skip to main content
10.1145/3421766.3421828acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaiamConference Proceedingsconference-collections
research-article

Encryption and Decryption of Optical Images with Different Algorithms

Published: 26 October 2020 Publication History

Abstract

While digital images are the most common expression of information on the internet, their security is of great concern, and image encryption technology is a key technology to ensure the security of images. Several kinds of image encryption and decryption methods were used to explore the encryption and decryption of optical images using MATLAB: randomly disrupting the row or column of each layer; randomly disrupting the pixel points; scaling the RGB values of pixel points; transposing, horizontal flipping and vertical flipping of RGB matrixes; and the one-dimensional and two-dimensional data reset of images. Different encryption algorithms have different image encryption effects and operating speeds. The research is to better assess this technology for beginners who are interested in image encryption and decryption technologies and to lay the foundation for these individuals to develop more advanced encryption and decryption technologies in the future. It is proved that these algorithms can be applied to image data protection.

References

[1]
P. Refregier, B. Javidi (1995) "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett., vol. 20, pp. 767--769.
[2]
Javidi, A. Sergent (1997) "Fully phase encoded key and biometrics for security verification," Opt. Eng., vol. 36, pp. 935--942.
[3]
N. Towghi, B. Javidi, Z. Luo (1999) "Fully phase encrypted image processor," J. Opt. Soc. Am. A., vol. 16, pp. 1915--1927.
[4]
Matoba, B. Javidi (1999) "Encrypted optical memory system using three-dimensional keys in the Fresnel domain," Opt. Lett., vol. 24, pp. 762--764.
[5]
T. Nomura, B. Javidi (2000) "Optical encryption using a joint transform correlator architecture," Opt. Eng., vol. 39, pp. 2031--2035.
[6]
Javidi, T. Nomura (2000) "Securing information by use of digital holography," Opt. Lett., vol. 25, pp. 28--30.
[7]
E. Tajahuerce, O. Matoba, S. C. Verrall, B (2000) Javidi, "Optoelectronic information encryption with phase-shifting interferometry," Appl. Optics., vol. 39, pp. 2313--2320.
[8]
E. Perez-Cabre, M. Cho, B. Javidi (2011) "Information authentication using photon-counting double-random-phase encrypted images," Opt. Lett., vol. 36, pp. 22--24.
[9]
W. Chen, X. Chen, A. Anand, B (2013) Javidi, "Optical encryption using multiple intensity samplings in the axial domain," J. Opt. Soc. Am. A., vol. 30, pp. 806--812.
[10]
Markman, B. Javidi (2014) "Full-phase photon-counting double-random-phase encryption," J. Opt. Soc. Am. A., vol. 31, pp. 394--403.
[11]
W. Chen, B. Javidi, X. Chen (2014) "Advances in optical security systems," Adv. Opt. Photonics., vol. 6, pp. 120--155.
[12]
X. Peng, Z. Cui, T. Tan (2002) "Information encryption with virtual-optics imaging system," Opt. commun., vol. 212, pp. 235--245.
[13]
Carnicer, M. Montes-Usategui, S. Arcos, I. Juvells (2005) "Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys," Opt. Lett., vol. 30, pp. 1644--1646.
[14]
X. Peng, P. Zhang, H. Wei, B. Yu (2006) "Known-plaintext attack on optical encryption based on double random phase keys," Opt. Lett., vol. 31, pp. 1044--1046.
[15]
X. Peng, H. Wei, P. Zhang, "Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain," Opt. Lett., vol. 31, pp. 3261--3263, 2006.
[16]
W. Qin, X. Peng, X. Meng, W. He (2010) "Improved known-plaintext attack on optical encryption based on double random phase encoding," In: Proceedings of Symposium on Photonics and Optoelectronic (SOPO), Chengdu, China.
[17]
X. Liu, J. Wu, W. He, M. Liao, C. Zhang, X. Peng (2015) "Vulnerability to ciphertext-only attack of optical encryption scheme based on double random phase encoding," Opt. Express., vol. 23, pp. 18955--18968.
[18]
H. Suzuki, T. Yamaya, T. Obi, M. Yamaguchi (2003) "Fingerprint verification for smart-card holders based on an optical image encryption scheme," Proc. of SPIE., vol. 5202, pp. 88--96.
[19]
M. Hennelly, J. T. Sheridan (2004) "Random phase and jigsaw encryption in the Fresnel domain," Opt. Eng., vol. 43, pp. 2239--2249.
[20]
J. F. Barrera, R. Henao, M. Tebaldi, R. Torroba, N. Bolognini (2006) "Multiplexing encryption-decryption via lateral shifting of a random phase mask," Opt. Commun., vol. 259, pp. 532--536.
[21]
N. Singh, A. Sinha (2009) "Gyrator transform-based optical image encryption, using chaos," Opt. Laser. Eng., vol. 47, pp. 539--546.
[22]
Alfalou, A. Mansour (2009) "Double random phase encryption scheme to multiplex and simultaneous encode multiple images," Appl. Optics., vol. 48, pp. 5933--5947.
[23]
Li, S. Li, M. Asim, J. Nunez, G. Alvarez, G. Chen (2009) "On the security defects of an image encryption scheme," Image Vision Comput., vol. 27, pp. 1371--1381.
[24]
P. Clemente, V. Durán, V. Torres-Company, E. Tajahuerce, J. Lancis (2010) "Optical encryption based on computational ghost imaging," Opt. Lett., vol. 35, pp. 2391--2393.
[25]
X. Wang, D. Zhao (2012) "Fully phase multiple-image encryption based on superposition principle and the digital holographic technique," Opt. Commun., vol. 285, pp. 4280--4284.
[26]
J. Liu, H. Jin, L. Ma, Y. Li, W. Jin (2013) "Optical color image encryption based on computer generated hologram and chaotic theory," Opt. Commun., vol. 307, pp. 76--79.
[27]
B. Deepan, C. Quan, Y. Wang, C. J. Tay (2014) "Multiple-image encryption by space multiplexing based on compressive sensing and the double-random phase-encoding technique," Appl. Optics., vol. 53, pp. 4539--4547.
[28]
P. Wang, C. Yuan, L. Wang, C. Li (2014) "Encryption and decryption for double images based on fractional Fourier transformation," Laser Technology., vol. 38, pp. 551--555.
[29]
Maluenda D., Carnicer A., Martínez-Herrero R., Juvells I., Javidi B (2015) "Optical encryption using photon-counting polarimetric imaging," Opt. Express., vol. 23, pp. 655--666.
[30]
N. Rawat, B. Kim, I. Muniraj, G. Situ, B. Lee (2015) "Compressive sensing based robust multispectral double-image encryption," Appl. Optics., vol. 54, pp. 1782--1793.
[31]
Y. Wang, Quan C., Tay C. J., "Asymmetric optical image encryption based on an improved amplitude-phase retrieval algorithm," Opt. Laser. Eng., vol. 78, pp. 8--16, 2016.
[32]
Zamrani W., Ahouzi E., Lizana A., Campos J., "Towards The Growth of Optical Security Systems for Image Encryption by Polarized Light," In: Proceedings of IEEE/ACS International Conference on Computer Systems and Applications (AICCSA), Agadir, Morocco, 2016.
[33]
Zamrani W., Ahouzi E., Lizana A., Campos J., "Optical image encryption technique based on deterministic phase masks," Opt. Eng., vol. 55, pp. 103108, 2016.
[34]
Zamrani W., Ahouzi E., Lizana A., Campos J., Yzuel M.J., "Enhanced method to improve the shift tolerance of double random phase encoding," In Proceedings of 15th Workshop on Information Optics (WIO), Barcelone, Spain, 2016.
[35]
Zamrani W., Ahouzi E., Azami N., El Ghazi H., Sadiki T., "Optical double phase encryption and spreading technique applied to color image," In Proceedings of 15th Workshop on Information Optics (WIO), Barcelone, Spain, 2016.
[36]
Ahouzi E., Zamrani W., Azami N., Lizana A., "Optical triple random phase encryption," Opt. Eng., vol. 56, pp. 113114, 2017.
[37]
Xi S., Wang X., Song L., Zhu Z., Zhu B., Huang S., Yu N., Wang H., "Experimental study on optical image encryption with asymmetric double random phase and computer-generated hologram," Opt. Express., vol. 25, pp. 8212--8222, 2017.
[38]
Chen J., Zhang Y., Qi L., Fu C., "Exploiting chaos-based compressed sensing and cryptographic algorithm for image encryption and compression," Opt. Laser Technol., vol. 99, pp. 238--248, 2018.
[39]
Kumar R., Quan C., "Optical colour image encryption using spiral phase transform and chaotic pixel scrambling," J. Mod. Optic., vol. 66, pp. 776--785, 2019.

Index Terms

  1. Encryption and Decryption of Optical Images with Different Algorithms

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    AIAM2020: Proceedings of the 2nd International Conference on Artificial Intelligence and Advanced Manufacture
    October 2020
    566 pages
    ISBN:9781450375535
    DOI:10.1145/3421766
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 26 October 2020

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. algorithms
    2. decryption
    3. encryption
    4. optical images

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    AIAM2020

    Acceptance Rates

    AIAM2020 Paper Acceptance Rate 100 of 285 submissions, 35%;
    Overall Acceptance Rate 100 of 285 submissions, 35%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 50
      Total Downloads
    • Downloads (Last 12 months)4
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 06 Jan 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media