-
In this paper we propose an algorithm for multiple-image encryption based on the improved virtual optical imaging (VOI). The improved algorithm enhances the security by integrating several images into one as an encrypting object and increasing key space. It focuses on three issues. First, it encrypts the phase information, which can improve the performance of decryption effect of the system. Second, it combines random phase plate with a random amplitude board at the position of the random phase plate to increase the dimension of the key space and the ability to resist the attacks. Finally, it adds a random phase plate before the image place, which enhances the security of the system. It uses the peak signal-to-noise ratio to evaluate the performance of the proposed algorithm. Compared with the traditional VOI-based encryption method, the simulations show that the proposed method demonstrates a good performance in the sense of feasibility, robustness and security.
-
Keywords:
- virtual optical imaging /
- phase coding /
- peak signal to noise ratio /
- information security
[1] Xiao Y L, Su X Y, Li S K, Liu X Q, Zeng S G 2011 Opt. Laser Technol. 43 889
[2] Wang B, Zhang Y 2009 Opt. Commum. 282 3439
[3] Qin W, Peng X 2010 Opt. Lett. 35 118
[4] Wang X G, Zhao D M 2011 Appl. Opt. 50 6645
[5] Yang H Q, Liao X F, Kwok-Wo Wong 2012 Acta Phys. Sin. 61 040505 (in Chinese) [杨华千, 廖晓峰, Kwok-Wo Wong 2012 61 040505]
[6] Peng X, Wei H Z, Zhang P 2008 Optical Information Security Introduction (Beijing:Science Press) p164 (in Chinese) [彭翔, 位恒政, 张鹏 2008 光学信息安全导论 (北京:科学出版社) 第164页]
[7] Wang J, Jiang G P 2011 Acta Phys. Sin. 60 060503 (in Chinese) [王静, 蒋国平 2011 60 060503]
[8] Jin J X, Qiu S S 2010 Acta Phys. Sin. 59 792 (in Chinese) [晋建秀, 丘水生 2010 59 792]
[9] Shi Y S, Wang Y L, Xiao J 2011 Acta Phys. Sin. 60 034202 (in Chinese) [史祎诗, 王雅丽, 肖俊 2011 60 034202]
[10] Situ G H, Zhang J J 2005 Opt. Kff. 30 1306
[11] Hennelly B M, Naughton T J, Mcdonald J 2007 Opt. Lett. 32 1060
-
[1] Xiao Y L, Su X Y, Li S K, Liu X Q, Zeng S G 2011 Opt. Laser Technol. 43 889
[2] Wang B, Zhang Y 2009 Opt. Commum. 282 3439
[3] Qin W, Peng X 2010 Opt. Lett. 35 118
[4] Wang X G, Zhao D M 2011 Appl. Opt. 50 6645
[5] Yang H Q, Liao X F, Kwok-Wo Wong 2012 Acta Phys. Sin. 61 040505 (in Chinese) [杨华千, 廖晓峰, Kwok-Wo Wong 2012 61 040505]
[6] Peng X, Wei H Z, Zhang P 2008 Optical Information Security Introduction (Beijing:Science Press) p164 (in Chinese) [彭翔, 位恒政, 张鹏 2008 光学信息安全导论 (北京:科学出版社) 第164页]
[7] Wang J, Jiang G P 2011 Acta Phys. Sin. 60 060503 (in Chinese) [王静, 蒋国平 2011 60 060503]
[8] Jin J X, Qiu S S 2010 Acta Phys. Sin. 59 792 (in Chinese) [晋建秀, 丘水生 2010 59 792]
[9] Shi Y S, Wang Y L, Xiao J 2011 Acta Phys. Sin. 60 034202 (in Chinese) [史祎诗, 王雅丽, 肖俊 2011 60 034202]
[10] Situ G H, Zhang J J 2005 Opt. Kff. 30 1306
[11] Hennelly B M, Naughton T J, Mcdonald J 2007 Opt. Lett. 32 1060
Catalog
Metrics
- Abstract views: 6754
- PDF Downloads: 604
- Cited By: 0