2019
DOI: 10.3390/photonics6040115
|View full text |Cite
|
Sign up to set email alerts
|

Optical Image Encryption Using a Nonlinear Joint Transform Correlator and the Collins Diffraction Transform

Abstract: The Collins diffraction transform (CDT) describes the optical wave diffraction from the generic paraxial optical system. The CDT has as special cases the diffraction domains given by the Fourier, Fresnel and fractional Fourier transforms. In this paper, we propose to describe the optical double random phase encoding (DRPE) using a nonlinear joint transform correlator (JTC) and the CDT. This new description of the nonlinear JTC-based encryption system using the CDT covers several optical processing domains, suc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
12
0
2

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(15 citation statements)
references
References 30 publications
1
12
0
2
Order By: Relevance
“…DRPE presents, however, several drawbacks: a complex ciphertext is difficult to record; the precision of the alignment must be very high; the fabrication of the phase conjugation mask is challenging; in the decryption process, one needs the precise complex conjugate of one of the RPMs employed as a key [ 29 , 31 ]. Moreover, DRPE cryptosystems are prone to attacks such as KPA (known-plaintext attack), CPA (chosen-plaintext attack) and COA (ciphertext-only attack) [ 32 ].…”
Section: Classification and Overview Of The Principles Of Optical Cor...mentioning
confidence: 99%
See 1 more Smart Citation
“…DRPE presents, however, several drawbacks: a complex ciphertext is difficult to record; the precision of the alignment must be very high; the fabrication of the phase conjugation mask is challenging; in the decryption process, one needs the precise complex conjugate of one of the RPMs employed as a key [ 29 , 31 ]. Moreover, DRPE cryptosystems are prone to attacks such as KPA (known-plaintext attack), CPA (chosen-plaintext attack) and COA (ciphertext-only attack) [ 32 ].…”
Section: Classification and Overview Of The Principles Of Optical Cor...mentioning
confidence: 99%
“…Afterwards, a second FTL is placed, and in its focal plane the recovery of the plaintext is finally obtained [ 29 ]. Thus, the encrypted image consists in a distribution of the intensity in the Fourier plane, whereas the decrypted image results after using the same key as for the encrypted part [ 31 ]. However, there are still some downsides of using cryptosystems based on JTC.…”
Section: Classification and Overview Of The Principles Of Optical Cor...mentioning
confidence: 99%
“…Entre las líneas de trabajo recientes se destacan el desarrollo de sistema ópticos compactos (Jaramillo-Osorio, et al, 2020a; Jaramillo-Osorio, et al, 2020b), en el que se advierten futuras aplicaciones basadas en criptosistemas ópticos que permitirán dinamizar el área de la encriptación óptica de información. También se sigue trabajando para aumentar y mejorar la seguridad (Dou, et al, 2019), en algunos casos implementando experimentalmente esquemas en diferentes dominios ópticos y transformadas que involucran nuevos parámetros de seguridad (Jaramillo-Osorio, et al, 2020b;Vilardy, et al, 2019a;Vilardy, et al, 2019b). Otras líneas que se siguen desarrollando activamente son las encaminadas a lograr una reducción de ruido para mejorar la calidad de los datos recuperados y la encriptación óptica con recuperación libre de ruido (Cheremkhin, et al, 2021a;Cheremkhin, et al, 2021b;Evtikhiev, et al, 2020;Wang, et al, 2020), la encriptación de múltiples datos (He, et al, 2020;Wu, et al, 2019;Zhang, et al, 2022) e incluso, la combinación de técnicas de multiplexado y recuperación libre de ruido (Jaramillo-Osorio, et al, 2020b;Yan, et al, 2019).…”
Section: Perspectivasunclassified
“…Además, en la literatura especializada se pueden encontrar muchas contribuciones que proponen diferentes sistemas ópticos para llevar a cabo procesos de protección de datos, entre las que se destacan los que usan la arquitectura 4f ( Barrera-Ramírez, et al, 2005a;Barrera-Ramírez, et al, 2005b;Javidi, et al, 1996;Mosso, et al, 2011a), los de correlador de transformada conjunta (joint transform correlator, JTC) en el dominio de Fourier (Nomura & Javidi, 2000;Velez-Zea, et al, 2018), los de Fresnel ( Barrera-Ramírez, et al, 2016;Jaramillo-Osorio, et al, 2022b;Vilardy, et al, 2014) y los de transformada fraccional (Jaramillo-Osorio, et al, 2018;Jaramillo-Osorio, et al, 2022a). Otras variantes incluyen el procesamiento mediante otras transformadas, entre ellas, la de Hartley (Chen & Zhao, 2006), la giratoria (Liu, et al, 2010;Vilardy, et al, 2017), la de Arnold (Shi, et al, 2011), la de Mellin (Zhou, et al, 2015), la jigsaw (Vilardy, et al, 2019a), y la de Collins (Vilardy, et al, 2019b). Muchas de las propuestas basadas en estas transformadas no han sido comprobadas experimentalmente debido a que usan arquitecturas ópticas que involucran muchos elementos o tienen grandes exigencias de potencia, alineación o estabilidad.…”
Section: Introductionunclassified
“…Hafiz Saad Khaliq et al, proposed a multifunctional single-layer Polymers 2021, 13, 1358 2 of 15 element reflective array in order to achieve polarization preservation and spin encryption of the reflected beam [22]. Juan M. Vilardy O. et al, used Collins diffraction transform and nonlinear joint transform correlator to perform optical image encryption, which improved the security of the system against brute force cracking and plaintext attacks [23]. Aimin Yan et al, proposed a multi-image optical encryption method based on angular multiplexing Quick Response (QR) code and spiral phase key [2].…”
Section: Introductionmentioning
confidence: 99%