WO2006001012A2 - Geometrical phase data encryption and decryption - Google Patents

Geometrical phase data encryption and decryption Download PDF

Info

Publication number
WO2006001012A2
WO2006001012A2 PCT/IL2005/000675 IL2005000675W WO2006001012A2 WO 2006001012 A2 WO2006001012 A2 WO 2006001012A2 IL 2005000675 W IL2005000675 W IL 2005000675W WO 2006001012 A2 WO2006001012 A2 WO 2006001012A2
Authority
WO
WIPO (PCT)
Prior art keywords
data
images
orientations
polarizer
carrier
Prior art date
Application number
PCT/IL2005/000675
Other languages
French (fr)
Other versions
WO2006001012A3 (en
Inventor
Erez Hasman
Gabriel Binner
Avi Niv
Original Assignee
Technion Research And Development Foundation Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Technion Research And Development Foundation Ltd. filed Critical Technion Research And Development Foundation Ltd.
Publication of WO2006001012A2 publication Critical patent/WO2006001012A2/en
Publication of WO2006001012A3 publication Critical patent/WO2006001012A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication

Definitions

  • the present invention relates to encryption. More particularly it relates to optical encryption method and device based on geometrical phase, which is originated from polarization manipulation. A space- variant subwavelength grating element is used as a carrier of the encrypted information.
  • optical encryption technique One of the processes that has been extensively investigated is the optical encryption technique.
  • advantages of optical encryption over conventional digital encryption include real time encryption, high space-bandwidth product, difficulty in unauthorized decryption, portability and the possibility of using biometrics.
  • Different optical encryption schemes have been suggested, for example schemes involving pure amplitude image encryption (see P. Refregier and B. Javidi, Opt. Lett. 20, 767 (1995)).
  • Polarization encryption provides additional flexibility in the key encryption design by adding a polarization state manipulation to the conventional phase and amplitude manipulation used in the former methods. This feature is advantageous as it makes the polarization encryption method more secure.
  • geometrical phase modification originate from polarization state manipulation, as anticipated by Pancharatnam (1956) and Berry (1984). Recently, we demonstrated the formation of complex polarization state manipulation by using computer-generated space-variant subwavelength dielectric gratings (A. Niv, G. Biener, V. Kleiner and E. Hasman, Opt. Lett. 29, 238 (2004)).
  • a method for encryption of an input data comprising: producing carrier for the data in the form of a space- variant subwavelength grating element, with local gratings having angles of orientation corresponding to the data. Furthermore, in accordance with some preferred embodiments of the present invention, the method further comprises: illuminating the carrier by a polarized incident beam; polarizing an emerging beam by a polarizer to obtain at least three images of the emerging beam acquired under different polarizer orientations; analyzing said at least three images to obtain a geometrical phase corresponding to the data.
  • the method further comprises applying a key function on the input data to obtain the data to be carried by the carrier, and after analyzing the images based on knowledge of the key function retrieving the input data.
  • the different polarizer orientations comprise two orthogonal orientations and one intermediate orientation.
  • the method further comprises applying a key function on the input data to obtain the data to be carried by the carrier.
  • the method further comprises: illuminating the carrier by an incident beam; polarizing an emerging beam by a polarizer to obtain at least three images of the emerging beam acquired under different polarizer orientations; and using said at least three images as carriers of the data. Furthermore, in accordance with some preferred embodiments of the present invention, the method further comprises: simulating illumination of the carrier by an incident beam and simulating polarization of an emerging beam to obtain at least three images of the emerging beam acquired under different polarization orientations; and using said at least three images as carriers of the data data. Furthermore, in accordance with some preferred embodiments of the present invention, said at least three images are watermarked.
  • the method further comprises: illuminating the carrier by a polarized incident beam; polarizing an emerging beam by a polarizer to obtain two pairs of images of the emerging beam, each pair acquired using different polarization states of the incident beam, and each image of the pairs acquired under different orientations of the polarizer; and analyzing said two pairs of images to obtain a geometrical phase corresponding to the encrypted data.
  • a device for carrying encrypted data comprising a space-variant subwavelength grating element, with local gratings having angles of orientation corresponding to the encrypted data.
  • the element is reflective.
  • the element is transmissive.
  • the gratings are made of dielectric material.
  • the gratings are made of metallic material.
  • a decrypting apparatus for decrypting encrypted data carried by a space- variant subwavelength grating element, with local gratings having angles of orientation corresponding to the encrypted data, the apparatus comprising: a light source for providing a light beam to illuminate the grating element; at least one polarizer for polarzing an emerging beam from the grating element in at different polarizer orientations; an imaging device for acquiring images acquired under different polarizer orientations of the emerging beam.
  • Figure Ia is an exemplary decryption arrangement, in accordance with a preferred embodiment of the present invention.
  • Figure Ib is an example of an input data, in the form of an image to be encrypted.
  • Figure 1 c illustrates the representation of the image of Fig. Ib after it was subjected to a secured key funcition.
  • Figure Id depicts an example of a space- variant subwavelength grating element, made according to a preferred embodiment of the present invention, based on the encrypted input information of the image shown Fig. Ic. L2005/000675
  • Figure 1 e depicts the space- variant polarization direction emerging from a space- variant subwavelength grating element.
  • Figures 2a, 2b and 2c show three intensity pictures obtained by three different orientations of a polarizer used in a computerized simulation of the method of the present invention.
  • Figures 3 a, 3b and 3 c show watermarked intensity pictures for three polarization orientations 0°, 45° and 90° respectively.
  • Figure 3d shows a properly decrypted image when using the watermarked images in the decryption process with the correct geometrical phase key.
  • Geometrical phase encryption can be optically realized by using a PBOE, which results in a robust and stable element that can be achieved using a single lithographic process. Therefore, this method is suitable for chip integration and can also be applied to personal security cards, e.g., credit cards or identification cards, without limiting other possible uses.
  • Geometrical phase encryption can also be implemented digitally, by computerized simulation. An important advantage of the digital implementation is the ability to use watermarking. The watermarking process is discussed later in this specification.
  • a primary input data for example an image
  • a PBOE that encodes the image intensity subjected to a secured key function.
  • the PBOE which is a space-variant rotating wave plate, imprints the image intensity plus the key function in the local orientations of the wave plate's fast axes.
  • the result is a space-variant subwavelength grating element (PBOE), with local gratings having angles of orientation corresponding to the encrypted data.
  • Fig. Ic which depicts an example of a space- variant subwavelength grating element, whose grating orientations (shown in Fig. Id) represent the encrypted information on the element.
  • the input data can be a matrix of any number dimensions, a string, or other form of information arrangement.
  • the information may be discrete or continuous.
  • the secured key function itself may be any key function that is acceptable by the user of the encryption method suggested herein, and in fact the present invention may also be implemented without using a secured key function.
  • the carrier the PBOE
  • the PBOE will be carrying information that can be recognized immediately in the decryption process, without having to be subjected to the corresponding secured key decryption. This means that the encryption of the input information is only subjected to medium change by way of transforming into geometrical phases on the PBOE, and once the geometrical phases of the PBOE are retrieved the in the decryption process the holder of this retrieved information will have the input data at his disposal.
  • the PBOE may be reflective, so that incident light illuminated on it emerges on the same side of the incident light source, or it may be transmissive, so that incident light illuminated on it emerges from the other side of the element.
  • Decryption is performed by illuminating the encrypted PBOE with a circularly polarized light from a light source and retrieving the primary image by analyzing the emerging Stokes parameters with the correct key, as shown in Fig l(a).
  • PBOEs are considered to be wave plates with constant retardation and space varying fast axes, the orientation of which is denoted by ⁇ (x,y). It is convenient to describe PBOEs by using Jones calculus.
  • a PBOE with a space-varying wave plate orientation function of Q (x,y) encodes the primary image of young Einstein, depicted in Fig. Ib.
  • the total orientation function of the wave plates, comprising the encrypted PBOE is shown in grayscale in Fig. Ic.
  • the emerging field which is a result of the vectorial self-interference, is a space varying polarized field. As can be seen, the orientation of the arrows is random.
  • the geometrical phase key, ⁇ k scrambles the space- variant polarization state of the beam and thus randomizes the geometrical phase encoding the primary image, ⁇ ..
  • the Stokes parameters of a fully polarized light (S 0 -S 3 ) are calculated from three intensity measurements. These measurements are taken when the transmitted light is passed through a polarizer with its axis oriented at 0° (/ 0)0 ), 45° (/ 45 ,o) and 90 ° (/90,0). A camera is used to capture the intensity pictures.
  • the subwavelength grating behaves as a uniaxial crystal with the optical axes parallel and perpendicular to the subwavelength grooves. Therefore, by fabricating locally periodic subwavelength structures for which the orientation of the subwavelength grooves is space varying, we achieve spatially rotating wave plates.
  • the realization procedure of the PBOE involves the fabrication of a computer-generated space- variant subwavelength-grating mask.
  • Figure l(d) is a magnified illustration of the subwavelength grating mask of the encrypted element. In order to test the concept, we used a computer simulation. For the encryption process we simulated a PBOE, encrypting the primary image intensity depicted in Fig. l(b).
  • Figures 2(a)-2(c) show the three intensity pictures obtained by the three different orientations of the simulated polarizer.
  • the three intensity pictures can be achieved optically using the realized PBOE, a polarizer and a CCD (see Fig. l(a)).
  • the authorized receiver is able to decrypt the primary image by calculating the Stokes parameters from the three intensity pictures and inserting these values into Eq. (3), along with the correct key.
  • a great advantage of the digital implementation approach is the possibility of using watermarking.
  • FIG. 3(a)- 3(c) show the watermarked intensity pictures for the three polarization orientations 0°, 45° and 90° respectively, while Fig. 3(d) shows the properly decrypted image when using the watermarked intensities in the decryption process with the correct geometrical phase key.
  • the advantage of the later method is that the birefringent parameters of the encrypted elements are not required, thus the method is insensitive to spatial fabrication errors and can be used with incoherent, polychromatic and, unpolarized illumination. These two methods use digital key when decrypting an image.
  • An other approach for discribing a subwavelength grating is the Stokes- Mueller fomalism approach.
  • a uniform wave plate where the fast axis is oriented along the y-axis can be described by a 4x4 matrix known as the Mueller matrix,
  • the measurement of the Mueller matrix members m 42 and m 43 is done by illuminating
  • circular analyzer which is composed of a QWP oriented at 0° and a polarizer oriented
  • I" 5 ( /f 45 ) are denoted by I" 5 ( /f 45 ), were a equals 0° or 45° for horizontally or 45° oriented

Abstract

A method and device for encryption and decryption of an input data. The encryption method comprises producing carrier for the data in the form of a space-variant subwavelength grating element, with local gratings having angles of orientation corresponding to the data.

Description

GEOMETRICAL PHASE DATA ENCRYPTION AND DECRYPTION
FIELD OF THE INVENTION The present invention relates to encryption. More particularly it relates to optical encryption method and device based on geometrical phase, which is originated from polarization manipulation. A space- variant subwavelength grating element is used as a carrier of the encrypted information.
BACKGROUND OF THE INVENTION hi the past few years there has been increased interest in data security and a need for improved methods for encrypting data. The increasing demands for better and faster security devices are results of the enormous interest in communication through the net, especially of unauthorized users and commercial spies. One of the processes that has been extensively investigated is the optical encryption technique. Several advantages of optical encryption over conventional digital encryption include real time encryption, high space-bandwidth product, difficulty in unauthorized decryption, portability and the possibility of using biometrics. Different optical encryption schemes have been suggested, for example schemes involving pure amplitude image encryption (see P. Refregier and B. Javidi, Opt. Lett. 20, 767 (1995)). Other encryption schemes involving phase-only images were explored to improve the decrypted image's visibility (see N. Towghi, B. Javidi and Z. Luo, J. Opt. Soc. Am. A 16, 1915 (1999)). Both methods use double-random phase encryption, first presented by Refregier and Javidi. The two methods record the complex field information by interference, and thus are unstable and cumbersome. Mogensen and Gluckstad proposed polarization encryption using spatially modulated retardation (P. C. Mogensen and J. Gluckstad, Opt. Commun. 173, 177 (2000)), while Unnikrishnan et al., proposed polarization encryption using spatially modulated azimuthal angle (G. Unnikrishnan, M. Pohit and K. Singh, Opt. Commun. 185, 25 (2000)). Polarization encryption provides additional flexibility in the key encryption design by adding a polarization state manipulation to the conventional phase and amplitude manipulation used in the former methods. This feature is advantageous as it makes the polarization encryption method more secure. In this specification, we propose an approach for polarization encryption using geometrical phase modification. Geometrical phases originate from polarization state manipulation, as anticipated by Pancharatnam (1956) and Berry (1984). Recently, we demonstrated the formation of complex polarization state manipulation by using computer-generated space-variant subwavelength dielectric gratings (A. Niv, G. Biener, V. Kleiner and E. Hasman, Opt. Lett. 29, 238 (2004)). We have also shown that such polarization state manipulations inevitably lead to a phase modification of geometrical origin, which is a manifestation of the geometrical Pancharatnam-Berry phase (E. Hasman, V. Kleiner, G. Biener and A. Niv, Appl. Phys. Lett. 82, 328 (2003)). Optical elements which use this effect to form a desired phase front are called Pancharatnam-Berry phase optical elements (PBOEs).
BRIEF DESCRIPTION OF THE INVENTION There is thus provided, in accordance with some preferred embodiments of the present invention, a method for encryption of an input data, the method comprising: producing carrier for the data in the form of a space- variant subwavelength grating element, with local gratings having angles of orientation corresponding to the data. Furthermore, in accordance with some preferred embodiments of the present invention, the method further comprises: illuminating the carrier by a polarized incident beam; polarizing an emerging beam by a polarizer to obtain at least three images of the emerging beam acquired under different polarizer orientations; analyzing said at least three images to obtain a geometrical phase corresponding to the data. Furthermore, in accordance with some preferred embodiments of the present invention, the method further comprises applying a key function on the input data to obtain the data to be carried by the carrier, and after analyzing the images based on knowledge of the key function retrieving the input data. Furthermore, in accordance with some preferred embodiments of the present invention, the different polarizer orientations comprise two orthogonal orientations and one intermediate orientation. Furthermore, in accordance with some preferred embodiments of the present invention, the method further comprises applying a key function on the input data to obtain the data to be carried by the carrier. Furthermore, in accordance with some preferred embodiments of the present invention, the method further comprises: illuminating the carrier by an incident beam; polarizing an emerging beam by a polarizer to obtain at least three images of the emerging beam acquired under different polarizer orientations; and using said at least three images as carriers of the data. Furthermore, in accordance with some preferred embodiments of the present invention, the method further comprises: simulating illumination of the carrier by an incident beam and simulating polarization of an emerging beam to obtain at least three images of the emerging beam acquired under different polarization orientations; and using said at least three images as carriers of the data data. Furthermore, in accordance with some preferred embodiments of the present invention, said at least three images are watermarked. Furthermore, in accordance with some preferred embodiments of the present invention, the method further comprises: illuminating the carrier by a polarized incident beam; polarizing an emerging beam by a polarizer to obtain two pairs of images of the emerging beam, each pair acquired using different polarization states of the incident beam, and each image of the pairs acquired under different orientations of the polarizer; and analyzing said two pairs of images to obtain a geometrical phase corresponding to the encrypted data. Furthermore, in accordance with some preferred embodiments of the present invention, there is provided a device for carrying encrypted data, the device comprising a space-variant subwavelength grating element, with local gratings having angles of orientation corresponding to the encrypted data. Furthermore, in accordance with some preferred embodiments of the present invention, the element is reflective. Furthermore, in accordance with some preferred embodiments of the present invention, the element is transmissive. Furthermore, in accordance with some preferred embodiments of the present invention, the gratings are made of dielectric material. Furthermore, in accordance with some preferred embodiments of the present invention, the gratings are made of metallic material. Furthermore, in accordance with some preferred embodiments of the present invention, there is provided a decrypting apparatus for decrypting encrypted data carried by a space- variant subwavelength grating element, with local gratings having angles of orientation corresponding to the encrypted data, the apparatus comprising: a light source for providing a light beam to illuminate the grating element; at least one polarizer for polarzing an emerging beam from the grating element in at different polarizer orientations; an imaging device for acquiring images acquired under different polarizer orientations of the emerging beam.
BRIEF DESCRIPTION OF THE DRAWINGS In order to better understand the present invention, and appreciate its practical applications, the following Figures are provided and referenced hereafter. It should be noted that the Figures are given as examples only and in no way limit the scope of the invention. Like components are denoted by like reference numerals.
Figure Ia is an exemplary decryption arrangement, in accordance with a preferred embodiment of the present invention. Figure Ib is an example of an input data, in the form of an image to be encrypted. Figure 1 c illustrates the representation of the image of Fig. Ib after it was subjected to a secured key funcition. Figure Id depicts an example of a space- variant subwavelength grating element, made according to a preferred embodiment of the present invention, based on the encrypted input information of the image shown Fig. Ic. L2005/000675
Figure 1 e depicts the space- variant polarization direction emerging from a space- variant subwavelength grating element. Figures 2a, 2b and 2c show three intensity pictures obtained by three different orientations of a polarizer used in a computerized simulation of the method of the present invention. Figures 3 a, 3b and 3 c show watermarked intensity pictures for three polarization orientations 0°, 45° and 90° respectively. Figure 3d shows a properly decrypted image when using the watermarked images in the decryption process with the correct geometrical phase key.
DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS Geometrical phase encryption can be optically realized by using a PBOE, which results in a robust and stable element that can be achieved using a single lithographic process. Therefore, this method is suitable for chip integration and can also be applied to personal security cards, e.g., credit cards or identification cards, without limiting other possible uses. Geometrical phase encryption can also be implemented digitally, by computerized simulation. An important advantage of the digital implementation is the ability to use watermarking. The watermarking process is discussed later in this specification. In order to encrypt a primary input data, for example an image, we propose forming a PBOE that encodes the image intensity subjected to a secured key function. The PBOE, which is a space-variant rotating wave plate, imprints the image intensity plus the key function in the local orientations of the wave plate's fast axes. The result is a space-variant subwavelength grating element (PBOE), with local gratings having angles of orientation corresponding to the encrypted data. Consider Fig. Ic, which depicts an example of a space- variant subwavelength grating element, whose grating orientations (shown in Fig. Id) represent the encrypted information on the element. It is noted that although the example discussed in this specification is an image, other forms of input data can be also subjected to the encryption method suggested herein. The input data can be a matrix of any number dimensions, a string, or other form of information arrangement. The information may be discrete or continuous. The secured key function itself may be any key function that is acceptable by the user of the encryption method suggested herein, and in fact the present invention may also be implemented without using a secured key function. In the latter case it must be understood that the carrier (the PBOE) will be carrying information that can be recognized immediately in the decryption process, without having to be subjected to the corresponding secured key decryption. This means that the encryption of the input information is only subjected to medium change by way of transforming into geometrical phases on the PBOE, and once the geometrical phases of the PBOE are retrieved the in the decryption process the holder of this retrieved information will have the input data at his disposal. The PBOE may be reflective, so that incident light illuminated on it emerges on the same side of the incident light source, or it may be transmissive, so that incident light illuminated on it emerges from the other side of the element. Decryption is performed by illuminating the encrypted PBOE with a circularly polarized light from a light source and retrieving the primary image by analyzing the emerging Stokes parameters with the correct key, as shown in Fig l(a). PBOEs are considered to be wave plates with constant retardation and space varying fast axes, the orientation of which is denoted by θ(x,y). It is convenient to describe PBOEs by using Jones calculus. We find the space-dependent transmission matrix for the PBOE, Tc, by applying the optical rotator matrix, R(θ(x,y)), to the Jones matrix of a wave plate, W, i.e., Tς?=R[θ(x,y)]WR.[θ(x,y)]. By transforming the space-dependent transmission matrix to the helical bases using the helical transformation matrix U, in which T=U-1TcU, we obtain the expression , , tx +ty ∞p(iφ) (l O) tx -ty &q?(iφ) ( O exp[i2θ{x,y)]\ m T{x'y)= 2 to lj+ 2 {Qχp[-i2θ(x,y)} O J' U where T is the space-variant transmission matrix in the helical bases, tx and ty are the real amplitude transmission coefficients for the light polarized perpendicular and parallel to the optical axes, respectively, and φis the retardation of the wave plate. Thus, for an incident wave with right hand circular polarization and unknown distributed complex amplitude, that follows the paraxial approximation, we find that the resulting field is
Figure imgf000008_0001
where ηR = [tχ + ty exp(/ φ)]/2 and ηL = [ - ty Qxp(iφ)]/2 are the complex field
coefficients, and |R} = (l θ)r and |L) = (θ l)r represent the right and left hand circularly polarized components in the helical basis respectively. From Eq. (2) we see that the emerging beam from a PBOE comprises two polarization orders. The first maintains the original polarization state and phase of the incident beam, and the latter is left hand circularly polarized and has the phase modification of - 2θ(x,y) • The phase modification of the L) polarization order originates solely from the local changes in the polarization state of the emerging beam, and is therefore, geometrical in nature.5"8 Let us assume that a PBOE with a space-varying wave plate orientation function of Q (x,y) encodes the primary image of young Einstein, depicted in Fig. Ib. The relationship between the primary image intensity / and β. is assumed to be θt = al(x,y), where a is a constant, hi order to further encrypt the encoded primary image information embedded in the PBOE, we add a random rotation function, θk(x,y), to the space- varying wave plates' orientation. This random rotation factor serves as an encryption/decryption key. The total orientation function of the wave plates, comprising the encrypted PBOE, is shown in grayscale in Fig. Ic. hi order to decrypt the primary image, we first illuminate the PBOE with |R^ polarized light. The beam emerging from the PBOE is a vectorial interference between two different polarized beams, as can be seen from Eq. (2). The geometrical phase added to the L)
polarized beam equals -fø? +<pk), where φ. = 2θt and φk = 2θk denote the geometrical phase added by the encoded primary image intensity and the encoded key respectively. Figure Ie depicts the space- variant polarization direction emerging from a PBOE with optical parameters of tx=ty=l and φ=τc/2. The emerging field, which is a result of the vectorial self-interference, is a space varying polarized field. As can be seen, the orientation of the arrows is random. The geometrical phase key, φk , scrambles the space- variant polarization state of the beam and thus randomizes the geometrical phase encoding the primary image, φ.. m order to retrieve the primary image's geometrical phase we need to measure the Stokes parameters of the beam emerging from the PBOE. The Stokes parameters of a fully polarized light (S0-S3) are calculated from three intensity measurements. These measurements are taken when the transmitted light is passed through a polarizer with its axis oriented at 0° (/0)0), 45° (/45,o) and 90° (/90,0). A camera is used to capture the intensity pictures. The relations between the Stokes parameters and the measured intensities are, ,S0 = /0 0 + Z90 0 ;
Si
Figure imgf000009_0001
R)| + |(E -1OClIt S1 = 2Re{(E0M/ |R)(L|Eoιrf )} and S2 = 2 Im{(E0M, | R)(L | E0^ )}, Re{} and lm{} denote the real and imaginary parts of the expression inside the curl brackets and (a\β) denotes the inner product. By using the Stokes parameters calculated above and by applying the geometrical phase key, we can retrieve the phase function fø.) of the primary image, such that φ. = arctan(S2 /S1 )- argføηl }- φk , (3) where arg{} denotes the argument of the expression in the curl brackets, and * denotes the complex conjugate. Since the emerging beam is fully polarized, the fourth Stokes parameter, S3, is not required. For the realization of the optical concept, we can implement a method, recently demonstrated for space variant polarization— state manipulations using computer-generated subwavelength structures.7'8 When the period of a subwavelength periodic structure is smaller than the incident wavelength, only the zeroth order is a propagating order, and all other orders are evanescent. The subwavelength grating behaves as a uniaxial crystal with the optical axes parallel and perpendicular to the subwavelength grooves. Therefore, by fabricating locally periodic subwavelength structures for which the orientation of the subwavelength grooves is space varying, we achieve spatially rotating wave plates. The realization procedure of the PBOE involves the fabrication of a computer-generated space- variant subwavelength-grating mask. Figure l(d) is a magnified illustration of the subwavelength grating mask of the encrypted element. In order to test the concept, we used a computer simulation. For the encryption process we simulated a PBOE, encrypting the primary image intensity depicted in Fig. l(b). The PBOE used has the birefrmgent parameters of tx=ty=l and φ=π/2. In order to decrypt the primary image, we illuminated the simulated encrypted element with a right circularly polarized light. Afterwards, we calculated the intensity pictures behind a simulated polarizer in the three orientations (0°, 45° and 90°). Figures 2(a)-2(c) show the three intensity pictures obtained by the three different orientations of the simulated polarizer. The three intensity pictures can be achieved optically using the realized PBOE, a polarizer and a CCD (see Fig. l(a)). The decrypted image shown in Fig. 2(d) is attained by calculating the Stokes parameters when applying the simulated intensities, and by using Eq. (3), when applying the correct geometrical phase key, φ, . A case in which the wrong key is used the decrypted image would result in white noise, without the possibility of reconstructing the original image. An alternative method for geometrical phase encryption makes use of digital implementation. In order to encrypt the information using this method, we need to calculate the three intensity pictures achieved by transmitting the beam, emerging from the digital PBOE through a digital polarizer, oriented in three different angles. These three intensity pictures are then sent via an optical communication net to an authorized receiver possessing the correct key. The authorized receiver is able to decrypt the primary image by calculating the Stokes parameters from the three intensity pictures and inserting these values into Eq. (3), along with the correct key. A great advantage of the digital implementation approach is the possibility of using watermarking. The watermarking procedure is achieved by adding a false image (as a deception) to the intensity pictures generated by the encryption process, such that /07 = J0 0 + IWMP, 1% = /45 0 + IWMp and /JJ{ = J90 0 + IWMp , where IWMp
symbolizes the watermark picture and I™ , Z4^ and J™ symbolize the watermarked intensity pictures. Although the watermark picture has little effect on the decryption process, it can be used to mislead unauthorized receivers. Figures 3(a)- 3(c) show the watermarked intensity pictures for the three polarization orientations 0°, 45° and 90° respectively, while Fig. 3(d) shows the properly decrypted image when using the watermarked intensities in the decryption process with the correct geometrical phase key. We further propose an alternative decryption variation of the present invention, which is analyzed using Mueller formalism, where four different intensity measurements are required. The advantage of the later method is that the birefringent parameters of the encrypted elements are not required, thus the method is insensitive to spatial fabrication errors and can be used with incoherent, polychromatic and, unpolarized illumination. These two methods use digital key when decrypting an image. An other approach for discribing a subwavelength grating is the Stokes- Mueller fomalism approach. In this representation, a uniform wave plate where the fast axis is oriented along the y-axis can be described by a 4x4 matrix known as the Mueller matrix,
Figure imgf000011_0001
where tx , ty are the real amplitude transmission coefficients for light polarized perpendicular and parallel to the optical axes and φ is the retardation of the wave plate. If the orientation of the wave plate is space- varying, i.e. different at each location, then the space- variant wave plates can be described by the space-dependent matrix, M{x,y) = R(θ{x,y))WR-ι{θ{x,y)), (2)
Figure imgf000012_0001
is the Mueller rotation matrix. Explicit calculation of M(x,y) yields,
Figure imgf000012_0002
where A=(tx+tyexpφ)/2 and B=(tx-tyexpφ)/2 and Re{} and Im{} denote the real and imaginary parts of the expression inside the curl brackets. hi order to decrypt the primary image, we need to measure the space- variant subwavelength groove orientation, Q. + 0k ■ As can be seen from Eq. (3) the groove orientation is found by dividing the SWG Mueller matrix members -m42 by m43, which result in,
Figure imgf000012_0003
We note that the imaginary parts written within the two matrix members are canceled when dividing these two members, as can be seen in Eq. (4). This result indicates that the extracted space- variant subwavelength orientation function does not depend on the subwavelength grating parameter values. Thus, the decryption method is insensitive to spatial fabrication non-uniformities. An other conclusion results from the cancellation of the subwavelength grating parameter values is that the decryption process can be implemented in an incoherent, quasi-monochromatic, and unpolarized source. While tx, ty and φ is process dependent θ is very accurate and does not depend on the process nor on the illumination, and thus, by extracting θ without the influence of tx, ty and φ,
makes the decryption process more simple and accurate.
By extracting β + θk and applying the correct key we can retrieve the primary
image, thus,
Figure imgf000013_0001
The measurement of the Mueller matrix members m42 and m43 is done by illuminating
the SWG with two differently polarized beams, for W42 we will illuminate with
horizontally linear polarized beam and for W43 we will illuminate the SWG with 45°
oriented linearly polarized beam. In both cases the intensities are measured using a
circular analyzer, which is composed of a QWP oriented at 0° and a polarizer oriented
at 45° and -45°, for the transmitted R) and L) polarization state, respectively. The
intensities resulting from the circular analyzer with a polarizer oriented at 45°(-45°)
are denoted by I"5 ( /f45 ), were a equals 0° or 45° for horizontally or 45° oriented
linear polarized illumination respectively. Explicitly the connection between the
measured intensities and the relevant Mueller matrix elements is given by, r0 r0 m42 = -^-45 - ^45 mA3 = IT5 r45 (6) - H45
To conclude, we have introduced an approach for geometrical phase encryption using spatial polarization state manipulation. Our method can be realized using space- variant subwavelength gratings, thereby making it suitable for personal security cards, or implemented solely in a digital environment thus enabling the additional feature of watermarking. Alternatively, the present invention maybe realized in computerized simulation. It should be clear that the description of the embodiments and attached Figures set forth in this specification serves only for a better understanding of the invention, without limiting its scope. It should also be clear that a person skilled in the art, after reading the present specification could make adjustments or amendments to the attached Figures and above described embodiments that would still be covered by the present invention.

Claims

1. A method for encryption of an input data, the method comprising: producing carrier for the data in the form of a space- variant subwavelength grating element, with local gratings having angles of orientation corresponding to the data.
2. The method of claim 1, further comprising: illuminating the carrier by a polarized incident beam; polarizing an emerging beam by a polarizer to obtain at least three images of the emerging beam acquired under different polarizer orientations; analyzing said at least three images to obtain a geometrical phase corresponding to the data.
3. The method of claim 2, further comprising applying a key function on the input data to obtain the data to be carried by the carrier, and after analyzing the images based on knowledge of the key function retrieving the input data.
4. The method of claim 2, wherein the different polarizer orientations comprise two orthogonal orientations and one intermediate orientation.
5. The method of claim 1, further comprising applying a key function on the input data to obtain the data to be carried by the carrier.
6. The method of claim 1 , further comprising: illuminating the carrier by an incident beam; polarizing an emerging beam by a polarizer to obtain at least three images of the emerging beam acquired under different polarizer orientations; and using said at least three images as carriers of the data.
7. The method of claim 6, wherein the different polarization orientations comprise two orthogonal orientations and one intermediate orientation.
8. The method of claim 1, further comprising: simulating illumination of the carrier by an incident beam and simulating polarization of an emerging beam to obtain at least three images of the emerging beam acquired under different polarization orientations; and using said at least three images as carriers of the data data.
9. The method of claim 8, wherein the different polarization orientations comprise two orthogonal orientations and one intermediate orientation.
10. The method of claim 9, wherein said at least three images are watermarked.
11. The method of claim 1 , further comprising: illuminating the carrier by a polarized incident beam; polarizing an emerging beam by a polarizer to obtain two pairs of images of the emerging beam, each pair acquired using different polarization states of the incident beam, and each image of the pairs acquired under different orientations of the polarizer; and analyzing said two pairs of images to obtain a geometrical phase corresponding to the encrypted data.
12. The method of claim 11 , further comprising applying a key function on the input data to obtain the data to be carried by the carrier, and after analyzing the images based on knowledge of the key function retrieving the input data.; and based on knowledge of the key function retrieving the input data.
13. A device for carrying encrypted data, the device comprising a space- variant subwavelength grating element, with local gratings having angles of orientation corresponding to the encrypted data.
14. The device of claim 13, wherein the element is reflective.
15. The device of claim 13, wherein the element is transmissive.
16. The device of claim 13, wherein the gratings are made of dielectric material.
17. The device of claim 13, wherein the gratings are made of metallic material.
18. A decrypting apparatus for decrypting encrypted data carried by a space- variant subwavelength grating element, with local gratings having angles of orientation corresponding to the encrypted data, the apparatus comprising: a light source for providing a light beam to illuminate the grating element; at least one polarizer for polarzing an emerging beam from the grating element in at different polarizer orientations; an imaging device for acquiring images acquired under different polarizer orientations of the emerging beam.
PCT/IL2005/000675 2004-06-25 2005-06-23 Geometrical phase data encryption and decryption WO2006001012A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US58243904P 2004-06-25 2004-06-25
US60/582,439 2004-06-25

Publications (2)

Publication Number Publication Date
WO2006001012A2 true WO2006001012A2 (en) 2006-01-05
WO2006001012A3 WO2006001012A3 (en) 2009-04-23

Family

ID=35782175

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IL2005/000675 WO2006001012A2 (en) 2004-06-25 2005-06-23 Geometrical phase data encryption and decryption

Country Status (1)

Country Link
WO (1) WO2006001012A2 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI405448B (en) * 2006-04-18 2013-08-11 Ibm Encryption of data in storage systems
CN104159073A (en) * 2014-07-21 2014-11-19 中国人民武装警察部队工程大学 Video optics encryption and decryption system and method based on double random phase encoding
CN115327677A (en) * 2022-04-14 2022-11-11 西北工业大学 Vector super surface for realizing polarization information encryption and design method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4892385A (en) * 1981-02-19 1990-01-09 General Electric Company Sheet-material authenticated item with reflective-diffractive authenticating device
US5680588A (en) * 1995-06-06 1997-10-21 International Business Machines Corporation Method and system for optimizing illumination in an optical photolithography projection imaging system
US6314220B1 (en) * 1995-03-13 2001-11-06 Templex Technology, Inc. Segmented complex fiber gratings

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4892385A (en) * 1981-02-19 1990-01-09 General Electric Company Sheet-material authenticated item with reflective-diffractive authenticating device
US6314220B1 (en) * 1995-03-13 2001-11-06 Templex Technology, Inc. Segmented complex fiber gratings
US5680588A (en) * 1995-06-06 1997-10-21 International Business Machines Corporation Method and system for optimizing illumination in an optical photolithography projection imaging system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
BOMZON ET AL.: 'Space-variant Pancharatnam-Berry phase optical elements with computer- generated subwavelength gratings' OPTICAL SOCIETY OF AMERICA vol. 27, no. 13, 01 July 2002, pages 1141 - 1143 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI405448B (en) * 2006-04-18 2013-08-11 Ibm Encryption of data in storage systems
CN104159073A (en) * 2014-07-21 2014-11-19 中国人民武装警察部队工程大学 Video optics encryption and decryption system and method based on double random phase encoding
CN115327677A (en) * 2022-04-14 2022-11-11 西北工业大学 Vector super surface for realizing polarization information encryption and design method
CN115327677B (en) * 2022-04-14 2024-01-30 西北工业大学 Vector super-surface for realizing polarization information encryption and design method

Also Published As

Publication number Publication date
WO2006001012A3 (en) 2009-04-23

Similar Documents

Publication Publication Date Title
Zhang et al. Optical encryption based on iterative fractional Fourier transform
Tao et al. Double image encryption based on random phase encoding in the fractional Fourier domain
Zhang et al. Meta-optics empowered vector visual cryptography for high security and rapid decryption
Zamrani et al. Optical image encryption technique based on deterministic phase masks
Vilardy et al. Improved decryption quality and security of a joint transform correlator-based encryption system
Lin et al. Four-dimensional key design in amplitude, phase, polarization and distance for optical encryption based on polarization digital holography and QR code
Sui et al. Color image encryption by using Yang-Gu mixture amplitude-phase retrieval algorithm in gyrator transform domain and two-dimensional Sine logistic modulation map
Dubreuil et al. Robustness against attacks of dual polarization encryption using the Stokes–Mueller formalism
Lin et al. Multiple images encryption based on Fourier transform hologram
Patra et al. Multiplexing and encryption of images using phase grating and random phase mask
Kumar et al. Optical voice information hiding using enhanced iterative algorithm and computational ghost imaging
He et al. Single-shot optical multiple-image encryption by jointly using wavelength multiplexing and position multiplexing
Wang et al. Optical image authentication scheme using dual polarization decoding configuration
Kumar et al. Multiuser optical image authentication platform based on sparse constraint and polar decomposition in Fresnel domain
Barrera et al. Fault tolerances using toroidal zone plate encryption
Chen Optical data security system using phase extraction scheme via single-pixel detection
Li et al. A one-time pad encryption method combining full-phase image encryption and hiding
Joshi et al. Simultaneous encryption of a color and a gray-scale image using byte-level encoding based on single-channel double random-phase encoding architecture in fractional Fourier domain
WO2006001012A2 (en) Geometrical phase data encryption and decryption
Ma et al. Symmetric–asymmetric hybrid encryption and decryption system based on chaotic iris phase mask and computer-generated holography
Zhang et al. Study on the key technology of optical encryption based on compressive ghost imaging with double random-phase encoding
Sui et al. Optical multiple-image authentication scheme based on the phase retrieval algorithm in gyrator domain
Kumar et al. Color image encryption using vectorial light field through a compact optical set-up
Mosso et al. Experimental optical encryption system based on a single-lens imaging architecture combined with a phase retrieval algorithm
Trejos et al. Experimental opto-digital processing of multiple data via modulation, packaging and encryption

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

NENP Non-entry into the national phase in:

Ref country code: DE

WWW Wipo information: withdrawn in national office

Country of ref document: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 05755441

Country of ref document: EP

Kind code of ref document: A2

122 Ep: pct application non-entry in european phase

Ref document number: 05755441

Country of ref document: EP

Kind code of ref document: A2