scispace - formally typeset
Journal ArticleDOI

Image encryption based on interference that uses fractional Fourier domain asymmetric keys

Sudheesh K. Rajput, +1 more
- 01 Apr 2012 - 
- Vol. 51, Iss: 10, pp 1446-1452
Reads0
Chats0
TLDR
An image encryption technique based on the interference principle and phase-truncation approach in the fractional Fourier domain that offers multiple levels of security with asymmetric keys and is free from the silhouette problem.
Abstract
We propose an image encryption technique based on the interference principle and phase-truncation approach in the fractional Fourier domain. The proposed scheme offers multiple levels of security with asymmetric keys and is free from the silhouette problem. Multiple input images bonded with random phase masks are independently fractional Fourier transformed. Amplitude truncation of obtained spectrum helps generate individual and universal keys while phase truncation generates two phase-only masks analytically. For decryption, these two phase-only masks optically interfere, and this results in the phase-truncated function in the output. After using the correct random phase mask, universal key, individual key, and fractional orders, the original image is retrieved successfully. Computer simulation results with four gray-scale images validate the proposed method. To measure the effectiveness of the proposed method, we calculated the mean square error between the original and the decrypted images. In this scheme, the encryption process and decryption keys formation are complicated and should be realized digitally. For decryption, an optoelectronic scheme has been suggested.

read more

Citations
More filters
Journal ArticleDOI

Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform

TL;DR: A novel image compression–encryption scheme is proposed by combining 2D compressive sensing with nonlinear fractional Mellin transform to achieve compression and encryption simultaneously.
Journal ArticleDOI

Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform

TL;DR: A discussion and a cryptanalysis of the optical phase-truncated Fourier-transform-based cryptosystem are presented and it is shown that the computing efficiency of the algorithm is improved and the number of iterations is much less than that by the specific attack, which has two iteration loops.
Journal ArticleDOI

Fresnel domain nonlinear optical image encryption scheme based on Gerchberg–Saxton phase-retrieval algorithm

TL;DR: The cryptanalysis has been carried out, which proves the robustness of proposed scheme against known-plaintext, chosen-plain text, and special attacks, and a simple optical setup for decryption has been suggested.
Journal ArticleDOI

Asymmetric optical cryptosystem based on coherent superposition and equal modulus decomposition.

TL;DR: A novel asymmetric cryptosystem based on coherent superposition, which is free from silhouette problem, is proposed, which achieves high robustness against the special attack based on iterative Fourier transform.
References
More filters
Journal ArticleDOI

Optical image encryption based on input plane and Fourier plane random encoding.

TL;DR: A new optical encoding method of images for security applications is proposed and it is shown that the encoding converts the input signal to stationary white noise and that the reconstruction method is robust.
Journal ArticleDOI

Optical encryption by double-random phase encoding in the fractional Fourier domain.

TL;DR: An optical architecture that encodes a primary image to stationary white noise by using two statistically independent random phase codes that has an enhanced security value compared with earlier methods is proposed.
Journal ArticleDOI

Known-plaintext attack on optical encryption based on double random phase keys

TL;DR: A new approach to known-plaintext attack on an optical encryption scheme based on double random phase keys that can be accessed with the help of the phase retrieval technique is demonstrated.
Journal ArticleDOI

Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys.

TL;DR: It is shown how optical encryption methods based on double random phase keys are vulnerable to an organized attack of the chosen-ciphertext type and cast doubts on the present security of these techniques.
Journal ArticleDOI

Asymmetric cryptosystem based on phase-truncated Fourier transforms.

TL;DR: Owing to the nonlinear operation of phase truncation, high robustness against existing attacks could be achieved and a set of simulation results shows the validity of proposed asymmetric cryptosystem.
Related Papers (5)