• Acta Optica Sinica
  • Vol. 34, Issue 8, 810003 (2014)
Chen Yixiang1、* and Wang Xiaogang2
Author Affiliations
  • 1[in Chinese]
  • 2[in Chinese]
  • show less
    DOI: 10.3788/aos201434.0810003 Cite this Article Set citation alerts
    Chen Yixiang, Wang Xiaogang. Image Encryption Based on Iterative Amplitude-Phase Retrieval and Nonlinear Double Random Phase Encoding[J]. Acta Optica Sinica, 2014, 34(8): 810003 Copy Citation Text show less
    References

    [1] Peng Xiang, Wei Hengzheng, Zhang Peng. Introduction of Optical Information Security [M]. Beijing: Science Press, 2008. 5-7.

    [2] P Refregier, B Javidi. Optical image encryption based on input plane and Fourier plane random encoding [J]. Opt Lett, 1995, 20(7): 767-769.

    [3] G Unnikrishnan, J Joseph, K Singh. Optical encryption by double-random phase encoding in the fractional Fourier domain [J]. Opt Lett, 2000, 25(12): 887-889.

    [4] Banghe Zhu, Shutian Liu, Qiwen Ran. Optical image encryption based on multifractional Fourier transforms [J]. Opt Lett, 2000, 25(16): 1159-1161.

    [5] Guohai Situ, Jingjuan Zhang. Double random-phase encoding in the Fresnel domain [J]. Opt Lett, 2004, 29(14): 1584-1586.

    [6] Guohai Situ, Jingjuan Zhang. Multiple-image encryption by wavelength multiplexing [J]. Opt Lett, 2005, 30(11): 1306-1308.

    [7] Ran Tao, Yi Xin, Yue Wang. Double image encryption based on random phase encoding in the fractional Fourier domain [J]. Opt Express, 2007, 15(24): 16067-16079.

    [8] Ran Tao, Jun Lang, Yue Wang. Optical image encryption based on the multiple-parameter fractional Fourier transform [J]. Opt Lett, 2008, 33(6): 581-583.

    [9] Zhengjun Liu, Lie Xu, Chuang Lin, et al.. Image encryption by encoding with a nonuniform optical beam in gyrator transform domains [J]. Appl Opt, 2010, 49(29): 5632-5637.

    [10] Zhengjun Liu, Qing Guo, Lie Xu, et al.. Double image encryption by using iterative random binary encoding in gyrator domains [J]. Opt Express, 2010, 18(11): 12033-12043.

    [11] Yishi Shi, Jingjuan Zhang. Research on the phase retrieval algorithm used for multiple-image encryption with region multiplexing [J]. Acta Optica Sinica, 2009, 29(10): 2705-2708.

    [12] Xi Sixing, Sun Xin, Liu Bing, et al.. New image encryption technology of image based on computer generated hologram [J]. Laser & Optoelectronics Progress, 2012, 49(4): 040902.

    [13] Qin Yi, Gong Qiong, Li Genquan, et al.. An optical encryption method with silhouette removal [J]. Chinese J Lasers, 2012, 39(12): 1209002.

    [14] Qin Yi, Li Jing, Ma Maofen, et al.. System for optical multiple binary image encryption by random phase mask multiplexing [J]. Acta Optica Sinica, 2014, 34(3): 0307001.

    [15] Wei Hengzheng, Peng Xiang, Zhang Peng, et al.. Chosen plaintext attack on double phase encoding encryption technique [J]. Acta Optica Sinica, 2007, 27(5): 824-829.

    [16] A Carnicer, M Montes-Usategui, S Arcos, et al.. Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys [J]. Opt Lett, 2005, 30(13): 1644-1646.

    [17] Wenqi He, Xiang Peng, Xiangfeng Meng. A hybrid strategy for cryptanalysis of optical encryption based on double-random phase-amplitude encoding [J]. Opt & Laser Technol, 2012, 44(5): 1203-1206.

    [18] Wan Qin, Xiang Peng. Asymmetric cryptosystem based on phase-truncated Fourier transforms [J]. Opt Lett, 2010, 35(2): 118-120.

    [19] Wen Chen, Xudong Chen. Optical color image encryption based on an asymmetric cryptosystem in the Fresnel domain [J]. Opt Commun, 2011, 284(16-17): 3913-3917.

    [20] Wei Liu, Zhengjun Liu, Shutian Liu. Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang-Gu algorithm [J]. Opt Lett, 2013, 38(10): 1651-1653.

    [21] S K Rajput, N K Nishchal. Fresnel domain nonlinear optical image encryption scheme based on Gerchberg-Saxton phase-retrieval algorithm [J]. Appl Opt, 2014, 53(3): 418-425.

    [22] Xiaogang Wang, Yixiang Chen, Chaoqing Dai, et al.. Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform [J]. Appl Opt, 2014, 53(2): 208-213.

    CLP Journals

    [1] Han Chao, Wan Rui, Liu Yang, Wang Fengsui. A Double Encryption Algorithm Research Based on Computer Generated Hologram[J]. Chinese Journal of Lasers, 2015, 42(9): 909001

    [2] Wang Hongjuan, Wang Zhipeng, Hai Tao, Liu Xuyan, Qin Yi. Lossless Binary Image Reconstruction in Diffractive Encryption System with Redundant Data[J]. Chinese Journal of Lasers, 2015, 42(7): 709002

    Chen Yixiang, Wang Xiaogang. Image Encryption Based on Iterative Amplitude-Phase Retrieval and Nonlinear Double Random Phase Encoding[J]. Acta Optica Sinica, 2014, 34(8): 810003
    Download Citation