Browse > Article
http://dx.doi.org/10.3807/JOSK.2010.14.2.097

QPSK Modulation Based Optical Image Cryptosystem Using Phase-shifting Digital Holography  

Jeon, Seok-Hee (Department of Electronic Engineering, The University of Incheon)
Gil, Sang-Keun (Department of Electronic Engineering, The University of Suwon)
Publication Information
Journal of the Optical Society of Korea / v.14, no.2, 2010 , pp. 97-103 More about this Journal
Abstract
We propose a new technique for the optical encryption of gray-level optical images digitized into 8-bits binary data by ASCII encoding followed by QPSK modulation. We made an encrypted digital hologram with a security key by using 2-step phase-shifting digital holography, and the encrypted digital hologram is recorded on a CCD camera with 256 gray-level quantized intensities. With these encrypted digital holograms, the phase values are reconstructed by the same security key and are decrypted into the original gray-level optical image by demodulation and decoding. Simulation results show that the proposed method can be used for cryptosystems and security systems.
Keywords
Optical cryptosystem; Digital holography; Phase-shifting interferometry; QPSK modualation;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
Times Cited By Web Of Science : 2  (Related Records In Web of Science)
Times Cited By SCOPUS : 5
연도 인용수 순위
1 P. Hariharan, “Digital phase-shifting interferometry : a simple error compensating phase calculation algorithm,” Appl. Opt. 26, 2504-2505 (1987).   DOI
2 P. Hariharan, “Error analysis for optical security by means of 4-step phase-shifting digital hologaphy,” J. Opt. Soc. Korea 10, 118-123 (2006).   DOI   ScienceOn
3 M.-O. Jeong, N. Kim, and J.-H. Park, “Elemental image synthesis for integral imaging using phase-shifting digital holography,” J. Opt. Soc. Korea 12, 275-280 (2008).   과학기술학회마을   DOI   ScienceOn
4 D. Kim and Y. J. Cho, “3-D surface profile measurement using an acousto-optic tunable filter based on spectral phase shifting technique,” J. Opt. Soc. Korea 12, 281-287 (2008).   과학기술학회마을   DOI   ScienceOn
5 P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767-769 (1995).   DOI
6 E. Cuche, F. Bevilacqua, and C. Depeursinge, “Digital holography for quantitative phase-contrast imaging,” Opt. Lett. 24, 291-293 (1999).   DOI
7 D. Weber and J. Trolinger, “Novel implementation of nonlinear joint transform correlators in optical security and validation,” Opt. Eng. 38, 62-68 (1999).   DOI   ScienceOn
8 G.-S. Lin, H. T. Chang, W.-N. Lie, and C.-H. Chuang, “Publickey-based optical image cryptosystem based on data embedding techniques,” Opt. Eng. 42, 2331-2339 (2003).   DOI   ScienceOn
9 I. Yamaguchi and T. Zhang, “Phase-shifting digital holography,” Opt. Lett. 22, 610-612 (1998).
10 E. Tajahuerce, O. Matoba, S. C. Verrall, and B. Javidi, “Optoelectronic information encryption with phase-shifting interferometry,” Appl. Opt. 39, 2313-2320 (2000).   DOI
11 G. Unnikrishnan and K. Singh, “Double random fractional Fourier domain encoding for optical security,” Opt. Eng. 39, 2853-2859 (2000).   DOI   ScienceOn
12 F. Zhang, J. D. R. Valera, and I. Yamaguchi, “Vibration analysis by phase shifting digital holography,” Opt. Rev. 11, 297-299 (2004).   DOI
13 S. K. Gil, S. H. Jeon, N. Kim, and J. R. Jeong, “Successive encryption and transmission with phase-shifting digital holography,” Proc. SPIE 6136, 339-346 (2006).
14 S. K. Gil, H. J. Byun, H. J. Lee, S. H. Jeon, and J. R. Jeong, “Optical encryption of binary data information with 2-step phase-shifting digital holography,” Proc. SPIE 6488, 648812 (2007).   DOI
15 S. H. Jeon, Y. G. Hwang, and S. K. Gil, “Optical encryption of gray-level image using on-axis and 2-f digital holography with two-step phase-shifting method,” Opt. Rev. 15, 181-186 (2008).   DOI
16 J. F. Heanue, M. C. Bashaw, and L. Hesselink, “Encrypted holographic data storage based on orthogonal-phase-code multiplexing,” Appl. Opt. 34, 6012-6015 (1995).   DOI
17 N. Yoshikawa, M. Itoh, and T. Yatagai, “Binary computergenerated holograms for security applications from a synthetic double-exposure method by electron-beam lithography,” Opt. Lett. 23, 1483-1485 (1990).   DOI
18 B. Javidi and J. L. Horner, “Optical pattern recognition for validation and security verification,” Opt. Eng. 33, 1752-1756 (1994).   DOI   ScienceOn