Asymmetric Optical Image Encryption With Silhouette Removal Using Interference and Equal Modulus Decomposition

We propose an asymmetric optical image encryption scheme with silhouette removal by using interference and equal modulus decomposition (EMD). Plaintext is first separated into two complex value masks with the same modulus using EMD in the Fresnel transform domain. The two masks are encoded into four...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE photonics journal 2020-04, Vol.12 (2), p.1-8
Hauptverfasser: Luan, Guangyu, Li, Aichuan, Chen, Zhengguang, Huang, Caojun
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 8
container_issue 2
container_start_page 1
container_title IEEE photonics journal
container_volume 12
creator Luan, Guangyu
Li, Aichuan
Chen, Zhengguang
Huang, Caojun
description We propose an asymmetric optical image encryption scheme with silhouette removal by using interference and equal modulus decomposition (EMD). Plaintext is first separated into two complex value masks with the same modulus using EMD in the Fresnel transform domain. The two masks are encoded into four phase-only masks (POMs), two of which are treated as ciphertexts and other two as plaintext-dependent private keys by using the inverse Fresnel transform with different diffraction distances and interference-based encryption. Any information about the plaintext, including its silhouette, cannot be retrieved using one, two, or even three of the four POMs. Our scheme also avoids the constraint of the same modulus in EMD and eliminates the vulnerability against the iterative amplitude-phase attack and advanced iterative amplitude-phase attack. Numerical simulations were used to verify the validity and security of our proposed method.
doi_str_mv 10.1109/JPHOT.2020.2963921
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1109_JPHOT_2020_2963921</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8949713</ieee_id><doaj_id>oai_doaj_org_article_c62aaa051393422096af3306cf16a91e</doaj_id><sourcerecordid>2376743658</sourcerecordid><originalsourceid>FETCH-LOGICAL-c405t-23e9543dd5558404ef35bf280001efe59cbfa11dce5312ae7c79047a9a15ef973</originalsourceid><addsrcrecordid>eNo9Uctu2zAQFIoWSJr2B9ILgZ7tLp8yj0HqNi5SuMgDPRIbaunQkESHlAr47yvHgU-7mJ2Z3cVU1SWHOedgv_36c7N-mAsQMBfWSCv4u-qcWyVnYFT9_tRrfVZ9LGULYCzX9rzqr8q-62jI0bP1bogeW7bqcENs2fu8n5DUs79xeGb3sX1OIw0DsTvq0r-J-Fhiv2GrfqAcKFPviWHfsOXLOA1_p2Zsx8K-k0_dLpV4sPpUfQjYFvr8Vi-qxx_Lh-ub2e365-r66nbmFehhJiRZrWTTaK0XChQFqZ-CWAAAp0Da-qeAnDeetOQCqfa1BVWjRa4p2FpeVKujb5Nw63Y5dpj3LmF0r0DKG4d5-rYl541ARNBcWqmEAGswSAnGB27Qcpq8vh69djm9jFQGt01j7qfznZC1qZU0ejGxxJHlcyolUzht5eAOGbnXjNwhI_eW0ST6chRFIjoJFlbZmkv5H57Qjhw</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2376743658</pqid></control><display><type>article</type><title>Asymmetric Optical Image Encryption With Silhouette Removal Using Interference and Equal Modulus Decomposition</title><source>IEEE Open Access Journals</source><source>DOAJ Directory of Open Access Journals</source><source>EZB Electronic Journals Library</source><creator>Luan, Guangyu ; Li, Aichuan ; Chen, Zhengguang ; Huang, Caojun</creator><creatorcontrib>Luan, Guangyu ; Li, Aichuan ; Chen, Zhengguang ; Huang, Caojun</creatorcontrib><description>We propose an asymmetric optical image encryption scheme with silhouette removal by using interference and equal modulus decomposition (EMD). Plaintext is first separated into two complex value masks with the same modulus using EMD in the Fresnel transform domain. The two masks are encoded into four phase-only masks (POMs), two of which are treated as ciphertexts and other two as plaintext-dependent private keys by using the inverse Fresnel transform with different diffraction distances and interference-based encryption. Any information about the plaintext, including its silhouette, cannot be retrieved using one, two, or even three of the four POMs. Our scheme also avoids the constraint of the same modulus in EMD and eliminates the vulnerability against the iterative amplitude-phase attack and advanced iterative amplitude-phase attack. Numerical simulations were used to verify the validity and security of our proposed method.</description><identifier>ISSN: 1943-0655</identifier><identifier>EISSN: 1943-0647</identifier><identifier>DOI: 10.1109/JPHOT.2020.2963921</identifier><identifier>CODEN: PJHOC3</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Algorithms ; Amplitudes ; asymmetric ; Asymmetry ; Computer simulation ; Cryptography ; Decomposition ; Diffraction ; Encryption ; Interference ; Iterative methods ; Masks ; Optical diffraction ; Optical image encryption ; Optical imaging ; same modulus constraint ; silhouette problem ; Transforms</subject><ispartof>IEEE photonics journal, 2020-04, Vol.12 (2), p.1-8</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c405t-23e9543dd5558404ef35bf280001efe59cbfa11dce5312ae7c79047a9a15ef973</citedby><cites>FETCH-LOGICAL-c405t-23e9543dd5558404ef35bf280001efe59cbfa11dce5312ae7c79047a9a15ef973</cites><orcidid>0000-0002-9628-6319</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8949713$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,864,2100,27631,27922,27923,54931</link.rule.ids></links><search><creatorcontrib>Luan, Guangyu</creatorcontrib><creatorcontrib>Li, Aichuan</creatorcontrib><creatorcontrib>Chen, Zhengguang</creatorcontrib><creatorcontrib>Huang, Caojun</creatorcontrib><title>Asymmetric Optical Image Encryption With Silhouette Removal Using Interference and Equal Modulus Decomposition</title><title>IEEE photonics journal</title><addtitle>JPHOT</addtitle><description>We propose an asymmetric optical image encryption scheme with silhouette removal by using interference and equal modulus decomposition (EMD). Plaintext is first separated into two complex value masks with the same modulus using EMD in the Fresnel transform domain. The two masks are encoded into four phase-only masks (POMs), two of which are treated as ciphertexts and other two as plaintext-dependent private keys by using the inverse Fresnel transform with different diffraction distances and interference-based encryption. Any information about the plaintext, including its silhouette, cannot be retrieved using one, two, or even three of the four POMs. Our scheme also avoids the constraint of the same modulus in EMD and eliminates the vulnerability against the iterative amplitude-phase attack and advanced iterative amplitude-phase attack. Numerical simulations were used to verify the validity and security of our proposed method.</description><subject>Algorithms</subject><subject>Amplitudes</subject><subject>asymmetric</subject><subject>Asymmetry</subject><subject>Computer simulation</subject><subject>Cryptography</subject><subject>Decomposition</subject><subject>Diffraction</subject><subject>Encryption</subject><subject>Interference</subject><subject>Iterative methods</subject><subject>Masks</subject><subject>Optical diffraction</subject><subject>Optical image encryption</subject><subject>Optical imaging</subject><subject>same modulus constraint</subject><subject>silhouette problem</subject><subject>Transforms</subject><issn>1943-0655</issn><issn>1943-0647</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><sourceid>DOA</sourceid><recordid>eNo9Uctu2zAQFIoWSJr2B9ILgZ7tLp8yj0HqNi5SuMgDPRIbaunQkESHlAr47yvHgU-7mJ2Z3cVU1SWHOedgv_36c7N-mAsQMBfWSCv4u-qcWyVnYFT9_tRrfVZ9LGULYCzX9rzqr8q-62jI0bP1bogeW7bqcENs2fu8n5DUs79xeGb3sX1OIw0DsTvq0r-J-Fhiv2GrfqAcKFPviWHfsOXLOA1_p2Zsx8K-k0_dLpV4sPpUfQjYFvr8Vi-qxx_Lh-ub2e365-r66nbmFehhJiRZrWTTaK0XChQFqZ-CWAAAp0Da-qeAnDeetOQCqfa1BVWjRa4p2FpeVKujb5Nw63Y5dpj3LmF0r0DKG4d5-rYl541ARNBcWqmEAGswSAnGB27Qcpq8vh69djm9jFQGt01j7qfznZC1qZU0ejGxxJHlcyolUzht5eAOGbnXjNwhI_eW0ST6chRFIjoJFlbZmkv5H57Qjhw</recordid><startdate>20200401</startdate><enddate>20200401</enddate><creator>Luan, Guangyu</creator><creator>Li, Aichuan</creator><creator>Chen, Zhengguang</creator><creator>Huang, Caojun</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>7U5</scope><scope>8FD</scope><scope>H8D</scope><scope>L7M</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0002-9628-6319</orcidid></search><sort><creationdate>20200401</creationdate><title>Asymmetric Optical Image Encryption With Silhouette Removal Using Interference and Equal Modulus Decomposition</title><author>Luan, Guangyu ; Li, Aichuan ; Chen, Zhengguang ; Huang, Caojun</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c405t-23e9543dd5558404ef35bf280001efe59cbfa11dce5312ae7c79047a9a15ef973</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Algorithms</topic><topic>Amplitudes</topic><topic>asymmetric</topic><topic>Asymmetry</topic><topic>Computer simulation</topic><topic>Cryptography</topic><topic>Decomposition</topic><topic>Diffraction</topic><topic>Encryption</topic><topic>Interference</topic><topic>Iterative methods</topic><topic>Masks</topic><topic>Optical diffraction</topic><topic>Optical image encryption</topic><topic>Optical imaging</topic><topic>same modulus constraint</topic><topic>silhouette problem</topic><topic>Transforms</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Luan, Guangyu</creatorcontrib><creatorcontrib>Li, Aichuan</creatorcontrib><creatorcontrib>Chen, Zhengguang</creatorcontrib><creatorcontrib>Huang, Caojun</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) Online</collection><collection>IEEE Xplore Digital Library</collection><collection>CrossRef</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Solid State and Superconductivity Abstracts</collection><collection>Technology Research Database</collection><collection>Aerospace Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE photonics journal</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Luan, Guangyu</au><au>Li, Aichuan</au><au>Chen, Zhengguang</au><au>Huang, Caojun</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Asymmetric Optical Image Encryption With Silhouette Removal Using Interference and Equal Modulus Decomposition</atitle><jtitle>IEEE photonics journal</jtitle><stitle>JPHOT</stitle><date>2020-04-01</date><risdate>2020</risdate><volume>12</volume><issue>2</issue><spage>1</spage><epage>8</epage><pages>1-8</pages><issn>1943-0655</issn><eissn>1943-0647</eissn><coden>PJHOC3</coden><abstract>We propose an asymmetric optical image encryption scheme with silhouette removal by using interference and equal modulus decomposition (EMD). Plaintext is first separated into two complex value masks with the same modulus using EMD in the Fresnel transform domain. The two masks are encoded into four phase-only masks (POMs), two of which are treated as ciphertexts and other two as plaintext-dependent private keys by using the inverse Fresnel transform with different diffraction distances and interference-based encryption. Any information about the plaintext, including its silhouette, cannot be retrieved using one, two, or even three of the four POMs. Our scheme also avoids the constraint of the same modulus in EMD and eliminates the vulnerability against the iterative amplitude-phase attack and advanced iterative amplitude-phase attack. Numerical simulations were used to verify the validity and security of our proposed method.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/JPHOT.2020.2963921</doi><tpages>8</tpages><orcidid>https://orcid.org/0000-0002-9628-6319</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1943-0655
ispartof IEEE photonics journal, 2020-04, Vol.12 (2), p.1-8
issn 1943-0655
1943-0647
language eng
recordid cdi_crossref_primary_10_1109_JPHOT_2020_2963921
source IEEE Open Access Journals; DOAJ Directory of Open Access Journals; EZB Electronic Journals Library
subjects Algorithms
Amplitudes
asymmetric
Asymmetry
Computer simulation
Cryptography
Decomposition
Diffraction
Encryption
Interference
Iterative methods
Masks
Optical diffraction
Optical image encryption
Optical imaging
same modulus constraint
silhouette problem
Transforms
title Asymmetric Optical Image Encryption With Silhouette Removal Using Interference and Equal Modulus Decomposition
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T15%3A10%3A59IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Asymmetric%20Optical%20Image%20Encryption%20With%20Silhouette%20Removal%20Using%20Interference%20and%20Equal%20Modulus%20Decomposition&rft.jtitle=IEEE%20photonics%20journal&rft.au=Luan,%20Guangyu&rft.date=2020-04-01&rft.volume=12&rft.issue=2&rft.spage=1&rft.epage=8&rft.pages=1-8&rft.issn=1943-0655&rft.eissn=1943-0647&rft.coden=PJHOC3&rft_id=info:doi/10.1109/JPHOT.2020.2963921&rft_dat=%3Cproquest_cross%3E2376743658%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2376743658&rft_id=info:pmid/&rft_ieee_id=8949713&rft_doaj_id=oai_doaj_org_article_c62aaa051393422096af3306cf16a91e&rfr_iscdi=true