71
Views
0
CrossRef citations to date
0
Altmetric
Articles

Nonlinear image encryption and authentication based on phase truncation and reservation in the cylindrical diffraction domain

&
Pages 430-444 | Received 06 Nov 2019, Accepted 14 Feb 2020, Published online: 03 Mar 2020

References

  • Liu Z, Guo C, Tan J, et al. Securing color image by using phase-only encoding in Fresnel domains. Opt Lasers Eng. 2015 Apr;68:87–92. doi: 10.1016/j.optlaseng.2014.12.022
  • Yadav AK, Singh P, Saini I, et al. Asymmetric encryption algorithm for colour images based on fractional Hartley transform. J Mod Opt. 2019;66(6):629–642. doi: 10.1080/09500340.2018.1559951
  • Luo Y, Tang S, Qin X, et al. A double-image encryption scheme based on amplitude-phase encoding and discrete complex random transformation. IEEE Access. 2018 Nov;6:77740–77753. doi: 10.1109/ACCESS.2018.2884013
  • Zhou N, Liu X, Zhang Y, et al. Image encryption scheme based on fractional Mellin transform and phase retrieval technique in fractional Fourier domain. Opt Laser Technol. 2013;47(4):341–346. doi: 10.1016/j.optlastec.2012.08.033
  • Ding X, Huang Y, Zhang D, et al. Nonlinear double-image encryption in cylindrical diffraction-based scheme by aid of position multiplexing. IEEE Access. 2019 Nov;8:205–214. doi: 10.1109/ACCESS.2019.2959008
  • Zhang D, Yang G, Li F, et al. Detecting seam carved images using uniform local binary patterns. Multimed Tools Appl. 2018. doi:10.1007/s11042-018-6470-y
  • Zhang D, Liang Z, Yang G, et al. A robust forgery detection algorithm for object removal by exemplar-based image inpainting. Multimed Tools Appl. 2018;77(10):11823–11842. doi: 10.1007/s11042-017-4829-0
  • Zhang D, Yin T, Yang G, et al. Detecting image seam carving with low scaling ratio using multi-scale spatial and spectral entropies. J Vis Commun Image Represent. 2017;48:281–291. doi: 10.1016/j.jvcir.2017.07.006
  • Ding X, Zhang D. Detection of motion-compensated frame-rate up-conversion via optical flow-based prediction residue. Optik. 2019. doi:10.1016/j.ijleo.2019.163766.
  • Javidi B, Refregier P. Optical image encryption based on input plane and Fourier plane random encoding. Opt Lett. 1995;20(7):767–769. doi: 10.1364/OL.20.000767
  • Matoba O, Javidi B. Encrypted optical memory system using three-dimensional keys in the Fresnel domain. Opt Lett. 1999;24(11):762–764. doi: 10.1364/OL.24.000762
  • Liu Z, Guo Q, Xu L, et al. Double image encryption by using iterative random binary encoding in gyrator domains. Opt Exp. 2010;18(11):12033–12043. doi: 10.1364/OE.18.012033
  • Wu J, Cao X, Liu X, et al. Image encryption using the random FrDCT and the chaos-based game of life. J Mod Opt. 2019;66(7):764–775. doi: 10.1080/09500340.2019.1571249
  • Rakheja P, Vig R, Singh P. Asymmetric hybrid encryption scheme based on modified equal modulus decomposition in hybrid multi-resolution wavelet domain. J Mod Opt. 2019;66(7):799–811. doi: 10.1080/09500340.2019.1574037
  • Zhang Y, Wang B. Optical image encryption based on interference. Opt Lett. 2008;33(21):2443–2445. doi: 10.1364/OL.33.002443
  • Chen W, Chen X, Sheppard CJR. Optical image encryption based on diffractive imaging. Opt Lett. 2010;35(22):3817–3819. doi: 10.1364/OL.35.003817
  • Amaya D, Tebaldi M, Torroba R, et al. Digital color encryption using a multi-wavelength approach and a joint transform correlator. J Opt A Pure Appl Opt. 2008 Sep;10(10):104031. doi: 10.1088/1464-4258/10/10/104031
  • Liao M, He W, Lu D, et al. Security enhancement of the phase-shifting interferometry-based cryptosystem by independent random phase modulation in each exposure. Opt Lasers Eng. 2017 Feb;89:34–39. doi: 10.1016/j.optlaseng.2016.03.015
  • Peng X, Zhang P, Wei H, et al. Known-plaintext attack on optical encryption based on double random phase keys. Opt Lett. 2006;31(8):1044–1046. doi: 10.1364/OL.31.001044
  • Peng X, Wei H, Zhang P. Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain. Opt Lett. 2006;31(22):3261–3263. doi: 10.1364/OL.31.003261
  • Carnicer A, Montes-Usategui M, Arcos S, et al. Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. Opt Lett. 2005;30(13):1644–1646. doi: 10.1364/OL.30.001644
  • Pérez-Cabré E, Cho M, Javidi B. Information authentication using photon-counting double-random-phase encrypted images. Opt Lett. 2011;36(1):22–24. doi: 10.1364/OL.36.000022
  • Wang H, Qin Y, Huang Y, et al. Multiple-image encryption and authentication in interference-based scheme by aid of space multiplexing. Opt Laser Technol. 2017 Oct;95:63–71. doi: 10.1016/j.optlastec.2017.04.019
  • Chen W, Chen X, Stern A, et al. Phase-modulated optical system with sparse representation for information encoding and authentication. IEEE Photon J. 2013 Apr;5(2):6900113–6900113.
  • Chen W, Chen X. Double random phase encoding using phase reservation and compression. J Opt. 2014;16(2):218–241. doi: 10.1088/2040-8978/16/2/025402
  • Zhang Y, Wang B, Dong Z. Enhancement of image hiding by exchanging two phase masks. J Opt A. 2009;11(12):125406.
  • Kumar P, Joseph J, Singh K. Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator. Appl Opt. 2011;50(13):1805–1811. doi: 10.1364/AO.50.001805
  • Lin C, Shen X, Lei M. Generation of plaintext-independent private key based on conditional decomposition strategy. Opt Lasers Eng. 2016 Nov;86:303–308. doi: 10.1016/j.optlaseng.2016.06.023
  • Lu D, He W, Liao M, et al. An interference-based optical authentication scheme using two phase-only masks with different diffraction distances. Opt Lasers Eng. 2016 Feb;89:40–46. doi: 10.1016/j.optlaseng.2016.04.002
  • Zhong Z, Qin H, Liu L, et al. Silhouette-free image encryption using interference in the multiple-parameter fractional Fourier transform domain. Opt Exp. 2017;25(6):6974–6982. doi: 10.1364/OE.25.006974
  • Luan G, Li A, Zhang D, et al. Asymmetric image encryption and authentication based on equal modulus decomposition in the Fresnel transform domain. IEEE Photon J. 2018 Feb;11(1):1–7. doi: 10.1109/JPHOT.2018.2886295
  • Qin W, Peng X. Asymmetric cryptosystem based on phase-truncated Fourier transforms. Opt Lett. 2010;35(2):118–120. doi: 10.1364/OL.35.000118
  • Wang X, Zhao D. A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms. Opt Commun. 2012 Mar;285(6):1078–1081. doi: 10.1016/j.optcom.2011.12.017
  • Wang J, Wang Q, Hu Y. Fast diffraction calculation of cylindrical computer generated hologram based on outside-in propagation model. Opt Commun. 2017 Nov;403:296–303. doi: 10.1016/j.optcom.2017.07.045
  • Wang J, Hu Y, Wang Q. Asymmetric color image cryptosystem using detour cylindrical-diffraction and phase reservation & truncation. IEEE Access. 2018 Sep;6:53976–53983. doi: 10.1109/ACCESS.2018.2871102
  • Wang J, Chen X, Zeng J, et al. Asymmetric cryptosystem using improved equal modulus decomposition in cylindrical diffraction domain. IEEE Access. 2019 May;7:66234–66241. doi: 10.1109/ACCESS.2019.2917994
  • Sando Y, Itoh M, Yatagai T. Fast calculation method for cylindrical computer-generated holograms. Opt Express. 2005;13(5):1418–1423. doi: 10.1364/OPEX.13.001418
  • Javidi B. Nonlinear joint power spectrum based optical correlation. Appl Opt. 1989;28(12):2358–2367. doi: 10.1364/AO.28.002358
  • The USC Signal and Image Processing Institute database [Online]. [Accessed on 2019 Jul 1]. Available from: http://sipi.usc.edu/database/.
  • Sadjadi F, Javidi B. Physics of automatic target recognition. Berlin: Springer Science & Business Media; 2007. p. 206–220.
  • Song Y, Zeng Y, Li X, et al. Fast CU size decision and mode decision algorithm for intra prediction in HEVC. Multimed Tools Appl. 2017;76(2):2001–2017. doi: 10.1007/s11042-015-3155-7
  • Song Y, Yang G, Xie H, et al. Residual domain dictionary learning for compressed sensing video recovery. Multimed Tools Appl. 2017;76(7):10083–10096. doi: 10.1007/s11042-016-3599-4
  • Li Y, Zhu N, Yang G, et al. Self-learning residual model for fast intra CU size decision in 3D-HEVC. Signal Process Image Commun. 2020;80:115660.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.