Share Email Print

Spie Press Book • new

Optical Encryption and Decryption
Format Member Price Non-Member Price
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Book Description

This Spotlight provides a brief overview of the field and highlights some of the key technical results in optical encryption systems. It opens with a historical review of steganography, watermarking, and some of the classical cryptographic methods: the Data Encryption Standard, Advanced Encryption Standard, and RSA algorithm. One of the most widespread approaches, double random phase encryption (DRPE), is described as an example. The theory and algorithms for optical-signal-processing-based encryption systems, divided into (a) optical/digital holographic-capture-based methods and (b) non-holographic-capture-based methods. Illumination-based implementations, i.e., photon counting, are briefly discussed. Finally, the security of some of these techniques is examined, and optical cryptoanalysis approaches, including iterative phase-retrieval-based methods, are briefly introduced.

Book Details

Date Published: 1 March 2019
Pages: 48
ISBN: 9781510626164
Volume: SL46

Table of Contents
SHOW Table of Contents | HIDE Table of Contents

1 Introduction

2 Data Security
2.1 Steganography
2.2 Watermarking
     2.2.1 Visible watermarking
     2.2.2 Invisible watermarking
2.3 Cryptography
     2.3.1 Symmetric cryptography
     2.3.2 Asymmetric cryptography

3 Optical Encryption Methods
3.1 Double random phase encoding
     3.1.1 Fourier-transform-based encryption of amplitude-encoded images
     3.1.2 Fourier-transform-based encryption of phase-encoded images
     3.1.3 Linear-canonical-transform-based encryption
     3.1.4 Fresnel-transform-based encryption
     3.1.5 Fractional Fourier-transform-based encryption
     3.1.6 Non-separable linear-canonical-transform-based encryption
3.2 Phase-only optical encryption
3.3 Polarization-based encryption
3.4 Optical image encryption based on interference
3.5 Optical asymmetric cryptography

4 Experimental Implementation of the Classical Encryption System
4.1 Optical/digital holographic capturing-based systems
     4.1.1 Coherent-light-based Fresnel encryption system
     4.1.2 Incoherent-illumination-based encryption system
4.2 Non-holographic encryption systems
     4.2.1 Encryption using the integral imaging method
     4.2.2 Hartley-transform-based encryption system

5 Low-Light-Power-Based Implementations

6 Cryptanalysis

7 Summary


High-rate data transmission has become ubiquitous due to the abundant availability of internet facilities. This also makes information security vital to protecting against data theft. Traditionally, encryption has been used to successfully address such threats. This Spotlight introduces some classical information-security approaches, e.g., steganography, watermarking, and digital cryptographic methods. In this context, optical signal processing (OSP)-based encryption systems have recently received a great deal of attention because of their inherent advantages, such as natural 2-D imaging capabilities, multiple degrees of freedom, and high-speed parallelism.

This book provides an overview of optical encryption from the perspective of image (both 2-D and 3-D) and optical-information processing. Section 3 introduces the classical Fourier-transform-based optical encryption method, i.e., double random phase encryption (DRPE), and several of its extensions. Section 4 discusses the conventional implementations (holographic and non-holographic) of some of the encryption systems introduced in Section 3. Section 5 briefly covers low-light-level (photon counting)-based encryption system implementations. Finally, Section 6 briefly talks about the cryptanalysis approaches used in various attempts to crack or break some of the classical encryption systems presented.

Both experimental and synthesized results (images) are provided in the text for illustration. Wherever possible (space permitting), background information is provided, although some knowledge of advanced mathematics and image processing, and familiarity with standard scientific computing languages, is needed for complete comprehension.

Inbarasan Muniraj
John T. Sheridan
January 2019

© SPIE. Terms of Use
Back to Top