Dual encryption scheme of images using polarized light

被引:123
|
作者
Alfalou, A. [1 ]
Brosseau, C. [2 ,3 ]
机构
[1] ISEN BREST, Lab L BISEN, Dept Optoelect, F-29228 Brest 2, France
[2] Univ Brest, Univ Europeenne Bretagne, Lab STICC, F-29238 Brest 3, France
[3] Univ Brest, Univ Europeenne Bretagne, Dept Phys, F-29238 Brest 3, France
关键词
SYSTEM;
D O I
10.1364/OL.35.002185
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
We propose and analyze a dual encryption/decryption scheme, motivated by recent interest in polarization encoding. Compared to standard optical encryption methods, which are based on phase and amplitude manipulation, this encryption procedure relying on Mueller-Stokes formalism provides large flexibility in the key encryption design. The effectiveness of our algorithm is discussed, thanks to a numerical simulation of the polarization encryption/decryption procedure of a 256 gray-level image. Of additional special interest is the immunity of this encryption algorithm to brute force attacks. (C) 2010 Optical Society of America
引用
收藏
页码:2185 / 2187
页数:3
相关论文
共 50 条
  • [1] Color image encryption using polarized light
    Rajput, Sudheesh K.
    Himanshu
    Nishchal, Naveen K.
    [J]. 2012 INTERNATIONAL CONFERENCE ON FIBER OPTICS AND PHOTONICS (PHOTONICS), 2012,
  • [2] Preserving the confidentiality of digital images using a chaotic encryption scheme
    Jolfaei, Alireza
    Matinfar, Ahmadreza
    Mirghadri, Abdolrasoul
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2015, 7 (03) : 258 - 277
  • [3] The Implementation of Chaotic Encryption Scheme for Images
    Veenus, P. K.
    Vivek, P. K.
    Sivasankar, K.
    Dharun, V. S.
    [J]. 2015 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), 2015, : 588 - 592
  • [4] Cryptanalysis of an encryption scheme for binary images
    Chang, CC
    Yu, TX
    [J]. PATTERN RECOGNITION LETTERS, 2002, 23 (14) : 1847 - 1852
  • [5] Identity-based broadcast encryption scheme using the new techniques for dual system encryption
    Sun, Jin
    Hu, Yu-Pu
    [J]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2011, 33 (05): : 1266 - 1270
  • [6] A New Image Encryption Scheme Using Dual Chaotic Map Synchronization
    Al-Hazaimeh, Obaida
    Al-Jamal, Mohammad
    Bawaneh, Mohammed
    Alhindawi, Nouh
    Hamdoni, Bara'a
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2021, 18 (01) : 95 - 102
  • [7] Light Encryption Scheme Using Light-Emitting Diode and Camera Image Sensor
    Liu, Yang
    Liang, Kevin
    Chen, Hung-Yu
    Wei, Liang-Yu
    Hsu, Chin-Wei
    Chow, Chi-Wai
    Yeh, Chien-Hung
    [J]. IEEE PHOTONICS JOURNAL, 2016, 8 (01):
  • [8] A Hybrid Encryption Scheme for Securing Images in the Cloud
    Kulkarni, Pallavi
    Khanai, Rajashri
    Bindagi, Gururaj
    [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT-2020), 2020, : 795 - 800
  • [9] A secure and efficient fingerprint images encryption scheme
    Zhao, Song
    Li, Hengjian
    Yan, Xu
    [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2803 - +
  • [10] An encryption scheme for securing multiple medical images
    Banik, Arpita
    Shamsi, Zeba
    Laiphrakpam, Dolendro Singh
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 49