scispace - formally typeset
Journal ArticleDOI

Color information cryptosystem based on optical superposition principle and phase-truncated gyrator transform.

Muhammad Rafiq Abuturab
- 20 Nov 2012 - 
- Vol. 51, Iss: 33, pp 7994-8002
Reads0
Chats0
TLDR
A novel asymmetric color information cryptosystem based on an optical coherent superposition method and phase-truncated gyrator transform (GT) and two phase keys provide asymmetric keys that offer a high-level robustness against existing attacks is proposed.
Abstract
A novel asymmetric color information cryptosystem based on an optical coherent superposition method and phase-truncated gyrator transform (GT) is proposed. In this proposal, an original color image is converted into three independent channels, i.e., red, green, and blue. Each channel is separated into a random phase masks (RPM) and a key phase mask (KPM) using a coherent superposition method. The KPM is a modulation of the RPM by the color channel and used as decryption key. The same RPM, which is independent of plaintext, can be chosen for different images of the same size; however, KPMs, which are related to the original color images, are different. The RPM and the KPM are independently gyrator transformed. Then two gyrator spectra are, respectively, phase truncated to obtain two encoded images and amplitude truncated to generate two asymmetric phase keys. The KPM and two phase keys provide asymmetric keys. The transformation angles of the GT give additional keys for each channel and thus offer a high-level robustness against existing attacks. The proposed optical design is free from axial movement. Numerical simulations are demonstrated to verify the flexibility and effectiveness of the proposed method.

read more

Citations
More filters
Journal ArticleDOI

Optical image encryption algorithm based on phase-truncated short-time fractional Fourier transform and hyper-chaotic system

TL;DR: The simulation results demonstrate that the proposed image encryption algorithm based on the PTSTFrFT is secure and robust enough against the common attacks.
Journal ArticleDOI

Fully phase image encryption using double random-structured phase masks in gyrator domain

TL;DR: The computed values of mean squared error between the retrieved and the original image show the efficacy of the proposed scheme, and the scheme's sensitivity to the encryption parameters, and robustness against occlusion and multiplicative Gaussian noise attacks are investigated.
Journal ArticleDOI

Securing color image by using phase-only encoding in Fresnel domains

TL;DR: A novel color image hiding scheme with three channels of cascaded Fresnel domain phase-only filtering, using the Gerchberg–Saxton iterative phase retrieval algorithm with another predefined phase key.
Journal ArticleDOI

An asymmetric color image encryption method by using deduced gyrator transform

TL;DR: An encryption algorithm is proposed by using the properties of deduced gyrator transform to resist the attack from iterative phase retrieval, the red, green and blue components of the input image is modulated by a random phase mask and then combined using convolution.
Journal ArticleDOI

An asymmetric single-channel color image encryption based on Hartley transform and gyrator transform

TL;DR: A novel asymmetric single-channel color image encryption using Hartley transform and gyrator transform using optoelectronic encryption and decryption systems is proposed.
References
More filters
Journal ArticleDOI

Optical image encryption based on input plane and Fourier plane random encoding.

TL;DR: A new optical encoding method of images for security applications is proposed and it is shown that the encoding converts the input signal to stationary white noise and that the reconstruction method is robust.
Journal ArticleDOI

Asymmetric cryptosystem based on phase-truncated Fourier transforms.

TL;DR: Owing to the nonlinear operation of phase truncation, high robustness against existing attacks could be achieved and a set of simulation results shows the validity of proposed asymmetric cryptosystem.
Journal ArticleDOI

Optical encryption based on computational ghost imaging

TL;DR: This Letter shows how computational ghost imaging can be used to encrypt and transmit object information to a remote party and important features, such as key compressibility and vulnerability to eavesdropping, are experimentally analyzed.
Journal ArticleDOI

Optical color image encryption by wavelength multiplexing and lensless Fresnel transform holograms

TL;DR: This work proposes what it believes is a new method for color image encryption by use of wavelength multiplexing based on lensless Fresnel transform holograms and presents an optical color image coding configuration with multichannel implementation and an optoelectronic color imageryption architecture with single-channel implementation.
Journal ArticleDOI

A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms

TL;DR: Analyzing the security of a recently proposed asymmetric cryptosystem that based on the phase-truncated Fourier transforms (PTFTs) implies that some appropriate measurements should be made to enhance the resistance of the PTFT-based cryptos system against the specific attack when it is used as a public-key cryptosSystem.
Related Papers (5)