검색 전체 메뉴
PDF
맨 위로
OA 학술지
Optical Encryption of a Binary Image by Phase Modulation of the Wavefront
  • 비영리 CC BY-NC
  • 비영리 CC BY-NC
ABSTRACT
Optical Encryption of a Binary Image by Phase Modulation of the Wavefront
KEYWORD
Optical security , Encryption , Phase modulation
  • I. INTRODUCTION

    Optical encryption systems [1, 2] have been widely researched in recent years, since Refregier and Javidi proposed the double- random phase encoding technique, in which a primary image is converted into stationary white noise using two random-phase masks [3, 4]. The double-random phase encoding could be improved by inserting the mask in the fractional Fourier domain [5]. Han et al. proposed XOR operation between two polarization states [6]. Davis et al. demonstrated two-dimensional encoding of the polarization state of the incident beam, using a phase spatial light modulator sandwiched between two quarter-wave plates [7]. Mogensen and Glückstad showed encryption of a two-dimensional image by employing XOR operation between two polarization states [8-11]. Biener et al. proposed an optical encryption method based on the polarization change caused by space-variant subwavelength dielectric gratings [12, 13]. Alfalou and Brosseau proposed an image encryption method based on the polarization encoding of an image illuminated by unpolarized light [14, 15].

    In this paper, we present an all-optical encryption and decryption scheme for a two-dimensional binary data page. We first transform the “on” and “off” pixels of the binary image into right- and left-handed circular polarizations. Then, two orthogonal linear polarizers are used to separate the original image into two independent phase images, each of which is fully encrypted such that the on and off pixels have the same intensity and polarization. It is shown that the decryption can be easily done by optically combining the two phase images. Our scheme is demonstrated by optical experiments, and the principle is explained by Jones matrices. The feasibility of our scheme is proved by measuring the bit error rate (BER) of the encrypted and decrypted images. It is experimentally shown that the interference between one of our encrypted images and a third plane wave cannot restore the original binary data.

    II. EXPERIMENTAL SETUP FOR PHASE MODULATION

    Our experimental setup is shown in Fig. 1(a). The encryption and decryption of a binary data page are performed optically, with the help of the circular polarization of the laser beam. A He-Ne laser of 633 nm is used for the light source. The laser beam is first expanded by a beam expander (BE) and converted to a large Gaussian beam. The curvature of the wavefront is later changed by lens L1 so that the wavefront itself is an encryption key, in addition to the phase modulation of the wavefront. Polarizer P1 polarizes the beam vertically with respect to the surface of the optical table, or the page. After its curvature is modified by lens L1, the beam passes through the TN-LC panel that is taken from a commercial beam projector (Sony VPL-EX100). The red LC panel used in our experiment has 1024×768 pixels. Since the LC panel is employed here for phase modulation, it is used without the crossed polarizers that were essential for the intensity modulation in the original beam projector.

    A two-dimensional binary image is displayed on the LC panel, using a computer. An off pixel in the image, representing a grayscale value of zero, makes the input laser beam pass through the LC panel with no change in its polarization, while an on pixel in the image, representing a grayscale value of 255, rotates the polarization of the output beam from the LC panel by 83°, relative to that of the input beam. Under our experimental conditions, the rotation of the polarization is not 90°, and thus it is very difficult to make the beams of on and off pixels be the right-hand and left-hand circular polarizations, respectively, at the same time. To overcome this problem, we use two quarter-wave plates, as shown in Fig. 1(a). The quarter-wave plate in the upper arm is aligned to give the beam of the on pixel exact right-hand circular polarization, whereas the other quarter-wave plate in the lower arm is used to give the beam of the off pixel exact left-hand circular polarization. The polarizer P2 in the upper arm is used to collect only the horizontal components of the beams of the on and off pixels, whereas the polarizer P3 in the lower arm is used to collect only the vertical components. Then, using the half-wave plate, the beam polarization is rotated by 90° in the upper arm, so that all beams are vertically polarized in the upper and lower arms. The wave plate (WP) is used to change the relative phase between the beams in the upper and lower arms. Lens L2 forms the image of the LC panel at the position of lens L3, and then lens L5 forms a reduced image of the LC panel at the CCD, which has 640×480 pixels. One bit (or block) in the binary image falling on the CCD covers 22×22 CCD pixels. Due to lenses L3 and L4, the diameter of each beam is almost unchanged as it propagates toward lens L5.

    It is noted that the images in the upper and lower arms respectively represent two encrypted images. Each can be separately recorded on the CCD by blocking the other beam. Combining the images of the upper and lower arms at the CCD yields the decrypted image.

    III. PRINCIPLE OF PHASE MODULATION

    When the vertically polarized laser beam passes through the LC panel, the polarization of the output beam is spatially modulated according to the binary pattern fed into the LC panel. An on pixel makes the output beam horizontally polarized, its polarization state being represented by the Jones matrix [1, 0]T. On the other hand, an off pixel causes no change in the output polarization, its polarization state being represented by the Jones matrix [0, 1]T. If an image-bearing beam passes through a quarter-wave plate, the beams of the on and off pixels respectively become right- and left-hand circularly polarized. The polarization state of the beam of an on pixel, which is right-hand circularly polarized, is represented by the Jones matrix as

    image

    In this equation φ is the rotation angle of the slow axis of the quarter-wave plate relative to the surface of the optical table, which is 45° in the ideal case. The phase term θ(x, y) represents the relative phase difference among the on pixels located at different points in the transverse plane, such as (x1, y1), (x2, y2), and so on. The relative phase is due to the curved wave front of the image-bearing beam. (The constant ½ is omitted on the right side of Eq. (1), because it is irrelevant to the polarization state.) Similarly, after passing through the quarter-wave plate, the polarization state of the beam of an off pixel, which is left-hand circularly polarized, is given by the Jones matrix as

    image

    Next, as explained earlier, the image bearing beam is split into two by a beamsplitter. In the lower arm, after the polarizer P3, the polarization states of the on and off pixels are respectively given as

    image
    image

    Note that the second element of the column matrix in Eq. (3) is equal to that of the column matrix in Eq. (1). Similarly, the second element of the column matrix in Eq. (4) is equal to that of the column matrix in Eq. (2). Either the on pixel in Eq. (3) or off pixel in Eq. (4) may have an extra phase shift, depending on the position on the wavefront. In these equations n stands for an on pixel and f stands for an off pixel.

    In the upper arm the beam is horizontally polarized, due to polarizer P2. After the polarizer, the Jones matrices of the on and off pixels are given as

    image
    image

    Note that the first element of the column matrix in Eq. (5) is equal to that of the column matrix in Eq. (1). Similarly, the first element of the column matrix in Eq. (6) is equal to that of the column matrix in Eq. (2).

    Next, the beam is vertically polarized using a half-wave plate. In the upper arm, therefore, the Jones matrices of the on and off pixels are finally given as

    image
    image

    In the lower arm, for example, the image-bearing beam contains on and off pixels whose polarization states are represented by Eqs. (3) and (4). Both beams are vertically polarized, although they are 90° phase-shifted with respect to each other, except for the phase difference θ(x, y). The two beams have the same intensity, such that they are indistinguishable at the CCD. The binary image is thus encrypted in the lower arm. By the same token, the binary image with the Jones matrices in Eqs. (7) and (8) is encrypted in the upper arm.

    The original binary data page is phase modulated, and therefore encrypted in both the upper and lower arms in our experimental setup. Decryption can be performed simply by combining the encrypted image with its counterpart.

    In our experiment, the beams in the upper and lower arms are combined at beamsplitter BS2 for decryption. The Jones matrices are shown in Eqs. (9) and (10). In this case, the on pixels in the upper and lower arms are combined such that the polarization state of the combined beam is given by the sum of Eqs. (3) and (7); the Jones matrix is given by

    image

    Similarly, when the off pixels in the upper and lower arms are combined, the polarization state is given by the sum of Eqs. (4) and (8); the Jones matrix is given by

    image

    Since the polarization states of the on and off pixels are the same as in Eqs. (9) and (10), it is impossible to distinguish on from off pixels in the combined image; the image is still encrypted. To decrypt the image, we insert an additional wave plate in the upper arm, which causes an extra phase delay of 90° in the beam. Then, from Eqs. (9) and (10), the polarization states of the on and off pixels in the decrypted page are given by

    image
    image

    Note that the second matrices on the left-hand sides of Eqs. (11) and (12) are multiplied by i, to account for the additional 90° phase shift of the beam in the upper arm. Eqs. (11) and (12) clearly show that the on and off pixels should be distinguishable in the decrypted image.

    IV. EXPERIMENTAL RESULTS

    A TN-LC panel of 1024×768 pixels is used in our experiment. We use a random checkerboard of 10×20 blocks, each representing a bit, as shown in Fig. 2(a). A white block represents an on pixel, while a black one represents an off pixel. A single block is made of 35×35 LC pixels. Under our experimental conditions, one block covers 22×22 pixels of the CCD.

    Figures 2(b) and 2(c) show two images encrypted in the upper and lower arms respectively. To check the degree of encryption, we measure the BER of the encrypted image, which is defined as

    image

    The BERs are measured as 44.2% and 59.6% respectively for the two encrypted images. Since a BER of 50% indicates the best case for the encryption, the measured BERs show that both encryptions in the upper and lower arms are excellent in our experiment. Figure 2(d) shows the decrypted image of the binary pattern obtained by combining the images in the upper and lower arms after an additional phase delay has been imposed in the upper arm. In this process, the beams of the on pixels interfere constructively (see Eq. (11)), while those of the off pixels interfere destructively (see Eq. (12)). The BER is measured as 3.7% in the decrypted image.

    We repeated the experiment of encryption and decryption by changing the curvature of the laser beam, which is done by moving lens L1 forward or backward. Figure 2(e) is the decrypted image when lens L1 is moved 20 cm toward the LC panel, while Fig. 2(f) is the decrypted image when lens L1 is moved 20 cm backward. The BERs are measured to be 2.4% and 5.5%, respectively, in this case. It is noted that the decryption is not affected by the change in curvature of the encrypted beam in our scheme.

    Next, we tried to decrypt the image using a third beam. With reference to Fig. 1(b), when a simply expanded laser beam is used to decrypt the image in the upper arm, lenses L4 and L5 are removed, and the interference between two beams yields the image at the CCD, as shown in Fig. 3(a). The BER is measured as 48.3%, meaning that the image has not been decrypted. To improve the BER, we employ lenses L4 and L5 and change the distance between them to make the curvature of the third beam fit that of the beam in the upper arm. Figure 3(b) is the best image we can obtain, for which the BER is measured as 15.3%.

    We then displace lens L1 forward or backward to change the curvature of the beam incident upon the LC panel, or the beam used to encrypt the image. Figures 3(c) and 3(d) are the images decrypted using the simply expanded laser beam; during the encryption, lens L1 was moved 20 cm forward for Fig. 3(c), and 20 cm backward for Fig. 3(d). The BERs for the decrypted images are measured to be 42.9% and 41.4%, respectively. The BERs show that decryption cannot be accomplished using a simply expanded laser beam. Figures 3(e) and 3(f) are the best decryptions we could obtain by adjusting lenses L4 and L5. In this case, the BERs are improved to 7.8% and 23.5%, which are still higher than that of the image decrypted using our method.

    V. CONCLUSION

    We have proposed a new scheme for optical encryption of a binary image. In our method, a binary data page is converted into a set of two phase images. In each phase image, the on and off pixels are 90° phase-shifted with respect to each other. Furthermore, the on pixel in a phase image is 90° phase shifted with respect to its counterpart in the other phase image. Since in a phase image the on and off pixels have the same intensity, they are indistinguishable to an intensity detector, and the original binary image is thus encrypted.

    In our method, decryption is performed easily by combining two phase images. An intruder might try to decrypt the image by interfering our phase image with a third beam―a plane wave, for example. However, since the curvature of the beam is changed during encryption in our method, a complete decryption is very difficult and time-consuming, even if the exact curvature of the beam is known. In our method, the BER of the decrypted image was as low as 3.7%. Even when we changed the curvature of the encryption beam, the BER of the decrypted image did not change much. On the other hand, the BER of the image decrypted by interfering the phase image with a plane wave was measured to be 48.3%, and it improved only to 15.3% when two lenses were used to fit the curvature of the encryption beam. When the curvature was changed during the encryption, decryption with a third beam required a lot of optical adjustment to fit the curvature using two lenses. In this case, the BER ranged from 7.8% to 23.5%.

    In conclusion, we propose a new system of optical encryption of binary data. In our method, the wavefront of a laser beam is phase modulated according to the binary data, and the curvature of the wavefront is changed for different data pages. The image-bearing beam is then split into two phase images, such that they are independently encrypted. Decryption is performed by optically combining the two phase images.

참고문헌
  • 1. Zheng J., Li X. (2015) “Image authentication using only partial phase information from a double-random-phase-encrypted image in the Fresnel domain,” [J. Opt. Soc. Korea] Vol.19 P.241-247 google cross ref
  • 2. Lee I. H. (2014) “Accumulation encoding technique based on double random phase encryption for transmission of multiple images,” [J. Opt. Soc. Korea] Vol.18 P.401-405 google cross ref
  • 3. Refregier P., Javidi B. (1995) “Optical image encryption based on input plane and Fourier plane random encoding,” [Opt. Lett.] Vol.20 P.767-769 google cross ref
  • 4. Javidi B., Zhang G., Li J. (1997) “Encrypted optical memory using double-random phase encoding,” [Appl. Opt.] Vol.36 P.1054-1058 google cross ref
  • 5. Matoba O., Javidi B. (1999) “Encrypted optical memory system using three-dimensional keys in the Fresnel domain,” [Opt. Lett.] Vol.24 P.762-764 google cross ref
  • 6. Han J. W., Park C. S., Ryu D. H., Kim E. S. (1999) “Optical image encryption based on XOR operations,” [Opt. Eng.] Vol.38 P.47-54 google cross ref
  • 7. Davis J. A., McNamara D. E., Cottrell D. M., Sonehara T. (2000) “Two-dimensional polarization encoding with a phase-only liquid-crystal spatial light modulator,” [Appl. Opt.] Vol.39 P.1549-1554 google cross ref
  • 8. Mogensen P. C., Gluckstad J. (2000) “A phase-based optical encryption system with polarisation encoding,” [Opt. Commun.] Vol.173 P.177-183 google cross ref
  • 9. Unnikrishnan G., Pohit M., Singh K. (2000) “A polarization encoded optical encryption system using ferroelectric spatial light modulator,” [Opt. Commun.] Vol.185 P.25-31 google cross ref
  • 10. Eriksen R. L., Mogensen P. C., Gluckstad J. (2001) “Elliptical polarisation encoding in two dimensions using phase-only spatial light modulators,” [Opt. Commun.] Vol.187 P.325-336 google cross ref
  • 11. Cheng C. J., Chen M. L. (2004) “Polarization encoding for optical encryption using twisted nematic liquid crystal spatial light modulators,” [Opt. Commun.] Vol.237 P.45-52 google cross ref
  • 12. Biener G., Niv A., Kleiner V., Hasman E. (2005) “Geometrical phase image encryption obtained with space-variant subwave-length gratings,” [Opt. Lett.] Vol.30 P.1096-1098 google cross ref
  • 13. Biener G., Niv A., Kleiner V., Hasman E. (2006) “Space-variant polarization scrambling for image encryption obtained with subwavelength gratings,” [Opt. Commun.] Vol.261 P.5-12 google cross ref
  • 14. Alfalou A., Brosseau C. (2010) “Dual encryption scheme of images using polarized light,” [Opt. Lett.] Vol.35 P.2185-2187 google cross ref
  • 15. Dubreuil M., Alfalou A., Brosseau C. (2012) “Robustness against attacks of dual polarization encryption using the Stokes-Mueller formalism,” [J. Opt.] Vol.14 P.094004 google cross ref
OAK XML 통계
이미지 / 테이블
  • [ FIG. 1. ]  Experimental setup: (a) original setup for our encryption and decryption of binary data, (b) decryption using a third beam.
    Experimental setup: (a) original setup for our encryption and decryption of binary data, (b) decryption using a third beam.
  • [ ] 
  • [ ] 
  • [ ] 
  • [ ] 
  • [ ] 
  • [ ] 
  • [ ] 
  • [ ] 
  • [ ] 
  • [ ] 
  • [ ] 
  • [ ] 
  • [ FIG. 2. ]  (a) Random checkerboard of 10×20 blocks. (b) Encrypted image in the upper arm. (c) Encrypted image in the lower arm. (d) Decrypted image. (e) Decrypted image when lens L1 is moved forward. (f) Decrypted image when lens L1 is moved backward.
    (a) Random checkerboard of 10×20 blocks. (b) Encrypted image in the upper arm. (c) Encrypted image in the lower arm. (d) Decrypted image. (e) Decrypted image when lens L1 is moved forward. (f) Decrypted image when lens L1 is moved backward.
  • [ ] 
  • [ FIG. 3. ]  (a) Decryption with a third beam, a simple laser beam. (b) Lenses L4 and L5 are used to improve the image in (a). (c) and (d): During encryption, Lens L1 was displaced forward in (c) and backward in (d), and then the decryptions are done with the third beam. (e) and (f): Lenses L4 and L5 are used to improve the images in (c) and (d), respectively.
    (a) Decryption with a third beam, a simple laser beam. (b) Lenses L4 and L5 are used to improve the image in (a). (c) and (d): During encryption, Lens L1 was displaced forward in (c) and backward in (d), and then the decryptions are done with the third beam. (e) and (f): Lenses L4 and L5 are used to improve the images in (c) and (d), respectively.
(우)06579 서울시 서초구 반포대로 201(반포동)
Tel. 02-537-6389 | Fax. 02-590-0571 | 문의 : oak2014@korea.kr
Copyright(c) National Library of Korea. All rights reserved.