2020
DOI: 10.1109/jphot.2020.2963921
|View full text |Cite
|
Sign up to set email alerts
|

Asymmetric Optical Image Encryption With Silhouette Removal Using Interference and Equal Modulus Decomposition

Abstract: We propose an asymmetric optical image encryption scheme with silhouette removal by using interference and equal modulus decomposition (EMD). Plaintext is first separated into two complex value masks with the same modulus using EMD in the Fresnel transform domain. The two masks are encoded into four phase-only masks (POMs), two of which are treated as ciphertexts and other two as plaintext-dependent private keys by using the inverse Fresnel transform with different diffraction distances and interference-based … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 19 publications
(6 citation statements)
references
References 29 publications
0
6
0
Order By: Relevance
“…Image matching is a tool used either to describe the entire image with global features which can describe a complete picture by only one vector or to concentrate on important image information that is stronger. We must deal with the contents and obtain information from these two methods in order to implement the two, which means that both methods take time to handle images and that they require hardware capable of acquiring these features efficiently [26]. This leads us to the fact that mobile device extraction takes a lot of time, random memory, thus increasing battery consumption, thus affecting the user's everyday use.…”
Section: Figure 1 Image Deduplication Processmentioning
confidence: 99%
“…Image matching is a tool used either to describe the entire image with global features which can describe a complete picture by only one vector or to concentrate on important image information that is stronger. We must deal with the contents and obtain information from these two methods in order to implement the two, which means that both methods take time to handle images and that they require hardware capable of acquiring these features efficiently [26]. This leads us to the fact that mobile device extraction takes a lot of time, random memory, thus increasing battery consumption, thus affecting the user's everyday use.…”
Section: Figure 1 Image Deduplication Processmentioning
confidence: 99%
“…Based on DRPE scheme, optical cryptosystem was further studied and extended from the Fourier domain to different transform domains [2][3][4][5]. Meanwhile, phase truncation scheme [6][7], diffraction scheme [8][9], and interference scheme [10][11][12] for optical cryptosystems were proposed based on different optical techniques. Optical cryptosystem can transform the image information into the ciphertext with noise-like white spectrum.…”
Section: Introductionmentioning
confidence: 99%
“…In 1995, Refregier et al [ 3 ] proposed an optical image encryption scheme based on double random phase encoding for the first time, which means it uses two uncorrelated random phase templates and Fourier transform to realize optical image encryption. In essence, this scheme is based on optical transformation to disturb the information of plaintext images and generate ciphertext images, such as fractional Fourier transform [ 4 ], fractional wavelet transform [ 5 ], fractional Merlin transform [ 6 ], interference [ 7 ], single-pixel imaging [ 8 , 9 ], etc. Optical image encryption belongs to parallel encryption with high speed and high efficiency, but its encryption performance is limited by the technology and precision of various optical devices in the optical path [ 10 ].…”
Section: Introductionmentioning
confidence: 99%