scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Image Encryption Based on Interleaved Computer-Generated Holograms

Dezhao Kong, Liangcai Cao1, Xueju Shen, Hao Zhang1, Guofan Jin1 
01 Feb 2018-IEEE Transactions on Industrial Informatics (IEEE)-Vol. 14, Iss: 2, pp 673-678
TL;DR: An encryption method based on interleaved computer-generated holograms (CGHs) displayed by a spatial light modulator (SLM) is demonstrated and may avoid the inherent silhouette problem and alleviate the precise alignment requirements of interference encryption.
Abstract: An encryption method based on interleaved computer-generated holograms (CGHs) displayed by a spatial light modulator (SLM) is demonstrated. Arbitrary decrypted complex optical wave fields are reconstructed in the rear focal plane of two phase-only holograms, generated from original image using a vector decomposition algorithm. Two CGHs are encoded into one hologram by interleaving the column of pixels, which optically combines the optical wave fields of two neighboring phase-only modulated pixels. The designed image encryption system may avoid the inherent silhouette problem and alleviate the precise alignment requirements of interference encryption. Video encryption and real-time dynamic decryption is demonstrated using one SLM.
Citations
More filters
Journal ArticleDOI
01 Oct 2019
TL;DR: In this paper, the authors reviewed the encountered technical contradictions when an attacker meets the cipher-images encrypted by the image encryption schemes (algorithms) proposed in 2018 from the viewpoint of an image cryptanalyst.
Abstract: This paper aims to review the encountered technical contradictions when an attacker meets the cipher-images encrypted by the image encryption schemes (algorithms) proposed in 2018 from the viewpoint of an image cryptanalyst. The most representative works among them are selected and classified according to their essential structures. Almost all image cryptanalysis works published in 2018 are surveyed due to their small number. The challenging problems on design and analysis of image encryption schemes are summarized to receive the attentions of both designers and attackers (cryptanalysts) of image encryption schemes, which may promote solving scenario-oriented image security problems with new technologies.

165 citations

Journal ArticleDOI
Chao Wu1, Ying Wang1, Ye Chen1, Jun Wang1, Qiong-Hua Wang2 
TL;DR: This method not only can achieve multiple-image encryption with a small amount of data, but also can prevent information disclosure and has high security because it can resist the phase-retrieval attack.

41 citations

Posted Content
TL;DR: The encountered technical contradictions when an attacker meets the cipher-images encrypted by the image encryption schemes (algorithms) proposed in 2018 are reviewed from the viewpoint of an image cryptanalyst.
Abstract: This paper aims to review the encountered technical contradictions when an attacker meets the cipher-images encrypted by the image encryption schemes (algorithms) proposed in 2018 from the viewpoint of an image cryptanalyst. The most representative works among them are selected and classified according to their essential structures. Almost all image cryptanalysis works published in 2018 are surveyed due to their small number. The challenging problems on design and analysis of image encryption schemes are summarized to receive the attentions of both designers and attackers (cryptanalysts) of image encryption schemes, which may promote solving scenario-oriented image security problems with new technologies.

37 citations


Cites methods from "Image Encryption Based on Interleav..."

  • ...In [87], a holographic encryption scheme based on interleaving operation of computergenerated holograms is proposed....

    [...]

Journal ArticleDOI
TL;DR: The optimal quantization for both available and future SLM devices is suggested, and several critical CGH parameters, including resolution, zero-padding size, reconstruction distance, wavelength, random phase, pixel pitch, bit depth, phase modulation deviation, and filling factor are considered.
Abstract: Owing to the characteristics of existing spatial light modulators (SLMs), the computer-generated hologram (CGH) with continuous complex-amplitude is conventionally converted to a quantized amplitude-only or phase-only CGH in practical applications. The quantization of CGH significantly affects the holographic reconstruction quality. In this work, we evaluated the influence of the quantization for both amplitude and phase on the quality of holographic reconstructions by traversing method. Furthermore, we considered several critical CGH parameters, including resolution, zero-padding size, reconstruction distance, wavelength, random phase, pixel pitch, bit depth, phase modulation deviation, and filling factor. Based on evaluations, the optimal quantization for both available and future SLM devices is suggested.

29 citations

Journal ArticleDOI
TL;DR: This study presents a novel encryption method for the security of DICOM (Digital Imaging and Communications in Medicine) images used in medical applications that is scalable with colour images and JPEG (Joint Photographic Experts Group) compression.
Abstract: This study presents a novel encryption method for the security of DICOM (Digital Imaging and Communications in Medicine) images used in medical applications. The proposed algorithm splits the original image into blocks of size 16 × 16 pixels, then encrypts it through three steps. Firstly, the keys k 1 , k 2 , k 3 and k 4 are transformed from four vectors of 16 pixels to a matrix of 16 × 16 pixels. Then, the proposed algorithm encrypts the image block-by-block using the Vigenere cipher algorithm. For each block, the proposed algorithm modifies the key using Arnold transform. The proposed encryption algorithm is scalable with colour images and JPEG (Joint Photographic Experts Group) compression. The cryptanalysis of the proposed algorithm demonstrates that it passed the cryptography attacks tests with success. Its running time shows that it is faster than a typical and recent image encryption algorithm.

22 citations

References
More filters
Journal ArticleDOI
TL;DR: A new optical encoding method of images for security applications is proposed and it is shown that the encoding converts the input signal to stationary white noise and that the reconstruction method is robust.
Abstract: We propose a new optical encoding method of images for security applications. The encoded image is obtained by random-phase encoding in both the input and the Fourier planes. We analyze the statistical properties of this technique and show that the encoding converts the input signal to stationary white noise and that the reconstruction method is robust.

2,361 citations


"Image Encryption Based on Interleav..." refers background in this paper

  • ...2714261 Refregier and Javidi proposed double random phase encoding [1], various algorithms have been further developed in order to enhance cryptosystem security....

    [...]

Journal ArticleDOI
TL;DR: An optical architecture that encodes a primary image to stationary white noise by using two statistically independent random phase codes that has an enhanced security value compared with earlier methods is proposed.
Abstract: We propose an optical architecture that encodes a primary image to stationary white noise by using two statistically independent random phase codes. The encoding is done in the fractional Fourier domain. The optical distribution in any two planes of a quadratic phase system (QPS) are related by fractional Fourier transform of the appropriately scaled distribution in the two input planes. Thus a QPS offers a continuum of planes in which encoding can be done. The six parameters that characterize the QPS in addition to the random phase codes form the key to the encrypted image. The proposed method has an enhanced security value compared with earlier methods. Experimental results in support of the proposed idea are presented.

1,066 citations


"Image Encryption Based on Interleav..." refers background in this paper

  • ...of holography, such as optical holography [2], [3], digital holography (DH) [4]–[8], and computer-generated holograms (CGH) [9]–[13]....

    [...]

Journal ArticleDOI
TL;DR: An information security method that uses a digital holographic technique that provides secure storage and data transmission and can be electrically decrypted by use of the digital hologram of the key.
Abstract: An information security method that uses a digital holographic technique is presented. An encrypted image is stored as a digital hologram. The decryption key is also stored as a digital hologram. The encrypted image can be electrically decrypted by use of the digital hologram of the key. This security technique provides secure storage and data transmission. Experimental results are presented to demonstrate the proposed method.

476 citations


"Image Encryption Based on Interleav..." refers background in this paper

  • ...Digital holography encryption consists of off-axis digital holography encryption [4], [5] and in-line digital holography encryption [6]–[8]....

    [...]

Journal ArticleDOI
TL;DR: A technique for performing three-dimensional pattern recognition by use of in-line digital holography, where the complex amplitude distribution generated by a 3D object at an arbitrary plane located in the Fresnel diffraction region is recorded by phase-shifting interferometry.
Abstract: We present a technique for performing three-dimensional (3D) pattern recognition by use of in-line digital holography. The complex amplitude distribution generated by a 3D object at an arbitrary plane located in the Fresnel diffraction region is recorded by phase-shifting interferometry. The digital hologram contains information about the 3D object's shape, location, and orientation. This information allows us to perform 3D pattern-recognition techniques with high discrimination and to measure 3D orientation changes. Experimental results are presented.

394 citations


"Image Encryption Based on Interleav..." refers background in this paper

  • ...Digital holography encryption consists of off-axis digital holography encryption [4], [5] and in-line digital holography encryption [6]–[8]....

    [...]

  • ...of holography, such as optical holography [2], [3], digital holography (DH) [4]–[8], and computer-generated holograms (CGH) [9]–[13]....

    [...]

Journal ArticleDOI
TL;DR: A novel architecture for optical image encryption based on interference is proposed that does not need iterative encoding and the parameters of the configuration can also serve as additional keys for encryption.
Abstract: We proposed a novel architecture for optical image encryption based on interference. The encryption algorithm for this new method is quite simple and does not need iterative encoding. The parameters of the configuration can also serve as additional keys for encryption. Numerical simulation results demonstrate the flexibility of this new proposed method.

365 citations


"Image Encryption Based on Interleav..." refers background in this paper

  • ...modulation of phase and amplitude [17], and phase retrieval [21]....

    [...]

  • ...Considerable following researches are proposed, such as the researches about solving inherent silhouette problem [14]–[17], repolarized light interference [18], fractional Fourier interference [19], [20], phase retrieval and interference [21], [22], etc....

    [...]