Abstract

An asymmetric multi-image encryption system based on the chirp z-transform (CZT) is demonstrated. The setup is a hybrid architecture that combines a double-random-phase encryption scheme in 4f configuration and a multiplexing procedure based on the CZT. The setup allows encodement of multiple images and their transmittal in a single multiplexed element. The decryption stage has a compact design that allows retrieval of several data without cross-talk noise. Since the system is asymmetric, the users’ decryption keys are different from those used in the encryption process, resulting in an encoding scheme resistant to cryptanalysis attacks. It is demonstrated that multiplexing based on the CZT allows functionality expansion of the static encoding setups (optical, digital or hybrid) to a dynamic range, a fact that provides a versatile solution to handle large volumes of encrypted data efficiently and safely. The viability of this proposal is verified using virtual optical systems.

© 2019 Optical Society of America

Full Article  |  PDF Article
OSA Recommended Articles
Robust multidepth object encryption based on a computer-generated hologram with a cascaded structure

Mei-Lan Piao, Shi-Gang Wang, Yan Zhao, Jian Wei, Yu Zhao, and Nam Kim
Appl. Opt. 58(36) 9921-9930 (2019)

Nonlinear optical security system based on a joint transform correlator in the Fresnel domain

Juan M. Vilardy, María S. Millán, and Elisabet Pérez-Cabré
Appl. Opt. 53(8) 1674-1682 (2014)

References

You do not have subscription access to this journal. Citation lists with outbound citation links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Supplementary Material (1)

NameDescription
» Visualization 1       Decrypted sequences from a multiplexed package obtained with an asymmetric multiple-image encryption system based on chirp z-transform. Each decryption uses different combinations of private and public keys.

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Figures (6)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Tables (3)

You do not have subscription access to this journal. Article tables are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Equations (6)

You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Metrics

You do not have subscription access to this journal. Article level metrics are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription