• Infrared and Laser Engineering
  • Vol. 47, Issue 6, 603003 (2018)
Chang Keming, Chen Ye, Wang Ying, and Wang Jun
Author Affiliations
  • [in Chinese]
  • show less
    DOI: 10.3788/irla201847.0603003 Cite this Article
    Chang Keming, Chen Ye, Wang Ying, Wang Jun. Single-channel color image encryption using cylindrical diffraction and color space converting[J]. Infrared and Laser Engineering, 2018, 47(6): 603003 Copy Citation Text show less
    References

    [1] He Fengtao, Zhang Min, Bai Ke, et al. Image encryption method based on laser speckle and henon mapping[J]. Infrared and Laser Engineering, 2016, 45(4): 268-272. (in Chinese)

    [2] Javidi B, Carnicer A, Yamaguchi M, et al. Road map on optical security[J]. Journal of Optics, 2016, 18(8): 083001.

    [3] Javidi B, Zhang Guanshen, Li Jian. Encrypted optical memory using double-random phase encoding[C]//Lasers and Electro-Optics Society Meeting, 1996, 1997: 364-365.

    [4] Yao Lili, Yuan Caojin, Qiang Junjie, et al. An asymmetric color image encryption method by using deduced gyrator transform[J]. Optics & Lasers in Engineering, 2016, 89: 72-79.

    [5] Hwang Hone-Ene. Optical color image encryption based on the wavelength multiplexing using cascaded phase-only masks in Fresnel transform domain[J]. Optics Communications, 2012, 285(5): 567-573.

    [6] Joshi M, Chandrashakher, Singh K. Color image encryption and decryption using fractional Fourier transform[J]. Optics Communication, 2007, 279(1): 35-42.

    [7] Chen Hang, Du Xiaoping, Liu Zhengjun, et al. Color image encryption based on the affine transform and gyrator transform[J]. Optics & Lasers in Engineering, 2013, 51(6): 768-775.

    [8] Fraue Y, Castro A, Naughton T J, et al. Resistance of the double random phase encryption against various attacks[J]. Optics Express, 2007, 15(16): 10253-10265.

    [9] Kong Dezhao, Shen Xueju, Cao Liangcai, et al. Phase retrieval for attacking fractional Fourier transform encryption[J]. Applied Optics, 2017, 56(12): 3449.

    [10] Wan Qin, Xiang Peng. Asymmetric cryptosystem based on phase-truncated Fourier transforms[J]. Optics Letters, 2010, 35(2): 118-120.

    [11] Deng Xiaopeng. Asymmetric optical cryptosystem based on coherent superposition and equal modulus decomposition: comment[J]. Optics Letters, 2015, 40(4): 475-478.

    [12] Ding Xiangling, Cui Yongzhong. Analysis and improvement for asymmetric cryptosystem based on phase-truncated Fourier transforms[J]. Laser Journal, 2013, 34(2): 27-29. (in Chinese)

    [13] Sando Y, Itoh M, Yatagai M. Fast calculation method for cylindrical computer-generated holograms[J]. Optics Express, 2005, 13(5): 1418-1423.

    [14] Wang Jun, Wang Qionghua, Hu Yuhen. Fast diffraction calculation of cylindrical computer generated hologram based on outside-in propagation model[J]. Optics Communications, 2017, 403(22): 296-303.

    [15] Liu Jungping, Poon Tingchung. Two-step-only quadrature phase-shifting digital holography[J]. Optics Letters, 2009, 34 (3): 250-252.

    [16] Wang Xingyuan, Zhao Jiangfeng, Liu Hongjun. A new image encryption algorithm based on chaos[J]. Optics Communications, 2012, 285(5): 562-566.

    [17] Wang Jun, Li Xiaowei, Hu Yuhen, et al. Phase-retrieval attack free cryptosystem based on cylindrical asymmetric diffraction and double-random phase encoding[J]. Optics Communications, 2018, 410: 468-474.

    Chang Keming, Chen Ye, Wang Ying, Wang Jun. Single-channel color image encryption using cylindrical diffraction and color space converting[J]. Infrared and Laser Engineering, 2018, 47(6): 603003
    Download Citation