OSA's Digital Library

Applied Optics

Applied Optics

APPLICATIONS-CENTERED RESEARCH IN OPTICS

  • Editor: Joseph N. Mait
  • Vol. 52, Iss. 3 — Jan. 20, 2013
  • pp: 467–473

Security improvement for asymmetric cryptosystem based on spherical wave illumination

Xiangling Ding, Xiaopeng Deng, Kehui Song, and Guangyi Chen  »View Author Affiliations


Applied Optics, Vol. 52, Issue 3, pp. 467-473 (2013)
http://dx.doi.org/10.1364/AO.52.000467


View Full Text Article

Enhanced HTML    Acrobat PDF (1020 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

We propose an improvement method for an asymmetric cryptosystem based on spherical wave illumination. Compared with the phase-truncated Fourier transform-based cryptosystem and the reported improving methods, the encryption process uses a spherical wave to illuminate the encryption system, rather than a uniform plane wave. As a result, the proposed method can avoid various types of the currently existing attacks and maintain the asymmetric characteristic of the cryptosystem. Moreover, due to only changing the illuminating mode, the proposed method can be easily implemented in optics compared with the reported improving methods. Simulation results are presented to demonstrate the feasibility and the security performance of the proposed method.

© 2013 Optical Society of America

OCIS Codes
(070.0070) Fourier optics and signal processing : Fourier optics and signal processing
(100.2000) Image processing : Digital image processing
(100.5070) Image processing : Phase retrieval

ToC Category:
Image Processing

History
Original Manuscript: September 25, 2012
Revised Manuscript: November 22, 2012
Manuscript Accepted: December 5, 2012
Published: January 17, 2013

Citation
Xiangling Ding, Xiaopeng Deng, Kehui Song, and Guangyi Chen, "Security improvement for asymmetric cryptosystem based on spherical wave illumination," Appl. Opt. 52, 467-473 (2013)
http://www.opticsinfobase.org/ao/abstract.cfm?URI=ao-52-3-467


Sort:  Author  |  Year  |  Journal  |  Reset  

References

  1. P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995). [CrossRef]
  2. G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887–889 (2000). [CrossRef]
  3. H. E. Hwang and P. Han, “Fast algorithm of phase masks for image encryption in the Fresnel domain,” J. Opt. Soc. Am. A 23, 1870–1874 (2006). [CrossRef]
  4. B. Hennelly and J. T. Sheridan, “Optical image encryption by random shifting in fractional Fourier domains,” Opt. Lett. 28, 269–271 (2003). [CrossRef]
  5. N. K. Nishchal, J. Joseph, and K. Singh, “Securing information using fractional Fourier transform in digital holography,” Opt. Commun. 235, 253–259 (2004). [CrossRef]
  6. H. E. Hwang, H. T. Chang, and W. N. Lie, “Fast double-phase retrieval in Fresnel domain using modified Gerchberg–Saxton algorithm for lensless optical security systems,” Opt. Express 17, 13700–13710 (2009). [CrossRef]
  7. G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586 (2004). [CrossRef]
  8. N. Singh and A. Sinha, “Optical image encryption using fractional Fourier transform and chaos,” Opt. Lasers. Eng. 46, 117–123 (2008). [CrossRef]
  9. X. Deng and D. Zhao, “Multiple-image encryption using phase retrieve algorithm and inter-modulation in Fourier domain,” Opt. Laser Technol. 44, 374–377 (2012). [CrossRef]
  10. X. Peng, L. F. Yu, and L. L. Cai, “Double-lock for image encryption with virtual optical wavelength,” Opt. Express 10, 41–45 (2002). [CrossRef]
  11. X. Deng and D. Zhao, “Single-channel color image encryption using a modified Gerchberg–Saxton algorithm and mutual encoding in the Fresnel domain,” Appl. Opt. 50, 6019–6025 (2011). [CrossRef]
  12. P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995). [CrossRef]
  13. X. Deng and D. Zhao, “Single-channel color image encryption based on asymmetric cryptosystem,” Opt. Laser Technol. 44, 136–140 (2012). [CrossRef]
  14. L. F. Chen and D. Zhao, “Optical color image encryption by wavelength multiplexing and lensless Fresnel transform holograms,” Opt. Express 14, 8552–8560 (2006). [CrossRef]
  15. R. Tao, Y. Xin, and Y. Wang, “Double image encryption based on random phase encoding in the fractional Fourier domain,” Opt. Express 15, 16067–16079 (2007). [CrossRef]
  16. H. T. Chang, W. C. Lu, and C. J. Kuo, “Multiple-phase retrieval for optical security systems using random phase encoding,” Appl. Opt. 41, 4825–4834 (2002). [CrossRef]
  17. G. H. Lin, H. T. Chang, W. N. Lai, and C. H. Chuang, “Public-key-based optical image cryptosystem with data embedding techniques,” Opt. Eng. 42, 2331–2339 (2003). [CrossRef]
  18. H. T. Chang and C. T. Chen, “Asymmetric-image verification for security optical system based on joint transform correlator,” Opt. Commun. 239, 43–54 (2004). [CrossRef]
  19. H. T. Chang and C. C. Chen, “Fully phase asymmetric image verification system based on joint transform correlator,” Opt. Express 14, 1458–1467 (2006). [CrossRef]
  20. W. Qin and X. Peng, “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35, 118–120 (2010). [CrossRef]
  21. X. Wang and D. Zhao, “A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Commun. 285, 1078–1081 (2012). [CrossRef]
  22. X. Wang and D. Zhao, “Security enhancement of a phase-truncation based image encryption algorithm,” Appl. Opt. 50, 6645–6651 (2011). [CrossRef]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited