Asymmetric optical cryptosystem for multiple images based on devil's spiral Fresnel lens phase and random spiral transform in gyrator domain
被引:5
|
作者:
Chen, Hang
论文数: 0引用数: 0
h-index: 0
机构:
Space Engn Univ, Sch Space Informat, Beijing 101416, Peoples R China
Univ Lorraine, CNRS, CRAN UMR 7039, F-54000 Nancy, France
Univ Lorraine, Lab Concept Optimisat & Modelisat Syst, F-57070 Metz, FranceSpace Engn Univ, Sch Space Informat, Beijing 101416, Peoples R China
Chen, Hang
[1
,2
,3
]
Liu, Zhengjun
论文数: 0引用数: 0
h-index: 0
机构:
Harbin Inst Technol, Dept Automat Measurement & Control, Harbin 150001, Peoples R ChinaSpace Engn Univ, Sch Space Informat, Beijing 101416, Peoples R China
Liu, Zhengjun
[4
]
Tanougast, Camel
论文数: 0引用数: 0
h-index: 0
机构:
Univ Lorraine, Lab Concept Optimisat & Modelisat Syst, F-57070 Metz, FranceSpace Engn Univ, Sch Space Informat, Beijing 101416, Peoples R China
Tanougast, Camel
[3
]
Blondel, Walter
论文数: 0引用数: 0
h-index: 0
机构:
Univ Lorraine, CNRS, CRAN UMR 7039, F-54000 Nancy, FranceSpace Engn Univ, Sch Space Informat, Beijing 101416, Peoples R China
Blondel, Walter
[2
]
机构:
[1] Space Engn Univ, Sch Space Informat, Beijing 101416, Peoples R China
[2] Univ Lorraine, CNRS, CRAN UMR 7039, F-54000 Nancy, France
An asymmetric cryptosystem is presented for encrypting multiple images in gyrator transform domains. In the encryption approach, the devil's spiral Fresnel lens variable pure phase mask is first designed for each image band to be encrypted by using devil' mask, random spiral phase and Fresnel mask, respectively. Subsequently, a novel random devil' spiral Fresnel transform in optical gyrator transform is implemented to achieved the intermediate output. Then, the intermediate data is divided into two masks by employing random modulus decomposition in the asymmetric process. Finally, a random permutation matrix is utilized to obtain the ciphertext of the intact algorithm. For the decryption approach, two divided masks (private key and ciphertext) need to be imported into the optical gyrator input plane simultaneously. Some numerical experiments are given to verify the effectiveness and capability of this asymmetric cryptosystem.