메뉴 건너뛰기




Volumn 51, Issue 10, 2012, Pages 1446-1452

Image encryption based on interference that uses fractional Fourier domain asymmetric keys

Author keywords

[No Author keywords available]

Indexed keywords

FOURIER TRANSFORMS; IMAGE PROCESSING; MEAN SQUARE ERROR;

EID: 84859357927     PISSN: 1559128X     EISSN: 15394522     Source Type: Journal    
DOI: 10.1364/AO.51.001446     Document Type: Article
Times cited : (136)

References (28)
  • 1
    • 0029289969 scopus 로고
    • Optical image encryption based on input plane encoding and Fourier plane random encoding
    • P. Refregier and B. Javidi, "Optical image encryption based on input plane encoding and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995).
    • (1995) Opt. Lett. , vol.20 , pp. 767-769
    • Refregier, P.1    Javidi, B.2
  • 2
    • 0032607911 scopus 로고    scopus 로고
    • Encrypted optical memory system using three-dimensional keys in the Fresnel domain
    • O. Matoba and B. Javidi, "Encrypted optical memory system using three-dimensional keys in the Fresnel domain," Opt. Lett. 24, 762-764 (1999). (Pubitemid 129306550)
    • (1999) Optics Letters , vol.24 , Issue.11 , pp. 762-764
    • Matoba, O.1    Javidi, B.2
  • 3
    • 20444461085 scopus 로고    scopus 로고
    • Multiple-image encryption by wavelength multiplexing
    • G. Situ and J. Zhang, "Multiple image encryption by wavelength multiplexing," Opt. Lett. 30, 1306-1308 (2005). (Pubitemid 40818548)
    • (2005) Optics Letters , vol.30 , Issue.11 , pp. 1306-1308
    • Situ, G.1    Zhang, J.2
  • 4
    • 31644440682 scopus 로고    scopus 로고
    • Multiplexing encryption-decryption via lateral shifting of a random phase mask
    • DOI 10.1016/j.optcom.2005.09.027, PII S0030401805009673
    • J. F. Barrera, R. Henao, R. Torroba, M. Tebaldi, and N. Bolognini, "Multiplexing encryption-decryption via lateral shifting of a random phase mask," Opt. Commun. 259, 532-536 (2006). (Pubitemid 43172231)
    • (2006) Optics Communications , vol.259 , Issue.2 , pp. 532-536
    • Barrera, J.F.1    Henao, R.2    Tebaldi, M.3    Torroba, R.4    Bolognini, N.5
  • 5
    • 72649107175 scopus 로고    scopus 로고
    • Multiple-image encryption and multiplexing using a modified Gerchberg-Saxton algorithm and phase modulation in Fresnel-transform domain
    • H.-E. Hwang, H. T. Chang, andW.-N. Lie, "Multiple-image encryption and multiplexing using a modified Gerchberg-Saxton algorithm and phase modulation in Fresnel-transform domain," Opt. Lett. 34, 3917-3919 (2009).
    • (2009) Opt. Lett. , vol.34 , pp. 3917-3919
    • Hwang, H.-E.1    Chang, H.T.2    Lie, W.-N.3
  • 6
    • 0001182141 scopus 로고    scopus 로고
    • Optical encryption by double-random phase encoding in the fractional Fourier domain
    • G. Unnikrishnan, J. Joseph, and K. Singh, "Optical encryption by double-random phase encoding in the fractional Fourier domain," Opt. Lett. 25, 887-889 (2000).
    • (2000) Opt. Lett. , vol.25 , pp. 887-889
    • Unnikrishnan, G.1    Joseph, J.2    Singh, K.3
  • 7
    • 0037443119 scopus 로고    scopus 로고
    • Optical image encryption by random shifting in fractional Fourier domains
    • B. Hennelly and J. T. Sheridan, "Optical image encryption by random shifting in fractional Fourier domains," Opt. Lett. 28, 269-271 (2003).
    • (2003) Opt. Lett. , vol.28 , pp. 269-271
    • Hennelly, B.1    Sheridan, J.T.2
  • 8
    • 36048937251 scopus 로고    scopus 로고
    • Optical image encryption using fractional Fourier transform and chaos
    • DOI 10.1016/j.optlaseng.2007.09.001, PII S0143816607001649
    • N. Singh and A. Sinha, "Optical image encryption using fractional Fourier transform and chaos," Opt. Lasers Eng. 46, 117-123 (2008). (Pubitemid 350087229)
    • (2008) Optics and Lasers in Engineering , vol.46 , Issue.2 , pp. 117-123
    • Singh, N.1    Sinha, A.2
  • 9
    • 77954936135 scopus 로고    scopus 로고
    • Optical image compression and encryption methods
    • A. Alfalou and C. Brosseau, "Optical image compression and encryption methods," Opt. Photon. 1, 589-636 (2009).
    • (2009) Opt. Photon. , vol.1 , pp. 589-636
    • Alfalou, A.1    Brosseau, C.2
  • 10
    • 0001248217 scopus 로고    scopus 로고
    • Optical image encryption based on multifractional Fourier transforms
    • B. Zhu, S. Liu, and Q. Ran, "Optical image encryption based on multifractional Fourier transforms," Opt. Lett. 25, 1159-1161 (2000).
    • (2000) Opt. Lett. , vol.25 , pp. 1159-1161
    • Zhu, B.1    Liu, S.2    Ran, Q.3
  • 11
    • 78650033282 scopus 로고    scopus 로고
    • Flexible optical encryption with multiple users and multiple security levels
    • N. K. Nishchal and T. J. Naughton, "Flexible optical encryption with multiple users and multiple security levels," Opt. Commun. 284, 735-739 (2011).
    • (2011) Opt. Commun. , vol.284 , pp. 735-739
    • Nishchal, N.K.1    Naughton, T.J.2
  • 12
    • 55849128496 scopus 로고    scopus 로고
    • Optical image encryption based on interference
    • Y. Zhang and B. Wang, "Optical image encryption based on interference," Opt. Lett. 33, 2443-2445 (2008).
    • (2008) Opt. Lett. , vol.33 , pp. 2443-2445
    • Zhang, Y.1    Wang, B.2
  • 13
    • 70450187173 scopus 로고    scopus 로고
    • Enhancement of image hiding by exchanging two phase masks
    • Y. Zhang, B. Wang, and Z. Dong, "Enhancement of image hiding by exchanging two phase masks," J. Opt. A: Pure Appl. Opt. 11, 125406 (2009).
    • (2009) J. Opt. A: Pure Appl. Opt. , vol.11 , pp. 125406
    • Zhang, Y.1    Wang, B.2    Dong, Z.3
  • 14
    • 77249163176 scopus 로고    scopus 로고
    • Optical image encryption based on two beams interference
    • Y. Han and Y. Zhang, "Optical image encryption based on two beams interference," Opt. Commun. 283, 1690-1692 (2010).
    • (2010) Opt. Commun. , vol.283 , pp. 1690-1692
    • Han, Y.1    Zhang, Y.2
  • 15
    • 77950901513 scopus 로고    scopus 로고
    • An encryption method with multiple encrypted keys based on interference principle
    • C. H. Niu, X. L. Wang, N. G. Lv, Z. H Zhou, and X. Y. Li, "An encryption method with multiple encrypted keys based on interference principle," Opt. Express 18, 7827-7834 (2010).
    • (2010) Opt. Express , vol.18 , pp. 7827-7834
    • Niu, C.H.1    Wang, X.L.2    Lv, N.G.3    Zhou, Z.H.4    Li, X.Y.5
  • 16
    • 79952312318 scopus 로고    scopus 로고
    • Experimental verification of optical image encryption based on interference
    • D. Weng, N. Zhu, Y. Wang, J. Xie, and J. Liu, "Experimental verification of optical image encryption based on interference," Opt. Commun. 284, 2485-2487 (2011).
    • (2011) Opt. Commun. , vol.284 , pp. 2485-2487
    • Weng, D.1    Zhu, N.2    Wang, Y.3    Xie, J.4    Liu, J.5
  • 17
    • 79958850486 scopus 로고    scopus 로고
    • Optical image encryption using jigsaw transform for silhouette removal in interferencebased methods and decryption with single spatial light modulator
    • P. Kumar, J. Joseph, and K. Singh, "Optical image encryption using jigsaw transform for silhouette removal in interferencebased methods and decryption with single spatial light modulator," Appl. Opt. 50, 1805-1811 (2011).
    • (2011) Appl. Opt. , vol.50 , pp. 1805-1811
    • Kumar, P.1    Joseph, J.2    Singh, K.3
  • 18
    • 79851476254 scopus 로고    scopus 로고
    • Optical stream-cipher-like system for image encryption based on Michelson interferometer
    • B. Yang, Z. Liu, B. Wang, Y. Zhang, and S. Liu, "Optical stream-cipher-like system for image encryption based on Michelson interferometer," Opt. Express 19, 2634-2642 (2011).
    • (2011) Opt. Express , vol.19 , pp. 2634-2642
    • Yang, B.1    Liu, Z.2    Wang, B.3    Zhang, Y.4    Liu, S.5
  • 19
    • 80052804056 scopus 로고    scopus 로고
    • Information hiding based on the optical interference principle
    • S. Yuan, S.-X. Yao, Y.-H. Xin, and M.-T. Liu, "Information hiding based on the optical interference principle," Opt. Commun. 284, 5078-5083 (2011).
    • (2011) Opt. Commun. , vol.284 , pp. 5078-5083
    • Yuan, S.1    Yao, S.-X.2    Xin, Y.-H.3    Liu, M.-T.4
  • 21
    • 33846148634 scopus 로고    scopus 로고
    • Asymmetric cryptography based on wavefront sensing
    • DOI 10.1364/OL.31.003579
    • X. Peng, H. Wie, and P. Zhang, "Asymmetric cryptography based on wavefront sensing," Opt. Lett. 31, 3579-3581 (2006). (Pubitemid 46079708)
    • (2006) Optics Letters , vol.31 , Issue.24 , pp. 3579-3581
    • Peng, X.1    Wei, H.2    Zhang, P.3
  • 22
    • 75749131585 scopus 로고    scopus 로고
    • Asymmetric cryptosystem based on phase-truncated Fourier transforms
    • W. Qin and X. Peng, "Asymmetric cryptosystem based on phase-truncated Fourier transforms," Opt. Lett. 35, 118-120 (2010).
    • (2010) Opt. Lett. , vol.35 , pp. 118-120
    • Qin, W.1    Peng, X.2
  • 23
    • 81355163453 scopus 로고    scopus 로고
    • Universal and special keys based on phase-truncated Fourier transform
    • W. Qin, X. Peng, X. Meng, and B. Gao, "Universal and special keys based on phase-truncated Fourier transform," Opt. Eng. 50, 080501 (2011).
    • (2011) Opt. Eng. , vol.50 , pp. 080501
    • Qin, W.1    Peng, X.2    Meng, X.3    Gao, B.4
  • 24
    • 78649684161 scopus 로고    scopus 로고
    • Multiple-image encryption based on nonlinear amplitude-truncation and phase-truncation in Fourier domain
    • X. Wang and D. Zhao, "Multiple-image encryption based on nonlinear amplitude-truncation and phase-truncation in Fourier domain," Opt. Commun. 284, 148-152 (2011).
    • (2011) Opt. Commun. , vol.284 , pp. 148-152
    • Wang, X.1    Zhao, D.2
  • 25
    • 84255184192 scopus 로고    scopus 로고
    • Security enhancement of a phasetruncation based image encryption algorithm
    • X. Wang and D. Zhao, "Security enhancement of a phasetruncation based image encryption algorithm," Appl. Opt. 50, 6645-6651 (2011).
    • (2011) Appl. Opt. , vol.50 , pp. 6645-6651
    • Wang, X.1    Zhao, D.2
  • 26
    • 22144431522 scopus 로고    scopus 로고
    • Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys
    • DOI 10.1364/OL.30.001644
    • A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, "Vulnerability to chosen-cyphertext attacks of the optical encryption schemes based on double random phase keys," Opt. Lett. 30, 1644-1646 (2005). (Pubitemid 40972027)
    • (2005) Optics Letters , vol.30 , Issue.13 , pp. 1644-1646
    • Carnicer, A.1    Montes-Usategui, M.2    Arcos, S.3    Juvells, I.4
  • 27
    • 33744788334 scopus 로고    scopus 로고
    • Known-plaintext attack on optical encryption based on double random phase keys
    • DOI 10.1364/OL.31.001044
    • X. Peng, P. Chang, H.Wei, and B. Yu, "Known plaintext attack on optical encryption based on double random phase keys," Opt. Lett. 31, 1044-1046 (2006). (Pubitemid 43837446)
    • (2006) Optics Letters , vol.31 , Issue.8 , pp. 1044-1046
    • Peng, X.1    Zhang, P.2    Wei, H.3    Yu, B.4
  • 28
    • 34547780523 scopus 로고    scopus 로고
    • Resistance of the double random phase encryption against various attacks
    • DOI 10.1364/OE.15.010253
    • Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, "Resistance of the double random phase encryption against various attacks," Opt. Express 15, 10253-10265 (2007). (Pubitemid 47230839)
    • (2007) Optics Express , vol.15 , Issue.16 , pp. 10253-10265
    • Frauel, Y.1    Castro, A.2    Naughton, T.J.3    Javidi, B.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.