This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
1. Introduction
Digital holography [1–7] is a promising technique to sense and retrieve 3D object information such as amplitude and phase of the object. The optically generated and digitally sensed holograms are numerically reconstructed to obtain 3D object features. The sensed digital hologram is a real-valued digital image. The retrieved 3D information from the digital hologram is a 2D complex image that contains 3D information of the object in the form of intensity and phase. Thus, the existing 2D image processing algorithms can adapt to process 3D information from 2D digital complex images. The optically generated and digitally sensed holograms are numerically reconstructed to obtain the 3D object features. The sensed digital hologram is a real-valued digital image. Digital holography has been widely used in many applications in the areas of phase contrast imaging [8, 9], 3D microscopy [10, 11], 3D object recognition [6, 12], information security [13, 14], surface shape measurement [15–17], interferometry [18, 19], etc.
The optoelectronic and computational imagining concepts involved in digital holography enable us to sense the compressed holographic data by digital sensors. Later on, it can be reconstructed with good accuracy using computational techniques. The compressive sensing (CS) techniques [20–25] can adapt well to digital holography as the process involves the detection of holographic data in the transform domain. This opens up new avenues for combining compressive data sensing with information security or encryption. Thus, the sensing and computing modalities of digital holography have complemented the CS framework. It has emerged as a secured CS 3D information system with a high data transmission rate and less storage space. The CS [20–25] is a paradigm shift in signal sampling theory that deals with reconstruction of the original signal from fewer samples than those of the Nyquist sampling rate. CS is an iterative procedure to reconstruct the original signal from the incomplete linear measurements by exploiting the sparsity of the signal. In the CS theory, the most commonly used sparse representations of the signal are FFT, DCT, Wavelet, etc. and help in accurate reconstruction of the original signal. CS framework is applied in holographic encryption for sampling and compression in order to reduce the hologram acquisition data and electronic data-processing load at sensors.
In conventional digital holographic encryption/decryption methods, the encrypted information is transmitted at the Nyquist sampling rate. The sender and receiver use a secret key to decrypt the encrypted information. The transmission of hologram requires a large amount of data storage, but the transmission channel bandwidth is limited. Traditionally, holographic encryption methods are implemented based on double random phase encoding (DRPE) [26–31], joint transform correlator (JTC) [32, 33], and ghost imaging (GI) [34], along with the encryptions based on the Fresnel domain [27, 29, 35, 36], Fourier domain, or fractional Fourier domain [37–40]. The CS based encryption methods have the additional advantage that the encryption depends on the measurement matrix (sampling mask) used for the sensing process which will enhance the security level and act as an additional key, which is not used in the conventional optical encryption systems. CS can be implemented in the optical domain using a digital micromirror device (DMD) and a single-pixel detector [41]. A DMD device is a reflective spatial light modulator introduced by Texas instruments that contain many micromirrors. The light incident on the DMD is modulated with the sampling matrix, and then a single-pixel detector records the measurements depending on the orientation of the mirrors [41, 42]. A single-pixel detector sequentially measures the light field that is reflected from the DMD device. The sensed information of a single-pixel detector (
In recent years, CS-based optical encryption methods have been increasing the demand for many optical information processing applications [41–53]. The idea of the single-pixel imaging was first proposed by Duarte et al. [41]. Bromberg et al. [43] have demonstrated a real-time pseudo-thermal GI using a combination of the DMD and single-pixel detector. Di et al. [44] have proposed multiple image encryption based on single-pixel compressive holography to encrypt the holograms. The decryption process of each image was carried out using total variation minimization problem. Clemente et al. [45] have adapted a phase shifting digital holography (PSDH) technique with a single-pixel detector to demonstrate the compressive holographic encryption. This method has experimentally reconstructed the amplitude of the ophthalmic lens by retaining only 20% of the hologram pixels. Li et al. [46, 47] have numerically presented a compressive optical image encryption method for inline PSDH by adopting the single-pixel imaging. In this work, the phase shifted digital holograms were acquired using single-pixel detector. In the reconstruction process, the encrypted holograms were reconstructed by retaining various hologram measurements (such as 60%, 80%, and 90%). Finally, the intensity of the original object wavefield was decrypted from the reconstructed holograms by the inversion of PSDH process. Leihong et al. [48] have experimentally presented compressive ghost imaging encryption based on PSDH. The simulation results have shown that the CS scheme improved the security and reconstruction quality of the intensity image. Wang et al. [49] have presented single-pixel compressive holographic encryption by modifying the Mach–Zehnder interferometer setup for multiple-3D-object imaging based on multiple interferences. The numerical simulation results have shown the accurate reconstruction of original 3D object intensity information from encrypted hologram measurements. It has been demonstrated that the cryptosystem provides high encryption capacity and robustness with multiple interferences. Recently, Du et al. [50] have proposed an efficient CS based optical image encryption system using single-pixel imaging. In this method, the input image is encrypted using one random phase mask (RPM) with various recording distances as one-dimensional vector key. It has been numerically presented that the one RPM key at different recording distances minimized the key storage requirement of data transmission and also enhanced the robustness of the encryption system. The encryption systems [44–50] were proposed based on inline schemes such as four-step, three-step, or two-step PSDH. Moreover, the phase reconstruction of the encrypted object field is not presented in the single-pixel compressive holography. The strength of digital holography is the ability to reconstruct the phase information and has great applications in 3D imaging of moving objects. Although the phase reconstruction is accurate in classical PSDH, it is not suitable for moving objects because it involves multiple exposures. On the other hand, to acquire instantaneous 3D image of object wavefield, parallel phase shifting digital holography (PPSDH) [54–56] was proposed. The PPSDH is a single exposure scheme that can be used for imaging moving objects or static objects. In the present work, single-pixel compressive imaging is demonstrated based on PPSDH and circular harmonic keys in DRPE scheme for improving the security level and storage efficiency of holographic data. The encrypted hologram measurements can be realized with much less criteria than those of the Nyquist sampling.
In this paper, a CS based encryption method to encrypt the complex object information by using linear two-step PPSDH and a circular harmonic key in DRPE is demonstrated. The holographic encryption system is implemented using a phase-only key with the random spatial distribution of circular harmonics in the Fresnel domain to improve the system security performance. The single-pixel compressive imaging is adapted with two-step PPSDH for compression of the encrypted holograms in the optical domain. During the encryption process, the two RPMs, the measurement matrix, the distance, and the wavelength of Fresnel transform are encryption keys. Compared with the traditional encryption scheme, the transmitted information can be significantly reduced with single-shot exposure method, and the circular harmonic key is associated with RPM, which improves the security of the system. In the proposed system, the quality of reconstructed hologram is guaranteed with much less rate than that of the Nyquist sampling. The proposed system is validated using computer simulations to show the proof of the concept. The robustness and key space security of the proposed encryption system have been verified with minimal pixel detection. The CS reconstruction framework was implemented using the Total Variation Minimization by Augmented Lagrangian and Alternating Direction Algorithm (TVAL3) [24]. The efficacy of the proposed cryptosystem has been analyzed using various performance metrics, and also the key space security and robustness of our method have been examined.
2. Proposed Encryption and Decryption Scheme Using a Circular Harmonic Key in DRPE
The schematic representation of the optical encryption arrangement of DRPE using the circular harmonic key in the Fresnel domain is shown in Figure 1(a). In this method, the RPM is expressed in terms of polar coordinates using a circular harmonic key [57, 58] to enhance the security of the optical system. To obtain the circular harmonic key, the Cartesian coordinates
[figure(s) omitted; refer to PDF]
Now, the RPM using a circular harmonic key in the Fresnel domain is defined as follows:
The inclusion of circular harmonic function [57, 58] in the random phase masks imparts additional degrees of freedom of encoding such as order of harmonics
The encryption process involves three different planes, i.e., the input plane, the intermediate Fresnel transform plane, and the output plane. The optical system is illuminated with a plane wave of wavelength λ, and the encrypted complex object information is obtained at the output plane in the Fresnel domain. The object
For simplicity, (7) and (8) can be written as follows:
Now, decryption process can be expressed as follows:
The 3D complex object used in the encryption system is shown in Figure 1(b). The 3D object construction can be considered as the integration of different sections of complex planes with certain features separated by a small distance
Similarly, the 3D complex object decryption process is given in the following equations:
The proposed optical encryption system consists of a single-pixel compressive holographic imaging system based on two-step PPSDH that encrypts the complex object information using DRPE and circular harmonic keys. Figure 2 shows the schematic of the proposed optical setup using Mach–Zehnder interferometric recording geometry. The light beam from the laser is divided into two parts using a polarizing beam splitter (PBS). The half wave plates are used to control the intensity and polarization of the interfering light beams. In the object arm, the complex object information is encrypted using DRPE in the Fresnel domain using two RPMs and circular harmonic keys. A phase array device PSLM is used in the reference wave arm to give the required phase shifts to the reference wave in an interleaved manner as mentioned in Section 3. The interference field formed by the encrypted and reference beams is sampled using a DMD by modulating it with a chosen measurement matrix (i.e., sampling mask) for a specific sample ratio. The output of the DMD is coupled to a single-pixel photodetector using a convex lens. Thus, the incomplete measurements of the encrypted single digital Fresnel hologram on the photodetector are obtained. The mathematical model of the proposed encryption and decryption using PPSDH and single-pixel compressive imaging is presented in Section 3.
[figure(s) omitted; refer to PDF]
3. Two-Step PPSDH Approach for Proposed Encryption and Decryption Using Single-Pixel Compressive Imaging
In this section, we present mathematical framework for numerical demonstration of single-pixel digital holographic scheme based on two-step PPSDH and DRPE, in which the random phase masks use circular harmonic key in the Fresnel domain. The flow diagram of the proposed encryption and decryption procedure is shown in Figure 3. The optical encryption technique uses DRPE in the Fresnel domain based on circular harmonic key as explained in Section 2. Let us consider that the input object field
[figure(s) omitted; refer to PDF]
Here, RPM1 and RPM2 are two independent random phase masks. Now, linear two-step PPSDH [54, 55, 58, 59] is applied for obtaining single-shot inline hologram on the DMD plane, in which a phase array device such as spatial light modulator is used to give phase shifts to the reference wave in an interleaved manner with a periodic phase of
Therefore, the digital hologram on the DMD plane is governed by the following equation:
Now, the measurement matrix
The retrieved complex field
To reconstruct the original encrypted object filed,
The sample ratio of the measurement matrix is calculated using the formula
4. Simulation Experiments and Discussion
To verify the proposed scheme, two numerical simulations were conducted. The parameters used in the simulations were the wavelength
4.1. 2D Complex Object Encryption and Decryption Results
A binary 2D complex object field “E” of size 64 × 64 was used in the simulation. The intensity of the 2D object was taken as 0.5, and the corresponding phase was considered as
[figure(s) omitted; refer to PDF]
At the receiver end, the compressed single-shot digital hologram is recovered with correct
[figure(s) omitted; refer to PDF]
4.2. 3D Complex Object Encryption and Decryption Simulation Results
The encryption and decryption simulation procedure of the 3D complex object is explained in Section 2. To simulate the 3D complex object, we have considered two transparent objects, “D” and “H,” made of binary images. The light propagates through the first object plane and obtains the features of the first complex object “D.” Then, the obtained features of first object plane are propagated through a distance of
The decrypted results with incorrect keys are shown in Figure 8. The intensity and phase distribution of 3D complex object scene are decrypted at first plane with one of the incorrect RPM2 keys. The decrypted intensity and phase distribution are shown in Figures 8(a) and 8(b). Figures 8(c) and 8(d) shows the intensity and phase distribution of incorrect distance key,
[figure(s) omitted; refer to PDF]
4.3. Compressive Ratio Performance
Figure 6 shows the relationship between MSE and sample ratio of the decrypted intensity and phase images for different sample ratios. From Figure 6, it can be seen that when the compression ratio is less than 30% measurements than its intensity, phase reconstruction accuracy is feasible for both the simulations, as shown in Figures 7(a)–7(c) and Figures 9(a) and 9(b). Its corresponding phase images are shown in Figures 10(a)–10(c) and Figures 11(a) and 11(b). When the sample ratio is between 30% and 40% measurements, then the decrypted intensity and phase images’ accuracy is acceptable, as shown in Figures 7(c), 10(c), 9(c) and 9(d), and 11(c) and 11(d), respectively.
[figure(s) omitted; refer to PDF]
When the sample ratio is greater than 40% measurements, then the intensity and phase reconstruction quality is similar to the original image, as shown in Figures 7(e) and 7(f), 10(e) and 10(f), 9(e) and 9(f), and 11(e) and 11(f), respectively. Figures 7–11 show the decrypted intensity and phase distribution of both 2D and 3D object simulation cases from various sample ratios. If the correct keys such as wavelength, propagation distance, RPMs, and measurement matrix are used, then the decrypted intensity and phase images for both 2D and 3D simulation cases are shown in Figures 7–11. If the different wrong keys are used in the decryption process, the quality of the decrypted intensity and phase images are affected and fail to reconstruct the originalobject wavefield as shown in Figures 12–18.
[figure(s) omitted; refer to PDF]
4.4. Key Space Security and Sensitivity Analysis
Figures 12–18 show the sensitivity of the keys with a small deviation
From Figures 12 and 13, it can be observed that the RE plot decreases to zero sharply only when the decrypted distance is the same as the simulation recording distance. Figures 12(b) and 13(b) show that the decrypted 2D complex object looks like a noisy image when a wrong distance key,
It can be seen from Figures 14 and 15 that the RE plot value decreases to zero sharply with a small variation in the angle of
It can be seen from Figures 16 and 17 that the RE plot value decreases to zero sharply with a small variation in the radius of
The sensitivity of the recording wavelength was also studied. The wrong wavelength of
5. Conclusion
In this paper, an efficient 2D and 3D information security system is proposed using single-pixel compressive digital holography. The proposed system combines CS and digital holography for complex data encryption using minimal pixel detection. The hologram encryption process uses a DRPE scheme in the Fresnel domain using circular harmonic key, and this scheme enhances the security performance of the decryption process with the variation of the rotation key as presented in the simulation results. In addition, the measurement matrix and other digital holographic secret keys make the system more secure than the conventional method. The two-step PPSDH technique and CS based system are combined to improve the resolution of the reconstructed images. Due to the single-pixel imaging and PPSDH, the 3D information transmission and data storage are effectively reduced. The numerical simulation results show that the proposed cryptosystem has capability to decrypt the intensity and phase information of the object wave accurately from highly compressed digital Fresnel hologram. To quantify the reconstructed complex images, MSE and RE are analyzed for different compression ratios and different key attacks. A small deviation in the decrypted key leads to a considerable increase in the RE value and thus failure to reconstruct the original object information. It is verified from the results that the encryption system has high security and robustness and can be used in many information security applications.
Acknowledgments
This work was supported by Science and Engineering Research Board (SERB), Department of Science and Technology, Government of India, under the sanction order no. CRG/2018/003906.
[1] U. Schnars, W. Jueptner, Digital Holography, 2005.
[2] U. Schnars, W. Jüptner, "Direct recording of holograms by a CCD target and numerical reconstruction," Applied Optics, vol. 33 no. 2, pp. 179-181, DOI: 10.1364/ao.33.000179, 1994.
[3] P. Picart, J. Leval, "General theoretical formulation of image formation in digital Fresnel holography," Journal of the Optical Society of America, vol. 25 no. 7, pp. 1744-1761, DOI: 10.1364/josaa.25.001744, 2008.
[4] J. W. Goodman, Introduction to Fourier Optics, 2005.
[5] A. Nelleri, J. Joseph, K. Singh, "Recognition and classification of three-dimensional phase objects by digital Fresnel holography," Applied Optics, vol. 45 no. 17, pp. 4046-4053, DOI: 10.1364/ao.45.004046, 2006.
[6] A. Nelleri, U. Gopinathan, J. Joseph, K. Singh, "Three-dimensional object recognition from digital Fresnel hologram by wavelet matched filtering," Optics Communications, vol. 259 no. 2, pp. 499-506, DOI: 10.1016/j.optcom.2005.09.007, 2006.
[7] Y. Zhang, Y. Zhu, E. Y. Lam, "Holographic 3D particle reconstruction using a one-stage network," Applied Optics, vol. 61 no. 5, pp. B111-B120, DOI: 10.1364/ao.444856, 2022.
[8] T. Tahara, Y. Kozawa, A. Matsuda, R. Oi, "Quantitative phase imaging with single-path phase-shifting digital holography using a light-emitting diode," OSA Continuum, vol. 4 no. 11, pp. 2918-2927, DOI: 10.1364/osac.435949, 2021.
[9] N. Hai, J. Rosen, "Single-plane and multiplane quantitative phase imaging by self-reference on-axis holography with a phase-shifting method," Optics Express, vol. 29 no. 15, pp. 24210-24225, DOI: 10.1364/oe.431529, 2021.
[10] V. F. Rad, A. Babaei-Ghazvini, R. Jamali, I. Shahabi-Ghahfarrokhi, A.-R. Moradi, "Digital holographic microscopy for real-time investigation of 3D microstructural dynamics of starch-kefiran-based nanocomposite," Applied Optics, vol. 60 no. 16, pp. 4706-4715, DOI: 10.1364/ao.423075, 2021.
[11] M. Panahi, R. Jamali, V. F. Rad, M. Khorasani, A. Darudi, A. R. Moradi, "3D monitoring of the surface slippage effect on micro-particle sedimentation by digital holographic microscopy," Scientific Reports, vol. 11 no. 1,DOI: 10.1038/s41598-021-92498-0, 2021.
[12] B. Javidi, D. Kim, "Three-dimensional-object recognition by use of single-exposure on-axis digital holography," Optics Letters, vol. 30 no. 3, pp. 236-238, DOI: 10.1364/ol.30.000236, 2005.
[13] B. Javidi, Optical and Digital Techniques for Information Security, 2005.
[14] A. Nelleri, J. Joseph, K. Singh, "Lensless complex data encoding for digital holographic whole information security," Optical Engineering, vol. 47 no. 11,DOI: 10.1117/1.3028351, 2008.
[15] N. Yoshikawa, T. Miyake, "Omnidirectional 3D shape measurement using image outlines reconstructed from gabor digital holography," . https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4075081
[16] B. Lokesh Reddy, P. Ramachandran, A. Nelleri, "Compressive complex wave retrieval from a single off-axis digital Fresnel hologram for quantitative phase imaging and microlens characterization," Optics Communications, vol. 478,DOI: 10.1016/j.optcom.2020.126371, 2021.
[17] L. R. Bodi, P. Ramachandran, A. Nelleri, "Optimal Fresnelet sparsification for compressive complex wave retrieval from an off-axis digital Fresnel hologram," Optical Engineering, vol. 60 no. 7, 2021.
[18] V. S. V. Allaparthi, A. Vishnoi, G. Rajshekhar, "Phase derivative estimation in digital holographic interferometry using deep," Applied Optics, vol. 4, 2022.
[19] K. S. Vengala, N. Paluru, R. K. S. Subrahmanyam Gorthi, "3D deformation measurement in digital holographic interferometry using a multitask deep learning architecture," Journal of the Optical Society of America A, vol. 39 no. 1, pp. 167-176, DOI: 10.1364/josaa.444949, 2022.
[20] E. J. Candès, "Compressive sampling," Proceedings of the International Congress of Mathematicians, . https://doi.org/10.4171/022-3/69
[21] D. L. Donoho, "Compressed sensing," IEEE Transactions on Information Theory, vol. 52 no. 4, pp. 1289-1306, DOI: 10.1109/tit.2006.871582, 2006.
[22] E. Candès, J. Romberg, "Sparsity and incoherence in compressive sampling," Inverse Problems, vol. 23 no. 3,DOI: 10.1088/0266-5611/23/3/008, 2007.
[23] E. J. Candes, M. B. Wakin, "An introduction to compressive sampling," IEEE Signal Processing Magazine, vol. 25 no. 2,DOI: 10.1109/MSP.2007.914731, 2008.
[24] L. I. Chengbo, W. Yin, Z. Yin, "TV minimization by augmented Lagrangian and alternating direction algorithms," 2009. https://www.caam.rice.edu/%7Eoptimization/L1/TVAL3/v.beta/User_Guide_beta2.4.pdf
[25] J. M. Bioucas-Dias, M. A. T. Figueiredo, "A new TWIST: two-step iterative shrinkage/thresholding algorithms for image restoration," IEEE Transactions on Image Processing, vol. 16 no. 12, pp. 2992-3004, DOI: 10.1109/tip.2007.909319, 2007.
[26] G. Unnikrishnan, J. Joseph, K. Singh, "Optical encryption by double-random phase encoding in the fractional Fourier domain," Optics Letters, vol. 25 no. 12, pp. 887-889, DOI: 10.1364/ol.25.000887, 2000.
[27] G. Situ, J. Zhang, "Double random-phase encoding in the Fresnel domain," Optics Letters, vol. 29 no. 14, pp. 1584-1586, DOI: 10.1364/ol.29.001584, 2004.
[28] D. S. Monaghan, G. Situ, U. Gopinathan, T. J. Naughton, J. T. Sheridan, "Role of phase key in the double random phase encoding technique: an error analysis," Applied Optics, vol. 47 no. 21, pp. 3808-3816, DOI: 10.1364/ao.47.003808, 2008.
[29] A. Nelleri, J. Joseph, K. Singh, "Error analysis for a lens-less in-line digital holographic complex information security system based on double random phase encoding," Optics and Lasers in Engineering, vol. 47, 2009.
[30] S. K. Rajput, N. K. Nishchal, "Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform," Applied Optics, vol. 52 no. 4, pp. 871-878, DOI: 10.1364/ao.52.000871, 2013.
[31] G. Li, W. Yang, D. Li, G. Situ, "Cyphertext-only attack on the double random-phase encryption: experimental demonstration," Optics Express, vol. 25 no. 8, pp. 8690-8697, DOI: 10.1364/oe.25.008690, 2017.
[32] J. Li, T. Zheng, Q.-Z Liu, R. Li, "Double-image encryption on joint transform correlator using two-step-only quadrature phase-shifting digital holography," Optics Communications, vol. 285 no. 7, pp. 1704-1709, DOI: 10.1016/j.optcom.2011.11.115, 2012.
[33] D. Kumar, N. K. Nishchal, "Digital holography based three-dimensional object recognition using binary differential joint transform correlator," Proceedings of the 12th International Conference on Fiber Optics and Photonics,DOI: 10.1364/photonics.2014.t3a.61, .
[34] P. Clemente, V. Durán, E. Tajahuerce, V. Torres-Company, R. Martínez-Cuenca, J. Lancis, Digital Holography by Ghost Imaging,DOI: 10.1364/dh.2011.dtud4, 2011.
[35] A. Nelleri, "Digital Fresnel field encryption for three-dimensional information security," Optical Engineering, vol. 46 no. 4,DOI: 10.1117/1.2727377, 2007.
[36] S. K. Rajput, N. K. Nishchal, "Fresnel domain nonlinear optical image encryption scheme based on Gerchberg-Saxton phase-retrieval algorithm," Applied Optics, vol. 53 no. 3, pp. 418-425, DOI: 10.1364/ao.53.000418, 2014.
[37] B. Hennelly, J. T. Sheridan, "Optical image encryption by random shifting in fractional Fourier domains," Optics Letters, vol. 28 no. 4, pp. 269-271, DOI: 10.1364/ol.28.000269, 2003.
[38] N. K. Nishchal, J. Joseph, K. Singh, "Securing information using fractional Fourier transform in digital holography," Optics Communications, vol. 235 no. 4–6, pp. 253-259, DOI: 10.1016/j.optcom.2004.02.052, 2004.
[39] N. K. Nishchal, J. Joseph, K. Singh, "Fully phase-based encryption using fractional order Fourier domain random phase encoding: error analysis," Optical Engineering, vol. 43 no. 10,DOI: 10.1117/1.1790503, 2004.
[40] S. K. Rajput, N. K. Nishchal, "Image encryption based on interference that uses fractional Fourier domain asymmetric keys," Applied Optics, vol. 51 no. 10, pp. 1446-1452, DOI: 10.1364/ao.51.001446, 2012.
[41] M. F. Duarte, M. A. Davenport, D. Takhar, J. N. Laska, T. Sun, K. F. Kelly, R. G. Baraniuk, "Single-pixel imaging via compressive sampling," IEEE Signal Processing Magazine, vol. 25 no. 2, pp. 83-91, DOI: 10.1109/msp.2007.914730, 2008.
[42] M. N. Kulakov, R. S. Starikov, P. A. Cheremkhin, "Objects reconstruction by compressive sensing from single-pixel registrations using DMD," KNE Energy, vol. 3 no. 3, pp. 509-522, DOI: 10.18502/ken.v3i3.2065, 2018.
[43] Y. Bromberg, O. Katz, Y. Silberberg, "Ghost imaging with a single detector," Physical Review, vol. 79 no. 5,DOI: 10.1103/physreva.79.053840, 2009.
[44] H. Di, K. Zheng, X. Zhang, E. Y. Lam, T. Kim, Y. S. Kim, T.-C. Poon, C. Zhou, "Multiple-image encryption by compressive holography," Applied Optics, vol. 51 no. 7, pp. 1000-1009, DOI: 10.1364/ao.51.001000, 2012.
[45] P. Clemente, V. Durán, E. Tajahuerce, P. Andrés, V. Climent, J. Lancis, "Compressive holography with a single-pixel detector," Optics Letters, vol. 38 no. 14, pp. 2524-2527, DOI: 10.1364/ol.38.002524, 2013.
[46] J. Li, J. Sheng Li, Y. Yang Pan, R. Li, "Compressive optical image encryption," Scientific Reports, vol. 5 no. 1,DOI: 10.1038/srep10374, 2015.
[47] L. Jun, B. Jia, X. Dai, M. Lei, C. Yang, L. Jiaosheng, L. Hongbing, L. Rong, "Compressive optical image encryption using phase-shifting interferometry on a joint transform correlator," Optica Applicata, vol. 47, 2017.
[48] Z. Leihong, X. Rui, Z. Dawei, C. Jian, "Optical encryption based on the algorithm of compressive ghost imaging and phase-shifting digital holography," Ukrainian Journal of Physical Optics, vol. 19 no. 3, pp. 179-190, DOI: 10.3116/16091833/19/3/179/2018, 2018.
[49] Y. Wang, Q. Liu, J. Wang, Q.-H. Wang, "Optical encryption of multiple three-dimensional objects based on multiple interferences and single-pixel digital holography," Chinese Physics B, vol. 27 no. 3,DOI: 10.1088/1674-1056/27/3/034202, 2018.
[50] J. Du, Y. Xiong, C. Wu, C. Quan, "Optical image encryption with high efficiency based on variable-distance ghost imaging," Optik, vol. 252, 2021.
[51] P. Zheng, Q. Dai, Z. Li, Z. Ye, J. Xiong, H. C. Liu, G. Zheng, S. Zhang, "Metasurface-based key for computational imaging encryption," Science Advances, vol. 7 no. 21,DOI: 10.1126/sciadv.abg0363, 2021.
[52] S. Jiao, J. Feng, Y. Gao, T. Lei, X. Yuan, "Visual cryptography in single-pixel imaging," Optics Express, vol. 28 no. 5, pp. 7301-7313, DOI: 10.1364/oe.383240, 2020.
[53] C. Zhang, B. Han, W. He, X. Peng, C. Xu, "A novel compressive optical encryption via single-pixel imaging," IEEE Photonics Journal, vol. 11 no. 4,DOI: 10.1109/jphot.2019.2924457, 2019.
[54] Y. Awatsuji, M. Sasada, T. Kubota, "Parallel quasi-phase-shifting digital holography," Applied Physics Letters, vol. 85 no. 6, pp. 1069-1071, DOI: 10.1063/1.1777796, 2004.
[55] Y. Awatsuji, T. Tahara, A. Kaneko, T. Koyama, K. Nishio, S. Ura, T. Kubota, O. Matoba, "Parallel two-step phase-shifting digital holography," Applied Optics, vol. 47 no. 19, pp. D183-D189, DOI: 10.1364/ao.47.00d183, 2008.
[56] T. Tahara, K. Ito, T. Kakue, M. Fujii, Y. Shimozato, Y. Awatsuji, K. Nishio, S. Ura, T. Kubota, O. Matoba, "Parallel phase-shifting digital holographic microscopy," Biomedical Optics Express, vol. 1 no. 2, pp. 610-616, DOI: 10.1364/boe.1.000610, 2010.
[57] J. E. Rueda-Parada, J. Enrique, "Encryption using circular harmonic key," Dyna, vol. 82 no. 190, pp. 70-73, DOI: 10.15446/dyna.v82n190.42915, 2015.
[58] Q. Wang, Q. Guo, L. Lei, J. Zhou, "Optical interference-based image encryption using circular harmonic expansion and spherical illumination in gyrator transform domain," Optics Communications, vol. 346, pp. 124-132, DOI: 10.1016/j.optcom.2015.02.040, 2015.
[59] B. Lokesh Reddy, A. Nelleri, "Complex object wave retrieval using single-pixel compressive imaging of an off-axis Fresnel hologram," Journal of Modern Optics, vol. 69 no. 10, pp. 541-553, DOI: 10.1080/09500340.2022.2067358, 2022.
[60] P. Ramachandran, Z. C. Alex, A. Nelleri, "Phase reconstruction using compressive two-step parallel phase-shifting digital holography," Optical Engineering, vol. 57 no. 4,DOI: 10.1117/1.oe.57.4.043105, 2018.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Copyright © 2022 B. Lokesh Reddy and Anith Nelleri. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0/
Abstract
An encryption system that combines compressive sensing (CS) and two-step parallel phase shifting digital holography (PPSDH) using double random phase encoding (DRPE) is presented in this paper. The two-step PPSDH is a linear inline holographic scheme and is much suitable for encrypting the 2D/3D information in a single exposure. The distribution of random phase mask (RPM) in the DRPE is implemented using circular harmonic key which increases the security of the encryption process. In this system, the keys used to encrypt are spatial positions of the planes, wavelength, and rotation of the circular harmonics in RPMs, and CS acts as an additional key that makes the system more secure than the conventional optical encryption methods. At the transmission end, two-step PPSDH is applied to encrypt the object information in single hologram. The digital mirror device (DMD) is placed between the object and a single-pixel detector for acquiring fewer hologram measurements. At the receiver end, the single digital hologram is numerically recovered by using a CS optimization problem. The original complex object field is decrypted from the CS recovered holograms by the inversion of two-step PPSDH process with the help of the correct keys. The numerical simulations are presented for complex 2D and 3D objects to test the feasibility of the proposed encryption and decryption system. The proposed method carried out intensity and phase reconstruction of the original object field using single-pixel compressive imaging. The computer simulation results demonstrated that the encrypted information is highly secured with the rotation of the circular harmonic key. The sensitivity of the decrypted intensity and phase images is also studied with variations of the encrypted keys. The obtained results show that the proposed encryption scheme is feasible and has better security performance and robustness.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer