† Corresponding author. E-mail:
We present an optical encryption method of multiple three-dimensional objects based on multiple interferences and single-pixel digital holography. By modifying the Mach–Zehnder interferometer, the interference of the multiple objects beams and the one reference beam is used to simultaneously encrypt multiple objects into a ciphertext. During decryption, each three-dimensional object can be decrypted independently without having to decrypt other objects. Since the single-pixel digital holography based on compressive sensing theory is introduced, the encrypted data of this method is effectively reduced. In addition, recording fewer encrypted data can greatly reduce the bandwidth of network transmission. Moreover, the compressive sensing essentially serves as a secret key that makes an intruder attack invalid, which means that the system is more secure than the conventional encryption method. Simulation results demonstrate the feasibility of the proposed method and show that the system has good security performance.
In recent years, many optical encryption technologies of two-dimensional (2D) information have been proposed and implemented.[1–6] Compared with the traditional 2D information, the three-dimensional (3D) information is superior because it can accurately render sensations of the depth, location, and spatial relations of 3D scenes information.[7–9] Therefore, the development of 3D display and 3D information encryption will greatly promote the information visualization and security of multiple dimensional data, such as medical imaging and virtual reality.[10–12] Hence, optical encryption of 3D objects becomes a hot issue in the field of security. Javidi et al. presented an encryption 3D display system interfaced with data newsletter for encrypted digital holograms.[13] Meanwhile, Kim et al. demonstrated a technique for 3D information security with virtual optics based hologram encryption.[14] Kong et al. proposed a novel approach for encrypting 3D scene information hierarchically based on computer-generated holograms (CGHs).[15] However, the above mentioned encryption systems are encrypting on a single object.
The multiple 3D objects encryption (MOE) algorithm means encrypting the scenes information of multiple 3D objects (more than two objects) into a ciphertext. The encryption technique can hide more information, which can increase the efficiencies of encryption, decryption information storage, and transmission. Therefore, the MOE technique is more promising than the single 3D object encryption technique. However, there are still some issues that need addressing in the multiple 3D objects encryption algorithm, which are the major limiting factors in the development of multiple object cryptography. Two main issues are crosstalk, which means how to reconstruct each high-quality single object from a single ciphertext, and decryption flexibility, which means each 3D object can be decrypted arbitrarily. Recently, Li et al. effectively solved the above two problems by proposing a three-step phase shifting method for the multiple-3D-object secure information system.[16,17] The huge storage required for storing and transmitting the ciphertext is another major issue. To the best of our knowledge, it has not been resolved. In other words, it is quite difficult to encrypt more than one object simultaneously with the current optical method. Therefore, there is little in the literature on the multiple 3D encryption system.
In this paper, we propose a multiple 3D objects encryption method based on multiple interferences and single-pixel digital holography. This system can simultaneously encrypt the information of multiple 3D objects into a single ciphertext by multiple interferences. At the same time, in the decryption process of each 3D object can be decrypted separately, which is very flexible. Moreover, in order to alleviate the problem of a large amount of encryption data in Ref. [16], the single pixel digital holography is introduced to record the ciphertext. This is the most important improvement in comparison with Ref. [16]. By using this approach, even if the measurements of the ciphertext are less than the number of original samples pixels, the original samples can be reconstructed through compressed sensing theory. Therefore, it greatly reduces the storage burden and bandwidth of the encrypted data transmission network while not impacting the image quality. In addition, it also greatly increases the number and space of keys. Simulation results demonstrate the feasibility of the method, and it shows that the system has good security.
Here some basic principles related to our proposed scheme are introduced.
The single-pixel digital holography[18–21] is a promising method for a holographic technique, which utilizes the concept of the single pixel camera proposed by Baraniuk.[22,23] By using this technique, the hologram can be reconstructed from the samples smaller than the Nyquist rate. The approach allows image compression to be performed during measurement rather than in the post-processing stage. The main principle of the single-pixel digital holographic technique combined the single pixel detector and compressive sensing (CS)[24–26] theory is to obtain the intensity measurement of a scene by imaging the scene using a structured mask implemented by the programmable spatial light modulator (SLM).
The data acquisition framework model of a single pixel digital holographic system based CS method is given as
In the CS process, instead of sampling
The experimental setup of the proposed multiple 3D objects encryption system is shown in Fig.
Since the two methods are applied with multiple-interference theory, these two experimental set-ups are similar. However, compared with the experimental set-up in Ref. [16], we replace the common CCD by a single-pixel camera in capturing which needs a reflective liquid crystal on silicon (LCOS) SLM for each object. Here, the SLM is to display the computer generated binary patterns and to modulate the object diffraction pattern, which plays a role of sampling the object light field.
Note that since 2n beam splitters are employed, there are so many optical surfaces in the encryption process that will result in undesired interferences, this degrades the reconstructed image. Therefore, the number of encrypted objects is limited in order to ensure the quality of the reconstructed image in practical optical implementation.
Assume that the complex amplitude distributions of the objects needed to encrypt are
To adapt the concept of a single-pixel camera to solve the problem of a large amount of data during the holographic interference imaging, we use reflective LCOS SLM to sample the diffraction pattern of each object. These M binary patterns are generated by a computer and sequentially displayed onto the SLMs. The diffraction field of each object with N pixels is multiplied in parallel by M different binary patterns (with
It should be emphasized that one arbitrary three-dimensional object is the crosstalk noise of the other three-dimensional objects, which makes it impossible for us to identify the corresponding decrypted 3D object. The complex opposite of the cross talk noise can be utilized as the auxiliary decryption keys to decrypt a high-quality 3D object. The IT1) and IT2 include the optical fields of the other objects excepting OBJi which are transmitted to the corresponding authorized user to decrypt OBJi
Since the 3D scene information can be firstly decrypted by the single interference method in Ref. [16] and then reconstructed by a computer using the CS theory, the decryption process of our proposed method can be realized by a pure digital method or partly realized by the optical method as in Ref. [16]. The optical part of decryption is shown in Fig.
Firstly, the plane wave is split into three plane waves by two BS. One of the plane waves passes through the ciphertext and the other two pass through key 1 and key 2 respectively. Continuously, the multiple plane waves interfere via a cube cross beam splitter (CBS). After it is transformed to the spatial domain with the correct optical wavelength and right propagation distance, the compressed 3D scene information is obtained as
To check the validity of the proposed scheme, several numerical simulations have been performed by MATLAB (R2013a), which is executed on a 64-bit computer. By the CGH chromatography,[27] a 3D object can be considered as the integration of many different depth slices of images. In our proposed system, we assume that the input object to be encrypted consists of two level images, binary or gray scale image. Three transparent 3D objects with the same size are presented in Fig.
We show the encryption results in Fig.
The decryption process has been shown in Fig.
From the results obtained, we can clearly see that the image is clearly reconstructed. To evaluate the quality of the reconstructed image, we use the correlation coefficient (CC)
The ratio of a sample size to the original sample size gives the compression ratio ((
The results show that the reduction of the compression ratio will increase the observed details in the decrypted image. Hence, PSNR also increases. As can be seen from the diagram, when the compression ratio is less than 60%, the PSNR values of the decrypted objects are greater than 30 dB, which means that the quality of the decrypted objects is acceptable.
The most important feature for optical encryption is high security of the algorithm. In the proposed system, a total of five secret keys are used: measurement matrix
When key 1-1 is the only incorrect key shown in Fig.
The wavelength λ of the illuminating beam and diffraction distance z both are important parameters in the encryption. In order to illustrate the relation between the decryption image and the wavelength λ of the illuminating beam and the diffraction distance z, we give the average CC values of the decryption objects at different slices versus different λ and z in Figs.
The quality of the decrypted image is associated with its corresponding encrypted image. In this section, we test the robustness of the proposed encryption scheme to additive noise attacks, where Gaussian noise with zero mean is adopted. Q is defined as noise intensity. Figure
To further validate the proposed scheme, we compare the CC values of the decrypted image with different noise intensities of the proposed scheme with that of Ref. [16].
The calculated CC values are shown in Table
In this paper, an efficient multiple 3D information security system is proposed. This method provides an efficient and flexible mode of multiple 3D information encryption and decryption. Each object plays the role of an assistant secret key for the other object to realize the mutual encryption and each 3D object can be decrypted separately. The quality of the decrypted slice image of each object is high according to the CC values. Due to the single-pixel digital holography, the data ciphertext and secret key of this method are effectively reduced and enhanced, respectively. In addition, it is easy to expand the optical device in the case of adding more 3D objects to encrypt. Moreover, the measurement operation serves as a secret key that makes an intruder attack invalid, which means that the system is more secure than the method in Ref. [16]. Simulation results demonstrate that our proposed method can reconstruct the original 3D scene information from under sampling holograms. It is verified that this method has high encryption capacity, data security and system robustness, as well as being able to avoid the influence of overlapping and crosstalk of multiple objects.
[1] | |
[2] | |
[3] | |
[4] | |
[5] | |
[6] | |
[7] | |
[8] | |
[9] | |
[10] | |
[11] | |
[12] | |
[13] | |
[14] | |
[15] | |
[16] | |
[17] | |
[18] | |
[19] | |
[20] | |
[21] | |
[22] | |
[23] | |
[24] | |
[25] | |
[26] | |
[27] |