Browse > Article
http://dx.doi.org/10.9717/kmms.2016.19.6.1043

Double Encryption of Binary Image using a Random Phase Mask and Two-step Phase-shifting Digital Holography  

Kim, Cheolsu (Dept. of Electrical Energy & Computer Engineering, Gyeongju University)
Publication Information
Abstract
In this paper, double encryption technique of binary image using random phase mask and 2-step phase-shifting digital holography is proposed. After phase modulating of binary image, firstly, random phase mask to be used as key image is generated through the XOR operation with the binary phase image. And the first encrypted image is encrypted again through the fresnel transform and 2-step phase-shifting digital holography. In the decryption, simple arithmetic operation and inverse Fresnel transform are used to get the first decryption image, and second decryption image is generated through XOR operation between first decryption image and key image. Finally, the original binary image is recovered through phase modulation.
Keywords
Double Encryption; Random Phase Mask; Phase-shifting Digital Holography; Key Image; Decryption; XOR Operation;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 C.S. Kim and G.S. Kim, “Phase Image Encryption Using Random Phase Mask and Phase-shift Digital Holography,” Proceeding of the Fall Conference of the Korea Multimedia Society, Vol. 18, No. 2, pp. 113-115, 2015.
2 S. Zhang and J. Zhou, “A New Estimation Method for Two-step-only Quadrature phase-shifting Digital Holography,” Journal of Optics Communication, Vol. 335, No. 1, pp. 183-188, 2015.   DOI
3 T.M. Kreis and W.P.O. Juptner, “Suppression of the DC Term in Digital Holography,” Journal of Optical Engineering, Vol. 36, No. 8, pp. 2357-2360, 1997.   DOI
4 G.L. Chen, C.Y. Lin, M.K. Kuo, and C.C. Chang, “Numerical Suppression of Zero-order Image in Digital Holography,” Journal of Optics Express, Vol. 15, No. 14, pp. 8851-8856, 2007.   DOI
5 T.C. Poon, Digital Holography and Three-Dimensional Display: Principles and Applications, Springer, New York, USA, 2006.
6 C.S. Kim, “Digital Image Watermarking Technique using Scrambled Binary Phase Computer Generated Hologram in Discrete Cosine Transform Domain, Journal of Korea Multimedia Society, Vol. 14, No. 3, pp. 403-413, 2011.   DOI
7 I. Yamagichi, “Phase-shifting Digital Holography,” Journal of Optics Letters, Vol. 22, No. 16, pp. 1268-1270, 1997.   DOI
8 X.F. Meng, L.Z. Cai, X.F. Xu, X.L. Yang, X. X. Shen, G.Y. Dong, et al., “Two-step Phase-shifting Interferometry and Its Application in Image Encryption,” Journal of Optics Letters, Vol. 31, No. 10, pp. 1414-1416, 2006.   DOI
9 L. Shen, J. Li, and H. Chang, “Double-image Encryption based on Joint Transform Correlation and Phase-shifting Interferometry,” Journal of Chinese Optics Letters, Vol. 5, No. 12, pp. 687-689, 2007.
10 J.P. Liu and T.C. Poon, “Two-step-only Quadrature Phase-shifting Digital Holography,” Journal of Optics Letters, Vol. 34, No. 3, pp. 250-252, 2009.   DOI
11 J.P. Liu, T.C. Poon, G.S. Jhou, and P.J. Chen, “Comparison of Two-, Three-, and Four-exposure Quadrature Phase-shifting Holography,“ Journal of Optical Society of America, Vol. 50, No. 16, pp. 2443-2450, 2011.