Claims
- 1. A method of encryption and decryption comprising the steps of:
encrypting original information to generate encrypted information; binarizing at least a part of said encrypted information to generate binarized encrypted information; and decrypting said binarized encrypted information to provided decrypted information indicative of said original information.
- 2. The method of claim 1 wherein said binarizing at least said part of said encrypted information comprises binarizing at least one of a real part and an imaginary part of said encrypted information.
- 3. The method of claim 1 wherein said binarizing at least said part of said encrypted information comprises binarizing a phase part of said encrypted information
- 4. The method of claim 1 wherein:
said encrypting said original information comprises,
(1) multiplying said original information by a first key to generate a first product of said original information and said first key in a first domain, (2) transforming said first product from said first domain into a second domain to generate a first transformed product in said second domain, (3) multiplying said first transformed product by a second key in said second domain to generate a second product, (4) transforming said second product from said second domain to a third domain to generate encrypted information; and said decrypting said binarized encrypted information comprises,
(1) transforming said binarized encrypted information from said third domain to a fourth domain to generate a transformed encrypted information, (2) multiplying said transformed encrypted information by a third key in said fourth domain to generate a third product, said third key being a conjugate of said second key wherein said second key is removed from said encrypted information, (3) transforming said third product from said fourth domain to a fifth domain to generate a second transformed product in said fifth domain, and (4) removing said first key from said second transformed product to provided said decrypted information.
- 5. The method of claim 1 wherein said original information comprises an optical image, a digitized image, one dimensional data, two dimensional data, multi-dimensional data, an electrical signal or an optical signal.
- 6. The method of claim 4 wherein:
said encrypting said original information further comprises phase encoding said original information prior to said step (1) of said step of encrypting; and said decrypting said binarized encrypted information further comprises removing said phase encoding from said encrypted information to provided said decrypted information.
- 7. The method of claim 4 wherein said removing said first key comprises:
multiplying said second transformed product by a fourth key in said fifth domain to generate said decrypted information, said fourth key being a conjugate of said first key wherein said first key is removed from said encrypted information.
- 8. The method of claim 4 wherein said removing said first key comprises:
removing said first key with an intensity sensitive device.
- 9. The method of claim 4 wherein said transforming steps each comprise Fourier or Fresnel transforming.
- 10. The method of claim 4 wherein said first and second keys each comprise a random phase function.
- 11. The method of claim 4 wherein said first and second keys each comprise a complex amplitude and phase function.
- 12. The method of claim 10 wherein said random phase functions comprise generally uniformly distributed white sequences, random distributions, statistical distributions or unknown distributions.
- 13. The method of claim 4 wherein said first and second functions each comprise a one dimensional function.
- 14. The method of claim 4 wherein said first and second functions each comprise a two dimensional function.
- 15. The method of claim 4 wherein said first, third and fifth domains are a space domain and said second and fourth domains are a Fourier domain or a Fresnel domain.
- 16. The method of claim 5 wherein said optical image, digitized image, one dimensional data, two dimensional data, multi-dimensional data, electrical signal or optical signal comprises a plurality thereof.
- 17. The method of claim 2 wherein said binarized encrypted information is expressed as
- 18. The method of claim 3 wherein said binarized encrypted information expressed as
- 19. The method of claim 2 wherein said binarized encrypted information is expressed as
- 20. The method of claim 3 wherein said binarized encrypted information expressed as
- 21. The method of claim 1 wherein:
said encrypting said original information comprises,
(1) transforming said original information from a first domain into a second domain to generate a transformed original information in said second domain, (2) multiplying said transformed original information by a first key in said second domain to generate a first product, (3) transforming said first product from said second domain to a third domain to generate said encrypted information; and said decrypting said binarized encrypted information comprises,
(1) transforming said binarized encrypted information from said third domain to a fourth domain to generate a transformed encrypted information, (2) multiplying said transformed encrypted information by a second key in said fourth domain to generate a second product, said second key being a conjugate of said first key wherein said first key is removed from said encrypted information, and (3) transforming said second product from said fourth domain to a fifth domain to provided said decrypted information.
- 22. The method of claim 21 wherein said first, third and fifth domains are a space domain and said second and fourth domains are a Fourier domain or a Fresnel domain.
- 23. The method of claim 1 wherein:
said encrypting said original information comprises,
(1) jointly transforming said original information and a first key to generate a first joint power spectrum thereof, (2) transforming said first joint power spectrum to generate said encrypted information which is indicative of a correlation between said original information and said first key; and said decrypting said binarized encrypted information comprises,
(1) jointly transforming said binarized encrypted information and a second key to generate a second joint power spectrum, said second key being a conjugate of said first key, and (2) transforming said second joint power spectrum to provide said decrypted information indicative of a correlation between said encrypted information and said second key.
- 24. The method of claim 1 wherein:
said encrypting said original information comprises,
(1) multiplying said original information by a fist key to generate a first product of said original information and said first key, (2) jointly transforming said first product and a second key to generate a first joint power spectrum thereof, and (3) transforming said first joint power spectrum to generate said encrypted information which is indicative of a correlation between said first product and said second key; and said decrypting said binarized encrypted information comprises,
(1) jointly transforming said binarized encrypted information and a third key to generate a second joint power spectrum, said second key being a conjugate of said second key, (2) transforming said second joint power spectrum to provide a transformed product indicative of a correlation between said encrypted information and said third key, and (3) multiplying said transformed product by a fourth key to generate said decrypted information, said fourth key being a conjugate of said first key wherein said first key is removed from said encrypted information.
- 25. A method of encryption and decryption comprising the steps of:
encrypting original information to generate encrypted information; and decrypting using only a phase part of said encrypted information to provide decrypted information indicative of said original information.
- 26. The method of claim 25 wherein:
said encrypting said original information comprises,
(1) multiplying said original information by a first key to generate a first product of said original information and said first key in a first domain, (2) transforming said first product from said first domain into a second domain to generate a first transformed product in said second domain, (3) multiplying said first transformed product by a second key in said second domain to generate a second product, (4) transforming said second product from said second domain to a third domain to generate encrypted information; and said decrypting said phase part of said encrypted information comprises,
(1) transforming said phase part of said encrypted information from said third domain to a fourth domain to generate a transformed encrypted information, (2) multiplying said transformed encrypted information by a third key in said fourth domain to generate a third product, said third key being a conjugate of said second key wherein said second key is removed from said encrypted information, (3) transforming said third product from said fourth domain to a fifth domain to generate a second transformed product in said fifth domain, and (4) removing said first key from said second transformed product to provide said decrypted information.
- 27. The method of claim 25 wherein said original information comprises an optical image, a digitized image, one dimensional data, two dimensional data, multi dimensional data, an electrical signal or an optical signal.
- 28. The method of claim 26 wherein:
said encrypting said original information further comprises phase encoding said original information prior to said step (1) of said step of encrypting; and said decrypting said phase part of said encrypted information further comprises removing said phase encoding from said encrypted information to provide said decrypted information.
- 29. The method of claim 26 wherein said removing said first key comprises:
multiplying said second transformed product by a fourth key in said fifth domain to generate said decrypted information, said fourth key being a conjugate of said first key wherein said first key is removed from said encrypted information.
- 30. The method of claim 26 wherein said removing said first key comprises:
removing said first key with an intensity sensitive device.
- 31. The method of claim 26 wherein said transforming steps each comprise Fourier or Fresnel transforming.
- 32. The method of claim 26 wherein said first and second keys each comprise a random phase function.
- 33. The method of claim 32 wherein said random phase functions comprise generally uniformly distributed white sequences, random distributions, statistical distributions or unknown distributions.
- 34. The method of claim 26 wherein said first and second functions each comprise a one dimensional function.
- 35. The method of claim 26 wherein said first and second functions each comprise a two dimensional function.
- 36. The method of claim 26 wherein said first, third and fifth domains are space domain and said second and fourth domains are a Fourier domain or a Fresnel domain.
- 37. The method of claim 27 wherein said optical image, digitized image, one dimensional data, two dimensional data, multi dimensional data, electrical signal or optical signal comprises a plurality thereof.
- 38. The method of claim 25 wherein:
said encrypting said original information comprises,
(1) transforming said original information from a first domain into a second domain to generate a transformed original information in said second domain, (2) multiplying said transformed original information by a first key in said second domain to generate a first product, (3) transforming said first product from said second domain to a third domain to generate said encrypted information; and said decrypting said phase part of said encryted information comprises,
(1) transforming said phase part of said encrypted information from said third domain to a fourth domain to generate a transformed encrypted information, (2) multiplying said transformed encrypted information by a second key in said fourth domain to generate a second product, said second key being a conjugate of said first key wherein said first key is removed from said encrypted information, and (3) transforming said second product from said fourth domain to a fifth domain to provide said decrypted information.
- 39. The method of claim 38 wherein said first, third and fifth domains are a space domain and said second and fourth domains are a Fourier domain or a Fresnel domain.
- 40. The method of claim 25 wherein:
said encrypting said original information comprises,
(1) jointly transforming said original information and a first key to generate a first joint power spectrum thereof, and (2) transforming said first joint power spectrum to generate said encrypted information which is indicative of a correlation between said original information and said first key; and said decrypting said phase part of said encrypted information comprises,
(1) jointly transforming said phase part of said encrypted information and a second key to generate a second joint power spectrum, said second key being a conjugate of said first key, and (2) transforming said second joint power spectrum to provide said decrypted information indicative of a correlation between said encrypted information and said second key.
- 41. The method of claim 25 wherein:
said encrypting said original information comprises,
(1) multiplying said original information by a fist key to generate a first product of said original information and said first key, (2) jointly transforming said first product and a second key to generate a first joint power spectrum thereof, and (3) transforming said first joint power spectrum to generate said encrypted information which is indicative of a correlation between said first product and said second key; and said decrypting said phase part of said encrypted information comprises,
(1) jointly transforming said phase part of said encrypted information and a third key to generate a second joint power spectrum, said second key being a conjugate of said second key, (2) transforming said second joint power spectrum to provide a transformed product indicative of a correlation between said encrypted information and said third key, and (3) multiplying said transformed product by a fourth key to generate said decrypted information, said fourth key being a conjugate of said first key wherein said first key is removed from said encrypted information.
- 42. The method of claim 38 wherein:
said encrypting said original information further comprises phase encoding said original information prior to said step (1) of said step of encrypting; and said decrypting said phase part of said encrypted information further comprises removing said phase encoding from said encrypted information to provide said decrypted information.
CROSS REFERENCE TO RELATED APPLICATIONS
[0001] This application claims the benefit of U.S. Provisional Application Serial No. 60/078,254 filed Mar. 17, 1998.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60078254 |
Mar 1998 |
US |
Divisions (1)
|
Number |
Date |
Country |
| Parent |
09240541 |
Jan 1999 |
US |
| Child |
10318841 |
Dec 2002 |
US |