Next Article in Journal
Design and Fabrication of a Flexible Gravimetric Sensor Based on a Thin-Film Bulk Acoustic Wave Resonator
Next Article in Special Issue
Spectral Analysis Methods for Improved Resolution and Sensitivity: Enhancing SPR and LSPR Optical Fiber Sensing
Previous Article in Journal
Effectiveness of the Relative Strength Index Signals in Timing the Cryptocurrency Market
Previous Article in Special Issue
Double Image Encryption System Using a Nonlinear Joint Transform Correlator in the Fourier Domain
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Convolution, Correlation and Generalized Shift Operations Based on the Fresnel Transform

1
Grupo de Investigación en Física del Estado Sólido (GIFES), Faculty of Basic and Applied Sciences, Universidad de La Guajira, Riohacha 440007, Colombia
2
Grupo de Investigación en Física del Estado Sólido (GIFES), Faculty of Engineering, Universidad de La Guajira, Riohacha 440007, Colombia
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(3), 1663; https://doi.org/10.3390/s23031663
Submission received: 25 November 2022 / Revised: 26 January 2023 / Accepted: 30 January 2023 / Published: 2 February 2023

Abstract

:
The Fresnel transform (FrT) is commonly used to describe the free-space propagation of optical waves. In this work, we present new definitions for the convolution, correlation and generalized shift operations based on the FrT. The generalized shift operation is defined by using simultaneous space and phase shifts. The generalized shift operation is useful for centred optical systems in the Fresnel domain (FrD) when the data distributions at the input plane of the optical system are shifted. The new convolution and correlation operations defined in terms of the FrT, the wavelength and the propagation distance, can be considered as a generalization of the usual convolution and correlation operations. The sampling theorem for distributions, whose resulting FrT has finite support, is formulated by using the new convolution operation introduced in this work and a new definition of the Dirac comb function. These new definitions and results could be applied to describe, design and implement optical processing systems related to the FrT. Finally, we present a centred optical systems used in holography and optical security systems that can be described or modelled by the new definitions of the operations proposed in this paper.

1. Introduction

The Fresnel approximation of the general scalar diffraction theory is a reduction of the Huygens–Fresnel principle that explains the free-space propagation of optical waves [1]. This Fresnel approximation is known as the Fresnel diffraction or Fresnel transform (FrT). The FrT and the operations of shift, modulation, convolution and correlation have been commonly used in several optical information processing systems, such as holographic systems, optical wavefront modulation, image processing and optical communications systems, among others [1,2,3,4,5,6,7,8]. The operations of shift, convolution and correlation have been proposed in the Gyrator domain [9] and the fractional Fourier domain [10,11] with the purpose of developing several information processing applications based on the Gyrator transform and the fractional Fourier transform, respectively. These applications are the sampling theorem, filtering, interpolation, encryption, decryption, authentication and pattern recognition, among others.
In this work, we introduce new definitions for the generalized shift, convolution and correlation operations based on the FrT. The generalized shift operation is a shift and a modulation by a pure linear phase of a given function, and the FrT of this generalized shift allows us to obtain a function in the Fresnel domain (FrD) without shift. The proposed definitions for the convolution and correlation operations at the spatial domain are explicit integral expressions that depend on the parameter λ and z, which are the wavelength of illumination and the distance propagation of the FrT, respectively. These integral expressions at the spatial domain can be considered as generalizations of the usual convolution and correlation operations. The new convolution and correlation operations in the FrD are performed by the product of two FrTs and a quadratic phase term. We develop and present two applications based on the new operations in the FrD. The first application is the sampling theorem for functions whose resulting FrTs have finite support, and the second application is the proposal of a modified version of the double random phase encoding (DRPE) in the FrD with an improvement to security over the encrypted distribution [12].
The paper is organized as follows: In Section 2, the definition and properties of the FrT are presented. In Section 3, the new operations based on the FrT are defined. Two applications of the new operations based on the FrT are developed in Section 4. The results presented and discussed in this work are summarized in Section 5 in the conclusions.

2. Fresnel Transform (FrT) and Properties

The Fresnel transform (FrT) corresponds to the free-space propagation of an object f ( x ) when it is illuminated by a plane wave of wavelength λ for a propagation distance z. Therefore, the FrT is defined by [1]
f z ( u ) = FrT λ , z { f ( x ) } = + f ( x ) h λ , z ( u , x ) d x ,
and the kernel h λ , z ( u , x ) of the FrT is
h λ , z ( u , x ) = M λ , z exp i π λ z ( u x ) 2 , and M λ , z = 1 i λ z exp i 2 π z λ ,
where x and u denote the coordinates at the spatial domain and the Fresnel domain (FrD), respectively, and M λ , z is a constant term for a given wavelength λ and a distance of propagation z. The expression FrT λ , z represents the FrT for parameters λ and z. The inverse FrT corresponds to the FrT for parameters λ and z . The main properties of the FrT, which are fundamental to the following sections, are
FrT λ , z 1 { FrT λ , z 2 [ f ( x ) ] } = FrT λ , z 1 + z 2 { f ( x ) } ,
FrT λ , z f ( x x 0 ) = f z ( u x 0 ) ,
FrT λ , z exp i 2 π v 0 x λ z f ( x ) = exp i π λ z 2 v 0 u v 0 2 f z ( u v 0 ) ,
where x 0 and v 0 are real constants. Equation (3) shows that the FrT is additive with respect to the parameter z. When a shift x 0 is introduced at the spatial domain for the object f ( x ) , the result of its FrT is also shifted in the FrD by the same amount of shift x 0 given by Equation (4). Finally, Equation (5) shows that the FrT of an object f ( x ) modulated by a pure linear phase term produces a shift and a modulation by another pure linear phase at the FrD. If we combine Equations (4) and (5) and define v 0 = x 0 , the following important property of the FrT is obtained [3,4,5]:
FrT λ , z exp i 2 π x 0 x λ z f ( x x 0 ) = exp i π λ z 2 x 0 u + x 0 2 f z ( u ) .

3. New Processing Operations Based on the FrT

3.1. Generalized Shift Operation

We use the result of Equation (6) in order to propose a new generalized shift operation given by a shift and a modulation by a pure linear phase for an object f ( x ) . This new generalized shift operation with parameters x 0 , λ and z is proposed as:
GS x 0 ; λ , z f ( x ) = exp i 2 π x 0 λ z x x 0 2 f ( x x 0 ) .
The generalized shift operation is additive with respect to the parameter x 0 , as follows GS x 1 ; λ , z GS x 2 ; λ , z = GS x 1 + x 2 ; λ , z . The generalized shift operation becomes the usual shift operation GS x 0 ; λ , z f ( x ) = f ( x x 0 ) when the parameter z is too large or tends to infinity. The FrT for parameters λ and z of the new generalized shift operation is computed by using the result of Equation (6):
FrT λ , z GS x 0 ; λ , z f ( x ) = exp i 2 π x 0 u λ z f z ( u ) .
The resulting FrT for the new generalized shift operation does not introduce a shift in the FrD. The right combination of Equations (4) and (5), which is represented by the proposed definition of our new generalized shift operation, can be used in the center of the output of optical systems that have a shifted input plane, and the optical waves propagation of these systems is described by the FrT.

3.2. Convolution Operation

The usual convolution of two functions f ( x ) and h ( x ) under the Fourier transform (FT) is computed in the Fourier domain (FD) by using the product of the FTs of these functions f ( x ) and h ( x ) . In order to define a new convolution operation with a similar property under the FrT, we propose the following integral convolution operation for parameters λ and z:
f ( x ) λ , z h ( x ) = M λ , z + f ( x ) h ( x x ) exp i 2 π x λ z ( x x ) d x .
The computation of the new convolution operation in the FrD for the parameters λ and z is:
FrT λ , z f ( x ) λ , z h ( x ) = f z ( u ) h z ( u ) exp i π u 2 λ z ,
where f z ( u ) = FrT λ , z { f ( x ) } and h z ( u ) = FrT λ , z { h ( x ) } . Therefore, the new convolution operation can be computed using the product of the FrTs of the functions f ( x ) and h ( x ) and a quadratic phase term. If the parameter z is too large or tends to infinity, the FrD in the Fraunhofer domain and Equation (9) is reduced to the usual convolution, f ( x ) λ , z h ( x ) = f ( x ) h ( x ) . The result of the new convolution operation between a function f ( x ) and a shifted Dirac delta function δ ( x x 0 ) is given by:
f ( x ) λ , z δ ( x x 0 ) = M λ , z exp i 2 π x 0 λ z ( x x 0 ) f ( x x 0 ) ,
the result of the previous equation allows us to express the new generalized shift operation presented in Section 3.1 as follows:
GS x 0 ; λ , z f ( x ) = 1 M λ , z f ( x ) λ , z δ ( x x 0 ) exp i π x 0 2 λ z .
The new convolution operation based on the FrT is invariant to the new generalized shift operation:
GS x 0 ; λ , z f ( x ) λ , z h ( x ) = GS x 0 ; λ , z f ( x ) λ , z h ( x ) = f ( x ) λ , z GS x 0 ; λ , z h ( x ) .

3.3. Correlation Operation

Our motivation to define a new correlation operation is very similar to the purpose described in the first paragraph of the previous subsection. Therefore, we define a new correlation operation for parameters λ and z by using the following integral expression:
f ( x ) λ , z h ( x ) = M λ , z + f ( x ) h ( x x ) exp i 2 π x λ z ( x x ) d x ,
where the superscript denotes the complex conjugation operation. This new correlation operation in the FrD for the parameters λ and z is represented by:
FrT λ , z f ( x ) λ , z h ( x ) = f z ( u ) h z ( u ) exp i π u 2 λ z ,
where f z ( u ) = FrT λ , z { f ( x ) } and h z ( u ) = FrT λ , z { h ( x ) } . The new correlation operation is computed using the product of the FrTs f z ( u ) and the complex conjugate of h z ( u ) and a quadratic phase term. If the parameter z is too large or tends to infinity, the new correlation operation given by Equation (14) is reduced to the usual correlation, f ( x ) λ , z h ( x ) = f ( x ) h ( x ) . The new correlation operation based on the FrT is also invariant to the new generalized shift operation:
GS x 0 ; λ , z f ( x ) λ , z h ( x ) = GS x 0 ; λ , z f ( x ) λ , z h ( x ) = f ( x ) λ , z GS x 0 ; λ , z h ( x ) .
The results of the new definitions for convolution and correlation based on the FrT depend on the information contained in the FrTs of the functions f ( x ) and h ( x ) , along with a modulation by a pure quadratic phase term, such as that which is shown in Equations (10) and (15). The differences between the results of the new convolution and correlation operations based on the FrT and the usual convolution and correlation operations based on the FT are related to the differences between the near-field optics described by the FrT and the far-field optics described by the FT [1].

4. Applications of the New Processing Operations Based on the FrT

4.1. Sampling Theorem Based on the FrT

We obtain the sampling theorem by using the FrT and the new processing operations described in the previous section. The sampling theorem is very important for the modern optical implementation of information processing systems that are composed of cameras, spatial light modulators and other optical and optoelectronic devices. The correct sampling at the spatial domain and in the FrD is a critical aspect for the information processing systems based on the free-space optical propagation because the characteristics of optical waves propagation can be preserved or modified when these samplings are defined correctly or incorrectly, respectively.
In order to simplify the mathematical process of obtaining the sampling theorem based on the FrT, we introduce a new Dirac comb function for parameters λ , z and period T, which is given by:
c o m b λ , z x T = T n = exp i π ( n T ) 2 λ z δ ( x n T ) .
The FrT for the parameters λ and z in the previous equation is:
FrT λ , z c o m b λ , z x T = M λ , z T c o m b λ , z u λ z / T .
The previous equation shows that the FrT for parameters λ and z of the proposed Dirac comb function for parameters λ , z and period T corresponds to the other Dirac comb function for parameters λ , z and period λ z / T . We describe the sampling theorem based on the FrT for a function f ( x ) whose FrT f z ( u ) for parameters λ and z has finite support [ u 0 / 2 , u 0 / 2 ] for coordinate u at the FrD. The following expression S ( u ) denotes the shifted replicas of f z ( u ) :
S ( u ) = f z ( u ) λ , z c o m b λ , z u u 0 = M λ , z u 0 n = f z ( u n u 0 ) exp i 2 π n u 0 u λ z exp i π ( n u 0 ) 2 λ z .
The FrT for parameters λ and z of Equation (19) is:
S ( x ) = FrT λ , z S ( u ) = 1 M λ , z n = f n λ z u 0 δ x n λ z u 0 .
The function S ( x ) of the previous equation represents a sampled version of f ( x ) with a sampling period that is defined by λ z / u 0 . The new convolution operation of Section 3.2 for parameters λ and z is utilized to perform the filtering of the function S ( x ) using a low-pass filter in the FrD. This filtering allows us to reconstruct f ( x ) from S ( x ) , as follows:
f ( x ) = S ( x ) λ , z FrT λ , z 1 u 0 r e c t u u 0 exp i π u 2 λ z = M λ , z exp i π x 2 λ z n = exp i π ( n T x ) 2 λ z f ( n T x ) sin π x n T x / T x π x n T x / T x ,
where T x λ z / u 0 in order to avoid aliasing for the reconstruction of f ( x ) , and the low-pass filter in the FrD is performed with a rectangle function whose support over the coordinate u is u 0 , which corresponds to the finite support of the FrT f z ( u ) . This last equation denotes the sampling theorem based on the FrT, and this reconstruction equation of f ( x ) allows us to obtain the values of f ( x ) for every x from the sampled version of f ( x ) when the sampling period is T x λ z / u 0 .

4.2. The Double Random Phase Encoding (DRPE) in the FrD

Double random phase encoding (DRPE) is a very important technique used to encrypt images with a high level of security by using an optical system [6,7,8]. DRPE uses two random phase masks (RPMs) to convert (encrypt) an original image into a noisy image (encrypted image). Initially, the DRPE was implemented in the FD using a holographic 4f-processor [1]. Later, the optical DRPE was extended from the FD to the FrD [12], the fractional Fourier domain [13] and the Collins domain [14] in order to improve the security of the encryption system. The DRPE can also be optically implemented with a nonlinear joint transform correlator (JTC) architecture in different optical processing domains (such as FD and FrD) with the purpose of increasing the quality of the decrypted image and obtaining better security over the encrypted image and practical setups with no hard alignment requirements [3,4,5,15,16,17,18,19,20].
In this section, we propose a modified version of the DRPE using the new processing operations based on FrT. This modified version of the DRPE in the FrD introduces new security keys that are given by the parameters of shift and distance of the proposed generalized shift operation in order to increase the security of the encrypted image. The original image to encrypt is a real-valued grayscale image f ( x ) with values in the interval [0, 1]. We use two RPMs for the encryption-decryption system, which are given by:
r ( x ) = exp { i 2 π m ( x ) } , h z 1 ( u ) = exp { i 2 π n ( u ) } ,
where x and u are the coordinates in the spatial domain and the FrD, respectively, and m ( x ) and n ( u ) are normalized positive functions that are randomly generated, statistically independent and uniformly distributed in the interval [0, 1] [6,15,16].
We define the encrypted image by using the original image f ( x ) that is encoded in amplitude, the two RPMs r ( x ) and h z 1 ( u ) , and the proposed generalized shift and convolution operations. The first step of the encryption system is:
s z 1 ( u ) = FrT λ , z 1 GS x 1 ; λ , z 1 f ( x ) r ( x ) λ , z 1 GS x 2 ; λ , z 1 h ( x ) = exp i 2 π x 1 u λ z 1 p z 1 ( u ) exp i 2 π x 2 u λ z 1 h z 1 ( u ) exp i π u 2 λ z 1 ,
where p z 1 ( u ) = FrT λ , z 1 { f ( x ) r ( x ) } and h z 1 ( u ) = FrT λ , z 1 { h ( x ) } . In this first step of the encryption process, the original image to needs to be encrypted f ( x ) is encoded in the amplitude and multiplied by the RPM r ( x ) on the input plane of the encryption system. Then, this product of f ( x ) r ( x ) is shifted to x 1 and modulated by a pure linear phase term by means of the generalized shift operation GS x 1 ; λ , z 1 . We perform the convolution for parameters λ and z 1 in the first FrD for the parameters λ and z 1 between the shifted and modulated product f ( x ) r ( x ) and the distribution h ( x ) , which is shifted to x 2 and modulated by another pure linear phase. This convolution in the first FrD for the parameters λ and z 1 is computed by the product between the Fresnel propagation (FrT) of the distribution GS x 1 ; λ , z 1 [ f ( x ) r ( x ) ] at distance z 1 when this distribution is illuminated with a plane wave of wavelength λ , and the distribution given by the multiplication of the RPM h z 1 ( u ) , a pure linear phase term and a quadratic phase term. The data distribution GS x 1 ; λ , z 1 [ f ( x ) r ( x ) ] is placed on the input plane of the encryption system, and its FrT plane, which is the first FrD for the parameters λ and z 1 , is located at distance z 1 with respect to the input plane of the system.
Equation (23) allows us to place two data distributions centred at different locations on the input plane of the encryption system by using the generalized shift operation; this feature is not possible for the proper working of the DRPE in the FrD presented in [12]. The application of this generalized shift operations on the input plane of the encryption system allow us to ensure the complete overlapping of the data distributions p z 1 ( u ) and h z 1 ( u ) in the FrD for the parameters λ and z 1 . This feature is very important to implement the DRPE technique because the encrypted image will be a noisy image when this feature is fulfilled [3,6,7,8,12,15,16,17,18]. Therefore, the correct implementation of the DRPE in the FrD is achieved due to proposed generalized shift and convolution operations based on the FrT. The proposed new processing operations based on the FrT can be used to describe and analyse the nonlinear encryption systems based on a JTC in the FrD in a compact form [3,19,20].
The second step of the encryption system is to perform the FrT for parameters λ and z 2 over the data distribution s z 1 ( u ) :
E z 2 ( x ) = FrT λ , z 2 s z 1 ( u ) .
The previous equation represents a Fresnel propagation (FrT) of the distribution s z 1 ( u ) from the first FrD for parameters λ and z 1 to the distance z 2 with the same wavelength λ . The resulting data distribution of Equation (24) is located in the second FrD for parameters λ and z 2 . Finally, the encrypted image is defined by:
E ˜ z 2 ( x ) = GS x 3 ; λ , z 3 E z 2 ( x ) = exp i 2 π x 3 λ z 3 x x 3 2 E z 2 ( x x 3 ) .
The encrypted image E ˜ z 2 ( x ) is defined in the second FrD for parameters λ and z 2 , and it corresponds to image E z 2 ( x ) that is shifted to x 3 and modulated by a pure linear phase term. The six security keys of the encryption system are given by the RPM h z 1 ( u ) , the wavelength λ and the distances z 1 , z 2 , z 3 and x 3 . The security keys for the encryption system of this subsection, apart from the RPM key, are added because we used the new processing operations based on the FrT. The proposed encryption system introduces two new security keys given by the distances z 3 and x 3 with respect to the previous DRPE in the FrD [12]. When the shifts x 1 , x 2 and x 3 are equal to zero, the proposed encryption of this paper is very similar to the DRPE in the FrD presented in [12]. Figure 1 shows the optical encryption scheme based on the FrT and the new processing operations proposed in this work.
The correct output of the decryption system, which is the correct decrypted image, is obtained from the encrypted image E ˜ z 2 ( x ) and the six security key RPMs ( h z 1 ( u ) , λ , z 1 , z 2 , z 3 and x 3 ). The first step of the decryption system is to apply the generalized shift operation with parameters x ^ 3 , λ ^ and z ^ 3 to the encrypted image E ˜ z 2 ( x )
E ^ z 2 ( x ) = GS x ^ 3 ; λ ^ , z ^ 3 E ˜ z 2 ( x ) = exp i 2 π x ^ 3 λ ^ z ^ 3 x x ^ 3 2 E ˜ z 2 ( x x ^ 3 ) = exp i 2 π x ^ 3 λ ^ z ^ 3 x x ^ 3 2 exp i 2 π x 3 λ z 3 x x ^ 3 x 3 2 E z 2 ( x x 3 x ^ 3 ) = exp i 2 π λ ^ z ^ 3 1 a a x 3 2 exp i 2 π x 5 λ ^ z ^ 3 x x 5 2 E z 2 ( x x 6 ) ,
where a = ( λ ^ z ^ 3 ) / ( λ z 3 ) , x 5 = x ^ 3 + a x 3 and x 6 = x ^ 3 + x 3 . In order to retrieve the data distribution E z 2 ( x ) of Equation (24) without performing shift and modulation by using a pure linear phase term from E ^ z 2 ( x ) , the correct three security keys used in the first step of decryption system have to be set exactly as x ^ 3 = x 3 , λ ^ = λ and z ^ 3 = z 3 . The second step of the decryption system is to apply the FrT for parameters λ ^ and z ^ 2 to the data distribution E ^ z 2 ( x )
s ^ z ^ 1 ( u ) = FrT λ ^ , z ^ 2 E ^ z 2 ( x ) .
In this second step of the decryption system, we use two security keys that are given by λ ^ and z ^ 2 . If the following security keys are set by x ^ 3 x 3 , λ ^ λ , z ^ 3 z 3 and z ^ 2 z 2 , the result of Equation (27) that is given by s ^ z ^ 1 ( u ) would be very different to the s z 1 ( u ) of Equation (23), and thus, the decryption process will be unsuccessful because the decrypted image will have a noisy distribution. For the case when x ^ 3 x 3 , λ ^ = λ , z ^ 3 z 3 and z ^ 2 = z 2 , the result of Equation (27) is:
s ^ z ^ 1 ( u ) = FrT λ , z 2 E ^ z 2 ( x ) = K exp i 2 π λ z ^ 3 x ^ 3 + z ^ 3 z 3 x 3 u s z 1 u 1 + z 2 z ^ 3 x ^ 3 1 + z 2 z 3 x 3 ,
where K is a complex-valued constant. The result of Equation (28) is a shifted and modulated version of the data distribution s z 1 ( u ) , which is defined in Equation (23). Now, if x ^ 3 = x 3 , λ ^ = λ , z ^ 3 = z 3 and z ^ 2 = z 2 , Equation (28) is reduced to s ^ z ^ 1 ( u ) = s z 1 ( u ) . The third step of the decryption system is to compute the following product:
t z ^ 1 ( u ) = s ^ z ^ 1 ( u ) exp i 2 π x 2 u λ z ^ 1 h ^ z ^ 1 ( u ) exp i π u 2 λ z ^ 1 = FrT λ , z ^ 1 s ^ ( x ) λ , z ^ 1 GS x 2 ; λ , z ^ 1 h ^ ( x ) ,
where FrT λ , z ^ 1 s ^ ( x ) = s ^ z ^ 1 ( u ) and FrT λ , z ^ 1 { h ^ ( x ) } = h ^ z ^ 1 ( u ) h z 1 ( u ) . Equation (29) is the proposed correlation in the FrD for the parameters λ and z ^ 1 between the data distributions of s ^ ( x ) and GS x 2 ; λ , z ^ 1 [ h ^ ( x ) ] . In this third step of the decryption system, we use the security keys corresponding to z ^ 1 and h ^ z ^ 1 ( u ) . If the following keys are set by x ^ 3 x 3 , λ ^ = λ , z ^ 3 z 3 , z ^ 2 = z 2 , z ^ 1 = z 1 and h ^ z ^ 1 ( u ) = h z 1 ( u ) , Equation (29) will never be reduced to the data distribution { i 2 π x 1 u / λ z 1 } p z 1 ( u ) . Finally, when the six security keys are correct in the decryption system, i.e., x ^ 3 = x 3 , λ ^ = λ , z ^ 3 = z 3 , z ^ 2 = z 2 , z ^ 1 = z 1 and h ^ z ^ 1 ( u ) = h z 1 ( u ) , the decrypted image is obtained as follows:
f ^ ( x x 1 ) = FrT λ , z 1 t z ^ 1 ( u ) = FrT λ , z 1 exp i 2 π x 1 u λ z 1 p z 1 ( u ) = GS x 1 ; λ , z 1 f ( x ) r ( x ) = f ( x x 1 ) .
The decrypted image f ^ ( x ) will be a replica of the original image f ( x ) when the six security keys in the decryption system are correct. If one or more of the six keys are wrong, the decrypted image will have a noisy data distribution. Therefore, the correct retrieval of the original image at the output of the decryption system is only possible when all of the values of the six security keys used in the decryption system are the same values values that were used in the encryption system. The optical schematic diagram of Figure 1 can be used to implement the proposed decryption system by using the complex conjugate of E z 2 ( x ) on the input plane of this optical schematic [12]. The design, description and analysis of the proposed encryption and decryption systems were performed by using the new processing operations proposed in this work. The use of these new processing operations produces a simple and compact characterization and implementation of the behaviour of the proposed modified version of the DRPE in the FrD of this subsection.
Figure 2 shows the computational results for the proposed encryption and decryption systems based on the generalized shift, convolution and correlation operations in the FrD. The images in Figure 2a,b represent the original image that needs to be encrypted f ( x ) and the random code image n ( u ) of the RPM h z 1 ( u ) , respectively. The random code image m ( x ) of the RPM r ( x ) is very similar in appearance to the image depicted in Figure 2b, but the values of random image m ( x ) are different from the values of random image n ( u ) . The amplitude and phase of the encrypted image E ˜ z 2 ( x ) for the keys λ = 532 nm, z 1 = 70 mm, z 2 = 82 mm, z 3 = 22 mm and x 3 = 10 mm, are shown in Figure 2c and Figure 2d, respectively. The right decrypted image f ^ ( x ) is presented in Figure 2e, where the correct values of the six security keys are provided to the decryption system. If the wrong value of the security key, such as z ^ 3 = 21.877   m z 3 , or h ^ z ^ 1 ( u ) h z 1 ( u ) , is introduced in the decryption system with the other correct five security keys, the resulting decrypted images will be the noisy images that are depicted in Figure 2f and Figure 2g, respectively.

4.3. Possible Case Studies Based on the New Processing Operators of This Work

In our research group, we numerically simulate new phase elements for photovoltaic cells and solar collectors with the purpose of focusing the thermal energy irradiated from the sun. This focusing of the sun’s rays can be performed with new phase elements based on the generalized shift operation proposed in this work. We are designing new phase elements that allow the sun’s rays to be focused on the same point or region, regardless of their orientation when they enter Earth’s atmosphere in order to eliminate the heavy mechatronic solar tracking systems.
The FrT is very important for optical processing systems because this optical transform allows us to implement centred, compact and lens-less optical systems for near-field optics [3,19,20]. Therefore, the new processing operators in this work can describe and analyse these optical processing system in the near-field regime. For instance, the JTC is an optical architecture that can be used for holography, target recognition, object distance detection, video surveillance, authentication, encryption, decryption and DNA sequence alignment, among other applications. The JTC in the FrD allows us to implement compact and lens-less optical systems when the generalized shift operation of this work is applied to each data distribution of the input plane of the JTC because all of the resulting data distributions on the output plane of the JTC in the FrD, which are contained in the joint Fresnel power distribution (JFPD) [3], are centred at the same place. The different terms of the JFPD can be easily described and analysed by the proposed convolution and correlation operations in this work. This description and analysis of the JTC in the FrD will be simple and compact, which would allow researchers to suitably study of the behaviour for the optical processing systems based on the JTC architecture in the FrD.
Finally, we will expect that several optical processing systems in the FrD for applications in holography, imaging systems, microscopy, diffractive optical elements, spectroscopy, beam focusing, surface modification, optical tweezers, security systems and image filtering systems, among others applications, will be designed, implemented, analysed and improved by using the new processing operators proposed in this work.

5. Conclusions

New processing operations based on the FrT have been proposed. The new processing operations are the generalized shift, the convolution and the correlation of the FrD. The generalized shift operation simultaneously produces a shift and modulation in the pure linear phase of a given function, and the FrT of this generalized shift operation allows us to obtain a function in the FrD without the shift. This fact of the generalized shift operation is very important for centred optical systems in the FrD, such as holographic ones, optical image formation and optical security systems, among others. The new integral expressions for the proposed convolution and correlation operations are generalized versions of the usual convolution and correlation operations, and these operations can be computed at the spatial domain for different values of the parameters λ and z. The proposed convolution and correlation operations of this work are performed in the FrD by means of the product of two FrTs and a quadratic phase term. We have developed two applications for the new processing operations based on the FrT. The first application was the sampling theorem based on the FrT for a function, whose resulting FrT has a finite support. We defined a new Dirac comb function for parameters λ , z and T, and we also used the new convolution operation in this paper in order to obtain a reconstruction formula for the sampling theorem based on the FrT. We have proved that the sampling period at the spatial domain of a function is directly proportional to the product of λ z and inversely proportional to the length of the finite support for the resulting FrT of the function that needs to be sampled. The second application was to propose and describe a modified version of the DRPE in the FrD by using all of the proposed new processing operations. The proposed encryption system in the FrD introduced two new security keys related to the parameters of the generalized shift operation, which allows us to improve the security of the encrypted image. The new processing operations proposed in this paper can also be used to describe and analyse other optical architectures of the DRPE technique. Finally, the new processing operations in this work could be used to develop new optical information processing systems based on the FrT.

Author Contributions

The work described in this article was the collaborative development of all authors. Conceptualization, J.M.V., E.A. and J.M.; methodology, J.M.V., E.A. and J.M.; software, J.M.V.; validation, J.M.V., E.A. and J.M.; investigation, J.M.V., E.A. and J.M.; writing—original draft preparation, J.M.V., E.A. and J.M.; writing—review and editing, J.M.V., E.A. and J.M.; supervision, J.M.V. All authors have read and agreed to the published version of the manuscript.

Funding

This research has been funded by the Universidad de La Guajira (Riohacha).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The supporting information can be found from the corresponding author.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
DRPEDouble random phase encoding
FDFourier domain
FrDFresnel domain
FTFourier transform
FrTFresnel transform
JFPDJoint Fresnel power distribution
JTCJoint transform correlator
RPMsRandom phase masks

References

  1. Goodman, J.W. Introduction to Fourier Optics, 3rd ed.; Roberts & Company Publishers: Englewood, CO, USA, 2005. [Google Scholar]
  2. Millán, M.S. Advanced optical correlation and digital methods for pattern matching—50th anniversary of Vander Lugt matched filter. J. Opt. 2012, 14, 103001. [Google Scholar] [CrossRef]
  3. Vilardy, J.M.; Millán, M.S.; Pérez-Cabré, E. Nonlinear optical security system based on a joint transform correlator in the Fresnel domain. Appl. Opt. 2014, 53, 1674–1682. [Google Scholar] [CrossRef]
  4. Vilardy, J.M.; Millán, M.S.; Pérez-Cabré, E. Joint transform correlator-based encryption system using the Fresnel transform and nonlinear filtering. Proc. SPIE 2013, 8785, 87853J. [Google Scholar]
  5. Vilardy, J.M.; Millán, M.S.; Pérez-Cabré, E. Occlusion and noise tests on the encrypted image produced by a security system based on a joint transform correlator and the Fresnel transform. J. Phys. Conf. Ser. 2019, 1221, 012046. [Google Scholar] [CrossRef]
  6. Réfrégier, P.; Javidi, B. Optical image encryption based on input plane and Fourier plane random encoding. Opt. Lett. 1995, 20, 767–769. [Google Scholar] [CrossRef] [PubMed]
  7. Millán, M.S.; Pérez-Cabré, E. Optical data encryption. In Optical and Digital Image Processing: Fundamentals and Applications; Cristóbal, G., Schelkens, P., Thienpont, H., Eds.; Wiley-VCH Verlag GmbH & Co.: Weinheim, Germany, 2011; pp. 739–767. [Google Scholar]
  8. Millán, M.S.; Pérez-Cabré, E.; Vilardy, J.M. Nonlinear techniques for secure optical encryption and multifactor authentication. In Advanced Secure Optical Image Processing for Communications; Al Falou, A., Ed.; IOP Publishing: Bristol, UK, 2018; pp. 8-1–8-33. [Google Scholar]
  9. Perez, R.A.; Vilardy, J.M.; Torres, C.O. Image processing operators based on the Gyrator transform: Generalized shift, convolution and correlation. Photonics 2019, 6, 120. [Google Scholar] [CrossRef]
  10. Torres, R.; Pellat-Finet, P.; Torres, Y. Fractional convolution, fractional correlation and their translation invariance properties. Signal Process. 2010, 90, 1976–1984. [Google Scholar] [CrossRef]
  11. Ozaktas, H.M.; Zalevsky, Z.; Kutay, M.A. The Fractional Fourier Transform: With Applications in Optics and Signal Processing; Wiley: Hoboken, NJ, USA, 2001. [Google Scholar]
  12. Situ, G.; Zhang, J. Double random phase encoding in the Fresnel domain. Opt. Lett. 2004, 29, 1584–1586. [Google Scholar] [CrossRef] [PubMed]
  13. Unnikrishnan, G.; Joseph, J.; Singh, K. Optical encryption by double-random phase encoding in the fractional Fourier domain. Opt. Lett. 2000, 25, 887–889. [Google Scholar] [CrossRef] [PubMed]
  14. Kwak, C.H.; Javidi, B. Generalized description of double random phase encoding by Collins diffraction transformation. J. Opt. 2019, 21, 015703. [Google Scholar] [CrossRef]
  15. Nomura, T.; Javidi, B. Optical encryption using a joint transform correlator architecture. Opt. Eng. 2000, 39, 2031–2035. [Google Scholar]
  16. Vilardy, J.M.; Millán, M.S.; Pérez-Cabré, E. Improved decryption quality and security of a joint transform correlator-based encryption system. J. Opt. 2013, 15, 025401. [Google Scholar] [CrossRef]
  17. Vilardy, J.M.; Millán, M.S.; Pérez-Cabré, E. Experimental optical encryption scheme for the double random phase encoding using a nonlinear joint transform correlator. Optik 2020, 217, 164653. [Google Scholar] [CrossRef]
  18. Jaramillo-Osorio, A.; Barrera-Ramírez, J.F.; Mira-Agudelo, A.; Velez-Zea, A.; Torroba, R. High performance compact optical cryptosystem without reference arm. J. Opt. 2020, 22, 035702. [Google Scholar] [CrossRef]
  19. Barrera, J.F.; Jaramillo, A.; Vélez, A.; Torroba, R. Experimental analysis of a joint free space cryptosystem. Opt. Lasers Eng. 2016, 83, 126–130. [Google Scholar]
  20. Dou, S.; Shen, X.; Zhou, B.; Wang, L.; Lin, C. Experimental research on optical image encryption system based on joint Fresnel transform correlator. Opt. Laser Technol. 2019, 112, 56–64. [Google Scholar] [CrossRef]
Figure 1. Optical schematic diagram of the proposed encryption system, where the data distribution in the first FrD is h ¯ ( u ) = exp i 2 π x 2 u / λ z 1 h z 1 ( u ) exp i π u 2 / λ z 1 .
Figure 1. Optical schematic diagram of the proposed encryption system, where the data distribution in the first FrD is h ¯ ( u ) = exp i 2 π x 2 u / λ z 1 h z 1 ( u ) exp i π u 2 / λ z 1 .
Sensors 23 01663 g001
Figure 2. (a) Original image to encrypt f ( x ) . (b) Random code image n ( u ) of the RPM h z 1 ( u ) . (c) Amplitude and (d) phase of the encrypted image E ˜ z 2 ( x ) using the following values of the security keys λ = 532 nm, z 1 = 70 mm, z 2 = 82 mm, z 3 = 22 mm and x 3 = 10 mm. (e) Decrypted image f ^ ( x ) using the correct values of the six security keys ( h z 1 ( u ) , λ , z 1 , z 2 , z 3 and x 3 ). Decrypted images for the following wrong security keys: (f) the z ^ 3 = 21.877   m z 3 , and (g) the RPM h ^ z ^ 1 ( u ) h z 1 ( u ) , when the other five security keys are correct.
Figure 2. (a) Original image to encrypt f ( x ) . (b) Random code image n ( u ) of the RPM h z 1 ( u ) . (c) Amplitude and (d) phase of the encrypted image E ˜ z 2 ( x ) using the following values of the security keys λ = 532 nm, z 1 = 70 mm, z 2 = 82 mm, z 3 = 22 mm and x 3 = 10 mm. (e) Decrypted image f ^ ( x ) using the correct values of the six security keys ( h z 1 ( u ) , λ , z 1 , z 2 , z 3 and x 3 ). Decrypted images for the following wrong security keys: (f) the z ^ 3 = 21.877   m z 3 , and (g) the RPM h ^ z ^ 1 ( u ) h z 1 ( u ) , when the other five security keys are correct.
Sensors 23 01663 g002
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Vilardy, J.M.; Alfaro, E.; Mendoza, J. Convolution, Correlation and Generalized Shift Operations Based on the Fresnel Transform. Sensors 2023, 23, 1663. https://doi.org/10.3390/s23031663

AMA Style

Vilardy JM, Alfaro E, Mendoza J. Convolution, Correlation and Generalized Shift Operations Based on the Fresnel Transform. Sensors. 2023; 23(3):1663. https://doi.org/10.3390/s23031663

Chicago/Turabian Style

Vilardy, Juan M., Eder Alfaro, and Johonfri Mendoza. 2023. "Convolution, Correlation and Generalized Shift Operations Based on the Fresnel Transform" Sensors 23, no. 3: 1663. https://doi.org/10.3390/s23031663

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop