2023
DOI: 10.1117/1.oe.62.9.098103
|View full text |Cite
|
Sign up to set email alerts
|

Research on multiple-image encryption method using modified Gerchberg–Saxton algorithm and chaotic systems

Anlin Wang,
Chuan Shen,
Junqiao Pan
et al.

Abstract: A multiple-image encryption method based on a computer-generated phase-only hologram (POH) algorithm and chaotic systems is proposed. In the proposed method, first, a modified Gerchberg-Saxton (GS) algorithm is applied to transform the multiple-image into corresponding sub-sampled POHs. Then, the multiple POHs are combined using spatial division multiplexing (SDM). The combined hologram is then mapped into a digital image, and each pixel of the digital image is transformed by a chaotic system to improve securi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 35 publications
0
1
0
Order By: Relevance
“…Here is a brief introduction to several algorithms based on optical principles, including ghost imaging, 16 nonlinear modified Gerchberg-Saxton (GS) phase retrieval algorithm, 7 and the phase-only hologram algorithm. 17 These methods use different optical principles to convert the original image information into noise-like optical information, which is more difficult for unauthorized visitors to access in the process of transmission and storage. In addition, Rakheja and Khurana 7 introduced the chaotic umbrella maps in the forward encryption process and successfully encrypted multiple iris input images into chaotic images, which greatly improves security.…”
Section: Introductionmentioning
confidence: 99%
“…Here is a brief introduction to several algorithms based on optical principles, including ghost imaging, 16 nonlinear modified Gerchberg-Saxton (GS) phase retrieval algorithm, 7 and the phase-only hologram algorithm. 17 These methods use different optical principles to convert the original image information into noise-like optical information, which is more difficult for unauthorized visitors to access in the process of transmission and storage. In addition, Rakheja and Khurana 7 introduced the chaotic umbrella maps in the forward encryption process and successfully encrypted multiple iris input images into chaotic images, which greatly improves security.…”
Section: Introductionmentioning
confidence: 99%