Journal ArticleDOI
Color information cryptosystem based on optical superposition principle and phase-truncated gyrator transform.
Reads0
Chats0
TLDR
A novel asymmetric color information cryptosystem based on an optical coherent superposition method and phase-truncated gyrator transform (GT) and two phase keys provide asymmetric keys that offer a high-level robustness against existing attacks is proposed.Abstract:
A novel asymmetric color information cryptosystem based on an optical coherent superposition method and phase-truncated gyrator transform (GT) is proposed. In this proposal, an original color image is converted into three independent channels, i.e., red, green, and blue. Each channel is separated into a random phase masks (RPM) and a key phase mask (KPM) using a coherent superposition method. The KPM is a modulation of the RPM by the color channel and used as decryption key. The same RPM, which is independent of plaintext, can be chosen for different images of the same size; however, KPMs, which are related to the original color images, are different. The RPM and the KPM are independently gyrator transformed. Then two gyrator spectra are, respectively, phase truncated to obtain two encoded images and amplitude truncated to generate two asymmetric phase keys. The KPM and two phase keys provide asymmetric keys. The transformation angles of the GT give additional keys for each channel and thus offer a high-level robustness against existing attacks. The proposed optical design is free from axial movement. Numerical simulations are demonstrated to verify the flexibility and effectiveness of the proposed method.read more
Citations
More filters
Journal ArticleDOI
Optical image encryption algorithm based on phase-truncated short-time fractional Fourier transform and hyper-chaotic system
TL;DR: The simulation results demonstrate that the proposed image encryption algorithm based on the PTSTFrFT is secure and robust enough against the common attacks.
Journal ArticleDOI
Fully phase image encryption using double random-structured phase masks in gyrator domain
TL;DR: The computed values of mean squared error between the retrieved and the original image show the efficacy of the proposed scheme, and the scheme's sensitivity to the encryption parameters, and robustness against occlusion and multiplicative Gaussian noise attacks are investigated.
Journal ArticleDOI
Securing color image by using phase-only encoding in Fresnel domains
Zhengjun Liu,Zhengjun Liu,Cheng Guo,Jiubin Tan,Wei Liu,Jingjing Wu,Qun Wu,Liqiang Pan,Shutian Liu +8 more
TL;DR: A novel color image hiding scheme with three channels of cascaded Fresnel domain phase-only filtering, using the Gerchberg–Saxton iterative phase retrieval algorithm with another predefined phase key.
Journal ArticleDOI
An asymmetric color image encryption method by using deduced gyrator transform
TL;DR: An encryption algorithm is proposed by using the properties of deduced gyrator transform to resist the attack from iterative phase retrieval, the red, green and blue components of the input image is modulated by a random phase mask and then combined using convolution.
Journal ArticleDOI
An asymmetric single-channel color image encryption based on Hartley transform and gyrator transform
TL;DR: A novel asymmetric single-channel color image encryption using Hartley transform and gyrator transform using optoelectronic encryption and decryption systems is proposed.
References
More filters
Journal ArticleDOI
Optical image encryption based on input plane and Fourier plane random encoding.
Philippe Réfrégier,Bahram Javidi +1 more
TL;DR: A new optical encoding method of images for security applications is proposed and it is shown that the encoding converts the input signal to stationary white noise and that the reconstruction method is robust.
Journal ArticleDOI
Asymmetric cryptosystem based on phase-truncated Fourier transforms.
Wan Qin,Xiang Peng +1 more
TL;DR: Owing to the nonlinear operation of phase truncation, high robustness against existing attacks could be achieved and a set of simulation results shows the validity of proposed asymmetric cryptosystem.
Journal ArticleDOI
Optical encryption based on computational ghost imaging
TL;DR: This Letter shows how computational ghost imaging can be used to encrypt and transmit object information to a remote party and important features, such as key compressibility and vulnerability to eavesdropping, are experimentally analyzed.
Journal ArticleDOI
Optical color image encryption by wavelength multiplexing and lensless Fresnel transform holograms
Linfei Chen,Daomu Zhao +1 more
TL;DR: This work proposes what it believes is a new method for color image encryption by use of wavelength multiplexing based on lensless Fresnel transform holograms and presents an optical color image coding configuration with multichannel implementation and an optoelectronic color imageryption architecture with single-channel implementation.
Journal ArticleDOI
A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms
TL;DR: Analyzing the security of a recently proposed asymmetric cryptosystem that based on the phase-truncated Fourier transforms (PTFTs) implies that some appropriate measurements should be made to enhance the resistance of the PTFT-based cryptos system against the specific attack when it is used as a public-key cryptosSystem.
Related Papers (5)
Optical image encryption based on input plane and Fourier plane random encoding.
Philippe Réfrégier,Bahram Javidi +1 more