Abstract:A novel information authentication system, i.e., an asymmetric optical interference of two beams in the gyrator transform (GT) domain, is proposed. In this algorithm, the input color image is divided into R, G, and B channels. The complex field of each channel is constructed by the inverse Fourier transform of the channel attached with a random phase function. The phase-only mask (POM) and amplitude-only mask (AOM) are analytically derived from the complex field. The POM and AOM are separately gyrator transfor… Show more
“…The GT can also be computer simulated by using phase-only filtering, Fourier transform and inverse Fourier transform [40]. The GT based color image encryption [11,12,19,20,41,44] and gray image encryption [42,43] have been researched. …”
Section: Gyrator Transformmentioning
confidence: 99%
“…The PFFT-based encryption system recently has been found to be vulnerable to a specific attack when the encrypting keys are used as public keys [18]. The simplest solution to the specific attack is to keep the encryption keys as private keys [19][20][21] or apply different phase keys for different plaintexts during the encryption process.…”
“…The GT can also be computer simulated by using phase-only filtering, Fourier transform and inverse Fourier transform [40]. The GT based color image encryption [11,12,19,20,41,44] and gray image encryption [42,43] have been researched. …”
Section: Gyrator Transformmentioning
confidence: 99%
“…The PFFT-based encryption system recently has been found to be vulnerable to a specific attack when the encrypting keys are used as public keys [18]. The simplest solution to the specific attack is to keep the encryption keys as private keys [19][20][21] or apply different phase keys for different plaintexts during the encryption process.…”
“…Although high robustness against existing attacks could be achieved owing to phase truncation in Fourier domain, it has been found to be vulnerable to the specific attack based on the iterative Fourier transforms when the two RPMs are used as public keys to encrypt different plaintexts [24]. In order avoid specific attack; the first way is to extend the PTFT-based cryptosystem into the fractional Fourier transform domain [25], gyrator domain directly [26][27][28]. The second way is to introduce an undercover amplitude modulator in the PTFT-based security system [25].…”
“…Recently, this system has revealed a security flaw to a known public key attack [17]. This attack can be avoided if the encryption keys are used as private keys or different phase keys are applied for different plaintexts [18][19][20][21][22]. The optical encryption systems have been evolved into multiple-image encryption and authentication systems owing to economic memory occupation and efficient transmission through a network [23−31].…”
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.