Double images encryption method with resistance against the specific attack based on an asymmetric algorithm.

A double-image encryption technique that based on an asymmetric algorithm is proposed. In this method, the encryption process is different from the decryption and the encrypting keys are also different from the decrypting keys. In the nonlinear encryption process, the images are encoded into an amplitude cyphertext, and two phase-only masks (POMs) generated based on phase truncation are kept as keys for decryption. By using the classical double random phase encoding (DRPE) system, the primary images can be collected by an intensity detector that located at the output plane. Three random POMs that applied in the asymmetric encryption can be safely applied as public keys. Simulation results are presented to demonstrate the validity and security of the proposed protocol.

[1]  Xiang Peng,et al.  Asymmetric cryptosystem based on phase-truncated Fourier transforms. , 2010, Optics letters.

[2]  Jingjuan Zhang,et al.  Double random-phase encoding in the Fresnel domain. , 2004, Optics letters.

[3]  Xiaogang Wang,et al.  Double-image self-encoding and hiding based on phase-truncated Fourier transforms and phase retrieval , 2011 .

[4]  G. Unnikrishnan,et al.  Optical encryption by double-random phase encoding in the fractional Fourier domain. , 2000, Optics letters.

[5]  Wen-Nung Lie,et al.  Fast double-phase retrieval in Fresnel domain using modified Gerchberg-Saxton algorithm for lensless optical security systems. , 2009, Optics express.

[6]  Peng Zhang,et al.  Known-plaintext attack on optical encryption based on double random phase keys. , 2006, Optics letters.

[7]  Hsuan T Chang,et al.  Multiple-phase retrieval for optical security systems by use of random-phase encoding. , 2002, Applied optics.

[8]  Bahram Javidi,et al.  Optical encryption using a joint transform correlator architecture , 2000 .

[9]  Ayman Alfalou,et al.  Optical image compression and encryption methods , 2009 .

[10]  Wen Chen,et al.  Optical asymmetric cryptography using a three-dimensional space-based model Optical asymmetric crypt , 2011 .

[11]  John T. Sheridan,et al.  Optical image encryption by random shifting in fractional Fourier domains. , 2003, Optics letters.

[12]  Hiroyuki Suzuki,et al.  Experimental evaluation of fingerprint verification system based on double random phase encoding. , 2006, Optics express.

[13]  Wen Chen,et al.  Optical color image encryption based on an asymmetric cryptosystem in the Fresnel domain , 2011 .

[14]  Myrian Tebaldi,et al.  Known-plaintext attack on a joint transform correlator encrypting system. , 2010, Optics letters.

[15]  Xiaogang Wang,et al.  Multiple-image encryption based on nonlinear amplitude-truncation and phase-truncation in Fourier domain , 2011 .

[16]  Da-hai Li,et al.  Simultaneous transmission for an encrypted image and a double random-phase encryption key. , 2007, Applied optics.

[17]  John Fredy Barrera,et al.  One step multiplexing optical encryption , 2010 .

[18]  Xiaogang Wang,et al.  Security enhancement of a phase-truncation based image encryption algorithm. , 2011, Applied optics.

[19]  Xiaogang Wang,et al.  A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms , 2012 .

[20]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[21]  Arturo Carnicer,et al.  Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. , 2005, Optics letters.

[22]  Bahram Javidi,et al.  Resistance of the double random phase encryption against various attacks. , 2007, Optics express.

[23]  Hiroyuki Suzuki,et al.  Known plaintext attack on double random phase encoding using fingerprint as key and a method for avoiding the attack. , 2010, Optics express.

[24]  J R Fienup,et al.  Phase retrieval algorithms: a comparison. , 1982, Applied optics.