Optical Image Encryption using Biometric phase mask generated by Digital Holography

Author(s):  
Gaurav Verma ◽  
Aloka Sinha
2012 ◽  
Vol 459 ◽  
pp. 461-464
Author(s):  
Huai Sheng Wang

A no interference optical image encryption is put forward in this paper. The encrypting process is composed of a Fresnel diffraction and a Fourier transformation. A digital image coded with a random phase plate first takes a Fresnel diffraction. The diffraction function is enlarged and coded with another random phase mask. At last the enlarged function undergoes a Fourier transformation. The real part of the transformed function is defined as an encrypted image. In decrypting process, first the encrypted image takes an inverse Fourier transformation. Then the upper left corner of the transformed function is intercepted. According to the space inversion of the transformed function, if the intercepted function takes an inverse Fresnel diffraction, the original digital image can be restored from the final diffraction function. Because there is no interference process in encryption and decryption, the optical system is relatively simple and the quality of restored image is very good


2015 ◽  
Vol 2015 ◽  
pp. 1-13 ◽  
Author(s):  
Hukum Singh ◽  
A. K. Yadav ◽  
Sunanda Vashisth ◽  
Kehar Singh

We have carried out a study of optical image encryption in the Fresnel transform (FrT) domain, using a random phase mask (RPM) in the input plane and a phase mask based on devil’s vortex toroidal lens (DVTL) in the frequency plane. The original images are recovered from their corresponding encrypted images by using the correct parameters of theFrTand the parameters of DVTL. The use of a DVTL-based structured mask enhances security by increasing the key space for encryption and also aids in overcoming the problem of axis alignment associated with an optical setup. The proposed encryption scheme is a lensless optical system and its digital implementation has been performed using MATLAB 7.6.0 (R2008a). The scheme has been validated for a grayscale and a binary image. The efficacy of the proposed scheme is verified by computing mean-squared-error (MSE) between the recovered and the original images. We have also investigated the scheme’s sensitivity to the encryption parameters and examined its robustness against occlusion and noise attacks.


2017 ◽  
Vol 23 (2) ◽  
pp. 184-191 ◽  
Author(s):  
Yonggang Su ◽  
Chen Tang ◽  
Xia Chen ◽  
Biyuan Li ◽  
Wenjun Xu ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document