• Acta Photonica Sinica
  • Vol. 43, Issue 3, 310004 (2014)
QIN Yi, LIU Xu-yan, and GONG Qiong
Author Affiliations
  • [in Chinese]
  • show less
    DOI: 10.3788/gzxb20144303.0310004 Cite this Article
    QIN Yi, LIU Xu-yan, GONG Qiong. Interference-based Multiple-image Encryption by Position and Wavelength Multiplexing[J]. Acta Photonica Sinica, 2014, 43(3): 310004 Copy Citation Text show less
    References

    [1] JAVIDI B. Securing information with optical technologies[J]. Physics Today, 1997, 50: 27-32.

    [2] ALFALOU A, BROSSEAU C. Optical image compression and encryption methods[J]. Advance in Optics and Photonics, 2009, 1(3): 589-636.

    [3] REFREGIER P, JAVIDI B. Optical image encryption based on input plane and Fourier plane random encoding[J]. Optics Letters, 1995, 20(7): 767-769.

    [4] UNNIKRISHNAN G, JOSEPH J, SINGH K. Optical encryption by double-random phase encoding in the fractional Fourier domain[J]. Optics Letters, 2000, 25(12): 887-889.

    [5] SITU G, ZHANG J. Double random-phase encoding in the Fresnel domain[J]. Optics Letters, 2004, 29(14): 1584-1586.

    [6] NOMURA T, JAVIDI B. Optical encryption using a joint transform correlator architecture[J]. Optical Engineering, 2000, 39(8): 2031-2035.

    [7] QIN Y, GONG Q. Optical encryption in a JTC encrypting architecture without the use of an external reference wave[J], Optics and Laser Technology, 2013, 51: 5-10.

    [8] ZHOU N, WANG Y, WU J. Image encryption algorithm based on the multi-order Discrete fractional Mellin transform[J]. Optics Communications, 2011, 284: 5588-5597.

    [9] PENG X, ZHANG P, WEI H, et al. Known-plaintext attack on optical encryption based on double random phase keys[J]. Optics Letters, 2006, 31(8): 1044-1046.

    [10] PENG Xiang, TANG Hong-qiao, TIAN Jing-dong. Ciphertext only attack on double random phase encoding optical encryption system[J]. Acta Physica Sinica, 2007, 56(5): 2629-2636.

    [11] CHANG H T, LU W C, KUO C J. Multiple-phase retrieval for optical security systems by use of random-phase encoding[J]. Applied Optics, 2002, 41(23): 4825-4834.

    [12] SITU G, ZHANG J. A lensless optical security system based on computer-generated phase only masks[J]. Optics Communications, 2004, 232: 115-122 .

    [13] LI Y, KRESKE K, ROSEN J. Security and encryption optical systems based on a correlator with significant output images[J]. Applied Optics, 2000, 39(29): 5295-5301.

    [14] ZHANG Y, WANG B. Optical image encryption based on interference[J]. Optics Letters, 2008, 33(21): 2443-2445.

    [15] WANG X, ZHAO D. Optical image hiding with silhouette removal based on the optical interference principle[J]. Applied Optics, 2012, 51(6): 686-691.

    [16] ZHANG Y, WANG B, DONG Z. Enhancement of image hiding by exchanging two phase masks[J]. Journal of Optics A: Pure and Applied Optics, 2009, 11(12): 125406.

    [17] SITU G, ZHANG J. Multiple-image encryption by wavelength multiplexing[J]. Optics Letters, 2005, 30(11): 1306-1308.

    [18] SITU G, ZHANG J. Position multiplexing for multiple-image encryption[J]. Journal of Optics A: Pure and Applied Optics, 2006, 8(5): 391-397.

    [19] BARRERA J F, HENAO R, TEBALDI M, et al. Multiplexing encrypted data by using polarized light[J]. Optics Communications, 2006, 260: 109-112.

    [20] LIU Z, ZHANG Y, ZHAO H, et al. Optical multi-image encryption based on frequency shift[J]. Optik, 2011, 122: 1010-1013.

    [21] JIA Li-juan, LIU Zheng-jun. Double image encryption algorithm based on random fractional Fourier transform[J]. Acta Photonica Sinica, 2009, 38(4): 1020-1024.

    [22] XIAO Y, SU X, LI S, et al. Key rotation multiplexing for multiple-image optical encryption in the Fresnel domain[J]. Optics and Laser Technology, 2011, 43(4): 889-894.

    [23] HWANG H E, CHANG H T, LIE W N. Multiple-image encryption and multiplexing using a modified Gerchberg-Saxton algorithm and phase modulation in Fresnel transform domain[J]. Optics Letters, 2009, 34(24): 3917-3919.

    [24] QIN Y, GONG Q. Interference-based multiple-image encryption with silhouette removal by position multiplexing[J]. Applied Optics, 2013, 52(17): 3987-92

    [25] NIU C H, WANG X L, LV N G, et al. An encryption method with multiple encrypted keys based on interference principle[J]. Optics Express, 2010, 18(8): 7827-7834.

    QIN Yi, LIU Xu-yan, GONG Qiong. Interference-based Multiple-image Encryption by Position and Wavelength Multiplexing[J]. Acta Photonica Sinica, 2014, 43(3): 310004
    Download Citation