Next Article in Journal
Novel Bending Test Method for Polymer Railway Sleeper Materials
Previous Article in Journal
Effect of Dexamethasone on Thermoresponsive Behavior of Poly(2-Oxazoline) Diblock Copolymers
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Optical Encryption Based on Computer Generated Holograms in Photopolymer

1
Department of Precision Instrument, Tsinghua University, Beijing 100084, China
2
Tsinghua Shenzhen International Graduate School, Tsinghua University, Shenzhen 518055, China
*
Authors to whom correspondence should be addressed.
Polymers 2021, 13(9), 1358; https://doi.org/10.3390/polym13091358
Submission received: 11 March 2021 / Revised: 19 April 2021 / Accepted: 19 April 2021 / Published: 21 April 2021
(This article belongs to the Section Polymer Applications)

Abstract

:
An optical encryption method based on computer generated holograms printing of photopolymer is presented. Fraunhofer diffraction is performed based on the Gerchberg-Saxton algorithm, and a hologram of the Advanced Encryption Standard encrypted Quick Response code is generated to record the ciphertext. The holograms of the key and the three-dimensional image are generated by the angular spectrum diffraction algorithm. The experimental results show that large-size encrypted Quick Response (QR) code and miniature keys can be printed in photopolymers, which has good application prospects in optical encryption. This method has the advantages of high-density storage, high speed, large fault tolerance, and anti-peeping.

Graphical Abstract

1. Introduction

Information encryption is an important research hotspot in information security today. According to incomplete statistics, cybercrime has caused approximately US $400 billion in economic losses worldwide [1,2]. With the rapid developments of the Internet and artificial intelligence, the field of information security has received more and more attention. Optical encryption is one of the important research directions. Compared with computer encryption and quantum encryption, optical encryption has the advantages of parallelism, high speed, large storage density, and multi-dimensional encryption. In 1995, Refregier et al., proposed a famous image encryption technology based on Dual Random Phase Encoding (DRPE) [3]. Subsequently, various improved DRPE-based optical encryption schemes were proposed [4,5,6,7,8]. However, there are still many important issues that need to be resolved, such as speckle noise, real-time encryption, data storage density, and transmission security [9].
In order to solve these problems, many works have proposed various optical encryption schemes. For example, metasurfaces [10], holographic watermarks [11], diffraction imaging [12], ghost imaging [13], photon counting [14], chaotic character encryption [15], polarized light encoding [16], and compressed sensing [17], etc. Gaurav Verma et al., proposed a biometric key-based asymmetric optical encryption method to solve the problem of key distribution in the optical encryption process [18]. Xinyuan Fang et al., studied the Orbital Angular Momentum Holography for high-security encryption, which has strong selectivity in the spatial frequency domain and can realize ultra-large-capacity holographic information storage [19]. Nikolay N. Evtikhiev and others used a 32,000-frame high-speed Digital Micromirror Device (DMD), combined with a fast digital camera, to create a high-speed optical encryption system [20]. Hosung Jeon et al., proposed a high-resolution binary hologram printing technology, which achieved high-resolution binary holographic printing through DMD [21]. Hafiz Saad Khaliq et al., proposed a multifunctional single-layer element reflective array in order to achieve polarization preservation and spin encryption of the reflected beam [22]. Juan M. Vilardy O. et al., used Collins diffraction transform and nonlinear joint transform correlator to perform optical image encryption, which improved the security of the system against brute force cracking and plaintext attacks [23]. Aimin Yan et al., proposed a multi-image optical encryption method based on angular multiplexing Quick Response (QR) code and spiral phase key [2]. Although the above-mentioned research has made interesting progress, the problems still to face are how to effectively store and transmit complex ciphertext information and avoid network attacks.
In this research, we propose an encryption method based on computer holographic holograms (CGH) in photopolymer. This method can print large-size encrypted QR code, miniature key, and miniature 3D image in photopolymer. First, the ciphertext is generated by using the Advanced Encryption Standard (AES) algorithm, and the ciphertext is encoded by the QR code to form an encrypted QR code. Fraunhofer diffraction was performed by the Gerchberg-Saxton (GS) algorithm to generate a phase-only hologram of the AES encrypted QR code. The phase-only hologram of the key and the three-dimensional (3D) image is generated by the angular spectrum diffraction theory. This research has realized multiple encryption and display through the combination of encrypted QR code, miniature key, and miniature 3D image. The volume holographic characteristics of photopolymers effectively avoids network attacks and improves optical encryption performance.
The rest of the paper is arranged as follows: In Section 2, the design theory and method are introduced, including the GS algorithm and the angular-spectrum layer-oriented method. In Section 3, the computational holographic printing method of large-size encrypted QR code is introduced. In Section 4, the computerized holographic printing method of the miniature image is introduced. Section 5 provides the conclusion.

2. Design Theory and Method

2.1. Coupled Wave Theory

The volume holographic grating can record and reproduce the wavefront information of 3D object. Kogelnik proposed the classic coupled wave theory in 1969, which can comprehensively analyze the diffraction efficiency of volume holographic gratings [24]. The coupled wave theory is an important theory for analyzing the angle and wavelength selectivity of volume holographic gratings and provides a theoretical basis for the following research on volume holographic gratings formed in photopolymer. In this work, for non-absorption volume holographic gratings, the diffraction efficiency of reflective volume holographic gratings can be calculated according to this theory, and the calculation equations are [24]:
η R = s h 2 ν 2 ξ 2 s h 2 ν 2 ξ 2 + ( 1 ξ 2 ν 2 ) ,
ν = π d Δ n λ c o s θ r c o s θ s ,
ξ = k d Δ θ s i n ( ϕ θ 0 ) / 2 c o s θ s k 2 d Δ λ / 8 π n c o s θ s ,
where η R represents the diffraction efficiency of the reflective volume holography, v represents coupling strength, ξ represents the Bragg mismatch, d is the thickness of the recording medium, Δ n represents the refractive index modulation, and λ is the wavelength of incident light. θ r is the angle between the reconstructed light and the direction in the normal to surface of separation air-grating within the dielectric material, and θ s is the angle between the diffracted light and the direction in the normal to surface of separation air-grating within the dielectric material. θ 0 is the Bragg angle, Δ θ is the angular offset, and Δ λ is the wavelength offset k is the size of the grating vector, ϕ is the tilt angle of the grating vector, and n is the refractive index of the medium.
In our configuration, the wavelength is 532 nm, the refractive index of the medium is 1.5, the thickness of the recording medium is 16 μm, the refractive index modulation is 0.03, and the angle between the reference beam and the object beam is 180°. As is shown in Figure 1a, any reference beam that deviates from the recording angle causes a sharp drop in diffraction efficiency, which reflects the angular selectivity of the volume holographic grating. Since volume holographic gratings need to be at a specific angle to observe the strongest diffraction efficiency, this feature plays an important role in encryption.
It can be seen from Figure 1b that when the wavelength of the incident light deviates from the original recording wavelength, the diffraction efficiency will drop sharply to zero. Any reproduced light that deviates from the original recording wavelength will lead to extremely low diffraction efficiency. The peak diffraction efficiency of the main lobe is 98.63%, and the peak diffraction efficiency of the first side lobe is about 27%. This shows that volume holographic gratings have strong wavelength selectivity.

2.2. The Gerchberg-Saxton Algorithm

The GS algorithm was first proposed by Gerchberg and Saxton, which is mainly used for phase recovery [25]. The flow of the GS iterative algorithm based on Fraunhofer diffraction is shown in Figure 2.
The coordinate system ( x , y ) represents the image surface, and the coordinate system ( x 0 , y 0 ) represents the holographic surface. First, initialize the random phase to ϕ 0 ( x 0 , y 0 ) , and the plane wave constant amplitude to A 0 ( x 0 , y 0 ) . When n = 0 , the complex amplitude of the holographic surface is U 0 ( x 0 , y 0 ) = A 0 ( x 0 , y 0 ) e x p [ j ϕ 0 ( x 0 , y 0 ) ] .
For the holographic surface U n ( x 0 , y 0 ) in the n-th cycle, take its phase as ϕ n ( x 0 , y 0 ) . Using the constant A 0 ( x 0 , y 0 ) to modulate its amplitude, and the modulated complex amplitude is U n   ( x 0 , y 0 ) = A 0 ( x 0 , y 0 ) e x p [ j ϕ n ( x 0 , y 0 ) ] . In this article, the constant A 0 ( x 0 , y 0 ) is a matrix of all ones.
The modulated holographic surface U n   ( x 0 , y 0 ) is spread to the image surface by Fraunhofer diffraction, and the complex amplitude of the image surface can be obtained.
U ˜ n ( x , y ) = 1 j λ z e x p ( j k z + j k x 2 + y 2 2 z ) { U n ( x 0 , y 0 ) } ,
For the image plane in the n-th cycle, take its phase as ϕ n ( x , y ) . Replace the amplitude of the image plane with the amplitude T of the original image and keep the phase unchanged to obtain the modulated image plane.
U ˜ n ( x , y ) = T e x p [ j ϕ n ( x , y ) ] ,
The modulated image surface is inversely diffracted to the object surface through Fraunhofer, and the holographic surface of the next iteration is obtained.
U n ( x 0 , y 0 ) = j e x p ( j k z ) λ z 1 { U ˜ n ( x , y ) e x p [ j k 2 z ( x 2 + y 2 ) } ,
where { } represents the Fourier transform, and 1 { } represents the inverse Fourier transform. Repeating the above-mentioned forward diffraction and reverse diffraction process, when n = N, stop the cycle, and output the hologram.

2.3. The Angular-Spectrum Layer-Oriented Method

The angular spectrum diffraction theory is called the plane wave theory of diffraction, which can perform plane wave decomposition [26]. Assuming that the distance between the diffraction surface and the observation surface is z, the complex amplitude distributions of the diffraction surface and the observation surface are U ( x , y , 0 ) and U ( x , y , z ) , and their corresponding angular spectra are A 0 ( u , v ) and A z ( u , v ) , respectively. The angular spectrum expressions of the diffraction surface and the observation surface are respectively:
A 0 ( u , v ) = U ( x , y , 0 ) e x p [ 2 π j ( u x + v y ) ] d x d y
A z ( u , v ) = U ( x , y , z ) e x p [ 2 π j ( u x + v y ) ] d x d y
wherein, u and v represent the spatial frequency of the x and y axes, respectively. A 0 ( u , v ) and A z ( u , v ) are the Fourier transforms of U ( x , y , 0 ) and U ( x , y , z ) , respectively. According to the angular spectrum diffraction theory, the relationship between A 0 ( u , v ) and A z ( u , v ) is:
A z ( u , v ) = A 0 ( u , v ) H ( u , v )
H ( u , v ) = e x p [ j k z 1 ( λ u ) 2 ( λ v ) 2 ]
wherein, H ( u , v ) is the transfer function related to the propagation distance z. The above equations give the law of angular spectrum propagation, indicating that the angular spectrum on the observation plane is equal to the angular spectrum on the diffraction plane multiplied by a transfer function. After obtaining the angular spectrum of the observation plane, the complex amplitude distribution of the light wave field on the observation plane can be obtained by inverse Fourier transform. In summary, the expression of the complex amplitude distribution in the observation plane is [27].
U ( x , y , z ) = 1 { A 0 ( u , v ) H ( u , v ) } = 1 { { U ( x , y , 0 ) } H ( u , v ) }
The angular-spectrum layer-oriented method is based on the depth map and intensity map of the 3D object to calculate the hologram [27], including three steps of 3D object layering, sub-layer hologram calculation, and hologram superimposition. First, a virtual 3D object is generated by a computer, and its intensity map and depth map are rendered. Then we convert the RGB (Red, Green, Blue) 24-bit image into an 8-bit grayscale image. The layering is performed according to the gray value of the depth map, and the object surface with the same gray value is regarded as the same layer object surface. The distance between each layer of objects is:
ε = z m a x z m i n N
where z m a x is the maximum depth value, z m i n is the minimum depth value, N is the number of layers, and ε is the spacing between the layers. Therefore, the distance between the object surface of the i-th layer and the holographic surface is:
z i = z 0 + i ε
where, z 0 represents the reference distance between the object surface and the holographic surface (the closest distance). A random phase is added to the amplitude of each layer of the object surface to simulate the scattering effect on the surface of a 3D object. The hologram of the single-layer object surface is calculated through the angular spectrum algorithm, which is H i = 1 { ( U i ) H } . H i is the hologram of each layer, H is the transfer function of the angular spectrum, and U i is the complex amplitude of the i-th layer.
Next, the hologram of each layer is repeatedly calculated, and the complex amplitudes of all sub-layer holograms are superimposed to obtain the complex amplitude distribution of the 3D object hologram. Finally, extract the phase of the hologram, load it into the phase-only spatial light modulator, and irradiate the spatial light modulator (SLM) with coherent light to reconstruct the wavefront of the 3D object.

3. CGH Printing of Large Encrypted QR Code

3.1. Encrypted QR Code Generation

QR code is a matrix two-dimensional code launched by Japan’s Denso company in 1994 [28]. It is currently the most widely used two-dimensional code encoding method in the world. QR code has the advantages of large data storage capacity, high error tolerance rate, high storage density, low error rate and easy reading, and can encode numbers and English characters. The RS code (Reed-Solomon code) error correction coding mechanism is adopted, and data recovery is realized by adding redundant information to the coded data, which has strong fault tolerance.
Block cipher is one of the important encryption methods of modern cryptography. It has the advantages of fast encryption, standardization, and high security. In block ciphers, the most classic are the AES [29,30]. The AES algorithm has the advantages of security, high efficiency, high flexibility, and strong realizability.
In order to record the ciphertext information in the photopolymer, the ciphertext is encoded by a QR code. The coding system for the QR Code has the error tolerance rate of 30%. The cipher text is generated by the AES algorithm, the plain text is “Product No.: 20210115”, and the key is “Tsinghua19112021”. In the parameter setting of the AES algorithm, the cipher block chaining (CBC) mode is adopted, the padding mode is zero padding, the data block is 128 bits, the encoding method of the output data is mode of Base 64, and the character set is UTF-8. The ciphertext content obtained through AES algorithm encryption is: “4jWsFlO5pipRanYaDFIF7KsOH+5uiY7uwyK4YzzFP3U=”, a total of 44 bytes. The generated QR code is shown in Figure 3a.
We use the GS algorithm to simulate and calculate the phase-only hologram of the QR code key. In the simulation parameter setting, the wavelength is 532 nm, the resolution of CGH is 1080 × 1080, the reconstruction distance is 300 mm, and the pixel size is 8 μm. Through simulation, the phase-only hologram of the encrypted QR code can be calculated, as shown in Figure 3b. It can be seen from Figure 3c that the GS algorithm can be used to reconstruct the QR code key with high quality. Scanning the original image and the numerical reconstruction image through the mobile phone, the scanning results are consistent, indicating that the accurate reconstruction image can be obtained through the GS algorithm.
The experimental optical setup is shown in Figure 4, and an off-axis reflective CGH printing optical setup is built. The model of the laser is MSL-F-532 (from Changchun New Industries Optoelectronics Technology Co., Ltd., Changchun, China). The laser is a single longitudinal mode laser with a wavelength of 532 nm, an output power of 1 W, and a coherence length greater than 50 m. The emitted laser light passes through the attenuator film, the electronic shutter, and the half-wave plate (HWP) in sequence, and is divided into two polarized light beams. The spatial light modulator used in this study belongs to the type of Liquid Crystal on Silicon (LCOS). Since the phase-type LCOS (from HOLOEYE Photonics AG, Berlin, Germany) can only modulate polarized light, which is used to illuminate the LCOS. The transmitted light beam is P light, which is expanded by a spatial filter (from Daheng optics, Beijing, China), and then becomes parallel light after passing through an aperture and collimation. After the object beam reflected by the LCOS is transformed by a lens (from Hengyang Optics, Guangzhou, China), the background light is focused into a spot. The transform of the object beam through the lens allows the Fraunhofer diffraction pattern to be observed at a close distance. The wavefront modulated beam illuminates the “+” surface of the photopolymer; the reflected light beam is S light, which is irradiated on the “−” surface of the photopolymer after beam expansion, collimation, and reflection. Subsequently, the photopolymer material is moved to the position where the reconstructed image is in focus. In order to improve the recording efficiency, the object beam and the reference beam need to be S-polarized light. Therefore, the HWP 2 (from Zolix Instruments Co., Ltd., Beijing, China) is adjusted to make the object beam reflected by the LCOS to S-polarization.
In this research, the spatial light modulator is LCOS, the model is HOLOEYE PLUTO-2. The pixel of this system is 1920 × 1080, the gray level is 256, the panel size is 15.36 mm × 8.64 mm, the pixel size is 8.0 μm. In recent years, photopolymers have attracted more and more attention in holographic applications due to their good characteristics, such as high diffraction efficiency, large information storage density, high resolution, and low requirements for physical or chemical processing [31,32]. For the selection of photopolymers, the CRT20 holographic film from Litiholo (Newport News, VA, USA) is used. CRT20 holographic film is a photopolymer composite material and is attached to a glass substrate with a thickness of approximately 1.8 mm. The holographic film is composed of two layers, the upper layer is a triacetate cellulose film (TAC) protective layer with a thickness of approximately 50 μm; the lower layer is a photopolymer with a thickness of approximately 16 μm.
Next, we adjust the beam splitting ratio through the half-wave plate HWP 1 (from Zolix Instruments Co., Ltd., Beijing, China), so that the optical power density of the two beams is 3 mW/cm2. When performing interference recording, the electronic shutter is opened, the angle between the reference beam and the object beam is 45°, the exposure time is 1 min, and the wavefront information modulated by LCOS is recorded into the photopolymer. After recording, the polymer is placed in darkness for 4 min, then a mercury lamp is applied for 2 min.
In Figure 5, the size of the QR code in the photopolymer is 14 mm × 14 mm, and its size is determined by the focal length of the lens. The larger the focal length, the larger the size of the two-dimensional image recorded by the photopolymer. Figure 5 shows the encrypted QR code printed by computer holography, which can be obtained by taking a photo with a mobile phone or camera. Due to the angular selectivity of the volume holographic grating, the encrypted QR code needs to be observed at a specific angle, that is, when the angle between the reproduce beam and the photopolymer surface is 45°. When the angle of the reproduce beam deviates, the diffraction efficiency will drop sharply, and the reconstructed image cannot be observed. Under the irradiation of natural light, the encrypted QR code recorded by the photopolymer is scanned by the mobile phone, and the scanning result is exactly the same as the ciphertext in the original QR code. This shows that the use of photopolymers can accurately record long-length cipher text information, and the cipher text information can be easily found by directly scanning the QR code with a mobile phone. We can use natural light to reproduce 3D objects, because there is a monochromatic component of 532 nm in natural light. Moreover, due to the wavelength selectivity of volume holographic gratings, any waveband deviating from 532 nm can cause a sharp drop in diffraction efficiency and play a filtering role. Due to the Fraunhofer diffraction based on the GS algorithm, the optically reconstructed QR code key has stronger brightness, and a large-size QR code can be obtained, which is conducive to directly scanning the QR code through the mobile phone to obtain the cipher text information.

3.2. Reconstruction Quality Evaluation

In this section, we will evaluate the reconstruction quality of the GS algorithm. The root mean square error (RSME) is used to evaluate the reconstruction quality of the image. The smaller the RSME, the better the quality of the reconstructed image. The calculation equation of RSME is
R S M E = 1 M N ( I i j I i j ) 2
The image size is M N , I i j represents the amplitude of a single pixel in the reconstructed image, and I i j represents the amplitude of a single pixel in the original image.
The Peak Signal to Noise Ratio (PSNR) is used to evaluate the optical reconstruction quality of the image, in decibels (dB). The larger the PSNR, the smaller the distortion and the better the quality of the reconstructed image. When the PSNR is greater than 40 dB, the image quality is very good, that is, very close to the original image. The calculation equation of PSNR is
P S N R = 10 × log 10 ( 2 n 1 R M S E ) 2
The school emblem of Tsinghua University is used as the original image for hologram calculation. The wavelength is 532 nm, the resolution of CGH is 1080 × 1080, the reconstruction distance is 300 mm, and the pixel size is 8 μm. Figure 6 shows the reconstructed image output from iteration 1, 10, and 100. It can be seen that as the number of iterations increases, the reconstructed image gradually becomes clearer.
The RSME and PSNR of the reconstructed image under different iteration numbers are presented. It can be seen that both RSME and PSNR eventually tend to converge within 1000 iterations. In Figure 7a, as the number of iterations increases, RSME decreases rapidly in the first 100 iterations. When the number of iterations is greater than 100, the rate of decline of RSME decreases, and RSME tends to converge to 0.22. In Figure 7b, as the number of iterations increases, the PSNR increases rapidly in the first 100 iterations. When the number of iterations is greater than 100, the growth rate of PSNR decreases, and PSNR tends to converge to about 61. In order to take into account the efficiency of the algorithm, the number of iterations in this article is 100. At this time, the RSME is about 0.22, and the PSNR is about 61. The image reconstruction quality is high and the image distortion is small. In Figure 7c, the number of iterations is proportional to the calculation time. The time consumed for 100 iterations is about 32 s. At this time, both efficiency and reconstruction quality can be taken into account.

4. CGH Printing of Miniature Keys

4.1. Miniature Key Generation

As shown in Figure 8a, for the key “Tsinghua19112021” of the AES algorithm in Section 3.1, we can calculate its hologram through angular spectrum diffraction. In the simulation parameter setting, the wavelength is 532 nm, the resolution of CGH is 1920 × 1080, the reconstruction distance is 220 mm, and the pixel size is 8 μm. Through simulation, the phase-only hologram of the key can be calculated, as shown in Figure 8b. It can be seen from Figure 8c that the GS algorithm can be used to reconstruct the key of the AES algorithm with high quality, and the accurate reconstruction image can be obtained through the GS algorithm.
Using the off-axis reflective computational holographic printing optical path shown in Figure 4, the reconstructed image of the hologram is focused on the surface of the photopolymer, and the recording of the miniature key is finally realized. The only difference is that in this experiment, the lens in Figure 4 focuses the wavefront information modulated by the LCOS at one point to achieve a miniature recording. During the experiment, the laser wavelength was 532 nm, the exposure intensity of the reference beam and the object beam was 3 mW/cm2, the exposure time was 1 min, the polymer is placed in darkness for 4 min, and the mercury lamp curing time was 2 min.
The optical setup shown in Figure 9 is used to take the micro-image recorded by the photopolymer. The front and back sides of the photopolymer are swapped, and the reference beam remains unchanged. At this time, the photopolymer is irradiated with the reference beam, and the real image can be observed at the symmetrical position of the reconstructed image. The real image can be taken with a camera (Canon 600D).
As shown in Figure 10, through angular spectrum diffraction and focusing lens, the miniature key can be recorded in the photopolymer, the reconstructed image is clear, and the stored key is the same as the original key information. We used Charge-coupled Device (CCD) to shoot the focused spot, and the model is MV-EM510M (from Vision Digital Image Technology Co., Ltd., Xi’an, China). After experimental measurements, the spot diameter is 660 CCD pixels and the size of each pixel is 3.45 μm, so the spot diameter is 2.28 mm and the area is 4.08 mm2.

4.2. Miniature 3D Image Generation

In order to print miniature 3D images in photopolymers, a virtual three-dimensional model is generated by a computer, and a depth map and an intensity map are obtained through rendering. The length of the train model is 30 mm, the width is 5 mm, the height is 10 mm, and the depth is 20 mm. The distance between the train and the hologram is 150–170 mm. In order to facilitate the observation of experimental phenomena, this paper divides the 3D train model into three layers according to the gray value range of the depth map and adds a random phase to each layer.
In the simulation parameter setting, the wavelength is 532 nm, the resolution of CGH is 1920 × 1080, the reconstruction distance is 150 mm, and the pixel size is 8 μm. Through the simulation of the layered angular spectrum algorithm, the phase-only hologram of the 3D image can be calculated. The train model reconstructed by numerical simulation is shown in Figure 11, which represent the reconstructed images when the depth of field is 150 mm, 160 mm, and 170 mm, respectively.
Using the optical path shown in Figure 4, the computational hologram of the 3D object is loaded in the LCOS. During the experiment, the laser wavelength was 532 nm, the exposure intensity of the reference beam and the object beam was 3 mW/cm2, the exposure time was 1 min, the polymer is placed in darkness for 4 min, and the mercury lamp curing time was 2 min.
After the recording is completed, the optical setup shown in Figure 9 is used to take a photo of microscopic 3D image recorded in the photopolymer. The reconstruction result is shown in Figure 12. Since the focal length of the focusing lens used is 200 mm, the distance from the camera to the photopolymer plane is determined by the focal length. It can be seen that when the camera is 200 mm, 210 mm, and 220 mm away from the photopolymer surface, the reconstructed image is consistent with the reconstructed image of the numerical simulation, and the clear locomotive, centre and rear of the vehicle can be observed at different depths of field. The experimental results show that the reconstruction of the miniature 3D model can be achieved through the photopolymer.
Figure 13 shows the results of the photopolymer reconstruction of the character string “THU”. The clearest letters ‘T’, ‘H’, and ‘U’ can be captured at different reconstruction distances of z = 200 mm, 210 mm, and 220 mm. The experimental results show that photopolymers can realize the reconstruction of miniature 3D image, and different images can be observed under different depths of field. It can be seen from Figure 12 and Figure 13 that through the encryption of the miniature 3D image, the image with obvious depth information can be recorded into the photopolymer. When irradiated with reproduced beam, when the camera is focused on a certain layer, the other layers become blurred. In this way, the key can be stored in segments, or different keys can be stored in different layers of the material, thereby increasing the information storage density. This method is conducive to the realization of multiple key storage, for example, in asymmetric encryption scenarios where public and private keys need to be used separately. Each layer of keys needs to be recognized under a specific reconstruction distance, and the distance deviation can cause the reconstruction image to be blurred. Each key corresponds to a specific reconstruction distance, and the optical encryption performance is further improved through the combination of the key and the depth of field.
In addition, due to the angular selectivity of the volume holographic grating, the miniature key and the 3D image need to be observed at a specific angle, that is, when the angle between the reproduced light and the photopolymer surface is 45°. When the angle of the reproduced light deviates, the diffraction efficiency will drop sharply, and the reconstructed image cannot be observed. Because it needs to be illuminated at a specific angle to reconstruct the image, the privacy of the key is improved.

4.3. Reconstruction Quality Evaluation

In this section, we will evaluate the reconstruction quality of the angular-spectrum layer-oriented method. The reconstruction quality of the algorithm is evaluated according to the PSNR and RSME defined in Section 3.2. We perform numerical reconstruction and calculate the error between the reconstructed image of each layer of the object surface and the original amplitude. The average RSME and average PSNR are used to evaluate the quality of the reconstructed image. The virtual 3D model is used as the original image for hologram calculation. The wavelength is 532 nm, the resolution of CGH is 1080 × 1080, and the pixel size is 8 μm.
It can be seen from Figure 14 that as the number of layers increases, the average RSME of the 3D object gradually decreases, and the average PSNR gradually increases. This shows that the larger the number of layers, the higher the quality of the reconstructed image and the smaller the distortion rate, but at the same time the calculation takes longer. Therefore, a compromise can be made between calculation time and reconstruction quality. In this research the number of layers is selected to be 64. At this time, the time to calculate the 3D object hologram is 26.43 s, the average RSME is 6.41, and the average PSNR is 32.66. The simulation results show that the calculation time of the angular-spectrum layer-oriented algorithm is shorter, the image reconstruction quality is higher, and the distortion rate is lower.

5. Conclusions

In this research, we propose a QR code encryption and display method based on photopolymer computer holographic printing. This method can record large-size encrypted QR codes, miniature keys, and miniature 3D images in the photopolymer. The ciphertext is generated using the AES algorithm, and the ciphertext is encoded by the QR code to form an encrypted QR code. Fraunhofer diffraction was performed by the GS algorithm to generate a phase-only hologram of the AES encrypted QR code, then through angular spectrum diffraction to generate the key and the phase-only hologram of the 3D image. For the GS algorithm based on Fraunhofer diffraction, RSME is 0.22 and PSNR is about 61. For the angular-spectrum layer-oriented method, when the number of layers is 64, the average RSME is 6.41, and the average PSNR is 32.66. Both of the two hologram generation algorithms have high image reconstruction quality and lower distortion rate, meeting the requirements of optical encryption. Through computerized holographic printing, encrypted QR codes of large size can be obtained, and the cipher text can be quickly scanned through a mobile phone. The spot diameter of the recorded miniature key and miniature 3D image is about 2.28 mm, which effectively realizes the miniature encryption and improves the information storage density of the key. The miniature key and miniature 3D image have good privacy and can play a good role in preventing peeping. In this study, the combination of encrypted QR code, miniature key and miniature 3D image has enhanced the ability to resist attacks and brute force cracking and improved the performance of optical encryption.

Author Contributions

Conceptualization, T.W., H.W., C.W., J.M. and L.C.; Data curation, T.W.; Funding acquisition, P.S., J.M. and L.C.; Investigation, J.M. and P.S.; Project administration, P.S., J.M. and L.C.; Software, T.W.; Supervision, J.M., P.S. and L.C.; Validation, T.W.; Writing–original draft, T.W.; Writing–review & editing, T.W., H.W., C.W., P.S. and L.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research is supported by Key R&D Project of Hunan Province (2018WK2101), International Collaboration Project of Shenzhen (GJHZ20190821164405428) and partially supported by National Natural Science Foundation of China (61775117).

Data Availability Statement

The data presented in this study are available on request from the corresponding author.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Arief, B.; Adzmi, M.A.B.; Gross, T. Understanding cybercrime from its stakeholders’ perspectives: Part 1—Attackers. IEEE Secur. Priv. 2015, 13, 71–76. [Google Scholar] [CrossRef]
  2. Yan, A.; Lu, C.; Yu, J.; Tang, M.; Dong, J.; Hu, Z.; Zhang, H. Multiple-image encryption based on angular-multiplexing holography with quick response code and spiral phase keys. Appl. Opt. 2019, 58, G6–G10. [Google Scholar] [CrossRef] [PubMed]
  3. Refregier, P.; Javidi, B. Optical image encryption based on input plane and Fourier plane random encoding. Opt. Lett. 1995, 20, 767–769. [Google Scholar] [CrossRef]
  4. Guo, C.; Muniraj, I.; Sheridan, J.T. Phase-retrieval-based attacks on linear-canonical-transform-based DRPE systems. Appl. Opt. 2016, 55, 4720–4728. [Google Scholar] [CrossRef] [PubMed]
  5. Singh, P.; Kumar, R.; Yadav, A.; Singh, K. Security analysis and modified attack algorithms for a nonlinear optical cryptosystem based on DRPE. Opt. Laser Eng. 2021, 139, 106501. [Google Scholar] [CrossRef]
  6. El-Bakary, E.M.; El-Rabaie, E.M.; Zahran, O.; Abd El-Samie, F.E. DRPE encryption with chaotic interleaving for video communication. Wirel. Pers. Commun. 2017, 97, 1373–1384. [Google Scholar] [CrossRef]
  7. Taheri, M.; Mozaffari, S. Phase mask generation for DRPE method using chaos theory and hash function. Optik 2013, 124, 2363–2367. [Google Scholar] [CrossRef]
  8. Elshamy, A.M.; Rashed, A.N.; Mohamed, A.E.A.; Faragalla, O.S.; Mu, Y.; Alshebeili, S.A.; Abd El-Samie, F. Optical image encryption based on chaotic baker map and double random phase encoding. J. Lightwave Technol. 2013, 31, 2533–2539. [Google Scholar] [CrossRef] [Green Version]
  9. Luo, X.; Hu, Y.; Li, X.; Jiang, Y.; Wang, Y.; Dai, P.; Liu, Q.; Shu, Z.; Duan, H. Integrated metasurfaces with microprints and helicity-multiplexed holograms for real-time optical encryption. Adv. Opt. Mater. 2020, 8, 1902020. [Google Scholar] [CrossRef]
  10. Li, J.; Kamin, S.; Zheng, G.; Neubrech, F.; Zhang, S.; Liu, N. Addressable metasurfaces for dynamic holography and optical information encryption. Sci. Adv. 2018, 4, r6768. [Google Scholar] [CrossRef] [Green Version]
  11. Yu, C.; Li, X.; Chen, X.; Li, J. An adaptive and secure holographic image watermarking scheme. Entropy 2019, 21, 460. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  12. Mehra, I.; Nishchal, N.K. Optical asymmetric watermarking using modified wavelet fusion and diffractive imaging. Opt. Laser Eng. 2015, 68, 74–82. [Google Scholar] [CrossRef]
  13. Shapiro, J.H. Computational ghost imaging. Phys. Rev. A 2008, 78, 61802. [Google Scholar] [CrossRef]
  14. Pérez-Cabré, E.; Mohammed, E.; Millán, M.; Saadon, H. Photon-counting multifactor optical encryption and authentication. J. Opt. 2015, 17, 25706. [Google Scholar] [CrossRef]
  15. Larger, L.; Goedgebuer, J.; Delorme, F. Optical encryption system using hyperchaos generated by an optoelectronic wavelength oscillator. Phys. Rev. E 1998, 57, 6618. [Google Scholar] [CrossRef]
  16. Rajput, S.K.; Nishchal, N.K. Image encryption using polarized light encoding and amplitude and phase truncation in the Fresnel domain. Appl. Opt. 2013, 52, 4343–4352. [Google Scholar] [CrossRef] [PubMed]
  17. Rawat, N.; Kim, B.; Muniraj, I.; Situ, G.; Lee, B. Compressive sensing based robust multispectral double-image encryption. Appl. Opt. 2015, 54, 1782–1793. [Google Scholar] [CrossRef]
  18. Verma, G.; Liao, M.; Lu, D.; He, W.; Peng, X.; Sinha, A. An optical asymmetric encryption scheme with biometric keys. Opt. Laser Eng. 2019, 116, 32–40. [Google Scholar] [CrossRef]
  19. Fang, X.; Ren, H.; Gu, M. Orbital angular momentum holography for high-security encryption. Nat. Photonics 2020, 14, 102–108. [Google Scholar] [CrossRef]
  20. Evtikhiev, N.N.; Krasnov, V.V.; Kuzmin, I.D.; Molodtsov, D.Y.; Rodin, V.G.; Starikov, R.S. Optical encryption of digital information in the scheme with spatially incoherent illumination based on micromirror light modulators. Procedia Comput. Sci. 2020, 169, 564–567. [Google Scholar] [CrossRef]
  21. Jeon, H.; Kim, B.; Jun, M.; Kim, H.; Hahn, J. High-resolution binary hologram printing methods. In Proceedings of the Practical Holography XXXIV: Displays, Materials, and Applications, San Francisco, CA, USA, 21 February 2020. [Google Scholar]
  22. Khaliq, H.S.; Akram, M.R.; Riaz, K.; Ansari, M.A.; Akbar, J.; Zhang, J.; Zhu, W.; Zhang, D.; Wang, X.; Zubair, M. Single-layered meta-reflectarray for polarization retention and spin-encrypted phase-encoding. Opt. Express 2021, 29, 3230–3242. [Google Scholar] [CrossRef] [PubMed]
  23. Vilardy, O.J.M.; Perez, R.A.; Torres, M.C.O. Optical image encryption using a nonlinear joint transform correlator and the collins diffraction transform. Photonics 2019, 6, 115. [Google Scholar] [CrossRef] [Green Version]
  24. Kogelnik, H. Coupled wave theory for thick hologram gratings. Bell Syst. Tech. J. 1969, 48, 2909–2947. [Google Scholar] [CrossRef]
  25. Gerchberg, R.W. A practical algorithm for the determination of phase from image and diffraction plane pictures. Optik 1972, 35, 237–246. [Google Scholar]
  26. Goodman, J.W. Introduction to Fourier Optics; Roberts and Company Publishers: Greenwood Village, CO, USA, 2005. [Google Scholar]
  27. Zhao, Y.; Cao, L.; Zhang, H.; Kong, D.; Jin, G. Accurate calculation of computer-generated holograms using angular-spectrum layer-oriented method. Opt. Express 2015, 23, 25440–25449. [Google Scholar] [CrossRef]
  28. Mishra, A.; Mathuria, M. A review on QR code. Int. J. Comput. Appl. 2017, 164, 17–19. [Google Scholar] [CrossRef]
  29. Rijmen, V.; Daemen, J. Advanced encryption standard. In Proceedings of Federal Information Processing Standards Publications; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2001; pp. 19–22. [Google Scholar]
  30. Anderson, R.; Biham, E.; Knudsen, L. Serpent: A proposal for the advanced encryption standard. NIST AES Proposal 1998, 174, 1–23. [Google Scholar]
  31. Bruder, F.; Fäcke, T.; Rölle, T. The chemistry and physics of Bayfol® HX film holographic photopolymer. Polymers 2017, 9, 472. [Google Scholar] [CrossRef] [Green Version]
  32. Ma, J.; Wu, T.; Cui, Y.; Li, J.; Wang, J.; Su, P. Modified monomer diffusion model for volume holographic grating formation in photopolymers. Appl. Opt. 2020, 59, 3952–3958. [Google Scholar] [CrossRef]
Figure 1. Volume holographic grating: (a) angular selectivity; (b) wavelength selectivity.
Figure 1. Volume holographic grating: (a) angular selectivity; (b) wavelength selectivity.
Polymers 13 01358 g001
Figure 2. Flow chart of the GS iterative algorithm based on Fraunhofer diffraction.
Figure 2. Flow chart of the GS iterative algorithm based on Fraunhofer diffraction.
Polymers 13 01358 g002
Figure 3. Computational holographic simulation results of encrypted QR code: (a) Original image, (b) phase-only CGH, (c) Numerical reconstruction.
Figure 3. Computational holographic simulation results of encrypted QR code: (a) Original image, (b) phase-only CGH, (c) Numerical reconstruction.
Polymers 13 01358 g003
Figure 4. Optical setup for off-axis reflective CGH printing.
Figure 4. Optical setup for off-axis reflective CGH printing.
Polymers 13 01358 g004
Figure 5. Experimental results of encrypted QR code photopolymer recording.
Figure 5. Experimental results of encrypted QR code photopolymer recording.
Polymers 13 01358 g005
Figure 6. Numerical simulation reconstruction image: (a) 1 iteration, (b) 10 iterations, (c) 100 iterations.
Figure 6. Numerical simulation reconstruction image: (a) 1 iteration, (b) 10 iterations, (c) 100 iterations.
Polymers 13 01358 g006
Figure 7. Evaluation of reconstruction quality of GS algorithm: (a) RSME, (b) PSNR, (c) Calculating time.
Figure 7. Evaluation of reconstruction quality of GS algorithm: (a) RSME, (b) PSNR, (c) Calculating time.
Polymers 13 01358 g007
Figure 8. Computerized holographic simulation of the key: (a) original image, (b) phase-only hologram, (c) numerical simulation reconstruction image.
Figure 8. Computerized holographic simulation of the key: (a) original image, (b) phase-only hologram, (c) numerical simulation reconstruction image.
Polymers 13 01358 g008
Figure 9. The shooting optical setup of the miniature image.
Figure 9. The shooting optical setup of the miniature image.
Polymers 13 01358 g009
Figure 10. The printed result of the computerized hologram of the miniature key: (a) the actual photopolymer, (b) a miniature key image taken with a camera under the illumination of the reference beam.
Figure 10. The printed result of the computerized hologram of the miniature key: (a) the actual photopolymer, (b) a miniature key image taken with a camera under the illumination of the reference beam.
Polymers 13 01358 g010
Figure 11. Numerical reconstruction of 3D train model: (a) z = 150 mm, (b) 160 mm, (c) 170 mm.
Figure 11. Numerical reconstruction of 3D train model: (a) z = 150 mm, (b) 160 mm, (c) 170 mm.
Polymers 13 01358 g011
Figure 12. Photopolymer reconstruction of the train: (a) z = 200 mm, (b) 210 mm, (c) 220 mm.
Figure 12. Photopolymer reconstruction of the train: (a) z = 200 mm, (b) 210 mm, (c) 220 mm.
Polymers 13 01358 g012
Figure 13. Photopolymer reconstruction “THU”: (a) z = 200 mm, (b) 210 mm, (c) 220 mm.
Figure 13. Photopolymer reconstruction “THU”: (a) z = 200 mm, (b) 210 mm, (c) 220 mm.
Polymers 13 01358 g013
Figure 14. Reconstruction evaluation of the angular-spectrum layer-oriented method: (a) The relationship between the number of layers, average RSME and average PSNR, (b) The relationship between the number of layers and calculation time.
Figure 14. Reconstruction evaluation of the angular-spectrum layer-oriented method: (a) The relationship between the number of layers, average RSME and average PSNR, (b) The relationship between the number of layers and calculation time.
Polymers 13 01358 g014
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Wu, T.; Ma, J.; Wang, C.; Wang, H.; Cao, L.; Su, P. Optical Encryption Based on Computer Generated Holograms in Photopolymer. Polymers 2021, 13, 1358. https://doi.org/10.3390/polym13091358

AMA Style

Wu T, Ma J, Wang C, Wang H, Cao L, Su P. Optical Encryption Based on Computer Generated Holograms in Photopolymer. Polymers. 2021; 13(9):1358. https://doi.org/10.3390/polym13091358

Chicago/Turabian Style

Wu, Taihui, Jianshe Ma, Chengchen Wang, Haibei Wang, Liangcai Cao, and Ping Su. 2021. "Optical Encryption Based on Computer Generated Holograms in Photopolymer" Polymers 13, no. 9: 1358. https://doi.org/10.3390/polym13091358

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop