Asian Journal of Physics Vol. 30 Nos 8 & 9 (2021) 1387-1396

An eagle eye view: Three-dimensional (3D) imaging based optical encryption

Inbarasan Muniraj1, Sunil Chinnadurai1, and John T Sheridan2


Abstract

Recent advancements in communication systems together with the development of sophisticated opto-electronic devices made voluminous data transfer possible. Owing to growth of the Internet of Things (IoT), approximately 2.5 quintillion bytes of data is being generated every day and shared across the internet [1]. Our “digitized and datafied era” demands effective methods to protect information, systems, and networks. Over the past few decades, a variety of digital, optical, and optically inspired digital techniques have been developed to achieve security. Some of the most popular approaches are Steganography, Watermarking, Cryptography, and Optical Signal Processing (OSP) based approaches, which include various encryption and authentication schemes. Conventionally, OSP based image encryption approaches have been developed for only two-dimensional (2D) images as the development of three-dimensional (3D) imaging systems was underdeveloped. However, in recent years, the implementation and applications of 3D imaging systems have been greatly discussed. This article aims to review some of the recent implementations of OSP based encryption systems designed for 3D imaging systems such as Computational Integral Imaging, Digital Holography and Microscopic Imaging. In general, most of these systems record the 3D complex amplitude by capturing encrypted diffraction patterns. By properly utilising the decryption keys together with numerical reconstruction algorithms, 3D scene reconstruction is possible. © Anita Publications. All rights reserved.
Keywords: 3D Optical Image Encryption, Integral Imaging, Digital Holography, Microscopic Imaging.


Peer Review Information
Method: Single- anonymous; Screened for Plagiarism? Yes
Buy this Article in Print © Anita Publications. All rights reserved

References

  1. https://www.forbes.com/sites/bernardmarr/2018/05/21/how-much-data-do-we-create-every-day-the-mind-blowing-stats-everyone-should-read/?sh=7f9e033560ba (Accessed on 26th May 2021).
  2. Bell G, Selenium and the Photophone, The Electrician, 5(1880)500-503.
  3. Hopkins H H, Kapany N S, Transparent fibers for the transmission of optical images, Opt Acta, 4(1955)164-170.
  4. Kapany N S, Eyer J A, Keim R E, Fiber Optics. Part II. Image transfer on static and dynamic scanning with fiber bundles, J Opt Soc Am, 47(1957)423-427.
  5. Kapany N S, Fiber Optics. VI. Image quality and optical insulation, J Opt Soc Am, 49(1959)779-787.
  6. Stone J, Optical transmission in liquid-core quartz fibers, Appl Phys Lett, 20(1972)239-240.
  7. Barnoski M K, Data distribution using fiber optics, Appl Opt, 14(1975)2571-2577.
  8. Wolf K B, Integral Transforms in Science and Engineering, (Plenum Publishing Corporation, New York), 1979.
  9. Goodman J W, Introduction to Fourier Optics, (McGraw-Hill, California), 1996.
  10. Shamir J, Optical Systems and Processes, (SPIE Press, Washington), 1999.
  11. Caulfield H J, Optical Information Processing: A Tribute to Adolf Lohmann, (SPIE Press Book, Washington), 2002.
  12. VanderLugt A, Optical Signal Processing, (Wiley Series in Pure & Applied Optics, New York), 2005.
  13. Nishchal N K, Optical Cryptosystems, (IOP Publishing, Bristol, U K), 2019.
  14. Healy J J, Kutay M A, Ozaktas H M, Sheridan J T, (eds), Linear Canonical Transforms, Springer series in Optical Sciences, New York, 2016.
  15. Muniraj I, Sheridan J T, Optical Encryption and Decryption, SL46, (SPIE Press), 2019.
  16. Zim H S, Codes and Secret Writing, (William Morrow, New York), 1948.
  17. Kahn D, The Codebreakers-The Story of Secret Writing, (Macmillan, New York). 1967.
  18. Johnson N F, Jajodia S, Exploring steganography: Seeing the unseen, IEEE Comp, 31(1998)26-34.
  19. Grover D, Data watermarking: Steganography and watermarking of digital data, Comp Law Security Rep, 17(2001) 101-104.
  20. Provos N, Honeyman P, Hide and seek: An introduction to steganography, IEEE Security and Privacy, 1(2003)32-44.
  21. Rosen J, Javidi B, Steganography, and encryption systems based on spatial correlators with meaningful output images, in Optical and Digital Techniques for Information Security, (Springer, Inc), 2005, pp 59-94.
  22. Cheddad A, Condell J, Curran J, Digital image steganography: Survey and analysis of current methods, Sign Process, 90 (2010)727-752.
  23. Cox I J, Miller M L, Review of watermarking and the importance of perceptual modeling, Proc SPIE 3016 Human Vision and Electronic Imaging II, (1997).
  24. Cox I J, Linnartz J P M G, Some general methods for tampering with watermarks, IEEE J Sel Areas Commun, 16(1998)587–593.
  25. Hartung F, Kutter M, Multimedia watermarking techniques, Proc IEEE, 87(1999)1079–1107.
  26. Chen B, Wornell G W, Quantization index modulation methods for digital watermarking and information embedding of multimedia, J VLSI Sign Process Systems for Signal, Image, and Video Tech, 27(2001)7–33.
  27. Cox I J, Miller M, Bloom J, Fridrich J, Kalker T, Digital Watermarking and Steganography, (Morgan Kaufmann Publishers, San Francisco), 2007.
  28. Wayner P, Disappearing Cryptography: Information Hiding: Steganography and Watermarking, 3rd Edition, Morgan Kaufmann Publishers, Massachusetts), 2008.
  29. Diffie W, Hellman M, New directions in cryptography, IEEE Trans Info Theory, 22(1976)472–492.
  30. Rivest R L, Shamir A, Adleman L, A method for obtaining digital signatures and public-key cryptosystems, Commun ACM Digital Library, 21(1978)120–126.
  31. Diffie W, Hellman M E, Privacy and authentication: An introduction to cryptography, Proc IEEE, 67(1979)397–427.
  32. Hellman M E, The mathematics of public key cryptography, Sci American, 241(1979) 146–198.
  33. ElGamal T, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Trans Inform Theory, 31(1985)469–472.
  34. Koblitz, N, Elliptic curve cryptosystems, Math Comput, 48(1987)203–209.
  35. Menezes A J, Oorschot P C V, Vanstone S A, Handbook of Applied Cryptography, (CRC Press), 1996.
  36. Zheng Y, Digital signcryption or how to achieve cost (signature & encryption) ≪ cost(signature) + cost(encryption), Advances in Cryptology, LNCS 1294 (1997)165–179.
  37. Coron J S, Resistance against differential power analysis for elliptic curve cryptosystems. In: Koç Ç.K., Paar C. (eds) Cryptographic Hardware and Embedded Systems. CHES, Springer Lecture Notes in Computer Science, 1717, (1999).
  38. Johnson D, Menezes A, Vanstone S, The elliptic curve digital signature algorithm (ECDSA), IJIS, 1(2001)36–63.
  39. Stinson D R, Paterson M, Cryptography Theory and Practice, (CRC Press), 2019.
  40. Stallings W, Cryptography and Network Security: Principles and Practice, 8th Edn, (Pearson), 2020.
  41. Wolf K B, Integral Transforms in Science and Engineering, (Plenum Publishing Corporation, New York),1979.
  42. Hennelly B M, Sheridan J T, Generalizing, optimizing, and inventing numerical algorithms for the fractional Fourier, Fresnel, and linear canonical transforms, J Opt Soc Am A, 22(2005)917–927.
  43. Hennelly B M, Sheridan J T, Fast numerical algorithm for the linear canonical transform, J Opt Soc Am A, 22(2005) 928–937.
  44. Healy J J, Sheridan J T, Sampling and discretization of the linear canonical transform, Sign Process, 89(2009) 641–648.
  45. Zhao L, Healy J J, Sheridan J T, Unitary discrete linear canonical transform: Analysis and application, Appl Opt, 52(2013)C30–C36.
  46. Zhao L, Muniraj I, Healy J J, Malallah R, Cui X G, Ryle J P, Sheridan J T, 2D non-separable linear canonical transform (2D-NS-LCT) based cryptography, Proc SPIE, 10233(2017)102331B; doi.org/10.1117/12.2265863.
  47. Zhao L, Healy J J, Sheridan J T, Constraints on additivity of the 1D discrete linear canonical transform, Appl Opt, 54(2015)9960–9965.
  48. Muniraj I, Guo C, Malallah R, Ryle J P, Healy J J, Lee B G, Sheridan J T, Low photon count based digital holography for quadratic phase cryptography, Opt Lett, 42(2017)2774–2777.
  49. Refregier P, Javidi B, Optical image encryption based on input plane and Fourier plane random encoding, Opt Lett, 20(1995)767–769.
  50. Neto L G, Sheng Y, Optical implementation of image encryption using random phase encoding, Opt Eng, 35(1996) 2459–2463.
  51. Goudail F, Bollaro F, Javidi B, Réfrégier P, Influence of a perturbation in a double phase-encoding system, J Opt Soc Am A, 15(1998)2629–2638.
  52. Towghi N, Javidi B, Luo Z, Fully phase encrypted image processor, J Opt Soc Am A, 16(1999)1915–1927.
  53. Matoba O, Naughton T J, Frauel Y, Bertaux N, Javidi B, Real-time three-dimensional object reconstruction by use of a phase-encoded digital hologram, Appl Opt, 41(2002)6187–6192.
  54. Kishk S, Javidi B, Information hiding technique with double phase encoding, Appl Opt, 41(2002)5462–5470.
  55. Arizaga R, Henao R, Torroba R, Fully digital encryption technique, Opt Commun, 221(2003)43–47.
  56. Alfalou A, Brosseau C, Optical image compression and encryption methods, Adv Opt Photon, 1(2009)589–636.
  57. Liu S, Guo C, Sheridan J T, A review of optical image encryption techniques, Opt Laser Technol, 57(2014)327–342.
  58. Rawat N, Kim B, Muniraj I, Situ G, Lee B G, Compressive sensing based robust multispectral double-image encryption, Appl Opt, 54(2015)1782–1793.
  59. Javidi B, Carnicer A, Yamaguchi M, Nomura T, Perez-Cabre E, Milan M, Nishchal, N K, Torroba R, Barrera J F, He W, Peng X, Stern A, Rivenson Y, Alfalou A, Brosseau C, Guo C, Seridan J T, Situ G, Naruse M, Matsumoto T,Tajahuerce E, Lancis J, Chen W, Chen X, Pinske P W H, Mosk A P, Markman A, Roadmap on optical security, J Opt (IOP), 18(2016)083001; doi. org/10.1088/2040-8978/18/8/083001.
  60. Guo C, Muniraj I, Sheridan J T, Phase-retrieval-based attacks on linear-canonical-transform-based DRPE systems, Appl Opt, 55(2016)4720–4728.
  61. Chen W, Chen X, Sheppard C J R, Optical image encryption based on diffractive imaging, Opt Lett, 35(2010) 3817–3819.
  62. Cabré E P, Cho M, Javidi B, Information authentication using photon-counting double-random-phase encrypted images, Opt Lett, 36(2011)22–24.
  63. Cho M, Javidi B, Three-dimensional photon counting double-random-phase encryption, Opt Lett, 38(2013)3198–3201.
  64. Muniraj I, Kim B, Lee B G, Encryption and volumetric 3D object reconstruction using multispectral computational integral imaging, Appl Opt, 53(2014)G25–G32.
  65. Muniraj I, Guo C, Lee B G, Sheridan J T, Interferometry based multispectral photon-limited 2D and 3D integral image encryption employing the Hartley transform, Opt Express, 23(2015)15907–15920.
  66. Vijayakumar A, Kashter Y, Kelner R, Rosen J, Coded aperture correlation holography–a new type of incoherent digital holograms, Opt Express, 24(2016)12430–12441.
  67. Vijayakumar A, Kumar M, Rai M, Rosen J, Coded Aperture Correlation Holography system for recording secured digital holograms of incoherently illuminated 3D scenes, in Advanced Secure Optical Image Processing for Communications, Alfalou A (Ed), Chapter 4, IOP Publishing Ltd, (2018).
  68. Li H, Guo C, Muniraj I, Schroeder B C, Sheridan J T, Jia S, Volumetric light-field encryption at the microscopic scale, Sci Rep, 7(2017)40113; doi.org/10.1038/srep40113.