Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Optical cryptosystem based on phase-truncated Fresnel diffraction and transport of intensity equation

Open Access Open Access

Abstract

A novel optical cryptosystem based on phase-truncated Fresnel diffraction (PTFD) and transport of intensity equation (TIE) is proposed. By using the phase truncation technique, a phase-encoded plaintext could be encrypted into a real-valued noise-like intensity distribution by employing a random amplitude mask (RAM) and a random phase mask (RPM), which are regarded as two secret keys. For decryption, a generalized amplitude-phase retrieval (GAPR) algorithm combined with the TIE method are proposed to recover the plaintext with the help of two keys. Different from the current phase-truncated-based optical cryptosystems which need record the truncated phase as decryption keys, our scheme do not need the truncated phase because of the introducing of the TIE method. Moreover, the proposed scheme is expected to against existing attacks. A set of numerical simulation results show the feasibility and security of the proposed method.

© 2015 Optical Society of America

1. Introduction

Optical information security technique has drawn a lot of attention due to its inherent property of parallelism and ultrafast processing speed [1]. Since Refregier and Javidi proposed the double random phase encoding (DRPE) method, which encrypted a plaintext into a complex-valued distribution with a 4-f optical processor in 1995 [2], various optical setups have been introduced to this research realm. In 2000, Nomura and Javidi adopt a joint transform correlator (JTC) architecture to encrypt an image into the joint power spectrum, a real-valued distribution, which is convenient to record and transmit [3]. Moreover, the JTC method does not require accurate optical alignment and an extra complex conjugate of the key as the DRPE demands. However, with development of cryptanalysis, more and more security issues were exposed by researchers. Carnicer et al schemed a chosen-ciphertext attack (CCA) on the DRPE-based systems in 2005 [4]. Soon afterwards, the same system was attacked by known-plaintext attacks (KPAs) [5–7]. Besides, it was also proved that the JTC-based systems have some security risks. Chosen-plaintext attacks (CPAs) were first implemented on these cryptosystems [8, 9] and KPAs were also proved effective [10, 11]. Before long, this system was attacked by COA method based on a hybrid input-output algorithm [12]. To resist the mentioned attacks such as CPAs, KPAs and COA, Qin and Peng proposed an asymmetric cryptosystem based on phase-truncated Fourier transform (PTFT) which use different keys in encryption and decryption process [13–15]. However, it was reported that the PTFT is suffered from known public key attack (KPKA) by a modified amplitude-phase retrieval algorithm [16, 17]. In recent years, scholars proposed modified asymmetric methods [18, 19]; whereas some researchers argued that it is rather a one-time pad than an asymmetric system, since the decryption keys are not independent of the plaintext [20, 21].

In optical encryption methods, phase information plays an important role. For example, RPMs are used as encryption keys in cryptosystems based on DRPE and JTC [2, 3], and truncated phases are used as decryption keys in PTFT-based systems [14, 19]. Therefore, it is vital to record or retrieve the phase information. To our knowledge, there are two kinds of phase retrieval techniques which are widely used in optical cryptography and cryptanalysis: phase-shifting interferometry and iterative phase retrieval algorithm (e.g. Gerchberg-Saxton algorithm, GS). In this paper, we introduce the transport of equation (TIE) method [22, 23], a third type of method to obtain the phase information in our decryption process. As discussed in above paragraph, the PTFT-based systems have a security enhancement due to the nonlinear operator of the phase-truncation. However, it requires recording the truncated phase each time using complicated interferometry in encryption process, and then the truncated phase are regard as secret keys for decryption. Besides, the security risks would arise if the encryption keys are used as public keys. To avoid its deficiency, we use a phase-truncated Fresnel diffraction (PTFD) optical setup for encryption, but utilize a generalized amplitude-phase retrieval (GAPR) algorithm and the TIE method in decryption process, which have no need of the truncated phase. Therefore, rather than generate two truncated phase each time as decryption keys in the PTFT-based systems [14, 19], our method only use two fixed keys which is more convenient in practice. Above all, we proposed an optical cryptosystem based on PTFD and TIE, in which the decryption process is different from the encryption. And this scheme not only enhances the security of the system but also avoids recording truncated phases as the traditional PTFT-based systems do. The rest of this paper is organized as follows. In section 2, we give a theoretical description of the proposed cryptosystem. Section 3 provides simulation results and a discussion. At last, a conclusion is made in section 4.

2. Theoretical description

For encryption, a phase-encoded plaintext bonded with a random amplitude mask (RAM) Fresnel diffracts a short distance, then the phase is truncated and its amplitude is recorded by its intensity. Subsequently the resultant amplitude is attached by a random phase mask (RPM), and Fresnel diffracts another distance, then the phase is truncated again and its intensity is recorded as ciphertext. The flow chart of the encryption process is shown in Fig. 1. R1(x,y) and R2(x,y) are two random distributions, which form the RAM (Key 1) and the RPM (Key 2), respectively. The RAM and RPM are regarded as two secret keys.

 figure: Fig. 1

Fig. 1 The flow chart of the encryption process. PTFD: phase-truncated Fresnel diffraction; E: ciphertext.

Download Full Size | PDF

To formulate the encryption process, suppose that an image (plaintext) f(x,y) is phase-encoded as exp[i2πf(x,y)], which multiply by the first key, RAM R1(x,y), to form a complex amplitude distribution:

u0(x,y)=R1(x,y)exp[i2πf(x,y)]

Then the complex amplitude Fresnel diffracts a distance dz1, which could be formulated by the angular spectrum theory [24]:

u1(x,y)=IFT{FT[u0(x,y)]H1(qx,qy)}=IFT{FT[u0(x,y)]exp[ikdz11(λqx)2(λqy)2]}

Here λ is wavelength, k=2π/λ and H1(qx,qy) is the transfer function. (qx,qy) are the variables conjugate to (x,y) in the Frequency domain. FT and IFT denote Fourier transform and inverse Fourier transform, respectively. CCD records its intensity as:

I1(x,y)=|u1(x,y)|2

Here |·| represents the modulus operator. In this record process the phase is truncated after Fresnel diffraction so that we name it as phase-truncated Fresnel diffraction (PTFD). Now we get the intermediate amplitude |u1(x,y)|=I1(x,y) as shown in Fig. 1. Then this amplitude is multiplied by the second key, RPM exp[i2πR2(x,y)]. This process could be written as:

u2(x,y)=|u1(x,y)|exp[i2πR2(x,y)]

Then this complex amplitude Fresnel diffracts another distance dz2 and is recorded by a CCD as ciphertext:

E(x,y)=|u3(x,y)|2=|IFT{FT[u2(x,y)]H2(qx,qy)}|2=|IFT{FT[u2(x,y)]exp[ikdz21(λqx)2(λqy)2]}|2

As described in the encryption process, the proposed method need not record the truncated phase as the PTFT-based cryptosystems do. We have also given a potential optical setup to realize our proposed encryption process. As shown in Fig. 2, SLM1 and SLM2 are amplitude-modulated and phase-modulated space-light modulators, respectively. The 4-f imaging system consisted by Lens1 and Lens2 enables the SLM1 and SLM2 to optically come into contact with each other. The Lens3 and Lens4 play identical role to transmit the complex amplitude on the SLM2 to the imaging plane. An intensity measurement device such as CCD is placed at a distance of dz from the imaging plane to measure the intensity of its corresponding complex amplitude. All the SLMs and CCD are controlled by a personal computer (PC). This optical setup could be used to implement the PTFD in the encryption process. As discussed in following paragraphs, the TIE method requires computing a finite difference which means that the Fresnel diffraction formulated in Eq. (2) only diffracts a very short distance. In other words, the CCD plane must be close to the image plane as shown in Fig. (2). It will be explained detailed in paragraphs following Eq. (14). Here we would like to emphasize that, the TIE method is widely used in the biomedical microscopy and X-ray imaging and its feasibility has been extensively verified by theories and experiments [23, 25, 26].

 figure: Fig. 2

Fig. 2 Sketch of optical setup for PTFD. SLM: space-light modulator; PC: personal computer.

Download Full Size | PDF

To decrypt the ciphertext, as shown in Fig. 3, the ciphertext E(x,y) and the RPM (Key 2) are taken as two constraints to retrieve the intermediate amplitude I1(x,y) using the GAPR algorithm, and then the amplitude I1(x,y) and the RAM (Key 1) are together to compute the phase exp[i2πf(x,y)] using the TIE method [22, 23]. The following paragraphs will formulate the GAPR and TIE methods in detail.

 figure: Fig. 3

Fig. 3 The flow chart of the decryption process. GAPR: generalized amplitude-phase retrieval algorithm; TIE: transport of intensity equation.

Download Full Size | PDF

The GAPR method that we used to retrieve the intermediate amplitude from two constraints is similar to the GS algorithm [27, 28]. It mainly consists of five steps: (1) generate a random distribution as the initial phase Φ0(x,y) to initialize an estimation of the complex amplitude G0(x,y)=E(x,y)exp[iΦ0(x,y)] in the output plane; (2) inverse Fresnel diffracts the estimation in the output plane; (3) replace the phase of the result in the step (2) with the RPM exp[i2πR2(x,y)] (Key 2), which is regarded as the phase constraint, to form an estimation of the complex amplitude in the input plane; (4) Fresnel diffracts the result of step (3) leading to another complex amplitude in the output plane; (5) replace the modulus of the result in step (4) with E(x,y), which is regarded as the amplitude constraint, to form an estimation of the complex amplitude in the output plane and it is then taken as the new input of the next iterative loop. The kth iteration process is illustrated in Fig. 4 and the aforementioned steps (2)-(5) are formulated as follows:

 figure: Fig. 4

Fig. 4 The flow chart of the GAPR algorithm. FD and IFD denote Fresnel diffraction and inverse Fresnel diffraction, respectively.

Download Full Size | PDF

Gk(x,y)=E(x,y)exp[iΦk(x,y)]gk(x,y)=IFD[Gk(x,y)]=Ik(x,y)exp[iφk(x,y)]gk+1(x,y)=Ik(x,y)exp[i2πR2(x,y)]Gk+1(x,y)=FD[gk+1(x,y)]=|Gk+1(x,y)|exp[iΦk+1(x,y)]

In Eq. (6), FD and IFD denote Fresnel diffraction and inverse Fresnel diffraction, respectively.

Once obtained the intermediate amplitude I(x,y) using the aforementioned GAPR method, we need to retrieve the plaintext using the amplitude I(x,y) and the RAM (Key 1). Generally speaking, iterative phase retrieval algorithm could not guarantee to retrieve the true solution, as the algorithm may converge to a local minimum. Therefore, as reported by J. R. Fienup, it is difficult to retrieve the true phase from two amplitude constraints using an iterative phase retrieval algorithms [26]. However, if the two amplitudes are in close proximity, its phase distribution could be recovered from the finite difference of the two amplitudes’ intensities using the TIE method [22, 23]. Here we give a brief derivation of the TIE formulation. A complex amplitude satisfies approximately the parabolic equation [22]:

(iz+22k+k)u0(x,y)=0

Where k=2π/λ, =xx+yy, 2=2x2+2y2 and u0(x,y) is such that,

I0(x,y)=|u0(x,y)|2

u0(x,y) has been defined in Eq. (1) in above paragraphs. So that the complex amplitude may be expressed in terms of the intensity and the phase,

u0(x,y)=[I0(x,y)]1/2exp[iφ(x,y)]=R1(x,y)exp[i2πf(x,y)]

Let Eq. (7) be multiplied by u0(x,y) on the left-hand side and the complex conjugate of Eq. (7) be multiplied by u0(x,y) on the left-hand. To subtract the two resulting equations one gets:

kI0(x,y)z=[I0(x,y)φ(x,y)]

Now, we need further introduce an auxiliary function ψ(x,y), which defined as:

ψ(x,y)=I0(x,y)φ(x,y)

Then Eq. (10) can be rewritten by:

2ψ(x,y)=kI0(x,y)z

According to the Fourier derivative theorem:

FT[x(n)w(x,y)]=inqxnFT[w(x,y)]

Here qx is the variable conjugate to x in the Fourier domain. So we get:

ψ(x,y)=IFT[(qx2+qy2)1FT(kI0(x,y)z)]

The longitude intensity derivative I0(x,y)/z in Eq. (14) along the Fresnel diffraction direction could not be directly measured. Conventionally, it has to make an approximation by a finite difference between two adjacent intensities. In the encryption process, as shown in Fig. 2, we set a very short distance between the image plane and the CCD plane, which ensures that the derivative I0(x,y)/z could be approximated by its finite difference. In decryption process, the derivative is approximated as follows:

I0(x,y)zI(x,y)|R1(x,y)|2dz1

I(x,y) is obtained by using GAPR algorithm, R1(x,y) is the Key 1 and dz1 is the diffraction distance that we set in the encryption process. Substitute Eq. (14) into Eq. (11), we get:

φ(x,y)=IFT{(qx2+qy2)1FT{[ψ(x,y)/I0(x,y)]}}

We noticed that the Eq. (16) has to compute ψ(x,y)/I0(x,y), where I0(x,y)=|R1(x,y)|2, so we set R1(x,y)[0.3,1] in the encryption process to avoid the division by zero error. So we obtain the plaintext directly by:

f(x,y)=φ(x,y)/2π

As depicted in the decryption process, the plaintext could be decrypted from the ciphertext by only using the two secret keys. The truncated phases in encryption process are needless in our cryptosystem. It is an essential difference and advantage of our method compared with the traditional PTFT-based cryptosystems.

3. Simulation results and discussion

The computer simulations are performed under the environment of MATLAB R2013b. To illustrate the performance of our algorithm and the reasonability of the diffraction distances, we calculate the correlation coefficient (CC) values vary with the diffraction distances. As shown in Fig. 5, the horizontal axis is the diffraction distance with the unit of micron (μm); the vertical axis is the CC values between the recovered results and the plaintext. The algorithm performance affected by diffraction distances of the TIE is shown in Fig. 5(a), which shows CC values varying with the diffraction distance dz1 from 1μm to 300μm. Besides, if we fix the diffraction distance dz1=10μm, after encryption and decryption, the CC values between the decrypted results and the plaintext is shown in the Fig. 5(b). It is clear that there is a down trending for CC values with the increasing of the diffraction distance. The simulation results provide guidance for parameters setting. We would like to point out that in this simulation the secret key R1(x,y)[0.3,0.8], in which the minimum has been explained in the paragraph following the Eq. (16), and the maximum is set to constraint the intensity distribution within a reasonable scope after Fresnel diffraction.

 figure: Fig. 5

Fig. 5 (a) The CC values between the original plaintext and the recovered results using the TIE method, it declines while the diffraction distance dz1 increases, (b) fix the diffraction distance dz1=10μm, the CC values between the original plaintext and the decrypted results using the MAPR and TIE methods, it also declines while the diffraction distance dz2 increases.

Download Full Size | PDF

In encryption process, we set parameters as λ=632.8nm, dz1=0.01mm and dz2=0.02mm. The proposed method requires that the intermediate result and the ciphertext to be quantized and recorded to high-bit format (16-bit in our method). Otherwise the recovered plaintext will be unrecognizable. In all the simulation experiments, we assume that the pixel sizes of SLMs and the CCD in the proposed optical setup are both 8μm, and the CCD works in the 16-bit imaging mode. Two images are taken as plaintexts which are shown in Fig. 6(a) (Lena, 512 × 512 pixels) and Fig. 6(d) (Treasure map, 512 × 512 pixels). Based on the PTFD strategy mentioned above, the corresponding ciphertexts obtained according to the Eqs. (1)-(5) are shown in Fig. 6(b) and Fig. 6(e) respectively, which look like noise patterns. With the help of the two keys (RAM and RPM), the ciphertexts are decrypted by using the GAPR and TIE methods, which are shown in the Fig. 6 (c) and Fig. 6(f). The CC values between the decrypted images and the original plaintexts are 0.9501 and 0.9936, respectively.

 figure: Fig. 6

Fig. 6 The simulation results. (a) Original plaintext ‘Lena’, (b) ciphertext corresponding to (a), (c) decrypted result using the GAPR and TIE methods. The CC value between the decrypted image (c) and the plaintext (a) is 0.9501. (d) Original plaintext ‘Treasure map’, (e) ciphertext corresponding to (d), (f) decrypted result using the GAPR and TIE methods. The CC value between the decrypted image (f) and the plaintext (d) is 0.9936.

Download Full Size | PDF

And the CC is defined as:

CC=mn(AmnA¯)(BmnB¯)(mn(AmnA¯)2)(mn(BmnB¯)2)

Where A and B denote two different two-dimensional distributions, m and n are the indexes of the rows and columns, respectively.

Here we would like to emphasize that thanks to introducing of the nonlinear phase-truncated operator, the security level of the proposed cryptosystem can thus get improved compared with other linear cryptosystems. For example, a plenty of optical cryptosystems based on the DRPE with a linear nature have already been proved to be vulnerable to the CCA and CPA [4, 7]. However, the proposed cryptosystem could be immune to these attacks. Meanwhile, referring to the more powerful KPA, the attackers usually adopt the phase retrieval technique to estimate the secret keys based on some prior knowledge, say a plaintext-ciphertext pair [5, 6]. But for our encryption scheme, the attackers use a plaintext-ciphertext pair cannot deduce the keys because they cannot aware of the RPM which is an essential constraint for a traditional phase retrieval algorithm [25]. As shown in Fig. 7, KPKA based on phase retrieval algorithm [16, 17] is also not feasible for our proposed method due to be lack of two secret keys.

 figure: Fig. 7

Fig. 7 The flow chart of the phase retrieval process. GAPR: generalized amplitude-phase retrieval algorithm. The red parts are not available to the attackers.

Download Full Size | PDF

To further demonstrate the security of our cryptosystem, suppose an attacker who has intercepted the ciphertext attempts to retrieve the plaintext without the knowledge of the Keys, he might try to decode the ciphertext with arbitrarily selected random keys. Figure 8(a) shows the decrypted result with a fake RPM and a fake RAM. Moreover, our simulation shows that, even if one of the two secret keys is divulged, it is still impossible to deduce the plaintext. Figure 8(b) shows the decrypted result with the true RPM (Key 2) and a fake RAM; Fig. 8(c) shows the decrypted result with a fake RPM and the true RAM (Key 1). Only possessed the true pair of keys, the correct decrypted result could be obtained. The CC values between the plaintext and the decrypted results with fake keys shown in Fig. 8(a)-8(c) are 0.0716, 0.0699 and 0.0718, respectively.

 figure: Fig. 8

Fig. 8 The decrypted results using fake keys. (a) Decrypted result using a fake RPM and a fake RAM; (b) decrypted result using the true RPM and a fake RAM; (c) decrypted result using a fake RPM and the true RAM.

Download Full Size | PDF

Moreover, different from the asymmetric cryptography based on PTFT which works with a one-time pad manner (each encryption process will generate a new set of keys used for decryption) [14, 18–21], our cryptosystem based on PTFD use only two fixed keys both in the encryption and decryption processes, this is more convenient in practice. Meanwhile, the PTFT-based methods have to record the truncated phase as decryption keys [14, 19]; by contrast, our decryption process based on the GAPR and TIE methods have no need of the truncated phase and the generated ciphertext is an intensity which could be recorded conveniently by a CCD.

4. Conclusion

In summary, we have proposed a novel optical cryptosystem based on the PTFD and TIE in which the decryption process is different from the encryption. A RAM and a RPM are employed as two secret keys to encrypt the input image into a real-valued noise-like intensity distribution. With the help of two secret keys, the ciphertext could be decrypt with the GAPR and TIE methods. Other than the published PTFT-based encryption methods which have to record the truncated phase as the decryption keys (different from the encryption keys), our method only requires the presence of the two encryption keys in the decryption process, and the decrypt plaintext is nearly lossless. Moreover, the generated ciphertext is an intensity which is convenient to record and transmit. Owing to the nonlinear operation of phase truncation as well as the decryption strategy, a higher security level could be achieved. A set of computer simulations are carried out to show the feasibility and security of the proposed method.

Acknowledgments

This work is supported by the National Natural Science Foundation of China (61171073 and 61307003), the Sino-German Center for Research Promotion (GZ 760) and China Postdoctoral Science Foundation (2013M540662, 2014T70823).

References and links

1. B. Javidi, “Securing information with optical technologies,” Phys. Today 50(3), 27–32 (1997). [CrossRef]  

2. P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20(7), 767–769 (1995). [CrossRef]   [PubMed]  

3. T. Nomura and B. Javidi, “Optical encryption using a joint transform correlator architecture,” Opt. Eng. 39(8), 2031–2035 (2000). [CrossRef]  

4. A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys,” Opt. Lett. 30(13), 1644–1646 (2005). [CrossRef]   [PubMed]  

5. U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, “A known-plaintext heuristic attack on the Fourier plane encryption algorithm,” Opt. Express 14(8), 3181–3186 (2006). [CrossRef]   [PubMed]  

6. X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31(8), 1044–1046 (2006). [CrossRef]   [PubMed]  

7. Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15(16), 10253–10265 (2007). [CrossRef]   [PubMed]  

8. J. F. Barrera, C. Vargas, M. Tebaldi, and R. Torroba, “Chosen-plaintext attack on a joint transform correlator encrypting system,” Opt. Commun. 283(20), 3917–3921 (2010). [CrossRef]  

9. W. Qin, X. Peng, and X. Meng, “Cryptanalysis of optical encryption schemes based on joint transform correlator architecture,” Opt. Eng. 50(2), 028201(2011). [CrossRef]  

10. J. F. Barrera, C. Vargas, M. Tebaldi, R. Torroba, and N. Bolognini, “Known-plaintext attack on a joint transform correlator encrypting system,” Opt. Lett. 35(21), 3553–3555 (2010). [CrossRef]   [PubMed]  

11. M. Liao, W. He, X. Peng, X. Liu, and X. Meng, “Cryptanalysis of optical encryption with a reference wave in a joint transform correlator architecture,” Opt. Laser Technol. 45, 763–767 (2013). [CrossRef]  

12. C. Zhang, M. Liao, W. He, and X. Peng, “Ciphertext-only attack on a joint transform correlator encryption system,” Opt. Express 21(23), 28523–28530 (2013). [CrossRef]   [PubMed]  

13. W. He, X. Peng, W. Qin, and X. Meng, “The keyed optical Hash function based on cascaded phase-truncated Fourier transforms,” Opt. Commun. 283(11), 2328–2332 (2010). [CrossRef]  

14. W. Qin and X. Peng, “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35(2), 118–120 (2010). [CrossRef]   [PubMed]  

15. W. Qin, X. Peng, X. Meng, and B. Gao, “Universal and special keys based on phase-truncated Fourier transform,” Opt. Eng. 50(8), 080501 (2011). [CrossRef]   [PubMed]  

16. X. Wang and D. Zhao, “A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Commun. 285(6), 1078–1081 (2012). [CrossRef]  

17. X. Wang, Y. Chen, C. Dai, and D. Zhao, “Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform,” Appl. Opt. 53(2), 208–213 (2014). [CrossRef]   [PubMed]  

18. W. Liu, Z. Liu, and S. Liu, “Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang-Gu algorithm,” Opt. Lett. 38(10), 1651–1653 (2013). [CrossRef]   [PubMed]  

19. X. Wang and D. Zhao, “Double images encryption method with resistance against the specific attack based on an asymmetric algorithm,” Opt. Express 20(11), 11994–12003 (2012), doi:. [CrossRef]   [PubMed]  

20. W. He, X. Meng, and X. Peng, “Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang-Gu algorithm: comment,” Opt. Lett. 38(20), 4044(2013). [CrossRef]   [PubMed]  

21. W. Chen, B. Javidi, and X. Chen, “Advances in optical security systems,” Adv. Opt. Photon. 6(2), 120–155 (2014). [CrossRef]  

22. M. Reed Teague, “Deterministic phase retrieval: a Green’s function solution,” J. Opt. Soc. Am. 73(11), 1434–1441 (1983). [CrossRef]  

23. L. J. Allen and M. P. Oxley, “Phase retrieval from series of images obtained by defocus variation,” Opt. Commun. 199(1–4), 65–75 (2001). [CrossRef]  

24. J. W. Goodman, Introduction to Fourier Optics (Roberts & Company, 2005), Chap. 3.

25. C. Zuo, Q. Chen, W. Qu, and A. Asundi, “High-speed transport-of-intensity phase microscopy with an electrically tunable lens,” Opt. Express 21(20), 24060–24075 (2013). [PubMed]  

26. C. Zuo, Q. Chen, Y. Yu, and A. Asundi, “Transport-of-intensity phase imaging using Savitzky-Golay differentiation filter - theory and applications,” Opt. Express 21(5), 5346–5362 (2013), doi:. [CrossRef]   [PubMed]  

27. J. R. Fienup, “Phase retrieval algorithms: a comparison,” Appl. Opt. 21(15), 2758–2769 (1982). [CrossRef]   [PubMed]  

28. J. R. Fienup, “Phase retrieval algorithms: a personal tour [Invited],” Appl. Opt. 52(1), 45–56 (2013). [PubMed]  

Cited By

Optica participates in Crossref's Cited-By Linking service. Citing articles from Optica Publishing Group journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (8)

Fig. 1
Fig. 1 The flow chart of the encryption process. PTFD: phase-truncated Fresnel diffraction; E: ciphertext.
Fig. 2
Fig. 2 Sketch of optical setup for PTFD. SLM: space-light modulator; PC: personal computer.
Fig. 3
Fig. 3 The flow chart of the decryption process. GAPR: generalized amplitude-phase retrieval algorithm; TIE: transport of intensity equation.
Fig. 4
Fig. 4 The flow chart of the GAPR algorithm. FD and IFD denote Fresnel diffraction and inverse Fresnel diffraction, respectively.
Fig. 5
Fig. 5 (a) The CC values between the original plaintext and the recovered results using the TIE method, it declines while the diffraction distance d z 1 increases, (b) fix the diffraction distance d z 1 =10μm , the CC values between the original plaintext and the decrypted results using the MAPR and TIE methods, it also declines while the diffraction distance d z 2 increases.
Fig. 6
Fig. 6 The simulation results. (a) Original plaintext ‘Lena’, (b) ciphertext corresponding to (a), (c) decrypted result using the GAPR and TIE methods. The CC value between the decrypted image (c) and the plaintext (a) is 0.9501. (d) Original plaintext ‘Treasure map’, (e) ciphertext corresponding to (d), (f) decrypted result using the GAPR and TIE methods. The CC value between the decrypted image (f) and the plaintext (d) is 0.9936.
Fig. 7
Fig. 7 The flow chart of the phase retrieval process. GAPR: generalized amplitude-phase retrieval algorithm. The red parts are not available to the attackers.
Fig. 8
Fig. 8 The decrypted results using fake keys. (a) Decrypted result using a fake RPM and a fake RAM; (b) decrypted result using the true RPM and a fake RAM; (c) decrypted result using a fake RPM and the true RAM.

Equations (18)

Equations on this page are rendered with MathJax. Learn more.

u 0 (x,y)= R 1 (x,y)exp[ i2πf(x,y) ]
u 1 (x,y)=IFT{ FT[ u 0 (x,y) ] H 1 ( q x , q y ) } =IFT{ FT[ u 0 (x,y) ]exp[ ikd z 1 1 (λ q x ) 2 (λ q y ) 2 ] }
I 1 (x,y)= | u 1 (x,y) | 2
u 2 (x,y)=| u 1 (x,y) |exp[ i2π R 2 (x,y) ]
E(x,y)= | u 3 (x,y) | 2 = | IFT{ FT[ u 2 (x,y) ] H 2 ( q x , q y ) } | 2 = | IFT{ FT[ u 2 (x,y) ]exp[ ikd z 2 1 (λ q x ) 2 (λ q y ) 2 ] } | 2
G k (x,y)= E(x,y) exp[i Φ k (x,y)] g k (x,y)=IFD[ G k (x,y) ]= I k (x,y) exp[i φ k (x,y)] g k+1 (x,y)= I k (x,y) exp[i2π R 2 (x,y)] G k+1 (x,y)=FD[ g k+1 (x,y) ]=| G k+1 (x,y) |exp[i Φ k+1 (x,y)]
(i z + 2 2k +k) u 0 (x,y)=0
I 0 (x,y)= | u 0 (x,y) | 2
u 0 (x,y)= [ I 0 (x,y) ] 1/2 exp[ iφ(x,y) ]= R 1 (x,y)exp[ i2πf(x,y) ]
k I 0 (x,y) z =[ I 0 (x,y)φ(x,y) ]
ψ(x,y)= I 0 (x,y)φ(x,y)
2 ψ(x,y)=k I 0 (x,y) z
FT[ x (n) w(x,y) ]= i n q x n FT[ w(x,y) ]
ψ(x,y)=IFT[ ( q x 2 + q y 2 ) 1 FT( k I 0 (x,y) z ) ]
I 0 (x,y) z I (x,y) | R 1 (x,y) | 2 d z 1
φ(x,y)=IFT{ ( q x 2 + q y 2 ) 1 FT{ [ ψ(x,y) / I 0 (x,y) ] } }
f(x,y)= φ(x,y) / 2π
CC= m n ( A mn A ¯ )( B mn B ¯ ) ( m n ( A mn A ¯ ) 2 )( m n ( B mn B ¯ ) 2 )
Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.