Academia.eduAcademia.edu

Optical Techniques for Information Security

2000, Proceedings of the IEEE

| This paper presents an overview of the potential of free space optical technology in information security, encryption, and authentication. Optical waveform posses many degrees of freedom such as amplitude, phase, polarization, spectral content, and multiplexing which can be combined in different ways to make the information encoding more secure. This paper reviews optical techniques for encryption and security of two-dimensional and three-dimensional data.

INVITED PAPER Optical Techniques for Information Security Encryption of information, taking advantage of the many degrees of freedom available in optical waveforms, can be used to safely transmit, protect, store and authenticate data. By Osamu Matoba, Member IEEE , Takanori Nomura, Elisabet Pérez-Cabré, Marı́a S. Millán, and Bahram Javidi, Fellow IEEE ABSTRACT | This paper presents an overview of the potential of free space optical technology in information security, encryption, and authentication. Optical waveform posses many degrees of freedom such as amplitude, phase, polarization, spectral content, and multiplexing which can be combined in different ways to make the information encoding more secure. This paper reviews optical techniques for encryption and security of two-dimensional and three-dimensional data. Interferometric methods are used to record and retrieve data by either optical or digital holography for security applications. Digital holograms are widely used in recording and processing three dimensional data, and are attractive for securing three dimensional data. Also, we review optical authentication techniques applied to ID tags with visible and near infrared imaging. A variety of images and signatures, including biometrics, random codes, and primary images can be combined in an optical ID tag for security and authentication. KEYWORDS | Authentication; digital holography; ID tag; information security; optical encryption; phase modulation I. INTRODUCTION Information security is an important concern in many societies. There have been many studies on data encrypManuscript received July 13, 2008; revised November 30, 2008. Current version published May 13, 2009. To the financial support of Spanish Ministerio de Educación y Ciencia and FEDER (project DPI2006-05479). O. Matoba is with the Department of Computer Science and Systems Engineering, Kobe University, Kobe 657-8501, Japan (e-mail: [email protected]). T. Nomura is with the Department of Opto-Mechatronics, Wakayama University, 930 Sakaedani, Wakayama 640-8510, Japan (e-mail: [email protected]). E. Pérez-Cabré and M. S. Millán are with the Optics and Optometry Department, Universitat Politècnica de Catalunya, Violinista Vellsolà 37 08222 Terrassa-Spain (e-mail: [email protected]; [email protected]). B. Javidi is with the Department of Electrical and Computer Engineering, University of Connecticut, Storrs, CT 06269-2157 USA (e-mail: [email protected]). Digital Object Identifier: 10.1109/JPROC.2009.2018367 1128 Proceedings of the IEEE | Vol. 97, No. 6, June 2009 tion, authentication, and watermarking. In digital form, digital signature is used to protect and to give access to the original data. Optical security and encryption have attracted the interest of many researchers. Optics provides many degrees of freedom to handle parameters such as amplitude, phase, wavelength, and polarization [1]–[3]. Optical waves can additionally be combined in multiplexed distributions. For instance, holographic patches in CD, DVD, and cash notes allow us to easily see colored images with different viewing angles. Biometrics, fingerprint, iris, and retina imaged by using infrared or visible light have already been used for secure identification. Recently, the quantum nature of light has also been used to provide a security key code in quantum communication ways [4]. In this paper, we review free space optical techniques for information encryption and security. These approaches are based on manipulating some physical parameters of the optical waves that convey the information. In this context, the double random phase encryption method [5] opened new fields of research in analog optical information processing. In this encryption method, original data embedded in two-dimensional amplitude information are transformed into a white-noise-like image by two random phase masks located in the input and the Fourier planes. Many variations of this approach have been introduced including employing the phase mask in the Fresnel domain where the unknown location of the key presents additional difficulties to the attacker. This architecture is effective to realize optical implementations by using modern spatial light modulators (e.g., Liquid crystal displays) and digital image sensors (e.g., CCD or CMOS). By properly utilizing some physical properties of optical waves such as polarization, wavelength, and three-dimensional positions of random phase masks in Fresnel or Fourier domain, security levels in an optical encryption system can be 0018-9219/$25.00 Ó 2009 IEEE Matoba et al.: Optical Techniques for Information Security increased [6]–[15]. The storage of optically encrypted data can be implemented optical or digitally. The digital format of encrypted data facilitates the use of encryption techniques in computers and digital data communication. The encrypted data can be obtained in either a real or a virtual optical system simulated by computer. Optics provides useful resources for remote, real-time, automatic, and reliable signal verification [16]–[29]. This paper overviews optical identification (ID) tags for robust, real-time and remote identification to enable surveillance or tracking of moving objects, such as vehicles. Different categories of identifying signals or factors are combined to produce positive verification for an authentic object. Designs for distortion-invariant ID tags are presented to allow remote information readout under the effects of scale variations or/and in-plane rotations. The paper is organized as following. In Section II, we present optical encryption methods based on random phase modulation in input plane, Fourier plane, and Fresnel domain. Double random phase encryption technique is an attractive method for securing data. It is intended to be implemented with fully random codes which can be updated frequently. However, when the codes are not random (that is fixed codes that are not updated), this method is vulnerable to attacks. Therefore, more degrees of freedom of the optical wave have been introduced to achieve a higher level of security with fixed keys. Some of these approaches are presented which utilize random phase modulation using physical properties of optical wave such as polarization, wavelengths multiplexing, and Fresnel domain encoding. Encrypted data can be stored in optical or digital form. In Section III, encrypted data is stored using a volume holographic memory. Various experimental results are provided to show the feasibility of the secure optical data storage. In Section IV, the combination of optical encryption and digital holography is reviewed. The digital holographic realization of random phase modulation in the Fourier or Fresnel domain is presented. In the last two sections, security applications based on optical encryption are reviewed. Section V deals with polarization-based optical encoding for authentication. Section VI introduces optical ID tags for authentication of remote objects. This section analyzes the robustness of ID tags against degradation, scale, and rotation distortions in both simulated and experimental results. Summary and conclusion are presented in Section VII. stration of phase modulation and recovery of images using holography and phase conjugation was presented by Kogelnik [6]. In this system [6], the original image is modulated by ground glass and then is recorded as a hologram on film. In the retrieval process, phase conjugate reconstruction is used. The phase modulation creates phase distortion. The phase conjugation can cancel those distortions and the original object is reconstructed successfully. However, this method will not provide any quantitative evaluation of security level. In [1], optical amplitude and phase modulation in the input plane were employed for the purpose of security verification and authentication of objects. However, this method did not provide encryption of data. To improve the method, Refregier and Javidi proposed double random phase encryption [5]. After the publication of this paper, many optical encoding and decoding methods such as fully random phase encryption [7], Fresnel domain random phase encryption [8], including spectral keys for encryption [9], and polarization keys for encryption [10]–[12] have been proposed. Various forms of optical security techniques such as XOR encoding using polarization [15] or generation of random numbers based on speckle patterns [30] have been presented by researchers. In this section, we concentrate on overview of double random phase encryption and its enhancement by using keys in the Fresnel domain, and double random full phase encryption [8]. II . OPTICAL ENCRYPTION METHODS BY RANDOM PHASE M ODULAT ION where Optics can provide a higher level of security because many degrees of freedom are available for manipulating information [6]–[15]. In coherent linear systems, phase modulation can easily transform the original amplitude distribution into random distribution. The first demon- A. Double Random Phase Encryption Fig. 1 shows an illustration of encryption and decryption process of double random phase encryption [5]. Here x and y denote the spatial domain coordinates, and  and  denote the Fourier domain coordinates. Let f ðx; yÞ denote the positive real-valued image to be encrypted. Let nðx; yÞ and hð; Þ denote two independent white sequences and are uniformly distributed on the interval ½0; 2 in the input and the Fourier plane. In the encryption process, the input data is multiplied by a random phase function ðx; yÞ ¼ expfinðx; yÞg in the input plane. The Fourier transform of the modulated input data is multiplied by another random phase function, Hð; Þ ¼ expfihð; Þg in the Fourier plane, and is written by Sð; Þ ¼ Fð; ÞHð; Þ (2.1) Fð; Þ ¼ FT ½ f ðx; yÞ ðx; yÞ: (2.2) In (2.2), FT½ denotes the operation of Fourier transform. This phase modulated data is inverse Vol. 97, No. 6, June 2009 | Proceedings of the IEEE 1129 Matoba et al.: Optical Techniques for Information Security Fig. 1. Principle of double random phase encryption. (a) Encoding process and decoding processes by use of (b) phase conjugate of RPM2 and (c) phase conjugate of encrypted data. Fourier-transformed and then encrypted data is obtained as follows: eðx; yÞ ¼ ½ f ðx; yÞ ðx; yÞ  FT 1 ½Hð; Þ (2.3) where  denotes convolution operation. These two phase functions, ðx; yÞ and Hð; Þ, can convert the original data into a stationary-white-noise-like data. Here we note that the random phase mask in the input plane prevents from the attack using phase retrieval method. If there is no phase mask in the input plane, one can know the Fourier spectra of the encrypted data and the priori information of real-valued original image. By using phase retrieval method, one can estimate the original real-valued data. The reader can see the paper about the security characteristics in double random phase encryption [31]. In the decryption process, two methods can be adopted to recover the original data; one is to use a phase conjugate mask of the random phase modulation used in the Fourier domain in the encryption process and the other is to use a 1130 Proceedings of the IEEE | Vol. 97, No. 6, June 2009 phase conjugate readout of the encrypted data as shown in Fig. 1(b) and (c), respectively. At first, we describe a method to use a phase conjugate mask of the random phase modulation used in the Fourier plane in the encryption process. Here the key phase mask used in the decryption process in the Fourier plane is denoted by kð; Þ. In this case, the reconstructed data is given by o1 ðx; yÞ ¼ ½ f ðx; yÞ ðx; yÞ  Cðx; yÞ (2.4) Cðx; yÞ ¼ FT 1 ½Hð; Þ  FT ½Kð; Þ: (2.5) where When one has a phase key, kð; Þ ¼ hð; Þ, the original data is successfully recovered because (2.5) becomes a delta function. The random phase function in the input plane, expfinðx; yÞg, is removed by detecting an intensitysensitive device. When one uses an incorrect phase key, Matoba et al.: Optical Techniques for Information Security kð; Þ ¼ 6 hð; Þ, the original data cannot be recovered because (2.4) remains as white noise. Next, we describe a method to use a phase conjugate of the encrypted data. Note that the key phase mask used in the decryption process in the Fourier plane is denoted by kð; Þ. In this case, the reconstructed data is given by o2 ðx; yÞ ¼ ½ f  ðx; yÞ  ðx; yÞ  Cðx; yÞ (2.6) Cðx; yÞ ¼ FT 1 ½H  ð; Þ  FT ½Kð; Þ: (2.7) where When one has a phase key, kð; Þ ¼ hð; Þ, the original data is successfully recovered because (2.7) becomes a delta function and the random phase function in the input plane, expfinðx; yÞg, is removed by detecting an intensitysensitive device. In this case, the same random phase mask used in the encryption process can be used in the decryption process. This is the advantage to implement. This phase conjugate readout is used in secure holographic memory system described in Section III. When one uses an incorrect phase key, kð; Þ 6¼ hð; Þ, the original data cannot be recovered because (2.6) remains as white noise. We discuss the resistance of double phase encryption technique against attacks. Optical encryption techniques as described in [6]–[15] are not intended for strictly digital implementation as there are many excellent mathematical encryption algorithms for digital implementation. We note that optical encryption techniques [6]–[15] are ideally suited for optical domain applications, that is, when data is in the optical domain such as optical data storage. Thus, the codes are supposed to be random, that is, the codes can be written on a spatial light modulator which can be updated on a regular basis in real time. In this case, the system is much more difficult to attack. Strict digital implementation of conventional double phase encryption technique with fixed codes may be vulnerable against attacks. Several attacks have been reported [32] against the conventional double random phase encryption technique with digital implementation, that is, one single key in the input plane, one single key in the Fourier domain, and using these stationary keys to encrypt all images without updating the keys. These attacks are demonstrated by computer simulation to illustrate the vulnerability of the algorithm, although attacking a full optically implemented system with updatable codes may be much more difficult. The conventional double phase encryption is a linear algorithm. Thus, it is vulnerable to these attacks. This algorithm is shown to be resistant against brute force attacks but it is vulnerable to chosen and known plaintext attacks. Some of the attacks against the double random phase encryption technique are impractical and others are effective. An exhaustive search of the key is generally not practical. However, chosen and known plaintext attacks are able to recover the keys. Secure modes for optical encryption can be developed that overcome these attacks [33]. Given the risks presented by some attacks against conventional double phase encryption by digital implementation, it is recommendable to use variations of the double phase encoding technique. The most effective approach to combat these attacks is to employ the encryption keys in the Fresnel domain as described in the following subsection [8]. This would force the attacker to search for keys in a 3-D volume which is very difficult. That correlation length of the keys defines the search step size. That is, if encryption keys with microns size correlation length are employed, then microns size search steps may be required. The double phase encryption by using the keys in the Fresnel domain would provide an additional dimension to the keys which have to be searched by the attacker. Also, if possible, the encryption keys should be updated so that we are not using the same keys for different images, as in a one-time pad approach. In general, the double phase encryption approach is useful in the optical domain due to the bandwidth and speed of computations, and the ability to update the codes fast. Thus, optical domain applications with updating the keys may not have a substantial computational cost. Key distribution, however, will also incur a cost, and carries its own risks of being intercepted by an attacker. B. Fresnel Domain Random Phase Modulation Furthermore, degree of freedom used in the encoding can be increased by using three-dimensional positions of the random phase masks in double random phase encryption. The random phase masks can be located at Fresnel domain as shown in Fig. 2. This technique is called as Fresnel domain random phase modulation [8]. We briefly present the Fresnel domain encryption method. Two random phase masks are located as shown in Fig. 2. Fresnel propagation with distance of z1 is described as gðx; yÞ ¼ f ðx; yÞ  hðx; y; z1 Þ ¼ Prop½ f ðx; yÞz1 (2.8) where hðx; y; z1 Þ ¼ expðið=z1 Þðx2 þ y2 ÞÞ. The encrypted data is given by  h i  eðx; yÞ ¼ FT 1 Prop Prop½ g1 ð; ÞLð; Þf z2 Hð; Þ z2 (2.9) where h i g1 ðx; yÞ ¼ Prop Prop½ f ðx; yÞz1 ðx; yÞ f z1 Vol. 97, No. 6, June 2009 | Proceedings of the IEEE (2.10) 1131 Matoba et al.: Optical Techniques for Information Security Fig. 2. Schematics of Fresnel domain random phase encryption. In this system, 3-D positions of the random phase masks can be used as additional keys even when the random phase masks are stolen. This makes the system more secure. We note that there is the tradeoff between the improvements of security and the mechanical precision and complexity of the additional movable part required to use 3-D positions as additional keycodes. We also note that for the sake of simplicity, we have not shown the possible lateral and longitudinal location of the optical keys. In general, the mathematical representations of the encryption process could be written to include the ðx; y; zÞ location of the keys in the Fresnel domain. In other approaches to develop a multidimensional key, wavelength-code with random phase modulation, fully phase encryption, polarization encryption can be used. Fractional Fourier encryption is considered to be a part of Fresnel domain random phase modulation because the random phase masks can be located at any position in Fresnel domain encryption. III . SECURE DATA ST ORAGE USING HOLOGRAPHIC MEMORY Holographic data storage is one of promising candidates of next generation optical disk memory to realize storage capacity of 1TB and data transfer speed of 1 Gbps [34]–[39]. In the holographic data storage, Fourier-transformed pattern of two-dimensional binary data page is recorded as a hologram in a thin medium. Therefore the phase modulation technique to encode the data is suitable to holographic memory systems because the waveform is recorded as hologram [8]–[11], [40]–[50]. In the decryption process that is the reconstruction process, the phase conjugate readout can be used. Fig. 3 shows an example of secure holographic memory systems using multidimensional key. Random phase masks, their three-dimensional positions, and wavelength can be used as multidimensional keys to encode and decode the data. In another type of encrypted holographic memories, the reference beam can be phase-encoded [45]. The readout process using phase masks is a key to access the data. In this section, we describe secure holographic data storage systems based on data encoding. A. Secure Holographic Memory Using Angular Multiplexing One of the major holographic memories is based on angular multiplexing. In the angular multiplexing, a bulk material is used to record many numbers of holograms in the same volume by changing the angle of plane reference wave. It is easy for phase conjugate reconstruction. Fig. 4 shows the experimental setup [42]. An Ar+ laser at a wavelength of 514.5 nm was used as a coherent light source. The light beam was divided into an object and a reference Fig. 3. Schematics of secure holographic memory using multidimensional keys based on random phase masks, their three-dimensional positions, and wavelength. 1132 Proceedings of the IEEE | Vol. 97, No. 6, June 2009 Matoba et al.: Optical Techniques for Information Security Fig. 4. Experimental setup of angular multiplexing using double random phase encryption. BSs: beam splitters; BE: beam expander; SHs: shutters; P: polarizer; Ms: mirrors; Ls: lenses; PRMs: random phase masks; FP: Fourier; LCD: liquid crystal display; CCDs: charge coupled device image sensors. beams by a beamsplitter, BS1, for the holographic recording. The reference beam was again divided into two reference beams: one for recording holograms and one for the phase-conjugate readout by a beamsplitter BS2. An input image was illuminated by a collimated beam, and then was Fourier-transformed by lens L1. FP denotes the Fourier plane. Two random phase-masks, RPM1 and RPM2, were located at the input and the Fourier planes, respectively. The two phase-masks convert an input image into a random-noise-like image as described in Section II-A. A reduced size of the Fourier-transformed image was imaged and recorded in a LiNbO3 crystal by lens L2. In the holographic recording, the object and the reference beams interfere with an angle of 90 in the LiNbO3 crystal. This configuration allows us to minimize the angular separation between adjacent stored data in the angular multiplexing. All of the beams were linearly polarized perpendicular to the paper due to the creation of an interference fringe pattern. A 10  10  10 mm3 LiNbO3 crystal doped with 0.03 mol% Fe was used as a recording medium. The c axis is on the paper and is at 45 with respect to the crystal faces. The crystal was mounted on a rotation stage. The encrypted image was observed by a CCD image sensor (CCD1) after the Fourier transform was taken by lens L3. During the recording of holograms, shutters SH1 and SH2 were opened, and SH3 was closed. In the decryption process, the reference beam used for the readout is the phase-conjugate beam of the reference beam. When the same masks used to record the hologram are located at the same place, the original image is reconstructed at a CCD image sensor (CCD2) because the ideal phase conjugation can eliminate the phase modulation caused by the random phase masks. Otherwise, the original data cannot be recovered. In the experiments we use two counterpropagating plane waves as the reference and phase-conjugated beams. Angularly multiplexed recording of three images is presented. Fig. 5(a) shows an example of original binary data pages. The image consists of 32  32 pixels. Two diffusers are used as the random phase-masks, RPM1 and Fig. 5. Experimental result. (a) Original binary data page, (b) encrypted image, and (c) reconstructed image with the correct phase key. Vol. 97, No. 6, June 2009 | Proceedings of the IEEE 1133 Matoba et al.: Optical Techniques for Information Security Optical system has a limited bandwidth. In the optical encryption system, this limited bandwidth causes degradation of encrypted pattern and then degradation of decrypted pattern as shown in Fig. 5(c). This results in the error of the reconstructed data. Design of the random phase masks is useful to improve the performance of the optical encryption system [51]. Digital image processing is also effective to improve the reconstructed data after obtaining the decrypted image. Fig. 6. Evaluation of reconstruction error when a part of random phase mask is blocked in the decryption process. RPM2. The focal lengths of L1, L2, and L3 were 400 mm, 58 mm, and 50 mm, respectively. Fig. 5(b) shows the intensity distribution of the encrypted images. Randomnoise-like images were observed. In the recording process, the optical powers of the object and the reference beams were 37 mW/cm2 and 1.7 W/cm2 , respectively. The exposure time was 60 s. These values can be decreased by using more sensitive materials such as photopolymer. Angular multiplexing was achieved by rotating the LiNbO3 crystal in the plane of Fig. 4. The angular separation between adjacent stored images was 0.2 . This angular separation is enough to avoid the crosstalk between reconstructed images. Fig. 5(c) shows the reconstructed images obtained using the correct key that is the same as the phase mask in the Fourier plane used to record the hologram. We evaluate the reconstruction error when a part of the random phase masks is used to decrypt the data. Fig. 6 shows results of bit error rate as a function of blocking percentage of random phase masks in the Fourier plane. When a part of the random phase mask is small, the bit error rate increases. The number of error bits depends on the overlap between Fourier spectra and the size of the random phase mask. B. Secure Holographic Memory Using Fresnel Domain Random Phase Encryption We present an encrypted optical memory system by using two 3-D keys that consist of two random phase-masks located in the Fresnel domain [8]. In addition to the phase information, the three-dimensional positions of two phasemasks are used as new keys for successful recovery of the original data. The encryption and decryption of the optical memory using angularly multiplexed images is presented. The experimental setup is the same as that in Fig. 4 except for positions of two random phase masks. Two random phase-masks, RPM1 and RPM2, were located between the input plane and L1 and between L1 and P1, respectively. Two phase-masks convert an input image into a random-noise-like image and serve as three-dimensional keys to decrypt. Since these phase-masks are located in the Fresnel domain, the phase modulation caused by the mask depends on the position of the mask along the optical axis. It makes difficult to decrypt without knowledge of threedimensional key. In the decryption process, the phase conjugate readout is used. We present a holographic recording of encrypted data and its reconstruction. Fig. 7 shows the experimental result. Fig. 7(a) shows an example of original binary data pages. Two diffusers are used as the random phase-masks, RPM1 and RPM2. RPM1 and RPM2 were located at a distance of 100 mm from L1 and at the center of L1 and FP, respectively, as shown in Fig. 4. The focal lengths of L1, L2, and L3 were 400 mm, 58 mm, and 50 mm, respectively. Fig. 7(b) shows encrypted images. Random-noise-like images were observed. In the recording process, the Fig. 7. Result of encryption and decryption in a holographic memory: (a) input image, (b) encrypted image, and (c) reconstructed image. 1134 Proceedings of the IEEE | Vol. 97, No. 6, June 2009 Matoba et al.: Optical Techniques for Information Security Fig. 8. Reconstructed images when the random phase masks are located at wrong positions. (a) and (b) Random phase masks shifted perpendicular to the optical axis. (c) and (d) Random phase masks shifted along the optical axis. optical powers of the object and the reference beams were 4 mW/cm2 and 500 mW/cm2 , respectively. The exposure time was 110 s. Fig. 7(c) shows reconstructed images by using the same masks located at the same positions used in the recording. The result shows that the decryption was made successfully. We can see the slight noise because of the imperfection of the phase-conjugate beam. Fig. 8 shows the reconstructed images when the two phasemasks were located at wrong positions. Fig. 8(a) and (b) shows one example of reconstructed images when RPM1 and RPM2 were shifted with 40 m along the direction perpendicular to the optical axis, respectively. Fig. 8(c) and (d) shows reconstructed images when RPM1 and RPM2 were shifted with 3.7 mm along the optical axis, respectively. In all images in Fig. 8, we cannot see a part of the original image. These results show that the positions of the two phase-masks are important keys for complete recovery of the original image. We estimate the difficulty of decryption in the proposed system when one has two random phase-masks used in the recording, but has no information about the positions of the masks. The total number of three-dimensional positions to be examined in a threedimensional key, V, is V ¼ Lx Ly L=xyz where the size of a random phase mask is rectangular area of Lx  Ly , the correlation lengths of the random phase-mask is x and y along the x and y axes, respectively, L is a focal length of Fourier-transform lens, and z is a resolvable length along the optical axis. Since two three-dimensional keys are used in the system, the total number of threedimensional positions to be examined, N, is N ¼ V 2 . In the present system, N ¼ 3  1018 when Lx ¼ Ly ¼ 25 mm, L ¼ 400 mm, x ¼ y ¼ 6 m, and z ¼ 4 mm. It is impossible to decrypt without the information about the positions of two three-dimensional keys. To decrypt the information without the knowledge of the positions of the keys, the random search in three-dimensional space is required. The search may need to be done experimentally. Simulation of the three-dimensional optical security system is very difficult. IV. OPTICAL ENCRYPTION B ASED ON DIGITAL HOL OGRAPHY In Section III, encrypted data can be stored by a holographic technique in optically sensitive volume medium and then the data can be reconstructed optically. Fig. 9. Secure image/video-storage/transmission system that uses a combination of double-random phase encryption and a digital holographic technique: (a) an encryption/transmission system and (b) a receiving/decryption system. Vol. 97, No. 6, June 2009 | Proceedings of the IEEE 1135 Matoba et al.: Optical Techniques for Information Security Fig. 12. Digital holograms of (a) the encrypted data and (b) the Fourier phase mask. Fig. 10. Optical experimental setup. SF: spatial filter; CL: collimating lens; Ms: mirrors; Ls: lenses; BSs: beam splitters; P1: input plane; P2: Fourier plane. Digital holography [52]–[62] is a useful technique for recording the fully complex field of a wave front. In line with advances in imaging devices such as CCDs, digital holography is accessible. We present in this section encryption systems that combine double-random phase encryption with a digital holographic technique. We can encrypt in both Fourier domain [63] and Fresnel domain [64], [65]. In this section the case in Fourier domain is briefly reviewed. Encrypted data are stored in digital format. Storing encrypted data in digital format enables us to store, transmit, and decrypt the encrypted data digitally. Either optical or computer decryption techniques can be used with the system, depending on the specific application. A. Optical Encryption and Digital Retrieval by Off-Axis Digital Holography We present a secure image/video-storage/transmission system that uses a digital holographic technique [63]. Fig. 9 shows the secure image/video-storage/transmission system that uses a combination of double-random phase encryption and a digital holographic technique. The data are encrypted optically by the double-random phase encryption technique and recorded as a digital hologram. The optical key, that is, the Fourier phase mask, can also be recorded as a digital hologram. The encrypted data can be decrypted digitally with the hologram of the optical key. The experimental system is shown in Fig. 10. It consists of a Mach–Zehnder interferometer. A He–Ne laser is used as a coherent light source. The lower arm of the interferometer is the optical path of the image encryption. The upper arm is the reference wave. The input image to be encrypted is bonded with the input phase mask at plane P1. This product is Fourier transformed by lens L1 and is multiplied by the Fourier phase mask at plane P2 and imaged onto the CCD camera by the 4-f optical system of lenses L2 and L3. The reference wave passes through the 4-f optical system of lenses L4 and L5 to keep the spatial coherence. At the CCD camera, a hologram is created by the interference between the encrypted data and the slightly inclined reference plane wave. Fig. 11 shows the input images to be decrypted. These electronically reconstructed images are obtained with an input phase mask without the Fourier phase mask. Scattering that is due to the thickness of the input random phase mask and the limitation on the numerical aperture of the lens L1 are the reasons why the images are somewhat noisy. The digitally reconstructed encrypted images are shown in Fig. 12. These images were obtained by inverse Fourier transforming of the digital hologram of the encrypted data. The original images cannot be recognized. The root-mean-square errors between the original images UCONN and MEMORY shown in Fig. 11 and the encrypted images shown in Fig. 12 are 6.6 and 7.3 for 8-bit pixel value, respectively. The digitally reconstructed images that have been decrypted with the hologram of the Fourier phase mask are shown in Fig. 13. Here one can see the original images. The mean-square errors between the original images UCONN and MEMORY shown in Fig. 11 and the decrypted images shown in Fig. 13 are 1.1 and 0.97, respectively. The experimental results demonstrate the feasibility of the method. B. Computational Optical Encryption System Using Digital Holographic Technique Virtual optical encryption system is useful because there is no requirement to encrypt and record the object in an optical system. We show an encryption method of 3-D object in a virtual optical system by use of phase Fig. 13. Images that have been digitally reconstructed with the digital Fig. 11. Digitally reconstructed input images. 1136 Proceedings of the IEEE | Vol. 97, No. 6, June 2009 hologram of both the encrypted data and the Fourier phase mask. Matoba et al.: Optical Techniques for Information Security Fig. 14. Scheme of an encryption step of a hybrid optical encryption of a 3-D object using a digital holographic technique. Fig. 15. Scheme of a decryption step of a hybrid optical encryption of a 3-D object using a digital holographic technique. modulation of an object wave [66]. The 3-D data used in the encryption can be taken in optical holographic recording or in virtual recording. Here we present that the encryption is accomplished by a combination of a real optical system and a virtual optical system. In this case, we call this method hybrid optical encryption. As the real optical system is used for recoding a 3-D object, we can encrypt a real 3-D object. The virtual optical systems shown in Figs. 14 and 15 are used for encryption and decryption. The fundamental concept of encryption/ decryption is the same as mentioned in Section II. Therefore only experimental results are shown here. Note that a virtual phase mask (VPM) is used instead of a real phase mask for encryption. For 3-D objects, two dice, which are as large as 10  10  10 mm each are used. The distances from the dice to the CCD are 180 and 270 mm, respectively. For encryption, we calculate the wavefront at a VPM using a computational diffraction integral. In this experiment, the distance from the CCD to the VPM is assumed to be 30 mm. To decrypt the encrypted digital hologram, a diffraction integral is calculated based on the algorithm mentioned above. With a correct position and a phase distribution of the VPM, the decrypted 3-D objects are shown in Fig. 16(a). Fig. 16(b) shows the decrypted 3-D objects using no information of the VPM. Fig. 16(c) and 16(d) shows the decrypted 3-D objects if either the position or phase distribution is wrong. In Fig. 16(c), the distance from the CCD to the VPM is set to 31 mm. In Fig. 16(d), to decrypt we use a VPM that has a phase distribution independent from the VPM used in the encryption process. Fig. 16. Decrypted 3-D objects using (a) both the correct position and phase distribution, (b) no information, (c) wrong position and correct phase distribution, and (d) correct position and wrong phase distribution of a virtual phase mask. (e) The reconstructed 3-D object from a nonencrypted digital hologram. Vol. 97, No. 6, June 2009 | Proceedings of the IEEE 1137 Matoba et al.: Optical Techniques for Information Security Fig. 17. Decrypted 3-D objects that have a different aspect: (a) front focused reconstructed objects from the left-half region, (b) middle focused reconstructed objects from the center region, and (c) back focused reconstructed image from the right-half region of the decrypted digital holograms, respectively. The reconstructed objects from an original digital hologram are shown in Fig. 16(e). From these experimental results, if both the information of position and phase distribution of the VPM are correct, the encrypted digital hologram can be decrypted. The performance of the hybrid optical encryption method is evaluated quantitatively. The root-mean-square error for 8-bit pixel value between the original image and the decrypted image is introduced as a metric. The rootmean-square errors between Fig. 16(a) and 16(e), 16(b) and 16(e), 16(c) and 16(e), and 16(d) and 16(e) are 29, 40, 41, and 42, respectively. The reason the root-mean-square errors between Fig. 16(a) and 16(e) is not equal to zero is mainly considered the limitation of the grayscale of digital holograms, including encrypted digital holograms. In this experiment, all digital holograms are recorded as grayscale images with 8 bits. If a characteristic of holography is used, parallax of the 3-D objects can be seen. Different perspectives of the decrypted dice are shown. Fig. 17 shows three parallax and different focused objects calculated from decrypted hologram at the VPM. Fig. 17(a), 17(b), and 17(c) are obtained from the left half, center, and right half regions of the decrypted hologram with different distances from the hologram. A different aspect in the figures can be seen. V. OPTICAL T ECHNIQUE FOR S ECURITY BAS ED ON POL ARI Z AT ION Optical validation and security verification methods using optical correlation systems have been proposed. In some of these systems, the validation is based on correlation with a reference phase mask [1], [67]. Here, we present an optical validation and security verification method that uses polarization encoding [12]. In this method, a gray-scale image such as a face or a fingerprint is bonded to a polarization encoded mask. The polarization-encoded mask consists of randomly oriented linear polarizer’s rotated at various angles from 0 to . It can provide an additional degree of freedom in securing the information by combining with a phase code. We call this composite image the polarization-encoded image. The polarization1138 Proceedings of the IEEE | Vol. 97, No. 6, June 2009 encoded image can not be distinguished from the normal gray scale using an intensity sensitive device such as a CCD camera because the polarization state cannot be detected by a conventional intensity sensitive sensor. A nonlinear joint transform correlator (JTC) [68] is used to provide the verification system. The polarization encoded optical security system is described in detail. Let gðx; yÞ denote a nonnegative and nonpolarized image to be identified. The image gðx; yÞ is bonded to the polarization encoded mask as shown in Fig. 18 to generate a polarization-encoded image. To verify a polarization-encoded image, we optically compare the polarization-encoded image with a reference polarization mask. We use a nonlinear random JTC optical system for verification. As shown in Fig. 19, the polarization-encoded image and the reference polarization mask are placed side by side in the input plane of the correlator. The input images are Fourier transformed using a lens. Then the joint power spectrum of the polarization encoded image and the reference polarization mask is captured by a CCD camera. The joint power spectrum can be nonlinearly transformed to provide a high discrimination capability. Then the joint power spectrum is inverse Fourier transformed. Finally we obtain the correlation between the polarization encoded image and the reference polarization mask. Here only correlational signals of JTC are shown but central signals on the optical axis and conjugate signals are not shown. Fig. 18. Polarization-encoded image for an optical verification system. Matoba et al.: Optical Techniques for Information Security tional degree of freedom to secure information using optical technologies. The polarization encoding can be combined with phase encoding scheme, to enhance the validation and security verification of the system. Optical experiments demonstrate the performance of the system. VI . OPTICAL ID T AGS Fig. 19. Polarization-encoded optical verification system using a JTC. When the encoding polarization mask is the same as the reference polarization mask, a strong correlation is produced. When the two polarization masks are not identical, the cross-correlation signal is lower than the cross-correlation signal when the polarization masks are the same. Thus, we can verify the image in terms of the correlation between the polarization encoded mask and the reference polarization mask. We present optical experiments to demonstrate the system. The experimental setup is the same as the system shown in Fig. 19. A human face on photographic film is used as a gray-scale image. The dimensions of the input image are 6  6 mm2 . For simplicity, the polarization masks consisting of 200  200 random binary (horizontal or vertical) linear polarizers arrays [69] are used. The arrays were made of two-surface, relief-etched birefringent substrates joined face to face. Each pixel size is 30  30 m2 . A He–Ne laser is used as a coherent light source. A lens with a focal length of 200 mm is used for optical Fourier transformation. The joint power spectrum is captured by a CCD camera. Then it is sampled to 512  480 pixels and quantized to 8 bits by a frame grabber equipped in a personal computer. The digitized joint power spectrum is Fourier transformed by using fast Fourier transform algorithm to obtain the correlation output. Fig. 20 shows the correlation results. Fig. 20(a) corresponds to the case when the reference polarization mask is the same as the encoding polarization mask. Fig. 20(b) corresponds to the case when the reference mask is different from the encoding mask. We demonstrated an optical validation and security verification system using polarization encoding of input images. The polarization encoding can provide an addi- In this section, we describe an example of applications of optical encryption with authentication. The presented system is a compact technique for encryption-verification that relates four elements: multifactor encryption, distortion-invariant ID tag, near infrared (NIR) readout, and optical processor. A highly-reliable security system is obtained by joining the advantages of these four elements. The designed NIR ID tag exhibits remarkable characteristics such as distortion-invariance, easy and economical tag production and robustness. The encrypted information included in the ID tag is verified by comparing the decoded signal with a reference that, in turn, can be a single or a compound signature. In the steps of the procedure we show the benefits of using combined optical and digital image processing techniques implemented by optoelectronic systems. The proposed optical ID tags are not intended for strictly digital implementation as there are other technologies based on electronic computing. Optical ID tags are best suited for the combined optical-digital domain as optics provides useful resources for remote, real-time, automatic and reliable signal verification. Optical security systems usually deal with a single primary image (an object, a signature, or a biometric signal) as authenticator. However, security can be reinforced by combining different authenticators. In such a case, a Boolean AND operation has to be performed for each factor’s authentication results so all must be affirmative before final authentication is satisfied [19]. The selection of authenticators is a crucial step because the identification of an element (object or person or both) is based on them. They must uniquely represent the element whose identity is to be validated on a basis of signal recognition. Frequently, the authenticators are images such as logotypes, bar codes, alphanumerical signs, signatures, biometric information, and random sequences. Biometric images such as fingerprints, face, hand, iris, and retina are more and more considered in authentication mechanisms because biometrics is based on something intrinsic to a person (something the person is) in contrast to other schemes based on either something a person knows (e.g., a password) or has (e.g., a metal key, an ID card) [19]. In this section we consider multiple signals to identify a person, an object (for instance, a vehicle or a parcel) or both. The information is combined using a multifactor encryption-authentication technique that reinforces optical security by allowing the simultaneous AND-verification of four primary images [20]. This technique is attractive for high-security purposes that require multiple reliable authentications [20], [27]. There is no a priori constraint Vol. 97, No. 6, June 2009 | Proceedings of the IEEE 1139 Matoba et al.: Optical Techniques for Information Security Fig. 20. Correlation results by optical experiments using a conventional JTC: (a) reference polarization mask identical to encoding polarization mask and (b) reference polarization mask different from encoding polarization mask. about the type of primary images to encode. In the example (Fig. 21) a combination of one biometric (to validate the authorised person), two characteristic images (to validate the content and the origin of a parcel) and one random phase sequence (to act as key code) are considered. The vessel distribution of a retina fundus image, which is stable, accurate, and very effective information for authentication, is used as biometric signal. In the example, a low resolution binary retina scanning is considered. The key phase code is shared by the database of the authentication processor and is introduced as a degree of freedom to codify, for instance, the key of the day. These four reference primary images, double-phase encoded (Section VI-A) and encrypted in an ID tag (Section VI-B), are compared with the input images obtained in situ from the person and the parcel whose authentication is wanted. A. Complex-Amplitude Encrypted Function The complex-amplitude encrypted function of multiple signatures (multifactor) in a single complex-valued distribution m ðxÞ is described here. Let rðxÞ, sðxÞ, bðxÞ, and nðxÞ be the multiple authenticators or reference primary images (for instance, those in Fig. 21), in one-dimensional notation for simplicity. All the four primary images sðxÞ, bðxÞ, and nðxÞ Fig. 21. Reference primary images to consider as multiple authenticators in the multifactor encryption-authentication technique. (a) Biometric sðxÞ; (b) parcel content rðxÞ; (c) key code bðxÞ; (d) parcel origin nðxÞ. 1140 Proceedings of the IEEE | Vol. 97, No. 6, June 2009 Matoba et al.: Optical Techniques for Information Security Fig. 22. Magnitude and phase distributions of the fully phase encrypted function to the set of reference primary images of Fig. 21. are normalized positive functions distributed in [0,1]. These images can be phase-encoded to yield tr ðxÞ, ts ðxÞ, t2b ðxÞ, tn ðxÞ that are generically defined by tf ðxÞ ¼ expfif ðxÞg. The fully-phase encrypted function containing the multifactor authenticators is given by the equation m ðxÞ ¼ trþ2b ðxÞ  ts ðxÞ  FT 1 ½tn ðxÞ (6.1) where trþ2b ðxÞ ¼ tr ðxÞt2b ðxÞ ¼ expfirðxÞg expfi2bðxÞg. The encrypted function is complex-amplitude valued. It can be either optically generated by using an optical hardware equivalent to a JTC or computed and electronically implemented using conventional techniques for computer generated holograms. Fig. 22 shows the magnitude and phase distributions of the encrypted function m ðxÞ obtained when (6.1) is applied to the set of reference primary images of the example (Fig. 21). The appearance of the encrypted function is dim enough and does not reveal the content of any primary image of the set. The specific combination of information expressed by (6.1) is related to the automatic process of optical simultaneous recognition to validate the set of four authenticators. It will be all described and justified in Section VI-C. B. NIR ID Tag Resistant to Degradation A robust ID tag must include the information of the encrypted function in a way that it can be read with invariance to certain distortions, in particular, to scale variations and rotations. If this property is shown, the receiver will be able to remotely capture the ID tag from an unexpected location and orientation and, within certain limits, to successfully process the information. Distortion-invariance is achieved by both multiplexing the information included in the ID tag and taking advantage of the ID tag topology [22]. The complex valued encrypted function m ðxÞ is to be fully grayscale encoded. It is convenient to print the phase content of m ðxÞ in grayscale variations rather than in phase. Otherwise, the phase content of the encrypted distribution could be easily neutralized and the ID tag sabotaged if an adhesive transparent tape were stuck on it. For this reason it m ðxÞ that results from applying Eq. (6.1) is useful to further encode the phase content of the signal in intensity variations. Thus, we consider encoding both the magnitude and phase in grayscale values. Let us consider the m ðxÞ in array notation m ðtÞ ¼ j m ðtÞj expfi m ðtÞg where t ¼ 1; 2; . . . N, and N is the total number of pixels of the encrypted function. We build two vectors: the magnitude vector j m ðtÞj and the phase vector  m ðtÞ, with t ¼ 1; 2; . . . N. The information of the ID tag is distributed in two circles. Fig. 23 shows a possible arrangement: one circle corresponds to the magnitude j m ðtÞj and the other circle to the phase distribution  m ðtÞ of the encrypted function. In both circles, the information is distributed similarly to the structure of a wedge-ring detector. The upper parts of the circles include the encrypted function written in radial direction and is repeated angularly so that rotationinvariance can be achieved. The bottom parts of the circles contain the encrypted function written circularly and is repeated in concentric rings. The information of a given pixel of the encrypted function will correspond to an angular sector in the optical code. Thus, the readout of the ciphered information will be tolerant to variations in scale. For encrypted signatures with a large number of pixels, such as the example given in Section VI-A, information of the scale-invariant ID tag have to be distributed by using different concentric semicircles to assure a minimum number of pixels for each sector to recover the information properly. Consequently, the tolerance to scale variation will be affected in accordance to the number of concentric circles used in the ID tag. As shown in Fig. 23, the centers of both circles are white dots that, along with a third white dot in the upper part, build a reference triangular shaped pattern that allows one to know the orientation of the whole ID tag. Both, the magnitude j m ðtÞj and the phase  m ðtÞ are encoded in grayscale in the left and right circles, respectively. Other possibilities can be considered to rearrange the information contained in the two circles of the ID tags [23]. The choice of a particular distribution of the signal information depends on practical considerations of a given problem. As an additional degree of security we gather the data of the ID tag from the NIR region of the spectrum [25]. The NIR ID tag is built by printing the ID tag gray level Vol. 97, No. 6, June 2009 | Proceedings of the IEEE 1141 Matoba et al.: Optical Techniques for Information Security Fig. 23. Synthesis of a rotation and scale invariant ID tag from the encrypted function ðxÞ. distribution with a common laser printer on a black cardboard. In the visible spectrum, the whole information is completely hidden to either the naked eye or common cameras operating in the visible region of the spectrum. When looking at the ID tag, both the eye and the common camera would see just a black patch. Thus, it is not possible for them to know neither the kind of information included in the ID tag nor the exact position of this ID tag over the item under surveillance. Only NIR InGaAs cameras or conventional monochrome CCD cameras without the IR cut-off filter are able to detect the information of concern. Using the procedure described, the information is also redundantly written, so that we obtain an improved resistance to noise and other sorts of degradation such as free space propagation or damages due to common handling (e.g., scratches) [25]. An auto-destruction mechanism of the ID tag has been proposed to invalidate the ID tag in case of having cuts or other damage produced by any attempt of tampering [25]. For example, a reservoir of black ink (black in terms of NIR illumination) under the ID tag. When the tag is cut, the ink is spread throughout it, the tag cannot be properly read, and the processor gives an alarm. The ID tag represented in Fig. 24. The NIR ID tag is captured by an NIR sensitive device. The information contained in the ID tag stuck on the parcel has to be compared with the input signals contained, for instance, in a card. In this way, it is possible to verify the identity of 1142 Proceedings of the IEEE | Vol. 97, No. 6, June 2009 both the card holder and the parcel. When the ID tag is captured, the encrypted information is decoded following a deciphering procedure that is the reverse of that described above. From one circle the magnitude is obtained and from the other, the phase distribution. Once the border between the rotation-invariant area and scale-invariant area is extracted (the axis in Fig. 23), the signature in vector notation m ðtÞ can be decoded either from the rotation or the scale-invariant region. From the rotation-invariant region, the optical code can be read out by using a linear array detector placed in any radius of the semicircle, from the center to the exterior of the code. Not only is a single code read along a unique radial direction for decoding, but a median value from several radial codes is computed to increase robustness against noise and other sorts of signal degradation. Pixels are written back into matrix notation prior to dechiphering the signature m ðxÞ. Following this procedure, the encrypted signature can be recovered whether the ID tag is captured in its original orientation or rotated. Similarly, m ðtÞ can be recovered by reading the ID tag in circular rings in the scaleinvariant region. To minimize errors in the reading process, the median value of pixels located in neighbour rings is computed. The signature is then written in matrix notation m ðtÞ and decrypted. The optical code will be recovered when the ID tag is captured with its original size or scaled. On the other hand, diffraction could distort the reflected ID tag field for long distances. If the system used the diffracted pattern as it was captured by the Matoba et al.: Optical Techniques for Information Security Fig. 24. Diagram of the ID tag readout, signature decryption and comparison with the input signal for verification. receiver, the correlation could be poor even in the case of a correct signal. We can overcome this by comparing the received field with a precalculated pattern that takes into account the ID tag after free space propagation for a given distance. In such a case, we may need to know the distance between the receiver and the tag. C. Optical Processor for Multifactor Verification The multifactor authentication technique involves an optical processor that consists of a combined nonlinear JTC and a classical 4f -correlator [70] for simultaneous AND authentications of multiple images (Fig. 25). We describe the principles of the method for a four-factor authentication taking into account that the encrypted function m ðxÞ, which has been decoded from the ID tag, was built according to (6.1). Let pðxÞ, qðxÞ, dðxÞ, and mðxÞ, denote the positive and normalized input images to compare with the set of reference images, rðxÞ, sðxÞ, bðxÞ and nðxÞ, respectively. In the first step, the ID tag m ðx  aÞ and one phase encoded input image, for instance tp ðx þ aÞ ¼ expfjpðx þ aÞg, are displayed side-by-side a distance tp ðx þ aÞ apart on the input plane of the nonlinear JTC illuminated by coherent light (Fig. 25). The phase distribution t2d ðx þ aÞ ¼ expfj2dðx þ aÞg is placed against the screen where the input tp ðx þ aÞ is displayed. Consequently, the amplitude distribution in the input plane is m ðx  aÞ þ tpþ2d ðx þ aÞ. A CCD sensor placed in the Fourier plane of the JTC captures the intensity distribution IðÞ of the joint power spectrum, IðÞ ¼ FT m  2 ðx  aÞ þ tpþ2d ðx þ aÞ : (6.2) The development of (6.2) gives the classical four terms of which two are interesting because they convey the crosscorrelation signals that lead to spatially separated distributions in the output plane. These two terms are: Term 1 : FT  ½ m   ðxÞFT tpþ2d ðxÞ expfj2ag  ¼ Trþ2b ðÞTs ðÞtn ðÞTpþ2d ðÞ expfj2ag;   Term 2 : FT ½ m ðxÞFT  tpþ2d ðxÞ expfj2ag  ¼ Trþ2b ðÞTs ðÞtn ðÞTpþ2d ðÞ expfj2ag; (6.3) where a function in capital letter indicates the Fourier transform of the function in small letter and  is the spatial frequency coordinate. Terms 1 and 2 of (6.3) can be modified according to a variety of nonlinear techniques of the general form Fig. 25. Optical processor for multifactor authentication. NLk fIðÞg ¼ IðÞjIðÞjk1 ; Vol. 97, No. 6, June 2009 | Proceedings of the IEEE (6.4) 1143 Matoba et al.: Optical Techniques for Information Security where k 2 ½0; 1 defines the strength of the nonlinearity and can vary from the linear case ðk ¼ 1Þ to the phase extraction ðk ¼ 0Þ or pure phase correlation (PPC). The resultant nonlinearly modified joint power spectrum ((6.4)) is displayed on the Fourier plane of a 4f classical correlator (Fig. 25). There, a transparency with the phase distribution tm ðÞ is placed against the screen. The input image qðxÞ is phase encoded and displayed on the input plane of the 4f -correlator. Behind the Fourier plane, Terms 1 and 2 of (6.3) are converted into: h i Term 1 : Tq ðÞTs ðÞjTs ðÞjk1 h   Trþ2b ðÞTpþ2d ðÞ Trþ2b ðÞTpþ2d ðÞ    tn ðÞtm ðÞ expfj2ag; h i Term 2 : Tq ðÞTs ðÞjTs ðÞjk1 h   Trþ2b ðÞTpþ2d ðÞ Trþ2b ðÞTpþ2d ðÞ k1 i k1 i  ½tnþm ðÞ expfj2ag: (6.5) If the information contained in the ID tag corresponds to a positive validation, then the multiple AND condition rðxÞ ¼ pðxÞ AND sðxÞ ¼ qðxÞ AND bðxÞ ¼ dðxÞ AND nðxÞ ¼ mðxÞ is fulfilled. In such a case, if the phase extraction is applied ðk ¼ 0Þ and provided the system is free of noise and distortions, Term 1 of (6.5) simplifies into jTs ðÞj expfj2ag, which represents a wavefront with all its curvature cancelled [70] that focuses on a sharp multifactor autocorrelation peak centered in x ¼ 2a of the output plane (Fig. 25). From (6.5), the output intensity distribution corresponding to Term 1 is the cross-correlation of autocorrelation signals given by  ACPOF ½ts ðxÞ ? ACPPC ½trþ2b ðxÞ 2  ?ACCMF ½Tn ðxÞ  ðx þ 2aÞ ; (6.6) where ? denotes cross-correlation, and subindices CMF, POF, PPC indicate the sort of filter involved in the autocorrelation signal (CMF stands for classical matched filter, POF for phase-only filter, and PPC for pure phase correlation). Since autocorrelation peaks are usually sharp and narrow, particularly those for POF and PPC, we expect that the cross-correlation of such autocorrelation signals will be even sharper and narrower [71]. Consequently, the information contained in Term 1, allows reinforced security verification by simultaneous multifactor authentication. On the other hand, when the multiple AND condition rðxÞ ¼ pðxÞ AND sðxÞ ¼ qðxÞ AND bðxÞ ¼ dðxÞ AND nðxÞ ¼ mðxÞ is fulfilled, and the phase extraction k ¼ 0 is considered, Term 2 of (6.5) becomes ½Ts2 ðÞ=jTs ðÞjt2n ðÞ expfj2ag, which does not yield any interesting result for recognition purposes. If pðxÞ 6¼ rðxÞ or qðxÞ 6¼ sðxÞ or bðxÞ 6¼ dðxÞ or nðxÞ 6¼ mðxÞ, Term 1 contains a cross correlation signal that is, in general, broader and less intense than the multifactor autocorrelation peak of (6.6). In the experiment, the set of input images can be equal to the reference set, partly different or totally different. Fig. 26 contains some input images, different from those reference primary images of Fig. 21, that are to be considered in the experiments. A distortion-invariant ID tag containing the multifactor encrypted information was produced by printing the ID tag using a common Hewlett Packard laser printer on a black cardboard. The printed ID tag was uniformly illuminated by ordinary incandescent light bulbs and grabbed lately by an NIR InGaAs camera [Fig. 27(a)] with sensitivity in the NIR region (900–1700 nm). This result shows a feasible way to obtain NIR ID tags using common materials. If the ID tag was registered using a monochrome camera sensitive in the visible region of the spectrum, its content would not be perceived at naked eye as it would be completely black. The ID tag was rotated 7 degrees from horizontal position [Fig. 27(a)]. The scrambled four factors (primary images sðxÞ, rðxÞ, bðxÞ, nðxÞ) were decrypted and introduced as a reference for the validation of the set of input image qðxÞ, pðxÞ, dðxÞ, mðxÞ. Fig. 27(b)–(e) shows the output intensity distribution corresponding to the Term 1 of the multifactor correlation with phase extraction ðk ¼ 0Þ for different situations that correspond to the most relevant identification results obtained in the Fig. 26. Images to consider in the experiments that involve encryption in the ID tag. (a) Biometric aðxÞ; (b) parcel content pðxÞ; (c) key code dðxÞ; (d) parcel origin mðxÞ. 1144 Proceedings of the IEEE | Vol. 97, No. 6, June 2009 Matoba et al.: Optical Techniques for Information Security Fig. 27. Experimental and simulated results for the verification system by using distorted NIR multifactor ID tags: (a) Optical distortion-invariant ID tag (rotation angle 7 degrees) experimentally captured by using an NIR XEVA (b) Positive validation when the four identifying factors coincide with the information included in the ID tag; Negative results obtained when one (c) or more factors (d) do not coincide with the set of primary images; (e) Positive validation with a partially scratched ID tag. In all cases, verification outputs are normalized to the positive validation (b). experiment. For the sake of comparison, the maximum intensity value of the output planes is normalized to the case where the set of input images coincide with the set of reference primary images (satisfactory verification) [Fig. 27(b)], and thus the result is given by (6.6). Also for comparison, the output correlation signal of the processor is depicted for an ideal ID tag and for the experimentally captured ID tag. If just one signal among the four factors (biometric, parcel content, origin, or key code) or even the whole set of input images does not correspond to the set introduced in de ID tag, the resulting output planes show an insignificant intensity peak that hardly projects over the background [Fig. 27(c), (d)]. An appropriate threshold value will indicate negative verification. Finally, if the ID tag is slightly scratched due to friction [Fig. 27(e)], a positive verification result is obtained when the whole set of input images coincides with the authorized factors included in the ID tag. If one or more input images do not coincide with the set of primary images, a negative result is obtained in the verification process. In the examples analyzed, there is a good Vol. 97, No. 6, June 2009 | Proceedings of the IEEE 1145 Matoba et al.: Optical Techniques for Information Security agreement between the experimental and the predicted verification results. VI I. CONCLUSION We have presented an overview of the potential of optical techniques in encryption and security applications. The encryption methods based on random phase modulation and other encryption methods based on multidimensional keys have been presented. When using optical encryption, many degrees of freedom to manipulate the physical parameters of optical waves can be used. Therefore, a higher level of security may be achieved. The encrypted data can be stored either in optical or digital format. In encrypted optical memory, large amounts of data storage as much as 1 Tera Bytes/optical disc and fast data transfer rate of 1 Gbps can be expected which can be optically REFERENCES [1] B. Javidi and J. L. Horner, BOptical pattern recognition for validation and security verification,[ Opt. Eng., vol. 33, pp. 1752–1756, 1994. [2] J. L. Horner and B. Javidi, Opt. Eng., vol. 38, Special Issue on Optical Security, 1999. [3] B. Javidi, Optical and Digital Techniques for Information Security. New York: Springer, 2005. [4] C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, BExperimental quantum cryptography,[ J. of Cryptology, vol. 5, pp. 3–28, 1992. [5] P. Réfrégier and B. Javidi, BOptical image encryption based on input plane and Fourier plane random encoding,[ Opt. Lett., vol. 20, pp. 767–769, 1995. [6] H. Kogelnik, BHolographic image projection through inhomogeneous media,[ Bell Syst. Tech. J., vol. 44, pp. 2451–2455, 1965. [7] N. Towghi, B. Javidi, and Z. Luo, BFully phase encrypted image processor,[ J. Opt. Soc. Amer. A, vol. 16, pp. 1915–1927, 1999. [8] O. Matoba and B. Javidi, BEncrypted optical memory system using three-dimensional keys in the Fresnel domain,[ Opt. Lett., vol. 24, pp. 762–764, 1999. [9] O. Matoba and B. Javidi, BEncrypted optical storage with wavelength-key and random phase codes,[ Appl. Opt., vol. 38, pp. 6785–6790, 1999. [10] X. Tan, O. Matoba, Y. Okada-Shudo, M. Ide, T. Shimura, and K. Kuroda, BSecure optical memory system with polarization encryption,[ Appl. Opt., vol. 40, pp. 2310–2315, 2001. [11] O. Matoba and B. Javidi, BSecure holographic memory by double random polarization encryption,[ Appl. Opt., vol. 43, pp. 2915–2919, 2004. [12] B. Javidi and T. Nomura, BPolarization encoding for optical security systems,[ Opt. Eng., vol. 9, pp. 2439–2443, 2000. [13] N. K. Nishchal, J. Joseph, and K. Singh, BFully phase encryption using fractional Fourier transform,[ Opt. Eng., vol. 42, pp. 1583–1586, 2003. [14] P. C. Mogensen and J. Gluckstad, BPhase-only optical encryption,[ Opt. Lett., vol. 25, pp. 566–568, 2000. 1146 secured. In digital holography, 3-D data can be encrypted optically secured and provided to remote users via data communication channels. In security applications, encrypted data have been used in the authentication process. Multiple signatures with IR imaging can be employed for distortion-invariant optical ID tags for authentication and verification. The techniques described in this work can be useful to protect, store or transmit classified data, to control the access to restricted areas, where the highly secure identification of a person, an object or both might be required. h Acknowledgment The authors would like to thank Dr. Fang Xu and Prof. Yeshaiahu Fainman at the University of California, San Diego, for fabricating the polarization masks. [15] S. Fukushima, T. Kurokawa, and Y. Sakai, BImage encipherment based on optical parallel processing using spatial light modulator,[ IEEE Trans. Photonics Technol. Lett., vol. 3, pp. 1133–1135, 1991. [16] B. Javidi, BReal-time remote identification and verification of objects using optical ID tags,[ Opt. Eng., vol. 42, pp. 1–3, 2003. [17] E. Pérez-Cabré and B. Javidi, BScale and rotation-invariant ID tags for automatic vehicle identification and authentication,[ IEEE Trans. Vehicular Technology, vol. 54, pp. 1295–1303, 2005. [18] J. F. Barrera, R. Henao, M. Tebaldi, R. Torroba, and N. Bolognini, BMultiplexing encrypted data by using polarized light,[ Opt. Commun., vol. 260, pp. 109–112, 2006. [19] L. O’Gorman, BComparing passwords, tokens, and biometrics for user authentication,[ Proc. IEEE, vol. 91, pp. 2021–2040, 2003. [20] M. S. Millán, E. Pérez-Cabré, and B. Javidi, BMultifactor authentication reinforces optical security,[ Opt. Lett., vol. 31, pp. 712–723, 2006. [21] S. K. Kaura, D. P. Chhachhia, and A. K. Aggarwal, BInterferometric moiré pattern encoded security holograms,[ J. Optics A, Pure and Applied Optics, vol. 8, pp. 51–67, 2006. [22] E. Pérez-Cabré, M. S. Millán, and B. Javidi, BDesign of distortion-invariant optical ID tags for remote identification and verification of objects,[ in Physics of the Automatic Target Recognition, F. Sadjadi and B. Javidi, Eds. New York: Springer, 2007. [23] E. Pérez-Cabré, M. S. Millán, and B. Javidi, BRemote optical ID tag recognition and verification using fully spatial phase multiplexing,[ in Proc. SPIE, 2005, vol. 5986, p. 598602. [24] E. Pérez-Cabré, M. S. Millán, and B. Javidi, BVisible and NIR spectral band combination to produce high security ID tags for automatic identification,[ in Proc. SPIE, 2006, vol. 6394, p. 63940I. [25] E. Pérez-Cabré, M. S. Millán, and B. Javidi, BNear infrared multifactor identification tags,[ Opt. Express, vol. 15, pp. 15615–15627, 2007. [26] S. Der, A. Chan, N. Nasrabadi, and H. Kwon, BAutomated vehicle detection in Proceedings of the IEEE | Vol. 97, No. 6, June 2009 [27] [28] [29] [30] [31] [32] [33] [34] [35] [36] [37] [38] [39] forward-looking infrared imagery,[ Appl. Opt., vol. 43, pp. 333–348, 2004. M. S. Millán, E. Pérez-Cabré, and B. Javidi, BHigh secure authentication by optical multifactor ID tags,[ in Proc. SPIE, 2006 vol. 6394, p. 63940J. ATR Definitions and Performance Measures, Automatic Target Recognizers Working Group (ATRWG) Publications, no. 86-001[ 1986. T. Kotzer, J. Rosen, and J. Shamir, BPhase extraction pattern recognition,[ Appl. Opt., vol. 31, pp. 1126–1137, 1992. R. Pappu, B. Recht, J. Taylor, and N. Gershenfeld, BPhysical one-way functions,[ Science, vol. 297, pp. 2026–2030, 2002. F. Goudail, F. Bollaro, B. Javidi, and P. Refregier, BInfluence of a perturbation in a double random phase encoding system,[ J. Opt. Soc. Amer. A, vol. 15, pp. 2629–2638, 1998. Y. Frauel, A. Castro, T. Naughton, and B. Javidi, BResistance of the double random phase encryption against various attacks,[ Opt. Express, vol. 15, pp. 10 253–10 265, 2007. T. J. Naughton, B. M. Hennelly, and T. Dowling, BIntroducing secure modes of operation for optical encryption,[ J. Opt. Soc. Amer. A, vol. 25, pp. 2608–261, 2008. P. J. van Heerden, BTheory of information storage in solids,[ Appl. Opt., vol. 2, pp. 393–400, 1963. H. J. Coufal, D. Psaltis, and G. Sincerbox, Holographic Data Storage. New York: Springer, 2000. L. Hesselink, S. S. Orlov, and M. C. Bashaw, BHolographic data storage systems,[ Proc. IEEE, vol. 92, pp. 1231–1280, 2004. J. F. Heanue, M. C. Bashaw, and L. Hesselink, BVolume holographic storage and retrieval of digital data,[ Science, vol. 265, pp. 749–752, 1994. L. d’Auria, J. P. Huignard, and E. Spitz, BHolographic read-write memory and capacity enhancement by 3-D storage,[ IEEE Trans. Magn., vol. 9, pp. 83–94, 1973. H. Horimai and X. Tan, BCollinear for a holographic versatile disk,[ Appl. Opt., vol. 45, pp. 910–914, 2006. Matoba et al.: Optical Techniques for Information Security [40] B. Javidi, G. Zhang, and J. Li, BEncrypted optical memory using double-random phase encoding,[ Appl. Opt., vol. 36, pp. 1054–1058, 1997. [41] G. Unnikrishnan, J. Joseph, and K. Singh, BOptical encryption system that uses phase conjugation in a photorefractive crystal,[ Appl. Opt., vol. 37, pp. 8181–8186, 1998. [42] O. Matoba and B. Javidi, BEncrypted optical storage with angular multiplexing,[ Appl. Opt., vol. 38, pp. 7288–7293, 1999. [43] X. Tan, O. Matoba, T. Shimura, K. Kuroda, and B. Javidi, BSecure optical storage that uses fully phase encryption,[ Appl. Opt., vol. 39, pp. 6689–6694, 2000. [44] T. Nomura, S. Mikan, Y. Morimoto, and B. Javidi, BSecure optical data storage with random phase key codes by use of a configuration of a joint transform correlator,[ Appl. Opt., vol. 42, pp. 1508–1514, 2003. [45] H. F. Heanue, M. C. Bashaw, and L. Hesselink, BEncrypted holographic data storage based on orthogonal-phase-code multiplexing,[ Appl. Opt., vol. 34, pp. 6012–6015, 1995. [46] O. Matoba and B. Javidi, BSecure holographic memory by double random polarization encryption,[ Appl. Opt., vol. 43, no. 14, pp. 2915–2919, 2004. [47] O. Matoba, Y. Yokohama, M. Miura, K. Nitta, and T. Yoshimura, BReflection-type holographic disk memory with random phase shift multiplexing,[ Appl. Opt., vol. 45, pp. 3270–3274, 2006. [48] C. C. Sun and W. C. Su, BThree-dimensional shift selectivity of random phase encoding in volume holograms,[ Appl. Opt., vol. 40, pp. 1253–1260, 2001. [49] J. F. Barrera, R. Henao, M. Tebaldi, R. Torroba, and N. Bolognini, BMultiplexing encryption-decryption via lateral shifting of a random phase mask,[ Opt. Commun., vol. 259, pp. 532–536, 2006. [50] M. Toishi, M. Hara, K. Tanaka, T. Tanaka, and K. Watanabe, BNovel encryption method using multi reference patterns in coaxial holographic data storage,[ Jpn. J. Appl. Phys., vol. 46, pp. 1781–3775, 2007. [51] T. Nomura, E. Nitanai, T. Numata, and B. Javidi, BDesign of input phase mask for the space bandwidth of the optical encryption system,[ Opt. Eng., vol. 45, p. 017006, 2006. [52] I. Yamaguchi and T. Zhang, BPhase-shifting digital holography,[ Opt. Lett., vol. 22, pp. 1268–1270, 1997. [53] W. Osten, T. Baumbach, and W. Juptner, BComparative digital holography,[ Opt. Lett., vol. 27, pp. 1764–1766, 2002. [54] T. Kreis, Handbook of Holographic Interferometry. Weinheim, Germany: Wiley VCH, 2005. [55] Y. Frauel, T. Naughton, O. Matoba, E. Tajahuerce, and B. Javidi, BThree-dimensional imaging and processing using computational holographic imaging,[ Proc. IEEE, vol. 94, pp. 636–653, 2006. [56] J. W. Goodman and R. Lawrence, BDigital image formation from electronically detected holograms,[ Appl. Phys. Lett., vol. 11, pp. 77–79, 1967. [57] J. Rosen, BThree-dimensional optical Fourier transform and correlation,[ Opt. Lett., vol. 22, pp. 964–966, 1997. [58] P. Ferraro, S. Grilli, D. Alfieri, S. D. Nicola, A. Finizio, G. Pierattini, B. Javidi, G. Coppola, and V. Striano, BExtended focused image in microscopy by digital holography,[ Opt. Express, vol. 13, pp. 6738–6749, 2005. [59] T. M. Kreis, BFrequency analysis of digital holography,[ Opt. Eng., vol. 41, pp. 771–778, 2002. [60] T. M. Kreis, BFrequency analysis of digital holography with reconstruction by convolution,[ Opt. Eng., vol. 41, pp. 1829–1839, 2002. [61] T. Nomura, S. Murata, E. Nitanai, and T. Numata, BPhase-shifting digital holography with a phase difference between orthogonal polarizations,[ Appl. Opt., vol. 45, pp. 4873–4877, 2006. [62] Y. Awatsuji, M. Sasada, and T. Kubota, BParallel quasi-phase shifting digital holography,[ Appl. Phys. Lett., vol. 85, pp. 1069–1071, 2004. [63] B. Javidi and T. Nomura, BSecuring information by use of digital holography,[ Opt. Lett., vol. 25, pp. 28–30, 2000. [64] E. Tajahuerce, O. Matoba, S. C. Verrall, and B. Javidi, BOptoelectronic information encryption with phase-shifting interferometry,[ Appl. Opt., vol. 39, pp. 2313–2320, 2000. [65] E. Tajahuerce and B. Javidi, BEncrypting three-dimensional information with digital holography,[ Appl. Opt., vol. 39, pp. 6595–6601, 2000. [66] T. Nomura, K. Uota, and Y. Morimoto, BHybrid encryption of a 3-D object using a digital holographic technique,[ Opt. Eng., vol. 43, pp. 2228–2232, 2004. [67] D. Weber and J. Trolinger, BNovel implementation of nonlinear joint transform correlators in optical security and validation,[ Opt. Eng., vol. 38, pp. 62–68, 1999. [68] B. Javidi, BNonlinear joint transform correlators,[ in Real-Time Optical Information Processing, B. Javidi and J. L. Horner, Eds. New York: Academic, 1994, pp. 115–183. [69] J. E. Ford, F. Xu, K. Urquhart, and Y. Fainman, BPolarization selective computer-generated-holograms,[ Opt. Lett., vol. 18, pp. 456–458, 1993. [70] J. W. Goodman, Introduction to Fourier Optics 2nd ed. New York: McGraw-Hill, 1996. [71] F. A. Sadjadi, BSelected papers on automatic target recognition,[ in SPIE, 1999. [CD-ROM]. ABOUT THE AUTHORS Osamu Matoba (Member, IEEE) received the Ph.D. degree in applied physics from Osaka University, Osaka, Japan, in 1996. He was a Research Associate at Institute of Industrial Science, University of Tokyo, from 1996 to 2002. Since 2002, he was an Associate Professor in the Department of Computer Science and Systems Engineering, Kobe University. Now he is a Professor at Kobe University. His interests are in optical security technology, optical and digital processing of three-dimensional objects, and terabyte holographic memory. Dr. Matoba is a member of the Optical Society of America (OSA), SPIE, the Optical Society of Japan, and the Japan Society of Applied Physics. He received the 2008 IEEE Donald G. Fink prized paper award. Takanori Nomura is a Professor in the Department of Opto-Mechatronics at Wakayama University, Japan. He received his B.E. and M.E. degrees in applied physics in 1986 and 1988, respectively, both from Osaka University, Japan. He received the Ph.D. degree in applied physics from Osaka University in 1991. He was a Research Associate at Kobe University, Japan, from 1991 to 1995. He was an Assistant Professor at Wakayama University from 1995 to 1999, and an Associate Professor at Wakayama University from 1999 to 2009. He was a Visiting Associate Professor at the University of Connecticut from 1998 to 1999. His research interests include information photonics, digital holography, and optical instrumentation. He is a member of IEEE LEOS, OSA, SPIE, the Japan Society of Applied Physics, and the Optical Society of Japan. Vol. 97, No. 6, June 2009 | Proceedings of the IEEE 1147 Matoba et al.: Optical Techniques for Information Security Elisabet Pérez-Cabré received the B.S. degree in physics from the Autonomous University of Barcelona in 1993 and the Ph.D. degree in physics from the Technical University of Catalonia in 1998. In 1996 she jointed the Department of Optics and Optometry at the Technical University of Catalonia as a Professor of Optics. She was the recipient of the IEEE Best Journal Paper Awards from IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY in 2002 and 2005 along with Dr. Javidi. Her current research interests include distortion-invariant pattern recognition, encryption techniques, spatial light modulators, color image processing and biomedical optics. She is a member of the Spanish Optical Society (SEDO), the European Optical Society (EOS) and the International Society for Optical Engineering (SPIE). Marı́a S. Millán received the Ph.D. degree in physics in 1990. She is Professor of the School of Optics and Optometry in the Technical University of Catalonia (Barcelona, Spain). Her academic activities involve lecturing on fundamentals of optics, Fourier optics, photonics technology and devices, and image processing. Her research work on image processing includes optoelectronic information processing, pattern recognition, machine vision, color imaging, automatic inspection for industrial applications, and programmable diffractive optical elements. She is the current president of the Committee of Image Techniques of the Spanish Society of Optics (SEDOPTICA) and is the representative of the Spanish Territorial Committee in the International Commission for Optics (ICO). She is a Fellow of SPIE. She is also a member of EOS and OSA. 1148 Proceedings of the IEEE | Vol. 97, No. 6, June 2009 Bahram Javidi (Fellow, IEEE) received the B.S. degree in electrical engineering from George Washington University, Washington, DC, in 1980 and the M.S. and Ph.D. degrees in electrical engineering from Pennsylvania State University, University Park, in 1982 and 1986, respectively. He is Board of Trustees Distinguished Professor at the University of Connecticut. He has over 630 publications. He has completed 9 books and 44 book chapters. He has published over 250 technical articles in major peer reviewed journals. He has published over 330 conference proceedings, including over 110 plenary addresses, keynote addresses, and invited conference papers. Dr. Javidi has been named Fellow of seven national and international professional scientific societies; the Institute of Electrical and Electronics Engineers (IEEE), American Institute for Medical and Biological Engineering (AIMBE), Optical Society of America (OSA), International Society for Optical Engineering (SPIE), Institute of Physics (IoP), Society for Imaging Science and Technology (IS&T), and the Institution of Electrical Engineers (IEE). In 2008, he received the Fellow award from the John Simon Guggenheim Foundation. He received the 2008 IEEE Donald G. Fink prized paper award among all (over 180) IEEE transactions, journals, and magazines. In 2007, The Alexander von Humboldt Foundation awarded Dr. Javidi the Humboldt Prizes for outstanding U.S. scientists, Germany’s highest research award for senior U.S. scientists and scholars in all disciplines. He received the Technology Achievement Award from the the International Society for Optical Engineering (SPIE) in 2008. In 2007, he was the corecepient of the best paper award from the Information Optics workshop sponsored by IEEE LEOS, SPIE and University of Iceland. In 2005, Dr. Javidi received the Dennis Gabor Award in Diffractive Wave Technologies by the International Society for Optical Engineering (SPIE). He was the recipient of the IEEE Lasers and Electro-optics Society Distinguished Lecturer Award twice in 2003–2004 and 2004–2005. He was awarded the IEEE Best Journal Paper Award from IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY twice in 2002 and 2005. In 1990, the National Science Foundation named Prof. Javidi a Presidential Young Investigator. In 1987, he received The Engineering Foundation and the Institute of Electrical and Electronics Engineers (IEEE) Faculty Initiation Award. He was selected in 2003 as one of the nation’s top 160 engineers between the ages of 30–45 by the National Academy of Engineering (NAE) to be an invited speaker at The Frontiers of Engineering Conference which was cosponsored by The Alexander von Humboldt Foundation. He is an alumnus of the Frontiers of Engineering of The National Academy of Engineering since 2003.