Double images encryption method with resistance against the specific attack based on an asymmetric algorithm
0202 electrical engineering, electronic engineering, information engineering
Information Storage and Retrieval
Signal Processing, Computer-Assisted
02 engineering and technology
Algorithms
Computer Security
Security Measures
DOI:
10.1364/oe.20.011994
Publication Date:
2012-05-11T18:16:57Z
AUTHORS (2)
ABSTRACT
A double-image encryption technique that based on an asymmetric algorithm is proposed. In this method, the encryption process is different from the decryption and the encrypting keys are also different from the decrypting keys. In the nonlinear encryption process, the images are encoded into an amplitude cyphertext, and two phase-only masks (POMs) generated based on phase truncation are kept as keys for decryption. By using the classical double random phase encoding (DRPE) system, the primary images can be collected by an intensity detector that located at the output plane. Three random POMs that applied in the asymmetric encryption can be safely applied as public keys. Simulation results are presented to demonstrate the validity and security of the proposed protocol.
SUPPLEMENTAL MATERIAL
Coming soon ....
REFERENCES (24)
CITATIONS (74)
EXTERNAL LINKS
PlumX Metrics
RECOMMENDATIONS
FAIR ASSESSMENT
Coming soon ....
JUPYTER LAB
Coming soon ....