Identification of random phase masks in a nonlinear joint transform correlator

Author(s):  
Leonid I. Muravsky
Photonics ◽  
2019 ◽  
Vol 6 (4) ◽  
pp. 115 ◽  
Author(s):  
Juan M. Vilardy O. ◽  
Ronal A. Perez ◽  
Cesar O. Torres M.

The Collins diffraction transform (CDT) describes the optical wave diffraction from the generic paraxial optical system. The CDT has as special cases the diffraction domains given by the Fourier, Fresnel and fractional Fourier transforms. In this paper, we propose to describe the optical double random phase encoding (DRPE) using a nonlinear joint transform correlator (JTC) and the CDT. This new description of the nonlinear JTC-based encryption system using the CDT covers several optical processing domains, such as Fourier, Fresnel, fractional Fourier, extended fractional Fourier and Gyrator domains, among others. The maximum number of independent design parameters or new security keys of the proposed encryption system using the CDT increases three times in comparison with the same encryption system that uses the Fourier transform. The proposed encryption system using the CDT preserves the shift-invariance property of the JTC-based encryption system in the Fourier domain, with respect to the lateral displacement of both the key random mask in the decryption process and the retrieval of the primary image. The viability of this encryption system is verified and analysed by numerical simulations.


Photonics ◽  
2019 ◽  
Vol 6 (4) ◽  
pp. 128
Author(s):  
Juan M. Vilardy O. ◽  
María S. Millán ◽  
Elisabet Pérez-Cabré

We propose a new encryption system based on a nonlinear joint transform correlator (JTC) using the information of two biometrics (one digital fingerprint for each user) as security keys of the encryption system. In order to perform the decryption and authentication in a proper way, it is necessary to have the two digital fingerprints from the respective users whose simultaneous authentication is pursued. The proposed security system is developed in the Fourier domain. The nonlinearity of the JTC along with the five security keys given by the three random phase masks and the two digital fingerprints of the two users allow an increase of the system security against brute force and plaintext attacks. The feasibility and validity of this proposal is demonstrated using digital fingerprints as biometrics in numerical experiments.


1994 ◽  
Vol 41 (6) ◽  
pp. 1253-1261
Author(s):  
B.S. Lowans ◽  
B. Bates ◽  
R.G.H. Greer

2003 ◽  
Vol 42 (8) ◽  
pp. 1508 ◽  
Author(s):  
Takanori Nomura ◽  
Shunji Mikan ◽  
Yoshiharu Morimoto ◽  
Bahram Javidi

1991 ◽  
Author(s):  
Santiago Vallmitjana ◽  
Ignacio P. Juvells ◽  
Arturo Carnicer ◽  
Juan C. Campos

1994 ◽  
Vol 33 (14) ◽  
pp. 2834 ◽  
Author(s):  
Bahram Javidi ◽  
Guanshen Zhang ◽  
Amir H. Faziollahi ◽  
Uzi Efron

Sign in / Sign up

Export Citation Format

Share Document