Wang et al., 2013 - Google Patents
Multiple-image encryption based on interference principle and phase-only mask multiplexing in Fresnel transform domainWang et al., 2013
View HTML- Document ID
- 7469220186362514622
- Author
- Wang Q
- Guo Q
- Lei L
- Zhou J
- Publication year
- Publication venue
- Applied optics
External Links
Snippet
In this article, a multiple-image encryption method based on the optical interference principle and phase-only mask (POM) multiplexing is proposed. During the encryption process, each secret image is encoded into two analytically obtained POMs and one computer-generated …
- 230000003287 optical 0 abstract description 38
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
-
- G—PHYSICS
- G02—OPTICS
- G02F—DEVICES OR ARRANGEMENTS, THE OPTICAL OPERATION OF WHICH IS MODIFIED BY CHANGING THE OPTICAL PROPERTIES OF THE MEDIUM OF THE DEVICES OR ARRANGEMENTS FOR THE CONTROL OF THE INTENSITY, COLOUR, PHASE, POLARISATION OR DIRECTION OF LIGHT, e.g. SWITCHING, GATING, MODULATING OR DEMODULATING; TECHNIQUES OR PROCEDURES FOR THE OPERATION THEREOF; FREQUENCY-CHANGING; NON-LINEAR OPTICS; OPTICAL LOGIC ELEMENTS; OPTICAL ANALOGUE/DIGITAL CONVERTERS
- G02F1/00—Devices or arrangements for the control of the intensity, colour, phase, polarisation or direction of light arriving from an independent light source, e.g. switching, gating, or modulating; Non-linear optics
- G02F1/35—Non-linear optics
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Rajput et al. | Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform | |
Rajput et al. | Image encryption based on interference that uses fractional Fourier domain asymmetric keys | |
Rajput et al. | Fresnel domain nonlinear optical image encryption scheme based on Gerchberg–Saxton phase-retrieval algorithm | |
Wang et al. | Optical image hiding with silhouette removal based on the optical interference principle | |
Rajput et al. | Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask | |
Liansheng et al. | Optical multiple-image encryption based on the chaotic structured phase masks under the illumination of a vortex beam in the gyrator domain | |
Liu et al. | Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang–Gu algorithm | |
Kumar et al. | Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator | |
Chen et al. | Optical image encryption based on diffractive imaging | |
Wang et al. | Security enhancement of a phase-truncation based image encryption algorithm | |
Chen et al. | A novel double-image encryption scheme based on cross-image pixel scrambling in gyrator domains | |
Hwang et al. | Fast double-phase retrieval in Fresnel domain using modified Gerchberg-Saxton algorithm for lensless optical security systems | |
Abuturab | Color information cryptosystem based on optical superposition principle and phase-truncated gyrator transform | |
Vilardy et al. | Nonlinear optical security system based on a joint transform correlator in the Fresnel domain | |
Zhong et al. | Silhouette-free image encryption using interference in the multiple-parameter fractional Fourier transform domain | |
Wang et al. | Multiple-image encryption based on interference principle and phase-only mask multiplexing in Fresnel transform domain | |
Rajput et al. | Photon counting imaging and phase mask multiplexing for multiple images authentication and digital hologram security | |
Qin et al. | Interference-based multiple-image encryption with silhouette removal by position multiplexing | |
Yang et al. | Optical stream-cipher-like system for image encryption based on Michelson interferometer | |
Wang et al. | Simultaneous nonlinear encryption of grayscale and color images based on phase-truncated fractional Fourier transform and optical superposition principle | |
Wang et al. | Double-image encryption without information disclosure using phase-truncation Fourier transforms and a random amplitude mask | |
Qin et al. | Optical multiple-image encryption in diffractive-imaging-based scheme using spectral fusion and nonlinear operation | |
Wang et al. | Fractional Fourier domain optical image hiding using phase retrieval algorithm based on iterative nonlinear double random phase encoding | |
Chen et al. | Interference-based optical image encryption using three-dimensional phase retrieval | |
Abuturab | Information authentication system using interference of two beams in gyrator transform domain |