Image encryption and authentication verification using fractional nonconventional joint transform correlator

被引:61
作者
Rajput, Sudheesh K. [1 ]
Nishchal, Naveen K. [1 ]
机构
[1] Indian Inst Technol, Dept Phys, Patna 800013, Bihar, India
关键词
Image encryption; Authentication verification; Fractional Fourier transform; Nonconventional joint transform correlator; PLAINTEXT ATTACK; PATTERN-RECOGNITION; FOURIER-TRANSFORM; PHASE ENCRYPTION; SECURITY; PLANE; SYSTEM;
D O I
10.1016/j.optlaseng.2012.03.018
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
We propose an image encryption and authentication verification scheme based on fractional nonconventional joint transform correlator architecture. For image encryption, an input image bonded with a random phase mask (RPM) and a separate key phase mask (another RPM) are fractional Fourier transformed independently. The obtained spectra are multiplexed together to what is called as the encrypted fractional joint power spectrum (EFJPS). For decryption, the key phase mask is fractional transformed and multiplied with the EFJPS and its inverse FRT is calculated. To check the quality of the decrypted image, the mean square signal-to-noise ratio (SNR) and peak-signal-to-noise ratio (PSNR) have been calculated. For security authentication verification, the input image bonded with an RPM and a separate key phase mask (identical RPM) are fractional Fourier transformed with same orders independently. The EFJPS is now fractional transformed with optimum fractional order, which gives a sharp autocorrelation peak in the output, if identical RPMs are used during the encryption process. Parameters such as SNR and peak-to-sidelobe ratio have been calculated to check the effectiveness of the proposed verification scheme. Computer simulation results with a binary text image and phase-encoded text image support the proposed idea. (C) 2012 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1474 / 1483
页数:10
相关论文
共 34 条
  • [1] Security optical systems based on a joint transform correlator with significant output images
    Abookasis, D
    Arazi, O
    Rosen, J
    Javidi, B
    [J]. OPTICAL ENGINEERING, 2001, 40 (08) : 1584 - 1589
  • [2] Optical image compression and encryption methods
    Alfalou, A.
    Brosseau, C.
    [J]. ADVANCES IN OPTICS AND PHOTONICS, 2009, 1 (03): : 589 - 636
  • [3] Fractional correlation operation: Performance analysis
    Bitran, Y
    Zalevsky, Z
    Mendlovic, D
    Dorsch, RG
    [J]. APPLIED OPTICS, 1996, 35 (02) : 297 - 303
  • [4] Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys
    Carnicer, A
    Montes-Usategui, M
    Arcos, S
    Juvells, I
    [J]. OPTICS LETTERS, 2005, 30 (13) : 1644 - 1646
  • [5] Fully-phase asymmetric-image verification system based on joint transform correlator
    Chang, HT
    Chen, CC
    [J]. OPTICS EXPRESS, 2006, 14 (04): : 1458 - 1467
  • [6] Enhanced optical image verification based on joint transform correlator adopting Fourier hologram
    Chang, HT
    Chen, CT
    [J]. OPTICAL REVIEW, 2004, 11 (03) : 165 - 169
  • [7] Resistance of the double random phase encryption against various attacks
    Frauel, Yann
    Castro, Albertina
    Naughton, Thomas J.
    Javidi, Bahram
    [J]. OPTICS EXPRESS, 2007, 15 (16) : 10253 - 10265
  • [8] Known-plaintext attack on a joint transform correlator encrypting system
    Fredy Barrera, John
    Vargas, Carlos
    Tebaldi, Myrian
    Torroba, Roberto
    Bolognini, Nestor
    [J]. OPTICS LETTERS, 2010, 35 (21) : 3553 - 3555
  • [9] Chosen-plaintext attack on a joint transform correlator encrypting system
    Fredy Barrera, John
    Vargas, Carlos
    Tebaldi, Myrian
    Torroba, Roberto
    [J]. OPTICS COMMUNICATIONS, 2010, 283 (20) : 3917 - 3921
  • [10] Optical cryptographic system employing multiple reference-based joint transform correlation technique
    Islam, Mohammed Nazrul
    Karim, Mohammad Ataul
    Alam, Mohammad Showkat
    Asari, K. Vijayan
    [J]. OPTICAL ENGINEERING, 2011, 50 (06)