Optical image encryption using different twiddle factors in the butterfly algorithm of fast Fourier transform

被引:8
作者
Song, Jaehun [1 ]
Lee, Yeon Ho [1 ]
机构
[1] Sungkyunkwan Univ, Coll Informat & Commun Engn, 2066 Seobu Ro, Suwon 2066, Gyeonggi Do, South Korea
基金
新加坡国家研究基金会;
关键词
Fast Fourier transform; Optical image encryption; Butterfly algorithm; Correlation coefficient; COHERENT SUPERPOSITION;
D O I
10.1016/j.optcom.2020.126707
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
We studied the flow of data in the paths of a fast Fourier transform (FFT) and inverse FFT in the butterfly algorithm in order to establish a relationship between the forward and backward data. We show that an FFT image can be encrypted by modifying the data of a path of FFT and decrypted by restoring the data during the inverse FFT. For encryption, the data in a path of FFT are shuffled by enforcing right bit shifts on the bit representation of the data index. Moreover, the phases of the data are changed by multiples of a fixed fraction of 2 pi; the data index is used as the multiplication constant, and the divisor for the fraction is used as an encryption key. The path number and number of right bit shifts are two other encryption keys. The three integers constitute a set of encryption keys for two-dimensional images. Four different images were encrypted with two sets of encryption keys. The decryptions were performed with partially correct keys in order to test the robustness of our method against brute attacks. The correlation between the original and decrypted images was evaluated using the correlation coefficient.
引用
收藏
页数:9
相关论文
共 28 条
[1]   Dual encryption scheme of images using polarized light [J].
Alfalou, A. ;
Brosseau, C. .
OPTICS LETTERS, 2010, 35 (13) :2185-2187
[2]   The correlation coefficient:: An overview [J].
Asuero, AG ;
Sayago, A ;
González, AG .
CRITICAL REVIEWS IN ANALYTICAL CHEMISTRY, 2006, 36 (01) :41-59
[3]  
Bracewell R.N., 1986, The Fourier Transform and its Applications, Vsecond
[4]   A new optical image cryptosystem based on two-beam coherent superposition and unequal modulus decomposition [J].
Chen, Linfei ;
Gao, Xiong ;
Chen, Xudong ;
He, Bingyu ;
Liu, Jingyu ;
Li, Dan .
OPTICS AND LASER TECHNOLOGY, 2016, 78 :167-174
[5]   Advances in optical security systems [J].
Chen, Wen ;
Javidi, Bahram ;
Chen, Xudong .
ADVANCES IN OPTICS AND PHOTONICS, 2014, 6 (02) :120-155
[6]   AN ALGORITHM FOR MACHINE CALCULATION OF COMPLEX FOURIER SERIES [J].
COOLEY, JW ;
TUKEY, JW .
MATHEMATICS OF COMPUTATION, 1965, 19 (90) :297-&
[7]   Optical image encryption based on XOR operations [J].
Han, JW ;
Park, CS ;
Ryu, DH ;
Kim, ES .
OPTICAL ENGINEERING, 1999, 38 (01) :47-54
[8]   Optical image encryption by random shifting in fractional Fourier domains [J].
Hennelly, B ;
Sheridan, JT .
OPTICS LETTERS, 2003, 28 (04) :269-271
[9]   Encrypted optical memory using double-random phase encoding [J].
Javidi, B ;
Zhang, GS ;
Li, JA .
APPLIED OPTICS, 1997, 36 (05) :1054-1058
[10]   Roadmap on optical security [J].
Javidi, Bahram ;
Carnicer, Artur ;
Yamaguchi, Masahiro ;
Nomura, Takanori ;
Perez-Cabre, Elisabet ;
Millan, Maria S. ;
Nishchal, Naveen K. ;
Torroba, Roberto ;
Barrera, John Fredy ;
He, Wenqi ;
Peng, Xiang ;
Stern, Adrian ;
Rivenson, Yair ;
Alfalou, A. ;
Brosseau, C. ;
Guo, Changliang ;
Sheridan, John T. ;
Situ, Guohai ;
Naruse, Makoto ;
Matsumoto, Tsutomu ;
Juvells, Ignasi ;
Tajahuerce, Enrique ;
Lancis, Jesus ;
Chen, Wen ;
Chen, Xudong ;
Pinkse, Pepijn W. H. ;
Mosk, Allard P. ;
Markman, Adam .
JOURNAL OF OPTICS, 2016, 18 (08)