OSA's Digital Library

Optics Express

Optics Express

  • Editor: C. Martijn de Sterke
  • Vol. 20, Iss. 3 — Jan. 30, 2012
  • pp: 2386–2398

A no-key-exchange secure image sharing scheme based on Shamir’s three-pass cryptography protocol and the multiple-parameter fractional Fourier transform

Jun Lang  »View Author Affiliations


Optics Express, Vol. 20, Issue 3, pp. 2386-2398 (2012)
http://dx.doi.org/10.1364/OE.20.002386


View Full Text Article

Enhanced HTML    Acrobat PDF (1877 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

In this paper, we propose a novel secure image sharing scheme based on Shamir’s three-pass protocol and the multiple-parameter fractional Fourier transform (MPFRFT), which can safely exchange information with no advance distribution of either secret keys or public keys between users. The image is encrypted directly by the MPFRFT spectrum without the use of phase keys, and information can be shared by transmitting the encrypted image (or message) three times between users. Numerical simulation results are given to verify the performance of the proposed algorithm.

© 2012 OSA

OCIS Codes
(100.2000) Image processing : Digital image processing
(200.3050) Optics in computing : Information processing
(070.2575) Fourier optics and signal processing : Fractional Fourier transforms

ToC Category:
Image Processing

History
Original Manuscript: September 28, 2011
Revised Manuscript: November 29, 2011
Manuscript Accepted: December 1, 2011
Published: January 19, 2012

Citation
Jun Lang, "A no-key-exchange secure image sharing scheme based on Shamir’s three-pass cryptography protocol and the multiple-parameter fractional Fourier transform," Opt. Express 20, 2386-2398 (2012)
http://www.opticsinfobase.org/oe/abstract.cfm?URI=oe-20-3-2386


Sort:  Author  |  Year  |  Journal  |  Reset  

References

  1. P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett.20(7), 767–769 (1995). [CrossRef] [PubMed]
  2. G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett.25(12), 887–889 (2000). [CrossRef] [PubMed]
  3. S. Liu, L. Yu, and B. Zhu, “Optical image encryption by cascaded fractional Fourier transforms with random phase filtering,” Opt. Commun.187(1-3), 57–63 (2001). [CrossRef]
  4. B. Zhu, S. Liu, and Q. Ran, “Optical image encryption based on multifractional Fourier transforms,” Opt. Lett.25(16), 1159–1161 (2000). [CrossRef] [PubMed]
  5. B. Hennelly and J. T. Sheridan, “Optical image encryption by random shifting in fractional Fourier domains,” Opt. Lett.28(4), 269–271 (2003). [CrossRef] [PubMed]
  6. J. Lang, R. Tao, and Y. Wang, “Image encryption based on the multiple-parameter discrete fractional Fourier transform and chaos function,” Opt. Commun.283(10), 2092–2096 (2010). [CrossRef]
  7. X. Wang and D. Zhao, “Double-image self-encoding and hiding based on phase-truncated Fourier transforms and phase retrieval,” Opt. Commun.284(19), 4441–4445 (2011). [CrossRef]
  8. Z. Liu, M. A. Ahmad, and S. Liu, “Image encryption scheme based on the commutation and anti-commutation rules,” Opt. Commun.279(2), 285–290 (2007). [CrossRef]
  9. R. Tao, J. Lang, and Y. Wang, “Optical image encryption based on the multiple-parameter fractional Fourier transform,” Opt. Lett.33(6), 581–583 (2008). [CrossRef] [PubMed]
  10. Q. Ran, H. Zhang, J. Zhang, L. Tan, and J. Ma, “Deficiencies of the cryptography based on multiple-parameter fractional Fourier transform,” Opt. Lett.34(11), 1729–1731 (2009). [CrossRef] [PubMed]
  11. R. Tao, J. Lang, and Y. Wang, “The multiple-parameter discrete fractional Hadamard transform,” Opt. Commun.282(8), 1531–1535 (2009). [CrossRef]
  12. Z. Liu, M. A. Ahmad, and S. Liu, “Image sharing scheme based on combination theory,” Opt. Commun.281(21), 5322–5325 (2008). [CrossRef]
  13. Z. Liu, S. Liu, and M. A. Ahmad, “Image sharing scheme based on discrete fractional random transform,” Optik (Stuttg.)121(6), 495–499 (2010). [CrossRef]
  14. C. N. Yang and S. M. Huang, “Constructions and properties of k out of n scalable secret image sharing,” Opt. Commun.283(9), 1750–1762 (2010). [CrossRef]
  15. N. Islam, W. Puech, K. Hayat, and R. Brouzet, “Application of homomorphism to secure image sharing,” Opt. Commun.284(19), 4412–4429 (2011). [CrossRef]
  16. J. Massey, “An introduction to contemporary cryptology,” Proc. IEEE76(5), 533–549 (1988). [CrossRef]
  17. L. Yang, A. W. Ling, and S. H. Liu, “Quantum three-pass cryptography protocol,” Proc. SPIE4917, 106–111 (2002). [CrossRef]
  18. H. M. Ozaktas, Z. Zalevsky, and M. A. Kutay, The Fractional Fourier Transform with Applications in Optics and Signal Processing (John Wiley & Sons, Chichester, 2001).
  19. J. Lang, R. Tao, Q. Ran, and Y. Wang, “The multiple-parameter fractional Fourier transform,” Sci. China Ser. F, Inf. Sci.51(8), 1010–1024 (2008). [CrossRef]
  20. J. Lang, R. Tao, and Y. Wang, “The discrete multiple-parameter fractional Fourier transform,” Sci. China Ser. F, Inf. Sci.53(11), 2287–2299 (2010). [CrossRef]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited