Key management of the double random-phase-encoding method using public-key encryption

Abstract Public-key encryption has been used to encode the key of the encryption process. In the proposed technique, an input image has been encrypted by using the double random–phase-encoding method using extended fractional Fourier transform. The key of the encryption process have been encoded by using the Rivest–Shamir–Adelman (RSA) public-key encryption algorithm. The encoded key has then been transmitted to the receiver side along with the encrypted image. In the decryption process, first the encoded key has been decrypted using the secret key and then the encrypted image has been decrypted by using the retrieved key parameters. The proposed technique has advantage over double random-phase-encoding method because the problem associated with the transmission of the key has been eliminated by using public-key encryption. Computer simulation has been carried out to validate the proposed technique.

[1]  Han-Yu Lin,et al.  Convertible multi-authenticated encryption scheme , 2008, Inf. Sci..

[2]  Xiaogang Wang,et al.  Image encryption based on extended fractional Fourier transform and digital holography technique , 2006 .

[3]  Zhengjun Liu,et al.  A new kind of double image encryption by using a cutting spectrum in the 1-D fractional Fourier transform domains , 2009 .

[4]  G. Unnikrishnan,et al.  Optical encryption by double-random phase encoding in the fractional Fourier domain. , 2000, Optics letters.

[5]  Daniel R. Simon,et al.  Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack , 1991, CRYPTO.

[6]  Ran Tao,et al.  Optical image encryption based on the multiple-parameter fractional Fourier transform. , 2008, Optics letters.

[7]  Jonathan Katz,et al.  Chosen-Ciphertext Security from Identity-Based Encryption , 2006 .

[8]  Liu Qiang,et al.  A blind image detection method for information hiding with double random-phase encoding , 2009 .

[9]  Huijuan Li,et al.  Image encryption based on gyrator transform and two-step phase-shifting interferometry , 2009 .

[10]  Jonathan Katz,et al.  Chosen-Ciphertext Security from Identity-Based Encryption , 2004, SIAM J. Comput..

[11]  Valerij Rozouvan,et al.  Modulo image encryption with fractal keys , 2009 .

[12]  Kehar Singh,et al.  Fully phase-encrypted memory using cascaded extended fractional Fourier transform , 2004 .

[13]  Chik How Tan,et al.  Secure public-key encryption scheme without random oracles , 2008, Inf. Sci..

[14]  Ran Canetti,et al.  A Forward-Secure Public-Key Encryption Scheme , 2003, Journal of Cryptology.

[15]  Li Wenbo,et al.  A chaos-based robust wavelet-domain watermarking algorithm , 2004 .

[16]  Yunlong Sheng,et al.  Optical implementation of image encryption using random phase encoding , 1996 .

[17]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[18]  Zhou Xin,et al.  An image reconstruction method based on the double-random phase encoding system in the Fresnel domain , 2009 .

[19]  Narendra Singh,et al.  Optical image encryption using fractional Fourier transform and chaos , 2008 .

[20]  Jingjuan Zhang,et al.  Double random-phase encoding in the Fresnel domain. , 2004, Optics letters.

[21]  Da-hai Li,et al.  Simultaneous transmission for an encrypted image and a double random-phase encryption key. , 2007, Applied optics.

[22]  Dan Boneh,et al.  Secure Identity Based Encryption Without Random Oracles , 2004, CRYPTO.

[23]  Chandra Shakher,et al.  Image encryption and decryption using fractional Fourier transform and radial Hilbert transform , 2008 .

[24]  Guilhem Castagnos An efficient probabilistic public-key cryptosystem over quadratic fields quotients , 2007, Finite Fields Their Appl..

[25]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[26]  Kehar Singh,et al.  Multiplexing in optical encryption by using an aperture system and a rotating sandwich random phase diffuser in the Fourier plane , 2008 .