Optical Image Encryption Technique Based on Hybrid-pattern Phase Keys |
Sun, Wenqing
(Jiangsu Key Laboratory of Micro and Nano Heat Fluid Flow Technology and Energy Application, School of Mathematics and Physics, Suzhou University of Science and Technology)
Wang, Lei (Jiangsu Key Laboratory of Micro and Nano Heat Fluid Flow Technology and Energy Application, School of Mathematics and Physics, Suzhou University of Science and Technology) Wang, Jun (Jiangsu Key Laboratory of Micro and Nano Heat Fluid Flow Technology and Energy Application, School of Mathematics and Physics, Suzhou University of Science and Technology) Li, Hua (Jiangsu Key Laboratory of Micro and Nano Heat Fluid Flow Technology and Energy Application, School of Mathematics and Physics, Suzhou University of Science and Technology) Wu, Quanying (Jiangsu Key Laboratory of Micro and Nano Heat Fluid Flow Technology and Energy Application, School of Mathematics and Physics, Suzhou University of Science and Technology) |
1 | A. Alfalou and C. Brosseau, "Optical image compression and encryption methods," Adv. Opt. Photon. 1, 590-636 (2009). |
2 | M. S. Millan, "Advanced optical correlation and digital methods for pattern matching-50th anniversary of Vander Lugt matched filter," J. Opt.-UK 14, 103001 (2012) DOI |
3 | W. Chen, B. Javidi, and X. Chen, "Advances in optical security systems," Adv. Opt. Photon. 6, 121-155 (2014) |
4 | S. Liu, C. Guo, and J. T. Sheridan, "A review of optical image encryption techniques," Opt. Laser Technol. 57, 327-342 (2014). DOI |
5 | B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, "Roadmap on optical security," J. Opt.-UK 18, 083001 (2016). |
6 | E. Perez-Cabre, M. Cho, and B. Javidi, "Information authentication using photon-counting double-random-phase encrypted images," Opt. Lett. 36, 22-24 (2011). DOI |
7 | I. Lee and M. Cho, "Optical encryption and information authentication of 3D objects considering wireless channel characteristics," J. Opt. Soc. Korea 17, 494-499 (2013). DOI |
8 | W. Qin and X. Peng, "Asymmetric cryptosystem based on phase-truncated Fourier transforms," Opt. Lett. 35, 118-120 (2010). DOI |
9 | M. Khurana and H. Singh, "An asymmetric image encryption based on phase truncated hybrid transform," 3D Res. 8 (2017). |
10 | S. K. Gil, "Asymmetric public key cryptography by using logic-based optical processing," J. Opt. Soc. Korea 20, 55-63 (2016). DOI |
11 | H. Yu, J. Chang, X. Liu, C. Wu, Y. He, and Y. Zhang, "Novel asymmetric cryptosystem based on distorted wavefront beam illumination and double-random phase encoding," Opt. Express 25, 8860 (2017). DOI |
12 | H. Chen, C. Tanougast, Z. Liu, and L. Sieler, "Asymmetric optical cryptosystem for color image based on equal modulus decomposition in gyrator transform domains," Opt. Lasers Eng. 93, 1-8 (2017). |
13 | L. Yao, C. Yuan, J. Qiang, S. Feng, and S. Nie, "Asymmetric color image encryption based on singular value decomposition," Opt. Lasers Eng. 89, 80-87 (2017). DOI |
14 | X. Li, M. Zhao, Y. Xing, L. Li, S. T. Kim, X. Zhou, and Q. H. Wang, "Optical encryption via monospectral integral imaging," Opt. Express 25, 31516-31527 (2017). DOI |
15 | T. Zhao, Y. Jiang, and C. Liu, "Demonstration and a practical scheme of the optical asymmetric cryptosystem," Optik 138, 509-515 (2017). DOI |
16 | L. Ma and W. Jin, "Symmetric and asymmetric hybrid cryptosystem based on compressive sensing and computer generated holography," Opt. Commun. 407, 51-56 (2018). DOI |
17 | J. F. Barrera, R. Henao, and R. Torroba, "Optical encryption method using toroidal zone plates," Opt. Commun. 248, 35-40 (2005). DOI |
18 | T. Li, Z. Miao, and Y. Shi, "Ciphertext-only attack on phase-shifting interferometery-based encryption," IEEE Photon. J. 9, 1-8 (2017). |
19 | M. Tebaldi, W. D. Furlan, R. Torroba, and N. Bolognini, "Optical-data storage-readout technique based on fractal encrypting masks," Opt. Lett. 34, 316 (2009). DOI |
20 | W. Zamrani, E. Ahouzi, A. Lizana, J. Campos, and M. J. Yzuel, "Optical image encryption technique based on deterministic phase masks," Opt. Eng. 55, 103108 (2016). DOI |
21 | J. F. Barrera, R. Henao, and R. Torroba, "Fault tolerances using toroidal zone plate encryption," Opt. Commun. 256, 489-494 (2005). DOI |
22 | S. K. Rajput and N. K. Nishchal, "Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask," Appl. Opt. 51, 5377-5386 (2012). DOI |
23 | C. Lin and X. Shen, "Design of reconfigurable and structured spiral phase mask for optical security system," Opt. Commun. 370, 127-134 (2016). DOI |
24 | C. Lin, X. Shen, and M. Lei, "Generation of plaintextindependent private key based on conditional decomposition strategy," Opt. Lasers Eng. 86, 303-308 (2016). DOI |
25 | H. Singh, "Nonlinear optical double image encryption using random-optical vortex in fractional Hartley transform domain," Opt. Appl. 47, 557-578 (2017). |
26 | R. Kumar and B. Bhaduri, "Optical image encryption in Fresnel domain using spiral phase transform," J. Opt.-UK 19, 095701 (2017). DOI |
27 | M. Rafiq Abuturab, "Asymmetric multiple information cryptosystem based on chaotic spiral phase mask and random spectrum decomposition," Opt. Laser Technol. 98, 298-308 (2018). DOI |
28 | M. R. Abuturab, "Securing multiple information using chaotic spiral phase encoding with simultaneous interference and superposition methods," Opt. Lasers Eng. 98, 1-16 (2017). DOI |
29 | Q. Chen, X. Shen, S. Dou, C. Lin, and L. Wang, "Topological charge number multiplexing for JTC multiple-image encryption," Opt. Commun. 412, 155-160 (2018). DOI |
30 | K. Ravi, B. Basanta, and K. N. Naveen, "Nonlinear QR code based optical image encryption using spiral phase transform, equal modulus decomposition and singular value decomposition," J. Opt.-UK 20, 015701 (2018). DOI |
31 | M. R. Abuturab, "Color image security system using double random-structured phase encoding in gyrator transform domain," Appl. Opt. 51, 3006-3016 (2012). DOI |
32 | M. R. Abuturab, "Color information security system using discrete cosine transform in gyrator transform domain radial- Hilbert phase encoding," Opt. Lasers Eng. 50, 1209-1216 (2012). DOI |
33 | H. Singh, A. K. Yadav, S. Vashisth, and K. Singh, "Fully phase image encryption using double random-structured phase masks in gyrator domain," Appl. Opt. 53, 6472 (2014). DOI |
34 | A. K. Yadav, S. Vashisth, H. Singh, and K. Singh, "A phase-image watermarking scheme in gyrator domain using devil's vortex Fresnel lens as a phase mask," Opt. Commun. 344, 172-180 (2015). DOI |
35 | S. Liansheng, Z. Bei, N. Xiaojuan, and T. Ailing, "Optical multiple-image encryption based on the chaotic structured phase masks under the illumination of a vortex beam in the gyrator domain," Opt. Express 24, 499-515 (2016). DOI |
36 | H. Singh, A. K. Yadav, S. Vashisth, and K. Singh, "Double phase-image encryption using gyrator transforms, and structured phase mask in the frequency plane," Opt. Lasers Eng. 67, 145-156 (2015). DOI |
37 | P. Singh, A. K. Yadav, and K. Singh, "Phase image encryption in the fractional Hartley domain using Arnold transform and singular value decomposition," Opt. Lasers Eng. 91, 187-195 (2017). DOI |
38 | H. Singh, "Cryptosystem for securing image encryption using structured phase masks in fresnel wavelet transform domain," 3D Res. 7 (2016). |
39 | H. Singh, "Devil's vortex Fresnel lens phase masks on an asymmetric cryptosystem based on phase-truncation in gyrator wavelet transform domain," Opt. Lasers Eng. 81, 125-139 (2016). DOI |
40 | I. Lee and M. Cho, "Double random phase encryption using orthogonal encoding for multiple-image transmission," J. Opt. Soc. Korea 18, 201-206 (2014). DOI |
41 | A. Vaish and M. Kumar, "Color image encryption using singular value decomposition in discrete cosine Stockwell transform domain," Opt. Appl. 48, 25-38 (2018). |
42 | Z. Shao, Y. Shang, Q. Tong, H. Ding, X. Zhao, and X. Fu, "Multiple color image encryption and authentication based on phase retrieval and partial decryption in quaternion gyrator domain," Multimedia Tools Appl. 77, 25821-25840 (2018). DOI |
43 | X. Li, X. Meng, X. Yang, Y. Wang, Y. Yin, X. Peng, W. He, G. Dong, and H. Chen, "Multiple-image encryption via lifting wavelet transform and XOR operation based on compressive ghost imaging scheme," Opt. Laser Eng. 102, 106-111 (2018). DOI |
44 | H. Xu, W. Xu, S. Wang, and S. Wu, "Phase-only asymmetric optical cryptosystem based on random modulus decomposition," J. Mod. Opt. 65, 1245-1252 (2018). DOI |
45 | M. Liao, W. He, D. Lu, and X. Peng, "Ciphertext-only attack on optical cryptosystem with spatially incoherent illumination: from the view of imaging through scattering medium," Sci. Rep. 7, 41789 (2017). DOI |
46 | K. Ravi, B. Basanta, and K. N. Naveen, "Nonlinear QR code based optical image encryption using spiral phase transform, equal modulus decomposition and singular value decomposition," J. Opt.-UK 20, 015701 (2018). DOI |
47 | J. F. Barrera, R. Henao, and R. Torroba, "Optical encryption method using toroidal zone plates," Opt. Commun. 248, 35-40 (2005). DOI |
48 | Y. Xiong, A. He, and C. Quan, "Security analysis of a double-image encryption technique based on an asymmetric algorithm," J. Opt. Soc. Am. A 35, 320-326 (2018). DOI |
49 | M. Cho and B. Javidi, "Three-dimensional photon counting double-random-phase encryption," Opt. Lett. 38, 3198-3201 (2013). DOI |