IJMTES – OPTICAL CRYPTOGRAPHY BASED ON COMPRESSIVE GHOST IMAGING USING MULTI-IMAGE ENCRYPTION SCHEME

Journal Title : International Journal of Modern Trends in Engineering and Science

Paper Title : OPTICAL CRYPTOGRAPHY BASED ON COMPRESSIVE GHOST IMAGING USING MULTI-IMAGE ENCRYPTION SCHEME

Author’s Name : Raghunandhini Balasubramanian | Ramesh Aunnamed

Volume 04 Issue 06 2017

ISSN no:  2348-3121

Page no: 8-9

Abstract – Computational ghost imaging primarily based optical cryptography has end up popular due to effective cryptographic techniques. However, in a few instances, cryptography mechanism can be laid low with selected-plain text assault due to the linear relationship between the input and output of the encryption gadget. To overcome plain text assault, computational ghost imaging based optical cryptography (CGI-OC) was proposed wherein invertible matrix modulation is utilized to decorate the safety. But, CGE-OC was vulnerable to detect a plain text attack which indirectly limits the performance of cryptography. CGI-OC was also not applicable in the case of using such as different series of phase-only masks for encryption. Hence, labyrinth-like phase modulation patterns are introduced in proposed High Security Optical Encryption technique. In this technique, single phase only mask is pre-set and series of random phase-only masks are generated using labyrinth-like phase modulation patterns for encryption process. Compressive sensing is included in this technique for effectively acquiring and reconstructing a signal by finding solutions to under determined linear systems during encryption technique. This improves the performance of encryption and decryption technique and also improves the security of data. Thus, the developed technique can save storage space and also improves the security level through effective cryptographic process.

Keywords –Cryptography, High Security Optical  Encryption Technique

References

  1. B. Javidi (Ed.), “Optical and digital techniques for information security ,” Springer Science & Business Media, vol.1, 2006.
  2. J. H. Shapiro, “Computational ghost imaging., Physical Review A, Vol. 78(6), 2009.
  3. A. Markman, “Optical Security using the Double-Random-Phase Encryption with Photon-Counting,” 2016.
  4. Y. Shi, T Li, Y. Wang, , Q. Gao, S. Zhang, and H . Li, “Optical image encryption via ptychography,” Optics letters, Vol. 38(9), pp.1425-1427, 2013.
  5. G. Unnikrishnan, J. Joseph and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Optics letters, Vol. 25(12), pp. 887-889, 2000.
  6. G. Situ, and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Optics Letters, Vol. 29(14), pp. 1584-1586, 2004.
  7. G. Meng, X. F., Cai, L. Z., Xu, X. F., Yang, X. L., Shen, X. X., Dong, G. Y., and Wang, Y. R, “ Two-step phase-shifting interferometry and its application in image encryption” Optics Letters, vol. 31(10), pp. 1414-1416, 2006.
  8. Y. Zhang,, and B. Wang,, “Optical image encryption based on interference”. Optics Letters, vol. 33(21), pp. 2443-2445, 2008.