2009
DOI: 10.1117/1.3204003
|View full text |Cite
|
Sign up to set email alerts
|

Image encryption based on random scrambling of the amplitude and phase in the frequency domain

Abstract: We propose an image encryption algorithm by using random position scrambling of the amplitude and phase functions in the frequency domain of optical transform. The positions of amplitude and phase data are scrambled randomly in the horizontal or vertical direction. The random position orders can be regarded as the key of the algorithm. Moreover, random phase encoding is not used in the proposed algorithm. A feasible optical implementation of the encryption algorithm is given. Some numerical simulations have de… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 32 publications
0
4
0
Order By: Relevance
“…First, the hologram generation algorithm is applied to transform the plaintext image to be encrypted into a corresponding sub-sampled phase-only hologram (POH) and then multiple-POHs are combined into a joint POH by means of SDM. The combined POH is mapped before the final ciphertext is obtained by image pixel transformation (IPT) 30 based on the chaotic system. IPT is divided into two processes: scrambling and diffusion.…”
Section: Methodsmentioning
confidence: 99%
“…First, the hologram generation algorithm is applied to transform the plaintext image to be encrypted into a corresponding sub-sampled phase-only hologram (POH) and then multiple-POHs are combined into a joint POH by means of SDM. The combined POH is mapped before the final ciphertext is obtained by image pixel transformation (IPT) 30 based on the chaotic system. IPT is divided into two processes: scrambling and diffusion.…”
Section: Methodsmentioning
confidence: 99%
“…Several kinds of pixel scrambling operations have been introduced in information hidden technology, such as Arnold transform, jigsaw transform and Baker mapping [15][16][17][18]. In these pixel scrambling operations [15][16][17][18][19][20][21], some parameters generated and used in the transforming process will be regarded as the additional keys to enhancing the security of the encryption algorithms.…”
Section: Introductionmentioning
confidence: 99%
“…In these pixel scrambling operations [15][16][17][18][19][20][21], some parameters generated and used in the transforming process will be regarded as the additional keys to enhancing the security of the encryption algorithms. Some latest color image encryption schemes in gyrator transform domain have been proposed [21][22][23][24][25], the gyrator transform are well used in these schemes and the security, validity and capability of the algorithms are improved.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover some optical processes or transforms [9][10][11][12][13][14][15][16][17][18][19][20][21][22][23] have been considered for changing the pixel value of image. The scrambling operations, such as Arnold transform and jigsaw transform, are used to make the change of sequence of image pixels [24][25][26][27][28][29][30][31][32][33]. A secret image can be randomized by an encryption scheme composed of random reversible process.…”
Section: Introductionmentioning
confidence: 99%