A journal of IEEE and CAA , publishes high-quality papers in English on original theoretical/experimental research and development in all areas of automation
Volume 7 Issue 4
Jun.  2020

IEEE/CAA Journal of Automatica Sinica

  • JCR Impact Factor: 15.3, Top 1 (SCI Q1)
    CiteScore: 23.5, Top 2% (Q1)
    Google Scholar h5-index: 77, TOP 5
Turn off MathJax
Article Contents
Chao Han and Yuzhen Shen, "Three-Dimensional Scene Encryption Algorithm Based on Phase Iteration Algorithm of the Angular-Spectral Domain," IEEE/CAA J. Autom. Sinica, vol. 7, no. 4, pp. 1074-1080, July 2020. doi: 10.1109/JAS.2019.1911726
Citation: Chao Han and Yuzhen Shen, "Three-Dimensional Scene Encryption Algorithm Based on Phase Iteration Algorithm of the Angular-Spectral Domain," IEEE/CAA J. Autom. Sinica, vol. 7, no. 4, pp. 1074-1080, July 2020. doi: 10.1109/JAS.2019.1911726

Three-Dimensional Scene Encryption Algorithm Based on Phase Iteration Algorithm of the Angular-Spectral Domain

doi: 10.1109/JAS.2019.1911726
Funds:  This work was supported by the Natural Science Research Project of the Colleges and Universities of Anhui Province (KJ2016A056), Natural Science Foundation of Anhui Province of China (1508085MF121), and National Natural Science Foundation of China (61572032)
More Information
  • In order to increase the capacity of encrypted information and reduce the loss of information transmission, a three-dimensional (3D) scene encryption algorithm based on the phase iteration of the angular spectrum domain is proposed in this paper. The algorithm, which adopts the layer-oriented method, generates the computer generated hologram by encoding the three-dimensional scene. Then the computer generated hologram is encoded into three pure phase functions by adopting the phase iterative algorithm based on angular spectrum domain, and the encryption process is completed. The three-dimensional scene encryption can improve the capacity of the information, and the three-phase iterative algorithm can guarantee the security of the encryption information. The numerical simulation results show that the algorithm proposed in this paper realized the encryption and decryption of three-dimensional scenes. At the same time, it can ensure the safety of the encrypted information and increase the capacity of the encrypted information.

     

  • loading
  • [1]
    P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Optics Letters, vol. 20, no. 7, pp. 767–769, Apr. 1995. doi: 10.1364/OL.20.000767
    [2]
    G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Optics Letters, vol. 29, no. 14, pp. 1584–1586, Aug. 2004. doi: 10.1364/OL.29.001584
    [3]
    G. Situ and J. Zhang, “A lensless optical security system based on computer-generated phase only masks,” Optics Communications, vol. 232, no. 1–6, pp. 115–122, Mar. 2004. doi: 10.1016/j.optcom.2004.01.002
    [4]
    H. Hwang, H. Chang, and W. Lie, “Fast double-phase retrieval in Fresnel domain using modified Gerchberg-Saxton algorithm for lensless optical security systems,” Optics Express, vol. 17, no. 16, pp. 13700–13710, Aug. 2009. doi: 10.1364/OE.17.013700
    [5]
    S. Xi, X. Sun, B. Liu, et al., “New image encryption technology of image based on computer generated hologram,” Laser&Optoelectronics Progress, vol. 49, no. 040902, pp. 1–6, Jan. 2012.
    [6]
    O. Matoba and B. Javidi, “Encrypted optical memory system using three-dimensional keys in the Fresnel domain,” Optics Letters, vol. 24, no. 11, pp. 762–764, Jun. 1999. doi: 10.1364/OL.24.000762
    [7]
    S. Liu, Q. Mi, and B. Zhu, “Optical image encryption with multistage and multichannel fractional Fourier-domain filtering,” Optics Letters, vol. 26, no. 16, pp. 1242–1244, Aug. 2001. doi: 10.1364/OL.26.001242
    [8]
    Y. Zhang, CH. Zheng, and N. Tanno, “Optical encryption based on iterative fractional Fourier transform,” Optics Communications, vol. 202, no. 4-6, pp. 277–285, Feb. 2002. doi: 10.1016/S0030-4018(02)01113-6
    [9]
    A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys,” Optics Letters, vol. 30, no. 13, pp. 1644–1646, Jul. 2005. doi: 10.1364/OL.30.001644
    [10]
    X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Optics Letters, vol. 31, no. 22, pp. 3261–3263, Nov. 2006. doi: 10.1364/OL.31.003261
    [11]
    X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Optics Letters, vol. 31, no. 8, pp. 1044–1046, Nov. 2006. doi: 10.1364/OL.31.001044
    [12]
    Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Optics Express, vol. 15, no. 16, pp. 10253–10265, Aug. 2007. doi: 10.1364/OE.15.010253
    [13]
    J. Chen, Y. Zhang, and L. Zhang, “Security enhancement of double random phase encoding using rear-mounted phase masking,” Optics and Lasers in Engineering, vol. 101, pp. 51–59, Feb. 2018. doi: 10.1016/j.optlaseng.2017.09.019
    [14]
    R. K. Wang, I. A. Watson, and C. R. Chatwin, “Random phase encoding for optical security,” Optical Engineering, vol. 35, no. 09, pp. 2464–2469, Sept. 1996. doi: 10.1117/1.600849
    [15]
    Y. Li, K. Kreske, and J. Rosen, “Security and encryption optical systems based on a correlator with significant output images,” Applied Optics, vol. 39, no. 29, pp. 5295–5301, Oct. 2000. doi: 10.1364/AO.39.005295
    [16]
    J. Hou, R. Xi, P. Liu, and T. Liu, “The switching fractional order chaotic system and its application to image encryption,” IEEE/CAA J. Autom. Sinica, vol. 4, no. 2, pp. 381–388, Apr. 2017. doi: 10.1109/JAS.2016.7510127
    [17]
    G. Situ and J. Zhang, “Multiple-image encryption by wavelength multiplexing,” Optics Letters, vol. 30, no. 11, pp. 1306–1308, Jun. 2005. doi: 10.1364/OL.30.001306
    [18]
    Y. Shi, G. Situ, and J. Zhang, “Multiple-image hiding in the Fresnel domain,” Optics Letters, vol. 32, no. 13, pp. 1914–1916, Jul. 2007. doi: 10.1364/OL.32.001914
    [19]
    J.-J. Huang, H.-E. Hwang, C.-Y. Chen, and C.-M. Chen, “Lensless multiple-image optical encryption based on improved phase retrieval algorithm,” Applied Optics, vol. 51, no. 13, pp. 2388–2394, Apr. 2012. doi: 10.1364/AO.51.002388
    [20]
    S. Y. Yao, L. F. Chen, G. J. Chang, and B. Y. He, “A new optical encryption system for image transformation,” Optics and Laser Technology, vol. 97, pp. 234–241, Dec. 2017. doi: 10.1016/j.optlastec.2017.07.005
    [21]
    L. Zhang, X. Yuan, D. Zhang, and J. Chen, “Research on multiple-image encryption scheme based on Fourier transform and Ghost imaging algorithm,” Current Optics and Photonics, vol. 2, no. 4, pp. 315–323, Aug. 2018.
    [22]
    X. Chen, Q. Liu, J. Wang, and Q. Wang, “Asymmetric encryption of multi-image based on compressed sensing and feature fusion with high quality image reconstruction,” Optics&Laser Technology, vol. 107, pp. 302–312, Nov. 2018.
    [23]
    Y. Zhao, L. Cao, H. Zhang, D. Kong, and G. Jin, “Accurate calculation of computer-generated holograms using angular-spectrum layer-oriented method,” Optics Express, vol. 23, no. 20, pp. 25440–25449, Oct. 2015. doi: 10.1364/OE.23.025440
    [24]
    D. Kong, L. Cao, G. Jin, and B. Javidi, “Three-dimensional scene encryption and display based on computer-generated holograms,” Applied Optics, vol. 55, no. 29, pp. 8296–8300, Oct. 2016. doi: 10.1364/AO.55.008296
    [25]
    D. Kong, L. Cao, X. Shen, H. Zhang, and G. Jin, “Image encryption based on interleaved computer-generated holograms,” IEEE Trans. Industrial Informatics, vol. 14, no. 2, pp. 673–678, Feb. 2018. doi: 10.1109/TII.2017.2714261
    [26]
    D. S. Monaghan, U. Gopinathan, T. J. Naughton, and J. T. Sheridan,, “Key-space analysis of double random phase encryption technique,” Applied Optics, vol. 46, no. 26, pp. 6641–6647, Sept. 2007. doi: 10.1364/AO.46.006641

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(13)

    Article Metrics

    Article views (1250) PDF downloads(63) Cited by()

    Highlights

    • An accurate angular spectrum diffraction is used to reduce the loss of information transmission.
    • The combination of the angular spectrum diffraction and the three - phase iterative algorithm improves the security of the encrypted information.
    • The algorithm proposed can achieve the encryption and decryption of 3D scenes and increase the capacity of the encrypted information.

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return