scholarly journals Angle Multiplexing Optical Image Encryption in the Fresnel Transform Domain Using Phase-Only Computer-Generated Hologram

Photonics ◽  
2019 ◽  
Vol 7 (1) ◽  
pp. 1 ◽  
Author(s):  
Hsuan T. Chang ◽  
Yao-Ting Wang ◽  
Chien-Yu Chen

We propose an angle multiplexing method for optics-based image encryption using a phase-only computer-generated hologram (POCGH) in the tilted Fresnel transform (TFrT) domain. Modified Gerchberg-Saxton algorithms, based on the three types of rotation manipulation in both the hologram and reconstruction planes, are used with their corresponding TFrT parameters to extract the phase-only functions (POFs) of the target images. All the extracted POFs are then phase-modulated and summed to obtain the final POCGH, which is capable of multiplexing and avoiding overlap in the reconstructed images. The computer simulation results show that the images corresponding to the various rotation manipulations at the hologram and image reconstruction planes can be successfully restored with high correlation coefficients. Due to the encrypted nature of the multiplexed images, a higher system security level can be achieved, as the images can only be correctly displayed when all the required parameters in the TFrT are available. The angle sensitivity on the image quality for each manipulation is also investigated.

2018 ◽  
Vol 2018 ◽  
pp. 1-6 ◽  
Author(s):  
Hui Ren ◽  
Jun Wang ◽  
Qiong-Hua Wang

We introduce an image encryption method based on computer-generated hologram (CGH) and two-dimensional Sine Logistic modulation map (2D-SLMM). We combine CGH and 2D-SLMM to improve encryption security. During the encryption process, the hologram needs to be logistically modulated by 2D-SLMM. This logistic modulation technique can avoid complex algorithms. Simulation results and security analysis demonstrate that the proposed approach has a high security level, good invisibility of image information in ciphertext, large key space, and strong robustness.


2012 ◽  
Vol 44 (7) ◽  
pp. 2238-2244 ◽  
Author(s):  
Jian-Ji Huang ◽  
Hone-Ene Hwang ◽  
Chun-Yuan Chen ◽  
Ching-Mu Chen

2018 ◽  
Vol 29 (07) ◽  
pp. 1850058 ◽  
Author(s):  
Nabil Ben Slimane ◽  
Nahed Aouf ◽  
Kais Bouallegue ◽  
Mohsen Machhout

In this paper, an efficient scheme for image encryption based on the nested chaotic map and deoxyribonucleic acid (DNA) is introduced. In order to generate the initial condition values of the nested chaotic system, the Secure Hash Algorithm SHA-256 is used. The algorithm consists of two main layers: confusion and diffusion. In the first layer, the nested chaotic map is employed to create the scrambled image. The scrambled image is obtained through the ascending sorting of the first component of the nested chaotic index sequence. To ensure higher sensitivity, higher complexity and higher security, DNA sequence and DNA operator are employed additionally with the nested chaotic map and hash algorithm to modify the pixel values. The important advantages of our algorithm are the improvement of Number of Pixel Change Rate (NPCR), Unified Average Changing Intensity (UACI) and entropy, which improve resistivity against several attacks. Experimental results and relevant security analysis demonstrated that our proposed encryption scheme has the highest security level because it is more complicated, and it has a sufficiently large key space. The proposed method is compared to other recent image encryption schemes using different security analysis factors, including NPCR, UACI, correlation coefficients (CCs), encryption quality (EQ) and entropy. It is also resistant to noise (Salt and Pepper, Gaussian and speckle) and data loss attacks. The illustrated results demonstrated that the proposed image encryption scheme is efficient, and can be adopted for image encryption and transmission.


2011 ◽  
Vol 50 (5) ◽  
pp. 710 ◽  
Author(s):  
Hsuan T. Chang ◽  
Hone-Ene Hwang ◽  
Cheng-Ling Lee ◽  
Mn-Ta Lee

Sign in / Sign up

Export Citation Format

Share Document