2020
DOI: 10.1109/jphot.2019.2921354
|View full text |Cite
|
Sign up to set email alerts
|

Image Encryption System Based on Joint Transformation Correlation and Ptychography

Abstract: In this paper, a new image encryption system based on joint transformation correlation principle and ptycholographic iterative engine is proposed. When the encryption is performed, the original image can be divided into several parts by using the scanning movement of the probe. Each part is encrypted by the joint transformation correlation technology, and the ciphertexts are finally transmitted in the form of many encrypted images. The receiver uses the working principle of the joint transform correlator to de… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 28 publications
0
7
0
Order By: Relevance
“…To increase the accuracy of sample analysis, both in materials science and medicine, as compared to traditional optical detectors, able to receive information only about the intensity and not also of the phase of the light beam, a system for encrypting images was recently proposed, based on both the JTC and the method of ptychography [ 69 ]. At the encryption stage, the scanning movement of the probe (from the ptychography iterative engine) is used to divide the initial image into different parts.…”
Section: Recent Applications and Implementations Of Optical Correlatorsmentioning
confidence: 99%
See 1 more Smart Citation
“…To increase the accuracy of sample analysis, both in materials science and medicine, as compared to traditional optical detectors, able to receive information only about the intensity and not also of the phase of the light beam, a system for encrypting images was recently proposed, based on both the JTC and the method of ptychography [ 69 ]. At the encryption stage, the scanning movement of the probe (from the ptychography iterative engine) is used to divide the initial image into different parts.…”
Section: Recent Applications and Implementations Of Optical Correlatorsmentioning
confidence: 99%
“…As advantages of the method, one can mention a simplified setup and functioning of the system, due to less strict constraints concerning the alignment and arrangement of components; a better security, due to the presence of numerous keys, that must be all correct for the restoration of the original image; the elimination of optical interference in the system. The feasibility of the method was proven by numerical simulations [ 69 ].…”
Section: Recent Applications and Implementations Of Optical Correlatorsmentioning
confidence: 99%
“…The technique of double random phase encoding (DRPE) has been extensively shown as an important technique to encrypt images by using optical means [ 7 , 8 ]. This DRPE has been typically implemented with a joint transform correlator (JTC) architecture [ 2 , 4 , 5 , 9 , 10 , 11 , 12 , 13 , 14 ]. The JTC architecture for optical encryption systems commonly uses two random phase masks (RPMs) in its input plane with the purpose of converting a single original image into a stationary white noise signal (encrypted image) in the Fourier domain (FD) [ 5 ].…”
Section: Introductionmentioning
confidence: 99%
“…With respect to other JTC-based systems developed in former works [ 2 , 5 , 6 , 9 , 10 , 11 , 12 , 13 , 14 , 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 ], the proposed encryption and decryption system for two images allows the simultaneous encryption of two images with a high level of security for the single real-valued encrypted image, besides retrieving high quality decrypted images, either simultaneously or separately. Our encryption and decryption system is not an iterative algorithm, the definitions of the two nonlinear operations applied on the JPS are entirely new, and the use of a new nonlinear JTC allows for breaking the linearity of former JTC-based encryption systems, aiming to obtain an encrypted image better protected against several attacks.…”
Section: Introductionmentioning
confidence: 99%
“…In a word, chaotic encryption provides a new choice for traditional encryption. In recent years, many effective chaos image encryption algorithms have been proposed [13][14][15][16][17][18][19][20][21][22][23][24][25].…”
Section: Introductionmentioning
confidence: 99%