Paper
26 September 2013 Optical asymmetric cryptosystem using polarized light
Sudheesh K. Rajput, Naveen K Nishchal
Author Affiliations +
Abstract
We propose an asymmetric image encryption and decryption scheme based on phase-truncated Fourier transform and polarization encoding. An image bonded with a random phase mask is Fourier transformed and the obtained spectrum is amplitude- and phase-truncated. The phase-truncated value is encrypted using the polarized light in which two independent optical plane waves are used. The first plane wave illuminates the input image and is encoded into a given state of polarization. The second plane wave illuminates an intensity key image and is encoded into another state of polarization. Thus obtained two waves are mixed to obtain first level of encryption. The resultant is then passed through a linear polarizer (pixilated polarizer), to obtain the second level of encryption. For decryption, encrypted image is passed through the pixilated polarizer rotated at appropriate angles. Finally, decrypted image is obtained by computing inverse Fourier transform of retrieved phase-truncated value bonded with amplitude-truncated value. The proposed method offers flexibility in the encryption key design. We also checked immunity against special attack if polarization keys are unknown. Due to amplitude- and phase-truncation process the designed keys are asymmetric in nature. Results of numerical simulation are presented in support of the encryption scheme.
© (2013) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Sudheesh K. Rajput and Naveen K Nishchal "Optical asymmetric cryptosystem using polarized light", Proc. SPIE 8855, Optics and Photonics for Information Processing VII, 885503 (26 September 2013); https://doi.org/10.1117/12.2023823
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Image encryption

Polarization

Fourier transforms

Polarizers

Computer programming

Computer security

Optical image encryption

RELATED CONTENT


Back to Top