ABSTRACT
In this paper, we propose a photon-counting double random phase encryption with merging reconstruction. Double random phase encryption (DRPE) is a simple and secure optical encryption technique using phase random masks. To enhance the security level, a three-dimensional photon counting technique has been applied to DRPE. However, we cannot recognize the original image information in a photon-limited scene. To solve this problem, we propose a merging reconstruction method, which can detect the photons using several reconstruction layers. Through this method, we can obtain a decrypted image of enhanced visual quality. This paper presents a simulation test for the proposed method.
- P. Refregier, B. Javidi, 1995. "Optical image encryption based on input plane and Fourier plane random encoding," Optics letters, vol.20, issue7, pp.767--769. DOI=https://doi.org/10.1364/OL.20.000767Google ScholarCross Ref
- J.W.Goodman, 1985. Statistical optics (John Wiley and Sons, inc.), Chapter9Google Scholar
- Watson and G. M. Morris, 1990 "Comparison of infrared up conversion methods for photon-limited imaging," Journal of Apply Physics, vol.67, pp.6075--6084. DOI= https://doi.org/10.1063/1.345167Google ScholarCross Ref
- Elisabet Perez-Cabre, M. Cho, B. Javidi, 2011."Information authentication using photon-counting double-random-phase encrypted images," Optics letters, vol.36, issue1, pp.22--24.DOI= https://doi.org/10.1364/OL.36.000022Google Scholar
- Lippmann, Gabriel, 1908. "Epreuves reversibles. photographies integrals." Comptes-Rendus Academie des Sciences 146, pp.446--451Google Scholar
- Seung-Hyun Hong, Ju-Seog Jang, and Bahram Javidi, 2004."Three-dimensional volumetric object reconstruction using computational integral imaging." Optics Express vol.12, no.3, pp.483--491. DOI=https://doi.org/10.1364/OPEX.12.000483Google Scholar
- JS Jang, B. Javidi, 2002. "Three-dimensional synthetic aperture integral imaging," Optics letters, vol.27, issue13, pp.1144--1146 DOI= https://doi.org/10.1364/OL.27.001144Google ScholarCross Ref
- B. Tavakoli, B. Javidi, 2008. "Three-dimensional visualization by photon counting computational Integral Imaging," Optics Express, vol.16, issue7, pp.4426--4436. DOI= https://doi.org/10.1364/OE.16.004426Google ScholarCross Ref
- J. Jung, M. Cho, 2010. "Three-dimensional photon counting integral imaging using bayesian estimation," Optics Letters, vol.35, issue11, pp.1825--1827. DOI=https://doi.org/10.1364/OL.35.001825Google ScholarCross Ref
- M. Cho, B. Javidi, 2012. "Three-dimensional photon counting integral imaging using moving array lens technique,", Optics Letters, vol.37, issue9, pp.1487--1489. DOI= https://doi.org/10.1364/OL.37.001487Google ScholarCross Ref
- M. Cho, 2015. "Three-dimensional color photon counting microscopy using Bayesian estimation with adaptive priori information," Chinese optics letter, vol.13, issue7, pp.070301--070304Google ScholarCross Ref
- M. Cho, B. Javidi, 2013. "Three-dimensional photon counting double-random-phase encryption," Optics letters, vol.38, issue17, pp.3198--3201. DOI=https://doi.org/10.1364/OL.38.003198Google ScholarCross Ref
- J.Y. Jang, Kotaro Inoue, Min-Chul Lee, M. Cho, 2016. "Information Authentication of Three-Dimensional Photon Counting Double Random Phase Encryption Using Nonlinear Maximum Average Correlation Height Filter," Journal of the Optical Society of Korea, vol.20, no.2, pp.228--233Google ScholarCross Ref
Index Terms
- 3D Optical Encryption System using Merging Reconstruction Method
Recommendations
Accelerated reconstruction of 3-D object images using estimated object area in backward computational integral imaging reconstruction
In this paper, we propose a novel approach for fast reconstruction of three-dimensional (3-D) object images by using the depth data of 3-D objects in the backward computational integral imaging reconstruction (B-CIIR) method. In the conventional B-CIIR ...
Fractional Fourier transform based key exchange for optical asymmetric key cryptography
Recently several optical encryption techniques have been proposed for two-dimensional data. These techniques use random phase masks, jigsaw transforms, digital signatures, and linear transforms like the Fourier transforms, the fractional Fourier ...
An Asymptotically Optimal Method for Converting Bit Encryption to Multi-Bit Encryption
Proceedings, Part I, of the 21st International Conference on Advances in Cryptology -- ASIACRYPT 2015 - Volume 9452Myers and Shelat FOCS 2009 showed how to convert a chosen ciphertext secure CCA secure PKE scheme that can encrypt only 1-bit plaintexts into a CCA secure scheme that can encrypt arbitrarily long plaintexts via the notion of key encapsulation mechanism ...
Comments