Asymmetric Optical Image Encryption With Silhouette Removal Using Interference and Equal Modulus Decomposition
We propose an asymmetric optical image encryption scheme with silhouette removal by using interference and equal modulus decomposition (EMD). Plaintext is first separated into two complex value masks with the same modulus using EMD in the Fresnel transform domain. The two masks are encoded into four...
Gespeichert in:
Veröffentlicht in: | IEEE photonics journal 2020-04, Vol.12 (2), p.1-8 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 8 |
---|---|
container_issue | 2 |
container_start_page | 1 |
container_title | IEEE photonics journal |
container_volume | 12 |
creator | Luan, Guangyu Li, Aichuan Chen, Zhengguang Huang, Caojun |
description | We propose an asymmetric optical image encryption scheme with silhouette removal by using interference and equal modulus decomposition (EMD). Plaintext is first separated into two complex value masks with the same modulus using EMD in the Fresnel transform domain. The two masks are encoded into four phase-only masks (POMs), two of which are treated as ciphertexts and other two as plaintext-dependent private keys by using the inverse Fresnel transform with different diffraction distances and interference-based encryption. Any information about the plaintext, including its silhouette, cannot be retrieved using one, two, or even three of the four POMs. Our scheme also avoids the constraint of the same modulus in EMD and eliminates the vulnerability against the iterative amplitude-phase attack and advanced iterative amplitude-phase attack. Numerical simulations were used to verify the validity and security of our proposed method. |
doi_str_mv | 10.1109/JPHOT.2020.2963921 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1109_JPHOT_2020_2963921</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8949713</ieee_id><doaj_id>oai_doaj_org_article_c62aaa051393422096af3306cf16a91e</doaj_id><sourcerecordid>2376743658</sourcerecordid><originalsourceid>FETCH-LOGICAL-c405t-23e9543dd5558404ef35bf280001efe59cbfa11dce5312ae7c79047a9a15ef973</originalsourceid><addsrcrecordid>eNo9Uctu2zAQFIoWSJr2B9ILgZ7tLp8yj0HqNi5SuMgDPRIbaunQkESHlAr47yvHgU-7mJ2Z3cVU1SWHOedgv_36c7N-mAsQMBfWSCv4u-qcWyVnYFT9_tRrfVZ9LGULYCzX9rzqr8q-62jI0bP1bogeW7bqcENs2fu8n5DUs79xeGb3sX1OIw0DsTvq0r-J-Fhiv2GrfqAcKFPviWHfsOXLOA1_p2Zsx8K-k0_dLpV4sPpUfQjYFvr8Vi-qxx_Lh-ub2e365-r66nbmFehhJiRZrWTTaK0XChQFqZ-CWAAAp0Da-qeAnDeetOQCqfa1BVWjRa4p2FpeVKujb5Nw63Y5dpj3LmF0r0DKG4d5-rYl541ARNBcWqmEAGswSAnGB27Qcpq8vh69djm9jFQGt01j7qfznZC1qZU0ejGxxJHlcyolUzht5eAOGbnXjNwhI_eW0ST6chRFIjoJFlbZmkv5H57Qjhw</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2376743658</pqid></control><display><type>article</type><title>Asymmetric Optical Image Encryption With Silhouette Removal Using Interference and Equal Modulus Decomposition</title><source>IEEE Open Access Journals</source><source>DOAJ Directory of Open Access Journals</source><source>EZB Electronic Journals Library</source><creator>Luan, Guangyu ; Li, Aichuan ; Chen, Zhengguang ; Huang, Caojun</creator><creatorcontrib>Luan, Guangyu ; Li, Aichuan ; Chen, Zhengguang ; Huang, Caojun</creatorcontrib><description>We propose an asymmetric optical image encryption scheme with silhouette removal by using interference and equal modulus decomposition (EMD). Plaintext is first separated into two complex value masks with the same modulus using EMD in the Fresnel transform domain. The two masks are encoded into four phase-only masks (POMs), two of which are treated as ciphertexts and other two as plaintext-dependent private keys by using the inverse Fresnel transform with different diffraction distances and interference-based encryption. Any information about the plaintext, including its silhouette, cannot be retrieved using one, two, or even three of the four POMs. Our scheme also avoids the constraint of the same modulus in EMD and eliminates the vulnerability against the iterative amplitude-phase attack and advanced iterative amplitude-phase attack. Numerical simulations were used to verify the validity and security of our proposed method.</description><identifier>ISSN: 1943-0655</identifier><identifier>EISSN: 1943-0647</identifier><identifier>DOI: 10.1109/JPHOT.2020.2963921</identifier><identifier>CODEN: PJHOC3</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Algorithms ; Amplitudes ; asymmetric ; Asymmetry ; Computer simulation ; Cryptography ; Decomposition ; Diffraction ; Encryption ; Interference ; Iterative methods ; Masks ; Optical diffraction ; Optical image encryption ; Optical imaging ; same modulus constraint ; silhouette problem ; Transforms</subject><ispartof>IEEE photonics journal, 2020-04, Vol.12 (2), p.1-8</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c405t-23e9543dd5558404ef35bf280001efe59cbfa11dce5312ae7c79047a9a15ef973</citedby><cites>FETCH-LOGICAL-c405t-23e9543dd5558404ef35bf280001efe59cbfa11dce5312ae7c79047a9a15ef973</cites><orcidid>0000-0002-9628-6319</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8949713$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,864,2100,27631,27922,27923,54931</link.rule.ids></links><search><creatorcontrib>Luan, Guangyu</creatorcontrib><creatorcontrib>Li, Aichuan</creatorcontrib><creatorcontrib>Chen, Zhengguang</creatorcontrib><creatorcontrib>Huang, Caojun</creatorcontrib><title>Asymmetric Optical Image Encryption With Silhouette Removal Using Interference and Equal Modulus Decomposition</title><title>IEEE photonics journal</title><addtitle>JPHOT</addtitle><description>We propose an asymmetric optical image encryption scheme with silhouette removal by using interference and equal modulus decomposition (EMD). Plaintext is first separated into two complex value masks with the same modulus using EMD in the Fresnel transform domain. The two masks are encoded into four phase-only masks (POMs), two of which are treated as ciphertexts and other two as plaintext-dependent private keys by using the inverse Fresnel transform with different diffraction distances and interference-based encryption. Any information about the plaintext, including its silhouette, cannot be retrieved using one, two, or even three of the four POMs. Our scheme also avoids the constraint of the same modulus in EMD and eliminates the vulnerability against the iterative amplitude-phase attack and advanced iterative amplitude-phase attack. Numerical simulations were used to verify the validity and security of our proposed method.</description><subject>Algorithms</subject><subject>Amplitudes</subject><subject>asymmetric</subject><subject>Asymmetry</subject><subject>Computer simulation</subject><subject>Cryptography</subject><subject>Decomposition</subject><subject>Diffraction</subject><subject>Encryption</subject><subject>Interference</subject><subject>Iterative methods</subject><subject>Masks</subject><subject>Optical diffraction</subject><subject>Optical image encryption</subject><subject>Optical imaging</subject><subject>same modulus constraint</subject><subject>silhouette problem</subject><subject>Transforms</subject><issn>1943-0655</issn><issn>1943-0647</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><sourceid>DOA</sourceid><recordid>eNo9Uctu2zAQFIoWSJr2B9ILgZ7tLp8yj0HqNi5SuMgDPRIbaunQkESHlAr47yvHgU-7mJ2Z3cVU1SWHOedgv_36c7N-mAsQMBfWSCv4u-qcWyVnYFT9_tRrfVZ9LGULYCzX9rzqr8q-62jI0bP1bogeW7bqcENs2fu8n5DUs79xeGb3sX1OIw0DsTvq0r-J-Fhiv2GrfqAcKFPviWHfsOXLOA1_p2Zsx8K-k0_dLpV4sPpUfQjYFvr8Vi-qxx_Lh-ub2e365-r66nbmFehhJiRZrWTTaK0XChQFqZ-CWAAAp0Da-qeAnDeetOQCqfa1BVWjRa4p2FpeVKujb5Nw63Y5dpj3LmF0r0DKG4d5-rYl541ARNBcWqmEAGswSAnGB27Qcpq8vh69djm9jFQGt01j7qfznZC1qZU0ejGxxJHlcyolUzht5eAOGbnXjNwhI_eW0ST6chRFIjoJFlbZmkv5H57Qjhw</recordid><startdate>20200401</startdate><enddate>20200401</enddate><creator>Luan, Guangyu</creator><creator>Li, Aichuan</creator><creator>Chen, Zhengguang</creator><creator>Huang, Caojun</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>7U5</scope><scope>8FD</scope><scope>H8D</scope><scope>L7M</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0002-9628-6319</orcidid></search><sort><creationdate>20200401</creationdate><title>Asymmetric Optical Image Encryption With Silhouette Removal Using Interference and Equal Modulus Decomposition</title><author>Luan, Guangyu ; Li, Aichuan ; Chen, Zhengguang ; Huang, Caojun</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c405t-23e9543dd5558404ef35bf280001efe59cbfa11dce5312ae7c79047a9a15ef973</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Algorithms</topic><topic>Amplitudes</topic><topic>asymmetric</topic><topic>Asymmetry</topic><topic>Computer simulation</topic><topic>Cryptography</topic><topic>Decomposition</topic><topic>Diffraction</topic><topic>Encryption</topic><topic>Interference</topic><topic>Iterative methods</topic><topic>Masks</topic><topic>Optical diffraction</topic><topic>Optical image encryption</topic><topic>Optical imaging</topic><topic>same modulus constraint</topic><topic>silhouette problem</topic><topic>Transforms</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Luan, Guangyu</creatorcontrib><creatorcontrib>Li, Aichuan</creatorcontrib><creatorcontrib>Chen, Zhengguang</creatorcontrib><creatorcontrib>Huang, Caojun</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) Online</collection><collection>IEEE Xplore Digital Library</collection><collection>CrossRef</collection><collection>Electronics & Communications Abstracts</collection><collection>Solid State and Superconductivity Abstracts</collection><collection>Technology Research Database</collection><collection>Aerospace Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE photonics journal</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Luan, Guangyu</au><au>Li, Aichuan</au><au>Chen, Zhengguang</au><au>Huang, Caojun</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Asymmetric Optical Image Encryption With Silhouette Removal Using Interference and Equal Modulus Decomposition</atitle><jtitle>IEEE photonics journal</jtitle><stitle>JPHOT</stitle><date>2020-04-01</date><risdate>2020</risdate><volume>12</volume><issue>2</issue><spage>1</spage><epage>8</epage><pages>1-8</pages><issn>1943-0655</issn><eissn>1943-0647</eissn><coden>PJHOC3</coden><abstract>We propose an asymmetric optical image encryption scheme with silhouette removal by using interference and equal modulus decomposition (EMD). Plaintext is first separated into two complex value masks with the same modulus using EMD in the Fresnel transform domain. The two masks are encoded into four phase-only masks (POMs), two of which are treated as ciphertexts and other two as plaintext-dependent private keys by using the inverse Fresnel transform with different diffraction distances and interference-based encryption. Any information about the plaintext, including its silhouette, cannot be retrieved using one, two, or even three of the four POMs. Our scheme also avoids the constraint of the same modulus in EMD and eliminates the vulnerability against the iterative amplitude-phase attack and advanced iterative amplitude-phase attack. Numerical simulations were used to verify the validity and security of our proposed method.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/JPHOT.2020.2963921</doi><tpages>8</tpages><orcidid>https://orcid.org/0000-0002-9628-6319</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1943-0655 |
ispartof | IEEE photonics journal, 2020-04, Vol.12 (2), p.1-8 |
issn | 1943-0655 1943-0647 |
language | eng |
recordid | cdi_crossref_primary_10_1109_JPHOT_2020_2963921 |
source | IEEE Open Access Journals; DOAJ Directory of Open Access Journals; EZB Electronic Journals Library |
subjects | Algorithms Amplitudes asymmetric Asymmetry Computer simulation Cryptography Decomposition Diffraction Encryption Interference Iterative methods Masks Optical diffraction Optical image encryption Optical imaging same modulus constraint silhouette problem Transforms |
title | Asymmetric Optical Image Encryption With Silhouette Removal Using Interference and Equal Modulus Decomposition |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T15%3A10%3A59IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Asymmetric%20Optical%20Image%20Encryption%20With%20Silhouette%20Removal%20Using%20Interference%20and%20Equal%20Modulus%20Decomposition&rft.jtitle=IEEE%20photonics%20journal&rft.au=Luan,%20Guangyu&rft.date=2020-04-01&rft.volume=12&rft.issue=2&rft.spage=1&rft.epage=8&rft.pages=1-8&rft.issn=1943-0655&rft.eissn=1943-0647&rft.coden=PJHOC3&rft_id=info:doi/10.1109/JPHOT.2020.2963921&rft_dat=%3Cproquest_cross%3E2376743658%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2376743658&rft_id=info:pmid/&rft_ieee_id=8949713&rft_doaj_id=oai_doaj_org_article_c62aaa051393422096af3306cf16a91e&rfr_iscdi=true |