|

One-dimentional statistical characteristics of binary random phase mask in the far-field diffraction pattern

Authors: Kolesnikov M.V., Trofimov N.E. Published: 12.10.2015
Published in issue: #5(104)/2015  
DOI: 10.18698/0236-3933-2015-5-97-108

 
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security  
Keywords: binary random phase masks, optical Fourier transform, probability density, complex amplitude, random field

The article describes some features of the far-field diffraction pattern from a binary random phase mask as an element of the optical information processing systems. Analytical expressions for one-dimensional probability density distributions of the amplitude, phase, and intensity are defined. The nonuniform character of these random distributions is shown. Both intensity expectation and variance dependences on the coordinates are obtained. Numerical simulation results are consistent with the obtained expressions. The expressions can be used for quality rating assessment of the optical methods for encryption and information hiding.

References

[1] Chen W., Javidi B., Chen X. Advances in optical security systems. Advances in Optics and Photonics, 2014, vol. 6, pp. 120-155.

[2] Liu S., Guo C., Sheridan J.T. A review of optical image encryption techniques. Optics & Laser Technology, 2014, vol. 57, pp. 327-342.

[3] Odinokov S.B., Sagatelyan G.R. Technology of Manufacturing of Diffraction and Hologram Optical Parts with Functional Microrelief of Surface by Method of Plasmochemical Etching. Vestn. Mosk. Gos. Tekh. Univ. im. N.E. Baumana, Priborostr. [Herald of the Bauman Moscow State Tech. Univ., Instrum. Eng.], 2010, no. 2 (79), pp. 92-104 (in Russ.).

[4] Ezhov P.V., Il’in O.A., Smirnova T.N., Tikhonov E.A. Binary Phase Masks on Self-Developing Photopolymers: The Technique of Forming and Testing in the Optical Correlator. Kvant. elektronika [Quantum Electronics], 2003, no. 33 (6), pp. 559-562 (in Russ.).

[5] Cayre F., Fontaine C., Furon T. Watermarking Security: theory and practice. IEEE Transactions on signal processing, 2005, vol. 53 (10).

[6] Furon T. A survey of watermarking security. Proc. of Int. Work. on Digital Watermarking. Vol. 3710 of Lecture Notes on Computer Science. Springer-Verlag, 2005, pp. 201-215.

[7] Zollner J., Federrath H., Klimant H. et al. Modeling the security of steganographic systems. In Information Hiding, 2nd International Workshop. Springer-Verlag, 1998, pp. 344-354.

[8] Wang Y., Moulin P. Perfectly secure steganography: capacity, error exponents, and code constructions. Computing Research Repository, 2007. URL: http://arxiv.org/abs/cs/0702161 (accessed: 15.10.2014).

[9] Gudmen D., Kosurova G.I. Vvedenie v fur’e-optiku [Introduction to Fourier Optics]. Moscow, Mir Publ., 1970. 364 p.

[10] Rao K.R. Lineynye statisticheskie metody i ikh primenenie [Linear Statistical Methods and Their Application]. Moscow, Nauka Publ., 1968. 547 p.

[11] Levin B.R. Teoreticheskie osnovy statisticheskoy radiotekhniki [Statistical Communication Theory]. Moscow, Radio i svyaz’ Publ., 1969. 656 p.

[12] Zey C. NIST/SEMATECH e-Handbook of Statistical Methods. 2012. URL: http://www.itl.nist.gov/div898/handbook (accessed: 15.10.2014).