In this paper, we implement a novel optical information processing tool termed as gyrator wavelet transform for the
application of double image encryption using amplitude- and phase-truncation approach. This approach enhances the key
space in an asymmetric cryptosystem by adding supplementary security layers, i.e., family of mother wavelet and the
gyrator transform order. Double input images bonded with random phase masks are independently gyrator transformed.
Amplitude truncation of obtained spectrum generates individual and universal keys while phase truncation generates two
real-valued functions. Each of the retrieved amplitude function is discrete wavelet transformed, which results into four
different frequency bands. We have fused the obtained wavelet spectrum of an individual image by again gyrator
transforming them following amplitude- and phase truncation. The obtained real-valued functions corresponding to each
image are bonded to form the encrypted image. After using the correct universal key, individual asymmetric key, type of
wavelet, and correct gyrator transform order, the original images are retrieved successfully. Numerical simulation results
prove that the proposed scheme is more flexible and effective than existing wavelet fusion schemes.
Collision is a phenomenon in which two distinct inputs produce an identical output, so if an attacker finds the encryption keys in such a way that when it is applied to an encrypted image, it produces an arbitrary image instead of original one. We propose collision in an asymmetric cryptosystem based on a phase-truncated Fresnel transform. For encryption, instead of using conventional random-phase masks, structured phase masks with desired construction parameters are used. The decryption keys are generated using the amplitude and phase truncation. An attacker generates an arbitrary (collision) image from the encrypted image using a modified Gerchberg-Saxton phase retrieval algorithm. Two different users, authorized and unauthorized user (attacker), can claim the retrieved image as the original data. The authorized user uses the correct decryption keys and retrieves the original image, while an unauthorized user uses the generated keys and retrieves the collision image. In order to verify the authenticity of the retrieved data, a joint transform correlator is used. A sharp auto-correlation peak is obtained when an image retrieved by authorized user is matched with the encrypted image. However, cross-correlation is obtained when an encrypted image is matched with the collision image. Results of computer simulation support the idea of the proposed collision.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.