Abstract

A position-multiplexing technique with ultra-broadband illumination is proposed to enhance the information security of an incoherent optical cryptosystem. This simplified optical encryption system only contains one diffuser acting as the random phase mask (RPM). Incoherent light coming from a plaintext passes through this nature RPM and generates the corresponding ciphertext on a camera. The proposed system effectively reduces problems of critical alignment sensitivity and coherent noise that are found in the coherent illumination. Here, the use of ultra-broadband illumination has the advantage of reducing the speckle contrast that makes the ciphertext more complex. Reduction of the ciphertext size further increases the strength of the ciphering. Using the spatial decorrelation of the speckle pattern we have demonstrated a position multiplexed based cryptosystem, where the ciphertext is the superposition of uniquely encrypted texts from various spatial positions. These unique spatial keys are utilized to decrypt the plaintext located at different spatial positions, and a complete decrypted text can be concatenated with high fidelity. Benefiting from position-multiplexing, the information of interest is scrambled together by a truly random method in a smaller ciphertext. A high performance security for an optical cryptosystem has been achieved in a simple setup with a ground glass diffuser as a nature RPM, the broadband incoherent illumination and small position-multiplexed ciphertext.

Highlights

  • As the development of the computer science and information technology, the information safety has become more challenging and drawn a lot of attention in recent years

  • We introduce an additional level of security to the incoherent optical cryptosystem with a practical position multiplexing technique

  • The point spreading function (PSF) is the speckle pattern generated by a point source (1 pixel in projector) in this setup

Read more

Summary

Experiments and Results

The stitched decryption is displayed, which presents a very good reconstruction of the four letters at the four corners, each with the corresponding key In this demonstration, the background with the normalized intensity smaller than 0.4 are removed as the reduced sizes for the ciphertext and keys are much smaller than that in Fig. 3 and generate more reconstruction background noises.

Discussion and Conclusion
Author Contributions
Additional Information
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call