Skip to main content
NIHPA Author Manuscripts logoLink to NIHPA Author Manuscripts
. Author manuscript; available in PMC: 2013 Oct 1.
Published in final edited form as: Opt Commun. 2012 Oct 1;285(21-22):4262–4267. doi: 10.1016/j.optcom.2012.06.056

Dual-channel in-line digital holographic double random phase encryption

Bhargab Das 1, Chandra S Yelleswarapu 1, D V G L N Rao 1,*
PMCID: PMC3587054  NIHMSID: NIHMS390801  PMID: 23471012

Abstract

We present a robust encryption method for the encoding of 2D/3D objects using digital holography and virtual optics. Using our recently developed dual-plane in-line digital holography technique, two in-line digital holograms are recorded at two different planes and are encrypted using two different double random phase encryption configurations, independently. The process of using two mutually exclusive encryption channels makes the system more robust against attacks since both the channels should be decrypted accurately in order to get a recognizable reconstruction. Results show that the reconstructed object is unrecognizable even when the portion of the correct phase keys used during decryption is close to 75%. The system is verified against blind decryptions by evaluating the SNR and MSE. Validation of the proposed method and sensitivities of the associated parameters are quantitatively analyzed and illustrated.

Keywords: Double random phase encryption, information security, digital holography, virtual optics

1. Introduction

With rapid advancements in internet, computer networking and global communications, information security to protect data from unauthorized use and counterfeiting has become an issue of supreme concern [1]. To this end, optical encryption techniques have received a great deal of attention mainly due to its natural ability to perform high speed parallel processing of two- or three-dimensional (2D/3D) information, and the security associated with an optical hardware implementation. One such method of optical encryption is the double random phase encoding (DRPE) technique [2].

Refregier and Javidi pioneered the work on double random phase encoding (DRPE) for optical security and encryption systems [3]. DRPE involves the use of two 2D random phase keys, one placed in the input image domain and one placed in the Fourier domain of an optical 4f imaging system. The input image is transformed into a stationary white noise by using these two statistically independent phase keys [4-8]. This DRPE technique was also put forward for encrypting information in the fractional Fourier domain with various architectures [9-11]. High security can be obtained because the scale factors and the fraction orders of the fractional Fourier transform provide additional security. Researchers have also extended the DRPE technique to the Fresnel domain where the distances between the random phase masks, the wavelength parameters, as well as the phase codes serve as the key to the system [12]. Several other optical encryption techniques based on fractional wavelet transform, integral imaging, and photon counting method can also be found in the literature [13-15].

However, the physical implementation of such an optical system gives rise to many practical issues such as lack of flexibility of optical hardware, non-availability of low-cost optoelectronics devices, and the need to manufacture physical random phase masks (RPMs) and difficulty in their alignment during the decryption process etc. Thus most of these encryption methods are difficult to be used in real world application. To overcome these problems, encryption methods based on the concepts of virtual optics (VO) have been proposed using digital holography techniques such as off-axis and phase-shifting digital holography [16-21]. VO enables to digitally control the RPMs and dispenses with the need to manufacture the RPMs physically. It also brings higher degrees of freedom into information hiding as there is no issue of physical limitations and no difficulty of optical alignment.

In this paper, we present a robust encryption method of 2D/3D objects using dual plane in-line digital holography [22-23], and VO. Digital holograms of an object pattern are optically recorded and are digitally encrypted using two independent DRPE channels. The decryption of the encrypted digital holograms and the reconstruction of the original object is performed digitally on a computing device. The proposed method has the advantages of cost effective utilization of the detector spatial bandwidth compared to off-axis holography and of fewer recorded holograms compared to phase-shifting holography [17, 18, 20-23]. Moreover, the use of two DRPE channels with phase keys Φ(x, y) to obtain the final encrypted data together with the reconstruction distances, z & Δz; and wavelength, λ remarkably enhances the security level of the encrypted information. In addition, digital recording of holograms enables us to store, transmit, and reconstruct data digitally, and offers several advantages over traditional methods.

2. Principle of Dual-channel digital holographic DRPE

The schematic of the experimental setup for recording in-line digital hologram is shown in figure 1. Linearly polarized light from an Ar-Kr laser (λ = 488 nm) is used. The object is placed in one arm of the interferometer and the transmitted light is collected and interfered with the reference beam. The two beams are combined by a beam splitter with no angular offset between them. The interference pattern between the two beams is recorded in two separate planes located at distances z and zz from the image plane.

Figure 1.

Figure 1

Experimental set-up for recording in-line digital holograms. BS’s, beam splitters; M’s, mirrors; P1 and P2, recording planes; IM, image plane.

These interferograms can be expressed [24] as

I1(x1,y1;z)=1+u1(x1,y1;z)2=1+u1(x1,y1;z)2+u1(x1,y1;z)+u1(x1,y1;z) (1)
I2(x2,y2;z+Δz)=1+u2(x2,y2;z+Δz)2=1+u2(x2,y2;z+Δz)2+u2(x2,y2;z+Δz)+u2(x2,y2;z+Δz) (2)

where the reference beam is considered to be an on-axis plane wave of unit amplitude, and u1(x1, y1; z) and u2(x2, y2; z + Δz) are the diffraction patterns of the object u0(x0, y0;0) at recording distances of z and zz from the image plane.

These two diffraction patterns can be expressed using the Rayleigh-Sommerfeld diffraction formula [24] as

ui(xi,yi;zi)=P{u0(x0,y0;0);zi}=12πu0(x0,y0;0)zi[exp[jkri]ri]dx0dy0 (3)

where i=1, 2, z1 = z, z2 = z + Δz, ri = [(xi - x0)2 + (yi - y0)2 + zi2]1/2, k=2π/λ and the operator P{·;z} stands for propagation in free space over a distance z.

The two recorded digital holograms at distances z and zz are then encrypted using the DRPE technique with two independent encryption channels as depicted by the block diagram in Figure 2. For this purpose, we followed the DRPE technique proposed in [2] and the required RPMs with uniform distribution in the range [0, 2π] are obtained digitally. To encode I1 in to a stationary white sequence, we perform two operations. First we multiply, I1 by a phase mask Φ11 = exp(i2πn11). The Fourier transform (FFT) of the above product is then multiplied by another phase mask Φ12 = exp(i2πn12). Here, n11 and n12 denote two independent white sequences uniformly distributed in [0, 1]. Finally, the encrypted information for the 1st channel is obtained by performing a further inverse Fourier transformation (IFFT). Thus the encrypted hologram for the 1st channel can be expressed as

Ψ1(x,y)=IFFT[FFT(I1(x,y)×Φ11)×Φ12] (4)

Figure 2.

Figure 2

Dual-channel DRPE encryption of recorded holograms. Φ’s are RPMs, FFT and IFFT are Fourier and Inverse Fourier transforms respectively. The procedure is reversed for decryption using corresponding conjugate phase masks.

The encrypted hologram for the 2nd encryption channel Ψ2 is obtained by using two more phase masks Φ21 and Φ22, and can be expressed as

Ψ2(x,y)=IFFT[FFT(I2(x,y)×Φ21)×Φ22] (5)

It is required that the encrypted holograms should be a stationary white noise for it to be robust against blind decryptions. The stationary whiteness can be verified by using the autocorrelation function given by

E{Ψ(x,y)Ψ(x+p,y+q)}=1Nξ=0N1η=0N1Ψ(ξ,η)2δ(p,q) (6)

where E{•} represents an ensemble average over a random phase, the asterisk denotes the complex conjugate, and δ(p, q) is Kronecker delta function. This property will be verified numerically in section 3 below by calculating the autocorrelation function of the encrypted holograms.

The reconstruction of the object pattern information from the encrypted digital hologram can be performed digitally in a computer. Initially each encrypted digital hologram is decrypted separately using conjugate of the corresponding phase masks [2]. For the 1st encryption channel, Ψ1 is inverse Fourier transformed and is multiplied by the phase mask Φ12=exp(i2πn12). The Fourier transform of the above product is then multiplied by the phase mask Φ11=exp(i2πn11). Similarly the 2nd encryption channel is also decrypted by performing a similar operation on Ψ2. Then the object information at the image plane can be reconstructed [22, 23] as follows:

U(x,y)=J1{δI(fx,fy;z)H(fx,fy;z)×[1H(fx,fy;2Δz)]} (7)

where J1{} stands for the inverse Fourier transform and

δI(fx,fy)=I(fx,fy;z)I(fx,fy;z+Δz)H(fx,fy;Δz), (8)
I(fx,fy;zi)=I(x,y;zi)exp[i2π(fxx+fyy)]dxdy (9)

I(x, y; zi), i = 1, 2, are the decrypted digital holograms, H(fx, fy; zi) is the transfer function for free space propagation, and fx and fy are the spatial frequency components along x and y directions respectively [24].

We notice from Eq. (7) and Eq. (8), that the decryption and reconstruction of the object information requires information from both the two channels. Thus the method proposed in this paper is bound to be more robust against attacks since both the two channels should be decrypted correctly in order to get a recognizable reconstruction. In the following section, we present encryption and decryption results based on the above proposed architecture. We show that the encrypted digital holograms become a white noise like pattern. We also calculate the signal-to-noise ratio (SNR) and mean-square-error (MSE) of the reconstructed object for various decryption conditions validating the robustness of the proposed dual-channel encryption technique.

3. Encryption and decryption results

For proof of concept, an USAF resolution chart (elements of Group 6 and 7) is used as the object. The holograms are recorded using a SPOT Insight™ 2 MP Firewire CCD with square pixels of size 7.4 μm. The two recorded holograms at distances 130.5 mm and 130.6 mm (from the image plane, Δz = 0.1 mm) are shown in figures. 3(a) and 3(b) respectively.

Figure 3.

Figure 3

The two recorded holograms at distances (a) 130.5 mm and (b) 130.6 mm

The encryption of the recorded digital holograms is performed using two independent DRPE channels. Each encryption channels involves the use of two 2D random phase keys (i.e. Φ11, Φ22, Φ21, and Φ22 as shown in the block diagram of figure 2), one placed in the hologram image domain and one placed in the Fourier domain of a 4f virtual optical imaging system. If these phase keys are generated by using statistically independent random sequences, then the encrypted information becomes stationary white noise. For example, figures 4(a) and 4(b) represent the real and imaginary parts of the encrypted digital hologram Ψ1 for one of the two channels. Figure 4(c) shows the autocorrelation function of the complex encrypted digital hologram Ψ1. The autocorrelation calculated using Eq. (6) is very small everywhere else except at (p, q) = (0, 0). This implicates that the encrypted hologram in our system becomes a stationary white noise. For further verification, we obtained the histograms of the real and imaginary parts of encrypted digital hologram Ψ1, as shown in figures 4(d) and 4(e). The theoretical Gaussian distribution fits very well to the histograms, and the mean and variance is calculated to be 0.0 and 0.3, respectively. This shows that the encrypted digital hologram Ψ1 can be a considered as a Gaussian stationary white noise. Similar studies are also performed for the other encrypted hologram Ψ2 which is not shown here. Ψ2 also becomes a Gaussian stationary white noise.

Figure 4.

Figure 4

(a) Real part, (b) Imaginary part, and (c) autocorrelation of the encrypted digital hologram for one of the two channels; histogram of (d) real part, (e) imaginary part of the encrypted digital hologram

The decryption of the encrypted digital holograms and the reconstruction of the data pattern is performed digitally. The object information at the image plane can be reconstructed using Eq. (7). Figure 5(a) shows the recovered image when the decryption and the reconstruction is performed using the correct system parameters. The quality of the object reconstruction in the presence of errors in different parameters in both the encryption channels are tested using the metrics of SNR and MSE defined respectively as [17],

SNR=ξ=0N1η=0N1U1(ξ,η)2ξ=0N1η=0N1[U1(ξ,η)U2(ξ,η)]2 (10)
MSE=ξ=0N1η=0N1[U1(ξ,η)U2(ξ,η)]2N×N (11)

where U1(ξ, η) and U2(ξ, η), respectively, represent the reconstructed object from the encrypted holograms using the correct encryption parameters and the reconstructed object from the encrypted hologram without using the correct encryption parameters. Both U1(ξ,η) and U2(ξ,η) are normalized by, the maximum of U1(ξ,η). For figure 5(a), the SNR and the MSE is calculated to be 159.5 and 3.31× 10−4 respectively. Further we studied the decryption of the encrypted holograms by choosing various system parameters. Figure 5(b) and 5(c) show the variation of SNR and the MSE values for different reconstruction distances on either side of the actual reconstruction distance. The SNR drops very sharply on either side, by about 50% of the maximum value when the reconstruction distance is altered as small as 0.5 mm. This shows the dependence of SNR and MSE of the recovered object on the reconstruction distances.

Figure 5.

Figure 5

(a) Reconstructed image using the correct system parameters; (b), (c) SNR and MSE versus reconstruction distance, respectively.

In order to test the robustness of the system, we reconstructed the object information from the encrypted digital holograms through blind decryption, where none of the parameters such as the phase keys Φ(x, y), the reconstruction distances, z and Δz; and wavelength, λ are known. In this case the reconstructed object is given by a white noise like pattern regardless of the reconstruction distance as shown in figure 6(a) and the average SNR and MSE are calculated to be 0.42 and 0.12, respectively. Figure 6(b) shows the SNR and MSE as functions of the reconstruction distance.

Figure 6.

Figure 6

(a) Reconstructed image through blind decryption (SNR=0.42 and MSE=0.12); (b), (c) SNR and MSE versus reconstruction distance, respectively.

Next the encrypted digital holograms are decrypted using the correct system parameters but using only a portion of the correct decryption phase keys in both the two channels. Figure 7 shows the SNR and MSE as a function of percentage of correct phase keys. Figure 8 shows the reconstructed object when the portion of the correct phase keys used in the decryption process is 25%, 50%, 75% and 90% respectively. In this case the reconstructed object was recognizable only when the portion of the correct phase keys used are greater than 75%. For comparison, the method proposed in [17] shows that a recognizable reconstructed image can be obtained when the decryption key used is only 5%. Thus our proposed method of dual channel DRPE is found to be more robust leading to a remarkable increase in the security level.

Figure 7.

Figure 7

SNR and MSE versus percentage of the correct phase keys used in the decryption process.

Figure 8.

Figure 8

Reconstructed object when the portion of the correct phase keys used is (a) 25%, MSE= 0.12; (b) 50%, MSE= 0.11; (c) 75%, MSE= 0.08; and (d) 90%, MSE= 0.03.

To further demonstrate the robustness of the dual channel DRPE technique, we decrypted the object information by considering a situation where the correct phase masks for one of the channel is 100% known. As shown in the figure 9, the reconstructed data pattern is still unrecognizable with very poor SNR and MSE values. This illustrates the robustness of the proposed method against a single channel DRPE technique. Furthermore, the distance between the two recording planes (Δz) is another vital parameter which serves as an important key. Figure 10 shows the recovered image obtained considering Δz=0.15 mm (correct Δz is 0.1 mm) during reconstruction assuming the best case scenario i. e. with correct system parameters for both the encryption channels. Even in this case the decrypted data pattern is not decipherable, and the SNR and MSE are found to be 0.86 and 0.06 respectively. Thus we see that the reconstruction algorithm and the decryption process are also very sensitive to the parameter Δz, and can be used as an effective encryption key together with the RPMs.

Figure 9.

Figure 9

Decrypted image with correct phase masks for one of the channels. SNR= 0.55 and MSE=0.096.

Figure 10.

Figure 10

Reconstructed image considering Δz=0.15 mm during reconstruction. Correct Δz is 0.1 mm.

7. Conclusion

In summary, we present the method of encryption of 2D/3D objects using digital holography and VO. Two in-line digital holograms recorded at two different planes are encrypted using a dual channel DRPE configuration. The robustness of the proposed system is verified against blind decryptions by evaluating the SNR and MSE. The reconstructed object shows a pattern of white noise irrespective of the reconstruction distance. It is also shown in the results that the reconstructed object is unrecognizable even when the portion of the correct phase keys used in the reconstruction is close to 75%. The method of inline digital holography makes the proposed method cost effective both in terms of utilizing the detector spatial bandwidth (compared to off-axis recording) and in terms of recording fewer holograms compared to phase shifting holography. Furthermore, the process of using two mutually exclusive encryption channels makes the system more robust against attacks since both the two channels should be decrypted properly in order to get a recognizable reconstruction. The reconstruction distances, z and Δz; and wavelength, λ offers additional security level to the encrypted information.

Acknowlegdement

This work is in part supported by National Center for Research Resources, National Institute of Health (NIH) grant 1R21RR024429-01A1.

Footnotes

Publisher's Disclaimer: This is a PDF file of an unedited manuscript that has been accepted for publication. As a service to our customers we are providing this early version of the manuscript. The manuscript will undergo copyediting, typesetting, and review of the resulting proof before it is published in its final citable form. Please note that during the production process errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal pertain.

References

  • [1].Javidi B. Optical and Digital Techniques for Information Security. Springer Verlag; 2005. [Google Scholar]
  • [2].Alfalou A, Brosseau C. Optical image compression and encryption methods. Adv. Opt. Photon. 2009;1:589–636. [Google Scholar]
  • [3].Refregier P, Javidi B. Optical-image encryption based on input plane and Fourier plane random encoding. Opt. Lett. 1995;20:767–769. doi: 10.1364/ol.20.000767. [DOI] [PubMed] [Google Scholar]
  • [4].Javidi B, Nomura T. Securing information by use of digital holography. Opt. Lett. 2000;25:28–30. doi: 10.1364/ol.25.000028. [DOI] [PubMed] [Google Scholar]
  • [5].Suzuki H, Yamaguchi M, Yachida M, Ohyama N, Tashima H, Obi T. Experimental evaluation of fingerprint verification system based on double random phase encoding. Opt. Express. 2006;14:1755–1766. doi: 10.1364/oe.14.001755. [DOI] [PubMed] [Google Scholar]
  • [6].Nelleri A, Joseph J, Singh K. Digital Fresnel field encryption for three-dimensional information security. Opt. Eng. 2007;46:045801. [Google Scholar]
  • [7].Monaghan DS, Gopinathan U, Situ G, Naughton TJ, Sheridan JT. Statistical investigation of the double random phase encoding technique. J. Opt. Soc. Am A. 2009;26:2033–2042. doi: 10.1364/josaa.26.002033. [DOI] [PubMed] [Google Scholar]
  • [8].Monaghan DS, Gopinathan U, Naughton TJ, Sheridan JT. Key-space analysis of double random phase encryption technique. Appl. Opt. 2007;46:6641–6647. doi: 10.1364/ao.46.006641. [DOI] [PubMed] [Google Scholar]
  • [9].Unnikrishnan G, Joseph J, Singh K. Optical encryption by double random phase encoding in the fractional Fourier domain. Opt. Lett. 2000;25:887–889. doi: 10.1364/ol.25.000887. [DOI] [PubMed] [Google Scholar]
  • [10].Nishchal NK, Unnikrishnan G, Joseph J, Singh K. Optical encryption using a localized fractional Fourier transform. Opt. Eng. 2003;42:3566–3571. [Google Scholar]
  • [11].Tao R, Xin Y, Wang Y. Double image encryption based on random phase encoding in the fractional Fourier domain. Opt. Express. 2007;15:16067–16079. doi: 10.1364/oe.15.016067. [DOI] [PubMed] [Google Scholar]
  • [12].Situ G, Zhang J. Double random-phase encoding in the Fresnel domain. Opt. Lett. 2004;29:1584–1856. doi: 10.1364/ol.29.001584. [DOI] [PubMed] [Google Scholar]
  • [13].Chen L, Zhao D. Optical image encryption based on fractional wavelet transform. Opt. Commun. 2005;254:361–367. [Google Scholar]
  • [14].Piao Y-R, Shin D-H, Kim E-S. Robust image encryption by combined use of integral imaging and pixel scrambling techniques. Opt. Lasers Eng. 2009;47:1273–1281. [Google Scholar]
  • [15].Perez-Cabre E, Cho M, Javidi B. Information authentication using photon-counting double-random-phase encrypted images. Opt Lett. 2011;36:22–24. doi: 10.1364/OL.36.000022. [DOI] [PubMed] [Google Scholar]
  • [16].Peng X, Cui Z, Tan T. Information encryption with virtual-optics imaging system. Opt. Commun. 2002;212:235–245. [Google Scholar]
  • [17].Kim H, Kim DH, Lee YH. Encryption of digital hologram of 3-D object by virtual optics. Opt. Express. 2004;12:4912–4921. doi: 10.1364/opex.12.004912. [DOI] [PubMed] [Google Scholar]
  • [18].Wang X, Zhao D, Jing F, Wei X. Information synthesis (complex amplitude addition and subtraction) and encryption with digital holography and virtual optics. Opt. Express. 2006;14:1476–1486. doi: 10.1364/oe.14.001476. [DOI] [PubMed] [Google Scholar]
  • [19].Wang X, Chen Y. Securing information using digital optics. J. Opt. A: Pure Appl. Opt. 2007;9:152–155. [Google Scholar]
  • [20].Meng XF, Cai LZ, Xu XF, Yang XL, Shen XX, Dong GY, Wang YR. Two step phase shifting interferometry and its application in image encryption. Opt. Lett. 2006;31:1414–1416. doi: 10.1364/ol.31.001414. [DOI] [PubMed] [Google Scholar]
  • [21].Meng XF, Peng X, Cai LZ, Li AM, Gao Z, Wang YR. Cryptosystem based on two-step phase-shifting interferometry and the RSA public key encryption algorithm. J. Opt. A: Pure Appl. Opt. 2009;11:085402. [Google Scholar]
  • [22].Das B, Yelleswarapu CS. Dual plane in-line digital holographic microscopy. Opt. Lett. 2010;35:3426–3428. doi: 10.1364/OL.35.003426. [DOI] [PubMed] [Google Scholar]
  • [23].Das B, Yelleswarapu CS, Rao DVGLN. Quantitative phase microscopy using dual-plane in-line digital holography. Appl. Opt. 2012;51:1387–1395. doi: 10.1364/AO.51.001387. [DOI] [PubMed] [Google Scholar]
  • [24].Goodman JW. Introduction to Fourier Optics. 3rd Ed Roberts & Company; 2004. [Google Scholar]

RESOURCES