scispace - formally typeset
Journal ArticleDOI

Optical image encryption based on interference.

Yan Zhang, +1 more
- 01 Nov 2008 - 
- Vol. 33, Iss: 21, pp 2443-2445
Reads0
Chats0
TLDR
A novel architecture for optical image encryption based on interference is proposed that does not need iterative encoding and the parameters of the configuration can also serve as additional keys for encryption.
Abstract
We proposed a novel architecture for optical image encryption based on interference. The encryption algorithm for this new method is quite simple and does not need iterative encoding. The parameters of the configuration can also serve as additional keys for encryption. Numerical simulation results demonstrate the flexibility of this new proposed method.

read more

Citations
More filters
Journal ArticleDOI

Image encryption based on interference that uses fractional Fourier domain asymmetric keys

TL;DR: An image encryption technique based on the interference principle and phase-truncation approach in the fractional Fourier domain that offers multiple levels of security with asymmetric keys and is free from the silhouette problem.
Journal ArticleDOI

Image encryption scheme by using iterative random phase encoding in gyrator transform domains

TL;DR: An iterative structure of image encryption is designed for introducing more random phases to encrypt image using the random phase encoding method in gyrator domains generated by a two-dimensional chaotic mapping with the help of computer.
Journal ArticleDOI

Fresnel domain nonlinear optical image encryption scheme based on Gerchberg–Saxton phase-retrieval algorithm

TL;DR: The cryptanalysis has been carried out, which proves the robustness of proposed scheme against known-plaintext, chosen-plain text, and special attacks, and a simple optical setup for decryption has been suggested.
Journal ArticleDOI

Asymmetric optical cryptosystem based on coherent superposition and equal modulus decomposition.

TL;DR: A novel asymmetric cryptosystem based on coherent superposition, which is free from silhouette problem, is proposed, which achieves high robustness against the special attack based on iterative Fourier transform.
Journal ArticleDOI

Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform

TL;DR: A scheme for information security under the basic double random phase encoding framework but with enhanced complexity and immunity against the known-plaintext attack, and presents the computer simulation results of multiple gray-scale images without any cross talk and also for a color image.
References
More filters
Journal ArticleDOI

Optical image encryption based on input plane and Fourier plane random encoding.

TL;DR: A new optical encoding method of images for security applications is proposed and it is shown that the encoding converts the input signal to stationary white noise and that the reconstruction method is robust.
Journal ArticleDOI

Known-plaintext attack on optical encryption based on double random phase keys

TL;DR: A new approach to known-plaintext attack on an optical encryption scheme based on double random phase keys that can be accessed with the help of the phase retrieval technique is demonstrated.
Journal ArticleDOI

Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys.

TL;DR: It is shown how optical encryption methods based on double random phase keys are vulnerable to an organized attack of the chosen-ciphertext type and cast doubts on the present security of these techniques.
Journal ArticleDOI

Encrypted optical memory system using three-dimensional keys in the Fresnel domain.

TL;DR: Encryption and decryption of optical memory in a LiNbO(3) :Fe photorefractive crystal by use of angular multiplexing is demonstrated.
Journal ArticleDOI

Double image encryption based on iterative fractional Fourier transform

TL;DR: An image encryption algorithm to simultaneously encrypt two images into a single one as the amplitudes of fractional Fourier transform with different orders is presented, independent of additional random phases as the encryption/ decryption keys.
Related Papers (5)