86
Views
1
CrossRef citations to date
0
Altmetric
Articles

A novel secret sharing with two users based on joint transform correlator and compressive sensing

&
Pages 1072-1080 | Received 16 Jun 2017, Accepted 20 Dec 2017, Published online: 15 Jan 2018

References

  • Javidi, B.; Carnicer, A.; Yamaguchi, M.; et al. Roadmap on optical security. J. Opt. 2016, 18 (8), 083001.10.1088/2040-8978/18/8/083001
  • Weaver, C.S.; Goodman, J.W. A Technique for Optically Convolving Two Functions. Appl. Opt. 1966, 5 (7), 1248–1249.10.1364/AO.5.001248
  • Lugt, A.V. Signal Detection by Complex Spatial Filtering. IEEE Trans. Inf. Theory 1964, 10 (2), 139–145.10.1109/TIT.1964.1053650
  • Chen, Z.; Zhang, Y.; Mu, G. Complementary-Reference Joint Transform Correlator. Appl. Opt. 1994, 33 (32), 7622–7626.10.1364/AO.33.007622
  • Rodolfo, J.F.; Rajbenbach, H.J.; Huignard, J.P. Performance of a Photorefractive Joint Transform Correlator for Fingerprint Identification. Opt. Eng. 1995, 34 (4), 1166–1172.10.1117/12.196537
  • Kobayashi, Y.; Toyoda, H. Development of an Optical Joint Transform Correlation System for Fingerprint Recognition. Opt. Eng. 1999, 38 (7), 1205–1210.10.1117/1.602269
  • Alam, M.S.; Akhteruzzaman, M.; Cherrri, A.K. Real-Time Fingerprint Identification. Opt. Laser Technol. 2004, 36 (3), 191–196.10.1016/j.optlastec.2003.08.005
  • Kamal, H.A.; Cherri, A.K. Complementary-Reference and Complementary-Scene for Real-Time Fingerprint Verification using Joint Transform Correlator. Opt. Laser Technol. 2009, 41 (5), 643–650.10.1016/j.optlastec.2008.09.010
  • Nomura, T.; Javidi, B. Optical Encryption using a Joint Transform Correlator Architecture. Opt. Eng. 2000, 39 (8), 2031–2036.
  • Refregier, P.; Javidi, B. Optical Image Encryption Based on Input Plane and Fourier Plane Random Encoding. Opt. Lett. 1995, 20 (7), 767–769.10.1364/OL.20.000767
  • Vilardy, J.M.; Millán, M.S.; Pérez-Cabré, E. Nonlinear Optical Security System Based on a Joint Transform Correlator in the Fresnel Domain. Appl. Opt. 2014, 53 (8), 1674–1682.10.1364/AO.53.001674
  • Shen, X.J.; Chao, L.; Xiao, Z.;  Cai, J.J. Nonlinear Optical Cryptosystem Based on Joint Fresnel Transform Correlator Under Vector Wave Illumination. J. Opt. 2015, 17 (5), 055701.
  • Shen, X.J.; Liu, X.M.; Yin, J.L.; Lu, X.W.; Kong, D.Z.; Lin, C. Joint Fresnel Transform Correlator Based on Double Optical Wedges. Opt. Commun. 2015, 339, 243–246.
  • Li, J.; Zhong, T.; Dai, X.F.; Yang, C.X.; Li, R.; Tang, Z.L. Compressive Optical Image Watermarking Using Joint Fresnel Transform Correlator Architecture. Opt. Lasers Eng. 2017, 89, 29–33.10.1016/j.optlaseng.2016.02.024
  • Lu, D.; Jin, W. Fully Phase Color Image Encryption Based on Joint Fractional Fourier Transform Correlator and Phase Retrieval Algorithm. Chin. Opt. Lett. 2011, 9 (2), 021002.
  • Lu, D.; Jin, W.. Color Image Encryption Based on Joint Fractional Fourier Transform Correlator. Opt. Eng. 2011, 50 (6), 068201–068201-7.10.1117/1.3590724
  • Mehra, I.; Rajput, S.K.; Nishchal, N.K. Cryptanalysis of an Image Encryption Scheme Based on Joint Transform Correlator with Amplitude-and Phase-Truncation Approach. Opt. Lasers Eng. 2014, 52, 167–173.10.1016/j.optlaseng.2013.06.015
  • Barrera, J.F.; Vargas, C.; Tebaldi, M.; Torroba, R. Chosen-Plaintext Attack on a Joint Transform Correlator Encrypting System. Opt. Commun. 2010, 283 (20), 3917–3921.10.1016/j.optcom.2010.06.009
  • Barrera, J.F.; Vargas, C.; Tebaldi, M.; Torroba, R.; Bolognini, N. Known-Plaintext Attack on a Joint Transform Correlator Encrypting System. Opt. Lett. 2010, 35 (21), 3553–3555.10.1364/OL.35.003553
  • Qin, W.; Peng, X.; Meng, X. Cryptanalysis of Optical Encryption Schemes Based on Joint Transform Correlator Architecture. Opt. Eng. 2011, 50(2), 028201–028201-4.10.1117/1.3533028
  • Lin, C.; Shen, X. Analysis and Design of Impulse Attack Free Generalized Joint Transform Correlator Optical Encryption Scheme. Opt. Laser Technol. 2012, 44 (7), 2032–2036.10.1016/j.optlastec.2012.03.031
  • Liao, M.H.; He, W.Q.; Peng, X.; Liu, X.L.; Meng, X.F. Cryptanalysis of Optical Encryption with a Reference Wave in a Joint Transform Correlator Architecture. Opt. Laser Technol. 2013, 45, 763–767.10.1016/j.optlastec.2012.04.039
  • Zhang, C.G.; Liao, M.H.; He, W.Q.; Peng, X. Ciphertext-Only Attack on a Joint Transform Correlator Encryption System. Opt. Express 2013, 21 (23), 28523–28530.10.1364/OE.21.028523
  • Cai, J.J.; Shen, X.J.; Wu, H.L.; Lin, C. Ciphertext-Only Attack on the JTC-Based Cryptosystem with Sizes and Locations of the Plaintext and the Key Code Unknown. Appl. Opt. 2015, 54 (15), 4760–4764.10.1364/AO.54.004760
  • Diffie, W.; Hellman, M. New Directions in Cryptography. IEEE Trans. Inf. Theory 1976, 22 (6), 644–654.10.1109/TIT.1976.1055638
  • Shamir, A. How to Share a Secret. Commun. ACM 1979, 22 (11), 612–613.10.1145/359168.359176
  • Blakley, G.R. Safeguarding Cryptographic Keys. Proc. Nat. Comput. Conf. 1979, 48, 313–317.
  • Takhar, D.; Laska, JN.; Wakin, MB.; Duarte, ME.; Baron, D.; Sarvotham, S.; Kelly, K.E.; Baraniuk, R.G. A New Compressive Imaging Camera Architecture Using Optical-Domain Compression. Comput. Imaging IV. Int. Soc. Opt. Photonics. 2006, 6065, 606509.
  • Duarte, M.F.; Davenport, M.A.; Takhar, D.; Laska, J.N.; Sun, T.; Kelly, K.F.; Baraniuk, R.G. Single-Pixel Imaging via Compressive Sampling. IEEE Signal Proc. Mag. 2008, 25 (2), 83–91.
  • Romberg, J. Imaging via Compressive Sampling. IEEE Signal Proc. Mag. 2008, 25 (2), 14–20.10.1109/MSP.2007.914729
  • Li, J.; Li, H.B.; Li, J.S.; Pan, Y.Y.; Li, R. Compressive Optical Image Encryption with Two-Step-Only Quadrature Phase-Shifting Digital Holography. Opt. Commun. 2015, 344, 166–171.
  • Rawat, N.; Kim, B.; Muniraj, I.; Situ, G.; Lee, B.G. Compressive Sensing Based Robust Multispectral Double-Image Encryption. Appl. Opt. 2015, 54 (7), 1782–1793.10.1364/AO.54.001782
  • Tropp, J.A.; Gilbert, A.C. Signal Recovery From Random Measurements via Orthogonal Matching Pursuit. IEEE Trans. Inf. Theory 2007, 53 (12), 4655–4666.10.1109/TIT.2007.909108

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.