2013
DOI: 10.1364/ao.52.005133
|View full text |Cite
|
Sign up to set email alerts
|

Information authentication system using interference of two beams in gyrator transform domain

Abstract: A novel information authentication system, i.e., an asymmetric optical interference of two beams in the gyrator transform (GT) domain, is proposed. In this algorithm, the input color image is divided into R, G, and B channels. The complex field of each channel is constructed by the inverse Fourier transform of the channel attached with a random phase function. The phase-only mask (POM) and amplitude-only mask (AOM) are analytically derived from the complex field. The POM and AOM are separately gyrator transfor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
20
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 29 publications
(20 citation statements)
references
References 43 publications
0
20
0
Order By: Relevance
“…The GT can also be computer simulated by using phase-only filtering, Fourier transform and inverse Fourier transform [40]. The GT based color image encryption [11,12,19,20,41,44] and gray image encryption [42,43] have been researched. …”
Section: Gyrator Transformmentioning
confidence: 99%
See 1 more Smart Citation
“…The GT can also be computer simulated by using phase-only filtering, Fourier transform and inverse Fourier transform [40]. The GT based color image encryption [11,12,19,20,41,44] and gray image encryption [42,43] have been researched. …”
Section: Gyrator Transformmentioning
confidence: 99%
“…The PFFT-based encryption system recently has been found to be vulnerable to a specific attack when the encrypting keys are used as public keys [18]. The simplest solution to the specific attack is to keep the encryption keys as private keys [19][20][21] or apply different phase keys for different plaintexts during the encryption process.…”
Section: Introductionmentioning
confidence: 99%
“…Although high robustness against existing attacks could be achieved owing to phase truncation in Fourier domain, it has been found to be vulnerable to the specific attack based on the iterative Fourier transforms when the two RPMs are used as public keys to encrypt different plaintexts [24]. In order avoid specific attack; the first way is to extend the PTFT-based cryptosystem into the fractional Fourier transform domain [25], gyrator domain directly [26][27][28]. The second way is to introduce an undercover amplitude modulator in the PTFT-based security system [25].…”
Section: Introductionmentioning
confidence: 99%
“…Recently, this system has revealed a security flaw to a known public key attack [17]. This attack can be avoided if the encryption keys are used as private keys or different phase keys are applied for different plaintexts [18][19][20][21][22]. The optical encryption systems have been evolved into multiple-image encryption and authentication systems owing to economic memory occupation and efficient transmission through a network [23−31].…”
Section: Introductionmentioning
confidence: 99%