Optical image encryption by random shifting in fractional Fourier domains

Files in This Item:
File Description SizeFormat 
Optical image encryption by random shifting in fractional Fourier domains.pdf238.05 kBAdobe PDFDownload
Title: Optical image encryption by random shifting in fractional Fourier domains
Authors: Hennelly, Bryan M.
Sheridan, John T.
Permanent link: http://hdl.handle.net/10197/3523
Date: 15-Feb-2003
Online since: 2012-02-22T14:38:53Z
Abstract: A number of methods have recently been proposed in the literature for the encryption of two-dimensional information by use of optical systems based on the fractional Fourier transform. Typically, these methods require random phase screen keys for decrypting the data, which must be stored at the receiver and must be carefully aligned with the received encrypted data. A new technique based on a random shifting, or jigsaw, algorithm is proposed. This method does not require the use of phase keys. The image is encrypted by juxtaposition of sections of the image in fractional Fourier domains. The new method has been compared with existing methods and shows comparable or superior robustness to blind decryption. Optical implementation is discussed, and the sensitivity of the various encryption keys to blind decryption is examined.
Funding Details: Other funder
Type of material: Journal Article
Publisher: Optical Society of America
Journal: Optics Letters
Volume: 28
Issue: 4
Start page: 269
End page: 271
Copyright (published version): 2003 Optical Society of America
Subject LCSH: Data encryption (Computer science)
Fourier transform optics
Signal processing
Image processing
DOI: 10.1364/OL.28.000269
Other versions: http://dx.doi.org/10.1364/OL.28.000269
Language: en
Status of Item: Not peer reviewed
Appears in Collections:Electrical and Electronic Engineering Research Collection

Show full item record

Citations 1

Last Week
Last month
checked on Feb 11, 2019

Google ScholarTM



This item is available under the Attribution-NonCommercial-NoDerivs 3.0 Ireland. No item may be reproduced for commercial purposes. For other possible restrictions on use please refer to the publisher's URL where this is made available, or to notes contained in the item itself. Other terms may apply.