All of such encryption systems can be divided in three category: optical, digital, and hybrid optical-digital systems. A brief survey of them is presented further.
Digital encryption systems
Digital encryption systems are performing all operations in numerical form in computer [1] so there is no need of optical systems to be created. There are several systems that are mostly digital such as Virtual Optics system [2] and virtual-optical-holography (VOH) [3] that are characterized by high cryptography resistance. Other digital systems that are worth noting are using fractional wavelet transform [4] or fractional Fourier transform [5]. One of the most widespread digital encryption technique is virtual-optical imaging scheme, VOIS [2] that simulates an optical imaging system in a computer model. As a computation model, Fresnel approach is used; encryption parameters are the wavelength of coherent ``virtual'' light LAMBDA , the distance between the image to be encoded and ``lens'' d0 , focal distance of the ``lens'' f , and distance between the ``lens'' and observing plane d_i (see Fig. 1).
Fourier-spectrum of an image to be encoded is multiplied by Fourier-spectrum of coding mask, so one need to know exact parameters of LAMBDA, d0 , d_i , and f in order to decrypt the image.
Optical encryption systems
In optical encryption techniques are utilized high speed and parallelism of optical images processing. As encryption keys, diffractive optical elements (DOEs) are used that are synthesized and outputted to ferroelectric [6] or LCD-modulators [7]. For example, such systems use lensless approach [8], 4-f based systems [9], fractional Fourier transform [10,11,12] or systems based on double random phase mask [13]. Apart from these systems, toroidal zone plates encryption systems is worth mention [14]. The most widespread approach in optical encryption systems is double random phase mask [13,15,16,17]. As it shortly described in [18], the image to be encrypted P is immediately followed by a first random phase mask, which is the first key X . Both the image and the mask are located in the object focal plane of a first lens (see Fig. 2).
In the image focal plane of this lens is therefore obtained the Fourier transform (FT) of the product P*X. This product is then multiplied by another random phase mask that is the second key Y. Lastly, another FT is performed by a second lens to return to the spatial domain. Since the last FT does not add anything to the security of the system, we will perform all our analyses in the Fourier plane. The ciphered image C is then:
C = Y * FT(P*X) | (1) |
Such systems allow obtaining encrypted images that are characterized by high cryptography resistance. Images are being encrypted in a very short time because of parallel optical processing is performed. Complexity of optical key diagram and expensiveness are drawbacks of such systems. Moreover, several vulnerabilities of double random phase mask were reported recently [19,20,21].
Hybrid optical-digital systems
Hybrid optical-digital systems allow to combine advantages of optical processing (high speed and parallelism) and digital processing (flexibility of digital image processing methods). Application of digital methods in optical coding allow to reduce weight and cost of devices.As a most widespread optical-digital paradigms, ``wavefront coding'' [22] and ``pupil engineering'' [23] are worth mention. Systems based on these paradigms are used in enhancing depth of field in microscopic imaging [24], aberrations compensation [25], depth-of-field improvement in MEMS-systems [26], and enhancing of tomography images [27].
Coding diffractive element (DOE) is introduced in the imaging scheme of such devices; hence optical convolution of input object and point spread function (PSF) of the DOE is performed optically. As a result, the image registered is blurred but a blur is the same across the image. Digital images deconvolution is performed in order to reconstruct the image and compensate introduced distortion. An example of hybrid optical-digital device is shown in Fig. 3.
Figure 3: Hybrid optical-digital imaging system: a photo sensor and a kinoform (DOE).
Hybrid optical-digital systems based on ``wavefront coding'' and ``pupil engineering'' paradigms can be used not only for encryption but for depth-of-field enhancing, too.
Such systems are advantageous because of their inexpensiveness, flexibility, and reliability (may be used not only for data encryption). But after image decryption, visual quality of the image is degraded slightly that is a disadvantage.
Bibliography
- 1
- Ari Y. Benbasat.
A survey of current optical security techniques.
Technical report, MIT Media Lab, Prepared for Prof. Cardinal Warde 6.637 Spring 1999 Research Project, April 15, 1999. - 2
- Xiang Peng, Zhiyong Cui, and Tieniu Tan.
Information encryption with virtual-optics imaging system.
Optics Communications, 212(4-6):235-245, November 2002. - 3
- Xiang Peng and Peng Zhang.
Security of virtual-optics-based cryptosystem.
Optik, 117:525-531, 2006. - 4
- Linfei Chen and Daomu Zhao.
Optical image encryption based on fractional wavelet transform.
Optics Communications, 254(4-6):361-367, October 2005. - 5
- B.M. Hennelly and J.T. Sheridan.
Image encryption and the fractional fourier transform.
Optik - International Journal for Light and Electron Optics, 114(6):251-265, 2003. - 6
- G. Unnikrishnan, M. Pohit, and K. Singh.
A polarization encoded optical encryption system using ferroelectric spatial light modulator.
Optics Communications, 185(1-3):25-31, November 2000. - 7
- Chau-Jern Cheng and Mao-Ling Chen.
Polarization encoding for optical encryption using twisted nematic liquid crystal spatial light modulators.
Optics Communications, 237(1-3):45-52, July 2004. - 8
- Guohai Situ and Jingjuan Zhang.
A lensless optical security system based on computer-generated phase only masks.
Optics Communications, 232(1-6):115-122, March 2004. - 9
- Xiaogang Wang, Daomu Zhao, and Linfei Chen.
Image encryption based on extended fractional fourier transform and digital holography technique.
Optics Communications, 260(2):449-453, April 2006. - 10
- Naveen Kumar Nishchal, Joby Joseph, and Kehar Singh.
Fully phase-encrypted memory using cascaded extended fractional fourier transform.
Optics and Lasers in Engineering, 42(2):141-151, August 2004. - 11
- Naveen Kumar Nishchal, Joby Joseph, and Kehar Singh.
Securing information using fractional fourier transform in digital holography.
Optics Communications, 235(4-6):253-259, May 2004. - 12
- Banghe Zhu and Shutian Liu.
Optical image encryption based on the generalized fractional convolution operation.
Optics Communications, 195(5-6):371-381, August 2001. - 13
- Steven C. Verrall Enrique Tajahuerce, Osamu Matoba and Bahram Javidi.
Optoelectronic information encryption with phase-shifting interferometry.
Applied Optics, Vol. 39, No. 14:2313-2320, 10 May 2000. - 14
- John Fredy Barrera, Rodrigo Henao, and Roberto Torroba.
Optical encryption method using toroidal zone plates.
Optics Communications, 248(1-3):35-40, April 2005. - 15
- Bahram Javidi Pedro Andres Enrique Tajahuerce, Jesus Lancis.
Optical security and encryption with totally incoherent light.
Optics Letters, Vol. 26, No. 10:678-680, May 15, 2001. - 16
- Enrique Tajahuerce and Bahram Javidi.
Encrypting three-dimensional information with digital holography.
Applied Optics, Vol. 39, No. 35:6595-6601, 10 December 2000. - 17
- Enrique Tajahuerce Bahram Javidi.
Three-dimensional object recognition by use of digital holography.
Optics Letters, Vol. 25, No. 9:610-612, May 1, 2000. - 18
- Yann Frauel, Albertina Castro, Thomas J. Naughton, and Bahram Javidi.
Resistance of the double random phase encryption against various attacks.
Optics Express, Vol. 15, No. 16:10253-10265, 6 August 2007. - 19
- A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells.
Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys.
Optics Letters, 30:1644-1646, 2005. - 20
- Thomas J. Naughton Unnikrishnan Gopinathan, David S. Monaghan and John T. Sheridan.
A known-plaintext heuristic attack on the fourier plane encryption algorithm.
Optics Express, Vol. 14, No. 8:3181-3186, 2006. - 21
- X. Peng, P. Zhang, H. Wei, and B. Yu.
Known-plaintext attack on optical encryption based on double random phase keys.
Optics Letters, 31:1044-1046, 2006. - 22
- W.T. Cathey and E.R. Dowski.
New paradigm for imaging systems.
Applied Optics, 41:6080-6092, 2002. - 23
- Sudhakar Prasad, Todd C. Torgersen, Victor P. Pauca, Robert J. Plemmons, and Joseph van der Gracht.
Engineering the pupil phase to improve image quality.
In Proc. SPIE, Visual Information Processing XII, volume 5108, pages 1-12, 2003. - 24
- M. R. Fetterman P. Potuluri and D. J. Brady.
High depth of field microscopic imaging using an interferometric camera.
Optics Express, Vol. 8, No. 11:624-630, 21 May 2001. - 25
- Sara C. Tucker, W. Thomas Cathey, and Edward R. Dowski, Jr.
Extended depth of field and aberration control for inexpensive digital microscope systems.
Optics Express, Vol. 4, No. 11:467-474, 24 May 1999. - 26
- Daniel L. Barton, Jeremy A. Walraven, Edward R. Dowski Jr., Rainer Danz, Andreas Faulstich, and Bernd Faltermeier.
Wavefront coded imaging systems for MEMS analysis.
Proc. of ISTFA, pages 295-303, 2002. - 27
- David J. Brady Daniel L. Marks, Ronald A. Stack.
Three-dimensional tomography using a cubic-phase plate extended depth-of-field system.
Opt. Letters No 4, 24:253-255, 1999.