WO2006001012A2 - Geometrical phase data encryption and decryption - Google Patents
Geometrical phase data encryption and decryption Download PDFInfo
- Publication number
- WO2006001012A2 WO2006001012A2 PCT/IL2005/000675 IL2005000675W WO2006001012A2 WO 2006001012 A2 WO2006001012 A2 WO 2006001012A2 IL 2005000675 W IL2005000675 W IL 2005000675W WO 2006001012 A2 WO2006001012 A2 WO 2006001012A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- images
- orientations
- polarizer
- carrier
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
Definitions
- the present invention relates to encryption. More particularly it relates to optical encryption method and device based on geometrical phase, which is originated from polarization manipulation. A space- variant subwavelength grating element is used as a carrier of the encrypted information.
- optical encryption technique One of the processes that has been extensively investigated is the optical encryption technique.
- advantages of optical encryption over conventional digital encryption include real time encryption, high space-bandwidth product, difficulty in unauthorized decryption, portability and the possibility of using biometrics.
- Different optical encryption schemes have been suggested, for example schemes involving pure amplitude image encryption (see P. Refregier and B. Javidi, Opt. Lett. 20, 767 (1995)).
- Polarization encryption provides additional flexibility in the key encryption design by adding a polarization state manipulation to the conventional phase and amplitude manipulation used in the former methods. This feature is advantageous as it makes the polarization encryption method more secure.
- geometrical phase modification originate from polarization state manipulation, as anticipated by Pancharatnam (1956) and Berry (1984). Recently, we demonstrated the formation of complex polarization state manipulation by using computer-generated space-variant subwavelength dielectric gratings (A. Niv, G. Biener, V. Kleiner and E. Hasman, Opt. Lett. 29, 238 (2004)).
- a method for encryption of an input data comprising: producing carrier for the data in the form of a space- variant subwavelength grating element, with local gratings having angles of orientation corresponding to the data. Furthermore, in accordance with some preferred embodiments of the present invention, the method further comprises: illuminating the carrier by a polarized incident beam; polarizing an emerging beam by a polarizer to obtain at least three images of the emerging beam acquired under different polarizer orientations; analyzing said at least three images to obtain a geometrical phase corresponding to the data.
- the method further comprises applying a key function on the input data to obtain the data to be carried by the carrier, and after analyzing the images based on knowledge of the key function retrieving the input data.
- the different polarizer orientations comprise two orthogonal orientations and one intermediate orientation.
- the method further comprises applying a key function on the input data to obtain the data to be carried by the carrier.
- the method further comprises: illuminating the carrier by an incident beam; polarizing an emerging beam by a polarizer to obtain at least three images of the emerging beam acquired under different polarizer orientations; and using said at least three images as carriers of the data. Furthermore, in accordance with some preferred embodiments of the present invention, the method further comprises: simulating illumination of the carrier by an incident beam and simulating polarization of an emerging beam to obtain at least three images of the emerging beam acquired under different polarization orientations; and using said at least three images as carriers of the data data. Furthermore, in accordance with some preferred embodiments of the present invention, said at least three images are watermarked.
- the method further comprises: illuminating the carrier by a polarized incident beam; polarizing an emerging beam by a polarizer to obtain two pairs of images of the emerging beam, each pair acquired using different polarization states of the incident beam, and each image of the pairs acquired under different orientations of the polarizer; and analyzing said two pairs of images to obtain a geometrical phase corresponding to the encrypted data.
- a device for carrying encrypted data comprising a space-variant subwavelength grating element, with local gratings having angles of orientation corresponding to the encrypted data.
- the element is reflective.
- the element is transmissive.
- the gratings are made of dielectric material.
- the gratings are made of metallic material.
- a decrypting apparatus for decrypting encrypted data carried by a space- variant subwavelength grating element, with local gratings having angles of orientation corresponding to the encrypted data, the apparatus comprising: a light source for providing a light beam to illuminate the grating element; at least one polarizer for polarzing an emerging beam from the grating element in at different polarizer orientations; an imaging device for acquiring images acquired under different polarizer orientations of the emerging beam.
- Figure Ia is an exemplary decryption arrangement, in accordance with a preferred embodiment of the present invention.
- Figure Ib is an example of an input data, in the form of an image to be encrypted.
- Figure 1 c illustrates the representation of the image of Fig. Ib after it was subjected to a secured key funcition.
- Figure Id depicts an example of a space- variant subwavelength grating element, made according to a preferred embodiment of the present invention, based on the encrypted input information of the image shown Fig. Ic. L2005/000675
- Figure 1 e depicts the space- variant polarization direction emerging from a space- variant subwavelength grating element.
- Figures 2a, 2b and 2c show three intensity pictures obtained by three different orientations of a polarizer used in a computerized simulation of the method of the present invention.
- Figures 3 a, 3b and 3 c show watermarked intensity pictures for three polarization orientations 0°, 45° and 90° respectively.
- Figure 3d shows a properly decrypted image when using the watermarked images in the decryption process with the correct geometrical phase key.
- Geometrical phase encryption can be optically realized by using a PBOE, which results in a robust and stable element that can be achieved using a single lithographic process. Therefore, this method is suitable for chip integration and can also be applied to personal security cards, e.g., credit cards or identification cards, without limiting other possible uses.
- Geometrical phase encryption can also be implemented digitally, by computerized simulation. An important advantage of the digital implementation is the ability to use watermarking. The watermarking process is discussed later in this specification.
- a primary input data for example an image
- a PBOE that encodes the image intensity subjected to a secured key function.
- the PBOE which is a space-variant rotating wave plate, imprints the image intensity plus the key function in the local orientations of the wave plate's fast axes.
- the result is a space-variant subwavelength grating element (PBOE), with local gratings having angles of orientation corresponding to the encrypted data.
- Fig. Ic which depicts an example of a space- variant subwavelength grating element, whose grating orientations (shown in Fig. Id) represent the encrypted information on the element.
- the input data can be a matrix of any number dimensions, a string, or other form of information arrangement.
- the information may be discrete or continuous.
- the secured key function itself may be any key function that is acceptable by the user of the encryption method suggested herein, and in fact the present invention may also be implemented without using a secured key function.
- the carrier the PBOE
- the PBOE will be carrying information that can be recognized immediately in the decryption process, without having to be subjected to the corresponding secured key decryption. This means that the encryption of the input information is only subjected to medium change by way of transforming into geometrical phases on the PBOE, and once the geometrical phases of the PBOE are retrieved the in the decryption process the holder of this retrieved information will have the input data at his disposal.
- the PBOE may be reflective, so that incident light illuminated on it emerges on the same side of the incident light source, or it may be transmissive, so that incident light illuminated on it emerges from the other side of the element.
- Decryption is performed by illuminating the encrypted PBOE with a circularly polarized light from a light source and retrieving the primary image by analyzing the emerging Stokes parameters with the correct key, as shown in Fig l(a).
- PBOEs are considered to be wave plates with constant retardation and space varying fast axes, the orientation of which is denoted by ⁇ (x,y). It is convenient to describe PBOEs by using Jones calculus.
- a PBOE with a space-varying wave plate orientation function of Q (x,y) encodes the primary image of young Einstein, depicted in Fig. Ib.
- the total orientation function of the wave plates, comprising the encrypted PBOE is shown in grayscale in Fig. Ic.
- the emerging field which is a result of the vectorial self-interference, is a space varying polarized field. As can be seen, the orientation of the arrows is random.
- the geometrical phase key, ⁇ k scrambles the space- variant polarization state of the beam and thus randomizes the geometrical phase encoding the primary image, ⁇ ..
- the Stokes parameters of a fully polarized light (S 0 -S 3 ) are calculated from three intensity measurements. These measurements are taken when the transmitted light is passed through a polarizer with its axis oriented at 0° (/ 0)0 ), 45° (/ 45 ,o) and 90 ° (/90,0). A camera is used to capture the intensity pictures.
- the subwavelength grating behaves as a uniaxial crystal with the optical axes parallel and perpendicular to the subwavelength grooves. Therefore, by fabricating locally periodic subwavelength structures for which the orientation of the subwavelength grooves is space varying, we achieve spatially rotating wave plates.
- the realization procedure of the PBOE involves the fabrication of a computer-generated space- variant subwavelength-grating mask.
- Figure l(d) is a magnified illustration of the subwavelength grating mask of the encrypted element. In order to test the concept, we used a computer simulation. For the encryption process we simulated a PBOE, encrypting the primary image intensity depicted in Fig. l(b).
- Figures 2(a)-2(c) show the three intensity pictures obtained by the three different orientations of the simulated polarizer.
- the three intensity pictures can be achieved optically using the realized PBOE, a polarizer and a CCD (see Fig. l(a)).
- the authorized receiver is able to decrypt the primary image by calculating the Stokes parameters from the three intensity pictures and inserting these values into Eq. (3), along with the correct key.
- a great advantage of the digital implementation approach is the possibility of using watermarking.
- FIG. 3(a)- 3(c) show the watermarked intensity pictures for the three polarization orientations 0°, 45° and 90° respectively, while Fig. 3(d) shows the properly decrypted image when using the watermarked intensities in the decryption process with the correct geometrical phase key.
- the advantage of the later method is that the birefringent parameters of the encrypted elements are not required, thus the method is insensitive to spatial fabrication errors and can be used with incoherent, polychromatic and, unpolarized illumination. These two methods use digital key when decrypting an image.
- An other approach for discribing a subwavelength grating is the Stokes- Mueller fomalism approach.
- a uniform wave plate where the fast axis is oriented along the y-axis can be described by a 4x4 matrix known as the Mueller matrix,
- the measurement of the Mueller matrix members m 42 and m 43 is done by illuminating
- circular analyzer which is composed of a QWP oriented at 0° and a polarizer oriented
- I" 5 ( /f 45 ) are denoted by I" 5 ( /f 45 ), were a equals 0° or 45° for horizontally or 45° oriented
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US58243904P | 2004-06-25 | 2004-06-25 | |
US60/582,439 | 2004-06-25 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2006001012A2 true WO2006001012A2 (en) | 2006-01-05 |
WO2006001012A3 WO2006001012A3 (en) | 2009-04-23 |
Family
ID=35782175
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IL2005/000675 WO2006001012A2 (en) | 2004-06-25 | 2005-06-23 | Geometrical phase data encryption and decryption |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2006001012A2 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI405448B (en) * | 2006-04-18 | 2013-08-11 | Ibm | Encryption of data in storage systems |
CN104159073A (en) * | 2014-07-21 | 2014-11-19 | 中国人民武装警察部队工程大学 | Video optics encryption and decryption system and method based on double random phase encoding |
CN115327677A (en) * | 2022-04-14 | 2022-11-11 | 西北工业大学 | Vector super surface for realizing polarization information encryption and design method |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4892385A (en) * | 1981-02-19 | 1990-01-09 | General Electric Company | Sheet-material authenticated item with reflective-diffractive authenticating device |
US5680588A (en) * | 1995-06-06 | 1997-10-21 | International Business Machines Corporation | Method and system for optimizing illumination in an optical photolithography projection imaging system |
US6314220B1 (en) * | 1995-03-13 | 2001-11-06 | Templex Technology, Inc. | Segmented complex fiber gratings |
-
2005
- 2005-06-23 WO PCT/IL2005/000675 patent/WO2006001012A2/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4892385A (en) * | 1981-02-19 | 1990-01-09 | General Electric Company | Sheet-material authenticated item with reflective-diffractive authenticating device |
US6314220B1 (en) * | 1995-03-13 | 2001-11-06 | Templex Technology, Inc. | Segmented complex fiber gratings |
US5680588A (en) * | 1995-06-06 | 1997-10-21 | International Business Machines Corporation | Method and system for optimizing illumination in an optical photolithography projection imaging system |
Non-Patent Citations (1)
Title |
---|
BOMZON ET AL.: 'Space-variant Pancharatnam-Berry phase optical elements with computer- generated subwavelength gratings' OPTICAL SOCIETY OF AMERICA vol. 27, no. 13, 01 July 2002, pages 1141 - 1143 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI405448B (en) * | 2006-04-18 | 2013-08-11 | Ibm | Encryption of data in storage systems |
CN104159073A (en) * | 2014-07-21 | 2014-11-19 | 中国人民武装警察部队工程大学 | Video optics encryption and decryption system and method based on double random phase encoding |
CN115327677A (en) * | 2022-04-14 | 2022-11-11 | 西北工业大学 | Vector super surface for realizing polarization information encryption and design method |
CN115327677B (en) * | 2022-04-14 | 2024-01-30 | 西北工业大学 | Vector super-surface for realizing polarization information encryption and design method |
Also Published As
Publication number | Publication date |
---|---|
WO2006001012A3 (en) | 2009-04-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhang et al. | Optical encryption based on iterative fractional Fourier transform | |
Tao et al. | Double image encryption based on random phase encoding in the fractional Fourier domain | |
Zhang et al. | Meta-optics empowered vector visual cryptography for high security and rapid decryption | |
Zamrani et al. | Optical image encryption technique based on deterministic phase masks | |
Vilardy et al. | Improved decryption quality and security of a joint transform correlator-based encryption system | |
Lin et al. | Four-dimensional key design in amplitude, phase, polarization and distance for optical encryption based on polarization digital holography and QR code | |
Sui et al. | Color image encryption by using Yang-Gu mixture amplitude-phase retrieval algorithm in gyrator transform domain and two-dimensional Sine logistic modulation map | |
Dubreuil et al. | Robustness against attacks of dual polarization encryption using the Stokes–Mueller formalism | |
Lin et al. | Multiple images encryption based on Fourier transform hologram | |
Patra et al. | Multiplexing and encryption of images using phase grating and random phase mask | |
Kumar et al. | Optical voice information hiding using enhanced iterative algorithm and computational ghost imaging | |
He et al. | Single-shot optical multiple-image encryption by jointly using wavelength multiplexing and position multiplexing | |
Wang et al. | Optical image authentication scheme using dual polarization decoding configuration | |
Kumar et al. | Multiuser optical image authentication platform based on sparse constraint and polar decomposition in Fresnel domain | |
Barrera et al. | Fault tolerances using toroidal zone plate encryption | |
Chen | Optical data security system using phase extraction scheme via single-pixel detection | |
Li et al. | A one-time pad encryption method combining full-phase image encryption and hiding | |
Joshi et al. | Simultaneous encryption of a color and a gray-scale image using byte-level encoding based on single-channel double random-phase encoding architecture in fractional Fourier domain | |
WO2006001012A2 (en) | Geometrical phase data encryption and decryption | |
Ma et al. | Symmetric–asymmetric hybrid encryption and decryption system based on chaotic iris phase mask and computer-generated holography | |
Zhang et al. | Study on the key technology of optical encryption based on compressive ghost imaging with double random-phase encoding | |
Sui et al. | Optical multiple-image authentication scheme based on the phase retrieval algorithm in gyrator domain | |
Kumar et al. | Color image encryption using vectorial light field through a compact optical set-up | |
Mosso et al. | Experimental optical encryption system based on a single-lens imaging architecture combined with a phase retrieval algorithm | |
Trejos et al. | Experimental opto-digital processing of multiple data via modulation, packaging and encryption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
NENP | Non-entry into the national phase in: |
Ref country code: DE |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: DE |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 05755441 Country of ref document: EP Kind code of ref document: A2 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 05755441 Country of ref document: EP Kind code of ref document: A2 |