2014
DOI: 10.1364/ao.53.006719
|View full text |Cite
|
Sign up to set email alerts
|

Optical interference-based multiple-image encryption using spherical wave illumination and gyrator transform

Abstract: A new optical interference-based multiple-image encryption using spherical wave illumination and gyrator transform is proposed. In this proposal, each secret color image is divided into normalized red, green, and blue component images and independently encoded into corresponding phase-only component images. Then each phase-only component image of all the images are combined together to produce a single-phase-only component image as an input component image, which is bounded with a random phase mask to form a c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 20 publications
(3 citation statements)
references
References 46 publications
0
3
0
Order By: Relevance
“…Therefore, it is necessary to develop a security system that can be used to store and retrieve the encrypted 3D images. attention due to the improvement of encryption capacity, the facilitation of transmission, and efficient storage of mass information [22][23][24][25][26][27][28][29]. Several multiple-image encryption systems have a disadvantage in that there is crosstalk noise between images, or a time-consuming iterative process is required due to the use of the phase-retrieval algorithm.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, it is necessary to develop a security system that can be used to store and retrieve the encrypted 3D images. attention due to the improvement of encryption capacity, the facilitation of transmission, and efficient storage of mass information [22][23][24][25][26][27][28][29]. Several multiple-image encryption systems have a disadvantage in that there is crosstalk noise between images, or a time-consuming iterative process is required due to the use of the phase-retrieval algorithm.…”
Section: Introductionmentioning
confidence: 99%
“…With the expectation to thoroughly resolve this problem at the source, two different triple-POM based methods have been reported recently, which do not need any time-consuming digital computation or post processing of POMs [17,20]. Furthermore, some IBE schemes have been devised for multiple-image or color image encryption by combining with polarized light encoding [21], POM multiplexing [22], position multiplexing [23] and phase-only encoding techniques [24]. Chen et al devised a novel IBE scheme using three-dimensional phase retrieval and an FrFT-based IBE scheme [25], in which a series of random and fixed phase-only masks are applied in the optical paths, to enhance the security of conventional IBE algorithms [26,27].…”
Section: Introductionmentioning
confidence: 99%
“…Various algorithms based on multiple-image encryption in the Fresnel transform (FrT) [30][31][32][33][34][35], Fourier transform (FT) [36,37], fractional Fourier transform (FRT) [38,39], and gyrator transform (GT) [40] domains have been proposed. Recently, a novel multiple image hiding system based on the diffraction model of direction multiplexing method has been presented [41].…”
Section: Introductionmentioning
confidence: 99%