Paper
22 June 2013 Multiple image encryption based on known-plaintext attack and modified G-S phase retrieval algorithm
Sudheesh K. Rajput, Naveen K. Nishchal
Author Affiliations +
Proceedings Volume 8769, International Conference on Optics in Precision Engineering and Nanotechnology (icOPEN2013); 87690X (2013) https://doi.org/10.1117/12.2014462
Event: International Conference on Optics in Precision Engineering and Nanotechnology (icOPEN2013), 2013, Singapore, Singapore
Abstract
We propose a novel multiple image encryption based on fractional Fourier transform (FRT) and known-plaintext attack with modified Gerchberg-Saxton (G-S) phase retrieval algorithm. Multiple images to be encrypted are encoded into corresponding phase-only masks (POMs) using modified G-S algorithm. These POMs are multiplexed into a single POM, which may be referred to as a general key. The individual keys can be generated with the help of all the POMs. Now a random intensity image is encrypted using double phase encoding in which POM and random phase masks (RPM) are used as keys. For decryption, with the concept of known-plaintext attack using intensity image and RPM as keys, the POM is obtained. With this POM, the original images can be retrieved by using individual keys, and correct orders of FRT. We present simulation results with four different gray-scale images. Numerical simulation results support the proposed idea of the multiple image encryption.
© (2013) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Sudheesh K. Rajput and Naveen K. Nishchal "Multiple image encryption based on known-plaintext attack and modified G-S phase retrieval algorithm", Proc. SPIE 8769, International Conference on Optics in Precision Engineering and Nanotechnology (icOPEN2013), 87690X (22 June 2013); https://doi.org/10.1117/12.2014462
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Image encryption

Phase retrieval

Image retrieval

Digital holography

Multiplexing

Spatial light modulators

Computer security

RELATED CONTENT


Back to Top