Please wait a minute...
Chin. Phys. B, 2019, Vol. 28(8): 084203    DOI: 10.1088/1674-1056/28/8/084203
ELECTROMAGNETISM, OPTICS, ACOUSTICS, HEAT TRANSFER, CLASSICAL MECHANICS, AND FLUID DYNAMICS Prev   Next  

Phase retrieval algorithm for optical information security

Shi-Qing Wang(王诗晴), Xiang-Feng Meng(孟祥锋), Yu-Rong Wang(王玉荣), Yong-Kai Yin(殷永凯), Xiu-Lun Yang(杨修伦)
Department of Optics, School of Information Science and Engineering, and Shandong Provincial Key Laboratory of Laser Technology and Application, Shandong University, Qingdao 266237, China
Abstract  As a typical technology for optical encryption, phase retrieval algorithms have been widely used in optical information encryption and authentication systems. This paper presents three applications of two-dimensional (2D) phase retrieval for optical encryption and authentication:first, a hierarchical image encryption system, by which multiple images can be hidden into cascaded multiple phase masks; second, a multilevel image authentication system, which combines (t, n) threshold secret sharing (both t and n are positive integers, and tn) and phase retrieval, and provides both high-level and low-level authentication; and finally, a hierarchical multilevel authentication system that combines the secret sharing scheme based on basic vector operations and the phase retrieval, by which more certification images can be encoded into multiple cascaded phase masks of different hierarchical levels. These three phase retrieval algorithms can effectively illustrate phase-retrieval-based optical information security. The principles and features of each phase-retrieval-based optical security method are analyzed and discussed. It is hoped that this review will illustrate the current development of phase retrieval algorithms for optical information security and will also shed light on the future development of phase retrieval algorithms for optical information security.
Keywords:  phase retrieval algorithm      authentication system      image encryption  
Received:  09 March 2019      Revised:  16 May 2019      Accepted manuscript online: 
PACS:  42.30.Rx (Phase retrieval)  
  42.30.Va (Image forming and processing)  
  42.30.Wb (Image reconstruction; tomography)  
  42.30.Kq (Fourier optics)  
Fund: Project supported by the National Natural Science Foundation of China (Grant Nos. 61775121, 61605165, 61307003, 61405122, and 11574311), the Key Research and Development Program of Shandong Province, China (Grant No. 2018GGX101002), the Natural Science Foundation of Shandong Province, China (Grant No. ZR2019QF006), and the Fundamental Research Funds of Shandong University, China (Grant No. 2015GN031).
Corresponding Authors:  Xiu-Lun Yang     E-mail:  xlyang@sdu.edu.cn

Cite this article: 

Shi-Qing Wang(王诗晴), Xiang-Feng Meng(孟祥锋), Yu-Rong Wang(王玉荣), Yong-Kai Yin(殷永凯), Xiu-Lun Yang(杨修伦) Phase retrieval algorithm for optical information security 2019 Chin. Phys. B 28 084203

[41] Chen Y, Liu Q, Wang J and Wang Q H 2017 Opt. Eng. 56 123106
[1] Zhang X P, Guo R, Chen H W, Zhao Z M and Wang J Y 2018 Chin. Phys. B 27 080701
[42] Shamir A 1979 Commun. ACM 22 612
[2] Wang X Y, Wang Y, Wang S W, Zhang Y Q and Wu X J 2018 Chin. Phys. B 27 110502
[43] Lin C C and Tsai W H 2004 J. Syst. Software 73 405
[3] Javidi B, Carnicer A, Yamaguchi M et al 2016 J. Opt. 18 083001
[44] Liu Z J, Ahmad M A and Liu S T 2008 Opt. Commun. 281 5322
[4] Chen W 2016 IEEE Photon. J. 8 1
[45] Islam N, Puech W, Hayat K and Brouzet R 2011 Opt. Commun. 284 4412
[5] Wang X G, Chen W and Chen X D 2015 Opt. Express 23 6239
[46] Chen W, Javidi B, Chen and X 2014 Adv. Opt. Photon. 6 120
[6] Li T and Shi Y S 2016 Chin. Phys. Lett. 33 014206
[47] Deng X P, Wen W, Mi X W and Long X W 2015 Opt. Commun. 341 22
[7] Chen W 2018 Appl. Opt. 57 1196
[48] Wang X G and Zhao D M 2011 Opt. Commun. 284 945
[8] Chen W 2017 Appl. Opt. 56 9126
[49] Chen L F, Liu J Y, Wen J S, Mao H D, Ge F and Zhao D M 2015 Opt. Commun. 338 110
[9] Chen W and Chen X D 2016 Appl. Opt. 55 6740
[50] Chen L F, Liu J Y, Wen J S, Gao X, Mao H D, Shi X Y and Qu Q L 2015 Opt. Laser Technol. 69 80
[10] Meng X F, Cai L Z, Xu X F, Yang X L, Shen X X, Dong G Y and Wang Y R 2006 Opt. Lett. 31 1414
[11] Meng X F, Cai L Z, Wang Y R, Yang X L, Xu X F, Dong G Y and Shen X X 2009 Opt. Laser Eng. 47 96
[12] Zhang X, Meng X F, Wang Y R, Yang X L and Yin Y K 2018 Chin. Phys. B 27 074205
[13] Chen W 2017 Opt. Express 25 16509
[14] Chen W 2016 IEEE Photon. Technol. Lett. 28 1932
[15] Chen W 2016 IEEE Photon. Technol. Lett. 28 540
[16] Chen W and Chen X D 2015 Europhys. Lett. 110 44002
[17] Chen W and Chen X D 2014 Appl. Phys. Lett. 104 251109
[18] Chen W and Chen X D 2013 Opt. Lett. 38 546
[19] Chen W and Chen X D 2013 Appl. Phys. Lett. 103 221106
[20] Chen W, Situ G H and Chen X D 2013 Opt. Express 21 24680
[21] Chen W 2015 Appl. Opt. 54 10711
[22] Wang R K, Watson I A and Chatwin C R 1996 Opt. Eng. 35 2464
[23] Situ G H, Zhang J J, Zhang Y and Zhao Z S 2004 J. Optoelectron. Laser 15 341 (in Chinese)
[24] Situ G H and Zhang J J 2004 Opt. Commun. 232 115
[25] Huang J J, Hwang H E, Chen C Y and Chen C M 2012 Appl. Opt. 51 2388
[26] Chen W, Chen X D, Stern A and Javidi B 2013 IEEE. Photon. J. 5 6900113
[27] Meng X F, Cai L Z, Wang Y R, Yang X L, Xu X F, Dong G Y, Shen X X, Zhang H and Cheng X C 2007 J. Opt. A-Pure Appl. Opt. 9 1070
[28] Fan D S, Meng X F, Wang Y R, Yang X L, Peng X, He W Q, Dong G Y and Chen H Y 2013 Appl. Opt. 52 5645
[29] Pan X M, Meng X F, Wang Y R, Yang X L, Peng X, He W Q, Dong G Y, Chen and H Y 2014 J. Mod. Opt. 61 1470
[30] Fan D S, Meng X F, Wang Y R, Yang X L, Pan X M, Peng X, He W Q, Dong G Y and Chen H Y 2015 Appl. Opt. 54 3204
[31] Pan X M, Meng X F, Wang Y R, Yang X L, Peng X, He W Q, Dong G Y and Chen H Y 2016 J. Mod. Opt. 63 632
[32] Li X Y, Meng X F, Yin Y K, Yang X L, Wang Y R, Peng X, He W Q, Pan X M, Dong G Y and Chen H Y 2017 Opt. Laser Eng. 89 59
[33] Li X Y, Meng X F, Wang Y R, Yang X L, Yin Y K, Peng X, He W Q, Dong G Y and Chen H Y 2017 Opt. Laser Eng. 96 7
[34] Fienup J R 1982 Appl. Opt. 21 2758
[35] Rosen J 1993 Opt. Lett. 18 1183
[36] Meng X F, Cai L Z, Yang X L, Shen X X and Dong G Y 2006 Appl. Opt. 45 3289
[37] He M Z, Cai L Z, Liu Q, Wang X C and Meng X F 2005 Opt. Commun. 247 29
[38] Chang H T, Lu W C and Kuo C J 2002 Appl. Opt. 41 4825
[39] Liu Z Y, Xia T C and Wang J B 2018 Chin. Phys. B 27 030502
[40] Yuk C K M, Au O C, Li R Y M and Lam S Y 2007 IEEE International Symposium on Circuits & Systems, May 27-30, 2007, New Orleans, LA, USA, p. 4
[41] Chen Y, Liu Q, Wang J and Wang Q H 2017 Opt. Eng. 56 123106
[42] Shamir A 1979 Commun. ACM 22 612
[43] Lin C C and Tsai W H 2004 J. Syst. Software 73 405
[44] Liu Z J, Ahmad M A and Liu S T 2008 Opt. Commun. 281 5322
[45] Islam N, Puech W, Hayat K and Brouzet R 2011 Opt. Commun. 284 4412
[46] Chen W, Javidi B, Chen and X 2014 Adv. Opt. Photon. 6 120
[47] Deng X P, Wen W, Mi X W and Long X W 2015 Opt. Commun. 341 22
[48] Wang X G and Zhao D M 2011 Opt. Commun. 284 945
[49] Chen L F, Liu J Y, Wen J S, Mao H D, Ge F and Zhao D M 2015 Opt. Commun. 338 110
[50] Chen L F, Liu J Y, Wen J S, Gao X, Mao H D, Shi X Y and Qu Q L 2015 Opt. Laser Technol. 69 80
[1] A color image encryption algorithm based on hyperchaotic map and DNA mutation
Xinyu Gao(高昕瑜), Bo Sun(孙博), Yinghong Cao(曹颖鸿), Santo Banerjee, and Jun Mou(牟俊). Chin. Phys. B, 2023, 32(3): 030501.
[2] Asymmetric image encryption algorithm based ona new three-dimensional improved logistic chaotic map
Guo-Dong Ye(叶国栋), Hui-Shan Wu(吴惠山), Xiao-Ling Huang(黄小玲), and Syh-Yuan Tan. Chin. Phys. B, 2023, 32(3): 030504.
[3] Lossless embedding: A visually meaningful image encryption algorithm based on hyperchaos and compressive sensing
Xing-Yuan Wang(王兴元), Xiao-Li Wang(王哓丽), Lin Teng(滕琳), Dong-Hua Jiang(蒋东华), and Yongjin Xian(咸永锦). Chin. Phys. B, 2023, 32(2): 020503.
[4] Deep-learning-based cryptanalysis of two types of nonlinear optical cryptosystems
Xiao-Gang Wang(汪小刚) and Hao-Yu Wei(魏浩宇). Chin. Phys. B, 2022, 31(9): 094202.
[5] Synchronously scrambled diffuse image encryption method based on a new cosine chaotic map
Xiaopeng Yan(闫晓鹏), Xingyuan Wang(王兴元), and Yongjin Xian(咸永锦). Chin. Phys. B, 2022, 31(8): 080504.
[6] Exponential sine chaotification model for enhancing chaos and its hardware implementation
Rui Wang(王蕊), Meng-Yang Li(李孟洋), and Hai-Jun Luo(罗海军). Chin. Phys. B, 2022, 31(8): 080508.
[7] Neural-mechanism-driven image block encryption algorithm incorporating a hyperchaotic system and cloud model
Peng-Fei Fang(方鹏飞), Han Liu(刘涵), Cheng-Mao Wu(吴成茂), and Min Liu(刘旻). Chin. Phys. B, 2022, 31(4): 040501.
[8] FPGA implementation and image encryption application of a new PRNG based on a memristive Hopfield neural network with a special activation gradient
Fei Yu(余飞), Zinan Zhang(张梓楠), Hui Shen(沈辉), Yuanyuan Huang(黄园媛), Shuo Cai(蔡烁), and Sichun Du(杜四春). Chin. Phys. B, 2022, 31(2): 020505.
[9] Finite-time complex projective synchronization of fractional-order complex-valued uncertain multi-link network and its image encryption application
Yong-Bing Hu(胡永兵), Xiao-Min Yang(杨晓敏), Da-Wei Ding(丁大为), and Zong-Li Yang(杨宗立). Chin. Phys. B, 2022, 31(11): 110501.
[10] An image encryption algorithm based on spatiotemporal chaos and middle order traversal of a binary tree
Yining Su(苏怡宁), Xingyuan Wang(王兴元), and Shujuan Lin(林淑娟). Chin. Phys. B, 2022, 31(11): 110503.
[11] Fractal sorting vector-based least significant bit chaotic permutation for image encryption
Yong-Jin Xian(咸永锦), Xing-Yuan Wang(王兴元), Ying-Qian Zhang(张盈谦), Xiao-Yu Wang(王晓雨), and Xiao-Hui Du(杜晓慧). Chin. Phys. B, 2021, 30(6): 060508.
[12] An image encryption algorithm based on improved baker transformation and chaotic S-box
Xing-Yuan Wang(王兴元), Huai-Huai Sun(孙怀怀), and Hao Gao(高浩). Chin. Phys. B, 2021, 30(6): 060507.
[13] Convolutional neural network for transient grating frequency-resolved optical gating trace retrieval and its algorithm optimization
Siyuan Xu(许思源), Xiaoxian Zhu(朱孝先), Ji Wang(王佶), Yuanfeng Li(李远锋), Yitan Gao(高亦谈), Kun Zhao(赵昆), Jiangfeng Zhu(朱江峰), Dacheng Zhang(张大成), Yunlin Chen(陈云琳), and Zhiyi Wei(魏志义). Chin. Phys. B, 2021, 30(4): 048402.
[14] Ghost imaging-based optical cryptosystem for multiple images using integral property of the Fourier transform
Yi Kang(康祎), Leihong Zhang(张雷洪), Hualong Ye(叶华龙), Dawei Zhang(张大伟), and Songlin Zhuang(庄松林). Chin. Phys. B, 2021, 30(12): 124207.
[15] A secure image protection algorithm by steganography and encryption using the 2D-TSCC
Qi Li(李琦), Xingyuan Wang(王兴元), He Wang(王赫), Xiaolin Ye(叶晓林), Shuang Zhou(周双), Suo Gao(高锁), and Yunqing Shi(施云庆). Chin. Phys. B, 2021, 30(11): 110501.
No Suggested Reading articles found!