Acta Optica Sinica, Volume. 34, Issue 7, 710001(2014)
Nonlinear Double Images Encryption Based on Double Random Phase Encoding
[1] [1] P Refregier, B Javidi. Optical image encryption based on input plane and Fourier plane random encoding [J]. Opt Lett, 1995, 20(7): 767-769.
[2] [2] G Unnikrishnan, J Joseph, K Singh. Optical encryption by double-random phase encoding in the fractional Fourier domain [J]. Opt Lett, 2000, 25(12): 887-889.
[3] [3] Shutian Liu, Li Yu, Banghe Zhu. Optical image encryption by cascaded fractional Fourier transforms with random phase filtering [J]. Opt Commun, 2001, 187(1-3): 57-63.
[4] [4] Guohai Situ, Jingjuan Zhang. Double random-phase encoding in the Fresnel domain [J]. Opt Lett, 2004, 29(14): 1584-1586.
[5] [5] Yu Bin, Peng Xiang. Optical image encryption based on cascaded phase retrieval algorithm [J]. Acta Optica Sinica, 2005, 25(7): 881-884.
[6] [6] Zhengjun Liu, Shutian Liu. Random fractional Fourier transform [J]. Opt Lett, 2007, 32(15): 20881-2090.
[7] [7] Ran Tao, Jun Lang, Yue Wang. Optical image encryption based on the multiple-parameter fractional Fourier transform [J]. Opt Lett, 2008, 33(6): 581-583.
[10] [10] Xiangfeng Meng, Luzhong Cai, Xianfeng Xu, et al.. Full-phase image encryption by two-step phase-shifting interferometry [J]. Optik, 2008, 119(9): 434-440.
[11] [11] Zhengjun Liu, Lie Xu, Chuang Lin, et al.. Image encryption by encoding with a nonuniform optical beam in gyrator transform domains [J]. Appl Opt, 2010, 49(29): 5632-5637.
[12] [12] Linfei Chen, Daomu Zhao, Fan Ge. Image encryption based on singular value decomposition and Arnold transform in fractional domain [J]. Opt Commun, 2013, 291: 98-103.
[13] [13] A Carnicer, M Montes-Usategui, S Arcos, et al.. Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys [J]. Opt Lett, 2005, 30(13): 1644-1646.
[14] [14] Xiang Peng, Peng Zhang, Hengzheng Wei, et al.. Known-plaintext attack on optical encryption based on double random phase keys [J]. Opt Lett, 2006, 31(8): 1044-1046.
[15] [15] Wei Hengzheng, Peng Xiang, Zhang Peng, et al.. Chosen plaintext attack on double phase encoding encryption technique [J]. Acta Optica Sinica, 2007, 27(5): 824-829.
[16] [16] X C Cheng, L Z Cai, Y R Wang, et al.. Security enhancement of double-random phase encryption by amplitude modulation [J]. Opt Lett, 2008, 33(14): 1575-1577.
[17] [17] Wenqi He, Xiang Peng, Xiangfeng Meng. A hybrid strategy for cryptanalysis of optical encryption based on double-random phase-amplitude encoding [J]. Opt & Laser Technol, 2012, 44(5): 1203-1206.
[18] [18] Wan Qin, Xiang Peng. Asymmetric cryptosystem based on phase-truncated Fourier transforms [J]. Opt Lett, 2010, 35(2): 118-120.
[19] [19] Xiaogang Wang, Daomu Zhao. A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms [J]. Opt Commun, 2012, 285(6): 1078-1081.
Get Citation
Copy Citation Text
Chen Yixiang, Wang Xiaogang. Nonlinear Double Images Encryption Based on Double Random Phase Encoding[J]. Acta Optica Sinica, 2014, 34(7): 710001
Category: Image Processing
Received: Jan. 21, 2014
Accepted: --
Published Online: Jun. 25, 2014
The Author Email: Yixiang Chen (chenyix1979@163.com)