Asymmetric cryptosystem for securing multiple images using two beam interference phenomenon

In this paper, a novel optical encryption technique based on two beam interference principle and phase truncation approach is presented. The proposed scheme is compact, highly secure, and suitable for securing multiple images. Simulation results with three different images have been presented. The first two images to be encrypted are encoded into two parts. One is phase-only distribution and other is amplitude mask. The amplitude masks are preserved as decryption keys while phase distribution is used as encryption keys in order to encrypt the third image using phase-truncation approach. The proposed scheme offers higher level of security as it resists the specific attack on asymmetric cryptosystem and is robust against occlusion attack. Also, detailed study has been carried out employing keys which are dependent on and independent of the input image.

[1]  Xiaogang Wang,et al.  Security enhancement of a phase-truncation based image encryption algorithm. , 2011, Applied optics.

[2]  Naveen K. Nishchal,et al.  Flexible optical encryption with multiple users and multiple security levels , 2011 .

[3]  Daomu Zhao,et al.  Multiple-image encryption using phase retrieve algorithm and intermodulation in Fourier domain , 2012 .

[4]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[5]  John Fredy Barrera,et al.  Optical encryption method using toroidal zone plates , 2005 .

[6]  Bahram Javidi,et al.  Optical and Digital Techniques for Information Security , 2004 .

[7]  Jingjuan Zhang,et al.  Multiple-image encryption by wavelength multiplexing. , 2005, Optics letters.

[8]  Isha Mehra,et al.  Collision in Fresnel domain asymmetric cryptosystem using phase truncation and authentication verification , 2013 .

[9]  Xiaogang Wang,et al.  A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms , 2012 .

[10]  Wen-Nung Lie,et al.  Multiple-image encryption and multiplexing using a modified Gerchberg-Saxton algorithm and phase modulation in Fresnel-transform domain. , 2009, Optics letters.

[11]  Arturo Carnicer,et al.  Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. , 2005, Optics letters.

[12]  Myrian Tebaldi,et al.  Chosen-plaintext attack on a joint transform correlator encrypting system , 2010 .

[13]  John T. Sheridan,et al.  Optical image encryption by random shifting in fractional Fourier domains. , 2003, Optics letters.

[14]  Ting-Chung Poon,et al.  Multiple-image encryption by compressive holography. , 2012, Applied optics.

[15]  Naveen K Nishchal,et al.  Image encryption based on interference that uses fractional Fourier domain asymmetric keys. , 2012, Applied optics.

[16]  Bo Wang,et al.  Optical image encryption based on interference. , 2008, Optics letters.

[17]  Xiang Peng,et al.  Asymmetric cryptosystem based on phase-truncated Fourier transforms. , 2010, Optics letters.

[18]  Naveen K. Nishchal,et al.  Image encryption and authentication verification using fractional nonconventional joint transform correlator , 2012 .

[19]  Xiaogang Wang,et al.  Multiple-image encryption based on nonlinear amplitude-truncation and phase-truncation in Fourier domain , 2011 .

[20]  Daomu Zhao,et al.  Double images encryption method with resistance against the specific attack based on an asymmetric algorithm. , 2012, Optics express.

[21]  D Mendlovic,et al.  Gerchberg-Saxton algorithm applied in the fractional Fourier or the Fresnel domain. , 1996, Optics letters.

[22]  Peng Zhang,et al.  Known-plaintext attack on optical encryption based on double random phase keys. , 2006, Optics letters.

[23]  Chenggong Zhang,et al.  Ciphertext-only attack on a joint transform correlator encryption system. , 2013, Optics express.

[24]  Naveen K Nishchal,et al.  Image encryption using polarized light encoding and amplitude and phase truncation in the Fresnel domain. , 2013, Applied optics.

[25]  G. Unnikrishnan,et al.  Optical encryption by double-random phase encoding in the fractional Fourier domain. , 2000, Optics letters.

[26]  Ayman Alfalou,et al.  Dual encryption scheme of images using polarized light. , 2010, Optics letters.

[27]  Yujing Han,et al.  Optical image encryption based on two beams' interference , 2010 .

[28]  Roberto Torroba,et al.  Noise-free recovery of optodigital encrypted and multiplexed images. , 2010, Optics letters.

[29]  Bahram Javidi,et al.  Resistance of the double random phase encryption against various attacks. , 2007, Optics express.

[30]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[31]  Naveen K Nishchal,et al.  Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform. , 2013, Applied optics.

[32]  Jingjuan Zhang,et al.  Double random-phase encoding in the Fresnel domain. , 2004, Optics letters.

[33]  Isha Mehra,et al.  Cryptanalysis of an image encryption scheme based on joint transform correlator with amplitude- and phase- truncation approach , 2014 .

[34]  Xiaogang Wang,et al.  Double-image self-encoding and hiding based on phase-truncated Fourier transforms and phase retrieval , 2011 .

[35]  B Javidi,et al.  Securing information by use of digital holography. , 2000, Optics letters.

[36]  Unnikrishnan Gopinathan,et al.  A known-plaintext heuristic attack on the Fourier plane encryption algorithm. , 2006, Optics express.

[37]  Naveen K Nishchal,et al.  Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask. , 2012, Applied optics.

[38]  Roberto Torroba,et al.  Experimental protocol for packaging and encrypting multiple data , 2013 .