OPTICAL SECURITY

Optical image encryption based on XOR operations

[+] Author Affiliations
Jong-Wook Han, Choon-Sik Park

Electronics and Telecommunications Research Institute, 161, Kajung-dong, Yusong-Gu, Taejon?305-350, South Korea

Dae-Hyun Ryu

Hansei University, Department of Information and Communication Science, 604-5, Dangjung-Dong, Kunpo-Si, Kyunggi-Do?435-742, South Korea

Eun-Soo Kim

Kwangwoon University, Department of Electronic Engineering, 447-1, Wolge-Dong, Nowon-Gu, Seoul?139-701, South Korea

Opt. Eng. 38(1), 47-54 (Jan 01, 1999). doi:10.1117/1.602060
History: Received Apr. 4, 1998; Accepted July 15, 1998
Text Size: A A A

Abstract

We propose a new optical image encryption technique based on exclusive-OR (XOR) operations for a security system that controls the entrance of authorized persons. The basic idea is that we convert a gray-level image to eight bit planes for image encryption. We use the XOR operation that is commonly used such as the well-known encryption method. The input image is encrypted by performing optical XOR operations with the key bit stream that are generated by digital encryption algorithms. The gray level input image is converted to eight bit planes, which are represented on a liquid crystal device (LCD). The key data represented on different LCDs is reproduced to eight bit planes by a lenslet array. The optical XOR operations between the key data and the bit planes are performed by the polarization encoding method. The results of XOR operations, which are detected by a CCD camera, are converted to an encrypted gray-level image and the image is used as an input to the binary phase extraction joint transform correlator (BPEJTC) for comparison with reference images. We present some simulation results that verify the proposed method. © 1999 Society of Photo-Optical Instrumentation Engineers.

© 1999 Society of Photo-Optical Instrumentation Engineers

Citation

Jong-Wook Han ; Choon-Sik Park ; Dae-Hyun Ryu and Eun-Soo Kim
"Optical image encryption based on XOR operations", Opt. Eng. 38(1), 47-54 (Jan 01, 1999). ; http://dx.doi.org/10.1117/1.602060


Figures

Tables

Access This Article
Sign in or Create a personal account to Buy this article ($20 for members, $25 for non-members).

Some tools below are only available to our subscribers or users with an online account.

Related Content

Customize your page view by dragging & repositioning the boxes below.

Topic Collections

PubMed Articles
Advertisement
  • Don't have an account?
  • Subscribe to the SPIE Digital Library
  • Create a FREE account to sign up for Digital Library content alerts and gain access to institutional subscriptions remotely.
Access This Article
Sign in or Create a personal account to Buy this article ($20 for members, $25 for non-members).
Access This Proceeding
Sign in or Create a personal account to Buy this article ($15 for members, $18 for non-members).
Access This Chapter

Access to SPIE eBooks is limited to subscribing institutions and is not available as part of a personal subscription. Print or electronic versions of individual SPIE books may be purchased via SPIE.org.