2012
DOI: 10.1088/2040-8978/15/2/025401
|View full text |Cite
|
Sign up to set email alerts
|

Improved decryption quality and security of a joint transform correlator-based encryption system

Abstract: Abstract. Some image encryption systems based on modified double random phase encoding and joint transform correlator architecture produce low quality decrypted images and are vulnerable to a variety of attacks. In this work, we analyse the algorithm of some reported methods that optically implement the double random phase encryption in a joint transform correlator. We show that it is possible to significantly improve the quality of the decrypted image by introducing a simple nonlinear operation in the encrypt… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
130
1
14

Year Published

2014
2014
2022
2022

Publication Types

Select...
7

Relationship

2
5

Authors

Journals

citations
Cited by 69 publications
(146 citation statements)
references
References 22 publications
1
130
1
14
Order By: Relevance
“…This processor typically requires strict optical alignment, which in practice is difficult to attain. To alleviate this constraint, the optical DRPE can be also performed by means of a joint transform correlator (JTC) architecture that also shows other advantages [13][14][15][16][17][18]. With the JTC, a CCD camera captures the intensity distribution of the joint power spectrum (JPS) as the encrypted data in the Fourier domain, while the classical DRPE method requires the recording of complex-valued information.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…This processor typically requires strict optical alignment, which in practice is difficult to attain. To alleviate this constraint, the optical DRPE can be also performed by means of a joint transform correlator (JTC) architecture that also shows other advantages [13][14][15][16][17][18]. With the JTC, a CCD camera captures the intensity distribution of the joint power spectrum (JPS) as the encrypted data in the Fourier domain, while the classical DRPE method requires the recording of complex-valued information.…”
Section: Introductionmentioning
confidence: 99%
“…An alternative solution is given in [18], where the key code is represented by real-valued data. Another solution that involves the nonlinear processing of the JPS is given in [16].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…From these pieces of information the attacker may recover crucial information of the security system such as the hidden decryption key. For the interested reader, the security flaws of the DRPE are analysed elsewhere ( [15][16][17] for a 4 f -processor, [39][40][13][14] for the JTC architecture).…”
Section: Moea [1] and The Newly Proposed Phc-moea Systems Against Twomentioning
confidence: 99%
“…Most of the optical security systems usually deal with a single primary image (for instance, an object, a plaintext, a signature, a biometric signal) as authenticator [2][3][4][5][6][7][10][11][12][13][14][18][19][20][21][22][23]. Some approaches permit to store multiple primary images, either in an optical memory [9] or in a single encrypted distribution [24][25][26][27], with the purpose of sequential and independent one-by-one decryption.…”
Section: Introductionmentioning
confidence: 99%