• Laser & Optoelectronics Progress
  • Vol. 60, Issue 10, 1010016 (2023)
Di Zhang1, Nana Yu1, Sixing Xi1,*, Liying Lang2..., Xiaolei Wang3 and Huanzhen Zhang1|Show fewer author(s)
Author Affiliations
  • 1School of Mathematics and Physics Science and Engineering, Hebei University of Engineering, Handan 056038, Hebei , China
  • 2Advanced Laser Technology Research Center, Hebei University of Technology, Tianjin 300401, China
  • 3Institute of Modern Optics, Nankai University, Tianjin 300350, China
  • show less
    DOI: 10.3788/LOP220659 Cite this Article Set citation alerts
    Di Zhang, Nana Yu, Sixing Xi, Liying Lang, Xiaolei Wang, Huanzhen Zhang. Multipleimage Polarization Encryption Method Based on Light Field Regulation and Frequency Shifting[J]. Laser & Optoelectronics Progress, 2023, 60(10): 1010016 Copy Citation Text show less
    References

    [1] Refregier P, Javidi B. Optical image encryption based on input plane and Fourier plane random encoding[J]. Optics Letters, 20, 767-769(1995).

    [2] Deng X P, Zhao D M. Single-channel color image encryption based on asymmetric cryptosystem[J]. Optics & Laser Technology, 44, 136-140(2012).

    [3] Liu Z J, Guo C, Tan J B et al. Securing color image by using phase-only encoding in Fresnel domains[J]. Optics and Lasers in Engineering, 68, 87-92(2015).

    [4] Abuturab M R. An asymmetric single-channel color image encryption based on Hartley transform and gyrator transform[J]. Optics and Lasers in Engineering, 69, 49-57(2015).

    [5] Qin W, Peng X. Asymmetric cryptosystem based on phase-truncated Fourier transforms[J]. Optics Letters, 35, 118-120(2010).

    [6] Rajput S K, Nishchal N K. Image encryption based on interference that uses fractional Fourier domain asymmetric keys[J]. Applied Optics, 51, 1446-1452(2012).

    [7] Wang X G, Zhao D M. A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms[J]. Optics Communications, 285, 1078-1081(2012).

    [8] Rajput S K, Nishchal N K. Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform[J]. Applied Optics, 52, 871-878(2013).

    [9] Wang X G, Chen Y X, Dai C Q et al. Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform[J]. Applied Optics, 53, 208-213(2014).

    [10] He M Z, Cai L Z, Liu Q et al. Multiple image encryption and watermarking by random phase matching[J]. Optics Communications, 247, 29-37(2005).

    [11] Situ G H, Zhang J J. Position multiplexing for multiple-image encryption[J]. Journal of Optics A Pure and Applied Optics, 8, 391-397(2006).

    [12] Shi Y S, Zhang J J. Research on the phase retrieval algorithm used for multiple-image encryption with region multiplexing[J]. Acta Optica Sinica, 29, 2705-2708(2009).

    [13] Hwang H E, Chang H T, Lie W N. Multiple-image encryption and multiplexing using a modified Gerchberg-Saxton algorithm and phase modulation in Fresnel-transform domain[J]. Optics Letters, 34, 3917-3919(2009).

    [14] Qin Y, Li J, Ma M F et al. System for optical multiple binary image encryption by random phase mask multiplexing[J]. Acta Optica Sinica, 34, 0307001(2014).

    [15] Guo F P, Li J, Gong Q et al. Color image encryption by additional key multiplexing[J]. Journal of Applied Optics, 35, 626-631(2014).

    [16] Wang H J, Qin Y, Huang Y D et al. Multiple-image encryption and authentication in interference-based scheme by aid of space multiplexing[J]. Optics & Laser Technology, 95, 63-71(2017).

    [17] Goodman J W, Lawrence R W. Digital image formation from electronically detected holograms[J]. Applied Physics Letters, 11, 77-79(1967).

    [18] Shen X J, Lin C, Kong D Z. Fresnel-transform holographic encryption based on angular multiplexing and random-amplitude mask[J]. Optical Engineering, 51, 068201(2012).

    [19] Xu D S, Lu M, Jia C Z et al. Angular-multiplexing optical multiple-image encryption based on digital holography and random amplitude mask[J]. Journal of Russian Laser Research, 38, 285-293(2017).

    [20] Di H, Zheng K F, Zhang X et al. Multiple-image encryption by compressive holography[J]. Applied Optics, 51, 1000-1009(2012).

    [21] Wan Y H, Wu F, Yang J H et al. Multiple-image encryption based on compressive holography using a multiple-beam interferometer[J]. Optics Communications, 342, 95-101(2015).

    [22] Wu J, Wang G, Xu G. Color image encryption method based on computer generated hologram and chaos[J]. Acta Optica Sinica, 41, 1909001(2021).

    [23] Liu X Y, Cao Y P, Lu P et al. Optical image encryption technique based on compressed sensing and Arnold transformation[J]. Optik, 124, 6590-6593(2013).

    [24] Deepan B, Quan C, Wang Y et al. Multiple-image encryption by space multiplexing based on compressive sensing and the double-random phase-encoding technique[J]. Applied Optics, 53, 4539-4547(2014).

    [25] Wang M T, Zhou X, Hu Y J et al. A new multiple-image encryption method based on compressive sensing[J]. Laser Journal, 37, 38-41(2016).

    [26] Fridrich J. Symmetric ciphers based on two-dimensional chaotic maps[J]. International Journal of Bifurcation and Chaos, 8, 1259-1284(1998).

    [27] Tang Z J, Song J, Zhang X Q et al. Multiple-image encryption with bit-plane decomposition and chaotic maps[J]. Optics and Lasers in Engineering, 80, 1-11(2016).

    [28] Zhou Y X, Bi M H, Teng X Y et al. Physical layer encryption and system performance enhancement algorithm based on chaos mapping in OFDM-PON[J]. Acta Optica Sinica, 41, 1606002(2021).

    [29] Wang X G, Zhao D M. Multiple-image encryption based on nonlinear amplitude-truncation and phase-truncation in Fourier domain[J]. Optics Communications, 284, 148-152(2011).

    [30] Zhang W Q, Zhou N R. Multiple-image encryption algorithm based on asymmetric cryptosystem[J]. Journal of Optoelectronics·Laser, 23, 1382-1388(2012).

    [31] Deng X P, Wen W. Optical multiple-image encryption based on fully phase encoding and interference[J]. Optik, 126, 3210-3214(2015).

    [32] Li X Y, Meng X F, Yang X L et al. Multiple-image encryption based on compressive ghost imaging and coordinate sampling[J]. IEEE Photonics Journal, 8, 3900511(2016).

    [33] Sui L S, Zhou B, Ning X J et al. Optical multiple-image encryption based on the chaotic structured phase masks under the illumination of a vortex beam in the gyrator domain[J]. Optics Express, 24, 499-515(2016).

    [34] Yuan X, Zhang L H, Chen J et al. Multiple-image encryption scheme based on ghost imaging of Hadamard matrix and spatial multiplexing[J]. Applied Physics B, 125, 174(2019).

    [35] Jiao S M, Feng J, Gao Y et al. Visual cryptography in single-pixel imaging[J]. Optics Express, 28, 7301-7313(2020).

    [36] Tang Z J, Song J, Zhang X Q et al. Multiple-image encryption with bit-plane decomposition and chaotic maps[J]. Optics and Lasers in Engineering, 80, 1-11(2016).

    [37] Zhang X Q, Wang X S. Multiple-image encryption algorithm based on mixed image element and permutation[J]. Optics and Lasers in Engineering, 92, 6-16(2017).

    [38] Guo Y, Zhou Y Y, Jing S W. Multiple-image encryption based on image recombination and bit scrambling[J]. Acta Photonica Sinica, 49, 0410002(2020).

    [39] Xu Q J, Li D L, Chang C L et al. Q-plate based dual image asymmetric polarization encryption[J]. Acta Physica Sinica, 68, 084202(2019).

    [40] Zhang Y, Wang B. Optical image encryption based on interference[J]. Optics Letters, 33, 2443-2445(2008).

    Di Zhang, Nana Yu, Sixing Xi, Liying Lang, Xiaolei Wang, Huanzhen Zhang. Multipleimage Polarization Encryption Method Based on Light Field Regulation and Frequency Shifting[J]. Laser & Optoelectronics Progress, 2023, 60(10): 1010016
    Download Citation