other antagonistically.
Acknowledgements
This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MEST) (2012-0009225), and this work was also partly supported by the IT R&D program of MSIP/ MOTIE/KEIT. [10039169, Development of Core Technologies for Digital Holographic 3-D Display and Printing System]
References
Vu T. V. , Kim N. , An J. , Hong S. 2007 “Experimental demonstration of kinogram-based single-phase decryption technique for information security,” Appl. Opt. http://dx.doi.org/10.1364/AO.46.007662 46 7662 - 7669
Jeon S. H. , Gil S. K. 2011 “2-step phase-shifting digital holographic optical encryption and error analysis,” J. Opt. Soc. Korea http://dx.doi.org/10.3807/JOSK.2011.15.3.244 15 244 - 251
Refregier P. , Javidi B. 1995 “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. http://dx.doi.org/10.1364/OL.20.000767 20 767 - 769
Lee H. J. , Gil S. K. 2006 “Error analysis for optical security by means of 4-step phase-shifting digital holography,” J. Opt. Soc. Korea http://dx.doi.org/10.3807/JOSK.2006.10.3.118 10 118 - 123
Shen L. , Li J. , Chang H. 2007 “Double-image encryption based on joint transform correlation and phase-shifting interferometry,” Chinese Opt. Lett. 5 687 - 689
Liu J. P. , Poon T. C. 2009 “Two-step-only quadrature phase-shifting digital holography,” Opt. Lett. http://dx.doi.org/10.1364/OL.34.000250 34 250 - 252
Kishk S. , Javidi B. 2002 “Information hiding technique with double phase encoding,” Appl. Opt. http://dx.doi.org/10.1364/AO.41.005462 41 5462 - 5470
Kishk S. , Javidi B. 2003 “Watermarking of threedimensional objects by digital holography,” Opt. Lett. http://dx.doi.org/10.1364/OL.28.000167 28 167 - 169
Shi Y. , Situ G. , Zhang J. 2007 “Multiple-image hiding in the Fresnel domain,” Opt. Lett http://dx.doi.org/10.1364/OL.32.001914 32 1914 - 1916
He M. Z. , Cai L. Z. , Liu Q. , Wang X. C. , Meng X. F. 2005 “Multiple image encryption and watermarking by random phase matching,” Opt. Commun. http://dx.doi.org/10.1016/j.optcom.2004.11.034 247 29 - 37
Situ G. , Zhang J. 2005 “Multiple-image encryption by wavelength multiplexing,” Opt. Lett. http://dx.doi.org/10.1364/OL.30.001306 30 1306 - 1308
Liu Z. , Liu S. 2007 “Double image encryption based on iterative fractional Fourier transform,” Opt. Commun. http://dx.doi.org/10.1016/j.optcom.2007.03.039 275 324 - 329
Liu Z. , Zhang Y. , Zhao H. , Ahmad M. A. , Liu S. 2011 “Optical multi-image encryption based on frequency shift,” Optik http://dx.doi.org/10.1016/j.ijleo.2010.06.039 122 1010 - 1013
Chang H. T. , Hwang H. E. , Lee C. L. , Lee M. T. 2011 “Wavelength multiplexing multiple-image encryption using cascaded phase-only masks in the Fresnel transform domain,” Appl. Opt. http://dx.doi.org/10.1364/AO.50.000710 50 710 - 716
Zhang Y. , Wang B. 2008 “Optical image encryption based on interference,” Opt. Lett. http://dx.doi.org/10.1364/OL.33.002443 33 2443 - 2445
Wang X. , Zhao D. 2012 “Optical image hiding with silhouette removal based on the optical interference principle,” Appl. Opt. http://dx.doi.org/10.1364/AO.51.000686 51 686 - 691
Kumar P. , Joseph J. , Singh K. 2011 “Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator,” Appl. Opt. http://dx.doi.org/10.1364/AO.50.001805 50 1805 - 1811
Jia W. , Wen F. J. , Chow Y. T. , Zhou C. 2012 “Binary image encryption based on interference of two phaseonly masks,” Appl. Opt. http://dx.doi.org/10.1364/AO.51.005253 51 5253 - 5258
Goodman J. W. 1996 Introduction to Fourier Optics 2nd ed. McGraw-Hill San Francisco, CA, USA