2020
DOI: 10.1109/access.2019.2959008
|View full text |Cite
|
Sign up to set email alerts
|

Nonlinear Double-Image Encryption in Cylindrical Diffraction-Based Scheme by Aid of Position Multiplexing

Abstract: Conventional phase-truncation-based double-image encryption (PT-DIE) scheme suffers from the phase retrieval algorithm-based attack, and information disclosure issue. In this paper, we introduce cylindrical diffraction and position multiplexing into the PT-DIE scheme. Through position multiplexing, double-image are integrated together. Then the integrated image is encoded into a real-valued cyphertext and two phase-only keys (POKs) by cylindrical diffraction. The decrypted images are acquired with two POKs by … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 33 publications
0
1
0
Order By: Relevance
“…However, because of the linear symmetry of DRPE technology [9], it is proved to be vulnerable to the known-plaintext attack [10] and chosen-plaintext attack [11]. To improve security, several nonlinear cryptosystems are proposed to improve the weaknesses of traditional symmetric cryptosystems, such as Fresnel domain [12], cylindrical diffraction transform [13][14][15], gyrator transform domain [16], and fractional Mellin transform [17]. However, these image encryption methods are usually applied to encrypt one image, which has made it challenging to meet the growing information needs.…”
Section: Introductionmentioning
confidence: 99%
“…However, because of the linear symmetry of DRPE technology [9], it is proved to be vulnerable to the known-plaintext attack [10] and chosen-plaintext attack [11]. To improve security, several nonlinear cryptosystems are proposed to improve the weaknesses of traditional symmetric cryptosystems, such as Fresnel domain [12], cylindrical diffraction transform [13][14][15], gyrator transform domain [16], and fractional Mellin transform [17]. However, these image encryption methods are usually applied to encrypt one image, which has made it challenging to meet the growing information needs.…”
Section: Introductionmentioning
confidence: 99%