Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Asymmetric multiple-image encryption system based on a chirp z-transform

Not Accessible

Your library or personal account may give you access

Abstract

An asymmetric multi-image encryption system based on the chirp z-transform (CZT) is demonstrated. The setup is a hybrid architecture that combines a double-random-phase encryption scheme in 4f configuration and a multiplexing procedure based on the CZT. The setup allows encodement of multiple images and their transmittal in a single multiplexed element. The decryption stage has a compact design that allows retrieval of several data without cross-talk noise. Since the system is asymmetric, the users’ decryption keys are different from those used in the encryption process, resulting in an encoding scheme resistant to cryptanalysis attacks. It is demonstrated that multiplexing based on the CZT allows functionality expansion of the static encoding setups (optical, digital or hybrid) to a dynamic range, a fact that provides a versatile solution to handle large volumes of encrypted data efficiently and safely. The viability of this proposal is verified using virtual optical systems.

© 2019 Optical Society of America

Full Article  |  PDF Article
More Like This
Robust multidepth object encryption based on a computer-generated hologram with a cascaded structure

Mei-Lan Piao, Shi-Gang Wang, Yan Zhao, Jian Wei, Yu Zhao, and Nam Kim
Appl. Opt. 58(36) 9921-9930 (2019)

Nonlinear optical security system based on a joint transform correlator in the Fresnel domain

Juan M. Vilardy, María S. Millán, and Elisabet Pérez-Cabré
Appl. Opt. 53(8) 1674-1682 (2014)

Supplementary Material (1)

NameDescription
Visualization 1       Decrypted sequences from a multiplexed package obtained with an asymmetric multiple-image encryption system based on chirp z-transform. Each decryption uses different combinations of private and public keys.

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Figures (6)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Tables (3)

You do not have subscription access to this journal. Article tables are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Equations (6)

You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.