2022
DOI: 10.37190/oa220204
|View full text |Cite
|
Sign up to set email alerts
|

Image encryption algorithm based on rear-mountedphase mask and random decomposition

Abstract: To escalate the image encryption a new method has been devised which includes double random phase encoding (DRPE) using rear phase masking and random decomposition (RD) technique stranded on fractional Fourier transform. Here, asymmetric cryptographic system is developed in fractional Fourier transform (FrFT) mode using two random phase masks (RPM) and a rear mounted phase mask. In the projected scheme a colored image is decomposed into R, G and B channels. The amplitude of each channel is normalized, phase en… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 35 publications
0
3
0
Order By: Relevance
“…In RD [32][33][34][35] a complex valued function f ( μ, γ) can be decomposed into two complex functions f 1 ( μ, γ) and f 2 ( μ, γ) such that (3) ---------------------------------------------------------------- ------------------------------------------------------------------i a…”
Section: Random Decompositionmentioning
confidence: 99%
See 1 more Smart Citation
“…In RD [32][33][34][35] a complex valued function f ( μ, γ) can be decomposed into two complex functions f 1 ( μ, γ) and f 2 ( μ, γ) such that (3) ---------------------------------------------------------------- ------------------------------------------------------------------i a…”
Section: Random Decompositionmentioning
confidence: 99%
“…In RD-based cryptosystems, masks are not in equal modulus, which prevents the transmission of private key information. By understanding the significance of RD, afterwards numerous cryptosystems based on RD [33][34][35] are performed. In the presented work, we have proposed an asymmetric cryptosystem using random decomposition in Fourier and fractional Fourier transforms.…”
Section: Introductionmentioning
confidence: 99%
“…These methods belong to linear operations and have potential risks. As a possible scheme to develop a new method, a cascaded encoding structure [22][23][24][25][26] can enhance security in an optical information hiding system.…”
Section: Introductionmentioning
confidence: 99%