OSA's Digital Library

Applied Optics

Applied Optics

APPLICATIONS-CENTERED RESEARCH IN OPTICS

  • Editor: Joseph N. Mait
  • Vol. 51, Iss. 33 — Nov. 20, 2012
  • pp: 7994–8002

Color information cryptosystem based on optical superposition principle and phase-truncated gyrator transform

Muhammad Rafiq Abuturab  »View Author Affiliations


Applied Optics, Vol. 51, Issue 33, pp. 7994-8002 (2012)
http://dx.doi.org/10.1364/AO.51.007994


View Full Text Article

Enhanced HTML    Acrobat PDF (2305 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

A novel asymmetric color information cryptosystem based on an optical coherent superposition method and phase-truncated gyrator transform (GT) is proposed. In this proposal, an original color image is converted into three independent channels, i.e., red, green, and blue. Each channel is separated into a random phase masks (RPM) and a key phase mask (KPM) using a coherent superposition method. The KPM is a modulation of the RPM by the color channel and used as decryption key. The same RPM, which is independent of plaintext, can be chosen for different images of the same size; however, KPMs, which are related to the original color images, are different. The RPM and the KPM are independently gyrator transformed. Then two gyrator spectra are, respectively, phase truncated to obtain two encoded images and amplitude truncated to generate two asymmetric phase keys. The KPM and two phase keys provide asymmetric keys. The transformation angles of the GT give additional keys for each channel and thus offer a high-level robustness against existing attacks. The proposed optical design is free from axial movement. Numerical simulations are demonstrated to verify the flexibility and effectiveness of the proposed method.

© 2012 Optical Society of America

OCIS Codes
(050.0050) Diffraction and gratings : Diffraction and gratings
(070.0070) Fourier optics and signal processing : Fourier optics and signal processing
(100.2000) Image processing : Digital image processing

ToC Category:
Image Processing

History
Original Manuscript: September 18, 2012
Revised Manuscript: October 19, 2012
Manuscript Accepted: October 19, 2012
Published: November 20, 2012

Citation
Muhammad Rafiq Abuturab, "Color information cryptosystem based on optical superposition principle and phase-truncated gyrator transform," Appl. Opt. 51, 7994-8002 (2012)
http://www.opticsinfobase.org/ao/abstract.cfm?URI=ao-51-33-7994


Sort:  Author  |  Year  |  Journal  |  Reset  

References

  1. P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995). [CrossRef]
  2. Z. Liu and S. Liu, “Random fractional Fourier transform,” Opt. Lett. 32, 2088–2090 (2007). [CrossRef]
  3. H.-E. Hwang, H. T. Chang, and W.-N. Lie, “Multiple-image encryption and multiplexing using a modified Gerchberg-Saxton algorithm and phase modulation in Fresnel-transform domain,” Opt. Lett. 34, 3917–3919 (2009). [CrossRef]
  4. P. Clemente, V. Durán, V. Torres-Company, E. Tajahuerce, and J. Lancis, “Optical encryption based on computational ghost imaging,” Opt. Lett. 35, 2391–2393 (2010). [CrossRef]
  5. A. Alfalou and C. Brosseau, “Dual encryption scheme of images using polarized light,” Opt. Lett. 35, 2185–2187 (2010). [CrossRef]
  6. P. W. M. Tsang, T.-C. Poon, and K. W. K. Cheung, “Fast numerical generation and encryption of computer-generated Fresnel holograms,” Appl. Opt. 50, B46–B52 (2011). [CrossRef]
  7. E. Pérez-Cabré, M. Cho, and B. Javidi, “Information authentication using photon-counting double-random-phase encrypted images,” Opt. Lett. 36, 22–24 (2011). [CrossRef]
  8. W. Chen and X. Chen, “Interference-based optical image encryption using three-dimensional phase retrieval,” Appl. Opt. 51, 6076–6083 (2012). [CrossRef]
  9. S. Q. Zhang and M. A. Karim, “Color image encryption using double random phase encoding,” Microwave Opt. Technol. Lett. 21, 318–323 (1999). [CrossRef]
  10. L. Chen and D. Zhao, “Optical color image encryption by wavelength multiplexing and lensless Fresnel transform holograms,” Opt. Express 14, 8552–8560 (2006). [CrossRef]
  11. M. Joshi, C. Shakher, and K. Singh, “Color image encryption and decryption using fractional Fourier transform,” Opt. Commun. 279, 35–42 (2007). [CrossRef]
  12. Z. Liu, L. Xu, T. Liu, H. Chen, P. Li, C. Lin, and S. Liu, “Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains,” Opt. Commun. 284, 123–128 (2011). [CrossRef]
  13. W. Stallings, Cryptography and Network Security: Principles and Practices, 5th ed. (Prentice Hall, 2011).
  14. W. Qin and X. Peng, “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35, 118–120(2010). [CrossRef]
  15. W. Qin, X. Peng, X. F. Meng, and B. Gao, “Universal and special keys based on phase-truncated Fourier transform,” Opt. Eng. 50, 080501 (2011). [CrossRef]
  16. W. Chen and X. Chen, “Optical color image encryption based on an asymmetric cryptosystem in the Fresnel domain,” Opt. Commun. 284, 3913–3917 (2011). [CrossRef]
  17. X. Deng and D. Zhao, “Single-channel color image encryption based on asymmetric cryptosystem,” Opt. Laser Technol. 44, 136–140 (2012). [CrossRef]
  18. X. Wang and D. Zhao, “A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Commun. 285, 1078–1081 (2012). [CrossRef]
  19. X. Wang and D. Zhao, “Security enhancement of a phase-truncation based image encryption algorithm,” Appl. Opt. 50, 6645–6651 (2011). [CrossRef]
  20. J. A. Rodrigo, T. Alieva, and M. L. Calvo, “Gyrator transform: properties and applications,” Opt. Express 15, 2190–2203 (2007). [CrossRef]
  21. J. A. Rodrigo, T. Alieva, and M. L. Calvo, “Experimental implementation of the gyrator transform,” J. Opt. Soc. Am. A 24, 3135–3139 (2007). [CrossRef]
  22. Z. Liu, L. Xu, C. Chin, and S. Liu, “Image encryption by encoding with a non-uniform optical beam in gyrator transform domains,” Appl. Opt. 49, 5632–5637 (2010). [CrossRef]
  23. Z. Liu, L. Xu, C. Chen, J. Dai, and S. Liu, “Image encryption scheme by using iterative random phase encoding in gyrator transform domains,” Opt. Lasers Eng. 49, 542–546 (2011). [CrossRef]
  24. Z. Liu, M. Yang, W. Liu, S. Li, M. Gong, W. Liu, and S. Liu, “Image encryption algorithm based on the random local phase encoding in gyrator transform domains,” Opt. Commun. 285, 3921–3925 (2012). [CrossRef]
  25. Z. Liu, S. Li, W. Liu, W. Liu, and S. Liu, “Image hiding scheme by use of rotating squared sub-image in the gyrator transform domains,” Opt. Laser Technol. 45, 198–203 (2013). [CrossRef]
  26. M. R. Abuturab, “Securing color information using Arnold transform in gyrator transform domain,” Opt. Lasers Eng. 50, 772–779 (2012). [CrossRef]
  27. M. R. Abuturab, “Color image security system using double random-structured phase encoding in gyrator transform domain,” Appl. Opt. 51, 3006–3016 (2012). [CrossRef]
  28. M. R. Abuturab, “Color information security system using discrete cosine transform in gyrator transform domain radial-Hilbert phase encoding,” Opt. Lasers Eng. 50, 1209–1216 (2012).
  29. M. R. Abuturab, “Securing color image using discrete cosine transform in gyrator transform domain structured-phase encoding,” Opt. Lasers Eng. 50, 1383–1390 (2012). [CrossRef]
  30. M. R. Abuturab, “Color information security system using Arnold transform and double structured phase encoding in gyrator transform domain,” Opt. Laser Technol. 45, 525–532 (2013). [CrossRef]
  31. M. R. Abuturab, “Color image security system based on discrete Hartley transform in gyrator transform domain,” Opt. Lasers Eng. (to be published).
  32. M. R. Abuturab, “Noise-free recovery of color information using a joint-extended gyrator transform correlator,” Opt. Lasers Eng. (to be published).
  33. X. Wang and D. Zhao, “Image encoding based on coherent superposition and basic vector operations,” Opt. Commun. 284, 945–951 (2011). [CrossRef]
  34. X. Wang and D. Zhao, “Double-image self-encoding and hiding based on phase-truncated Fourier transforms and phase retrieval,” Opt. Commun. 284, 4441–4445 (2011). [CrossRef]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited