• Acta Photonica Sinica
  • Vol. 51, Issue 6, 0610001 (2022)
Yuan GUO, Lanlan WU*, and Shiwei JING
Author Affiliations
  • School of Computer and Control Engineering,Qiqihar University,Qiqihar,Heilongjiang 161006,China
  • show less
    DOI: 10.3788/gzxb20225106.0610001 Cite this Article
    Yuan GUO, Lanlan WU, Shiwei JING. A Phase-truncated Fourier Transform Asymmetric Optical Compression and Encryption System[J]. Acta Photonica Sinica, 2022, 51(6): 0610001 Copy Citation Text show less
    Working principle of PTFT optical compression encryption system
    Fig. 1. Working principle of PTFT optical compression encryption system
    Encryption flowchart of PTFT system based on compressed sensing
    Fig. 2. Encryption flowchart of PTFT system based on compressed sensing
    Decryption flow of PTFT system based on compressed sensing
    Fig. 3. Decryption flow of PTFT system based on compressed sensing
    Encryption and decryption image of the encryption system
    Fig. 4. Encryption and decryption image of the encryption system
    Grayscale histogram
    Fig. 5. Grayscale histogram
    Correlation distribution of adjacent pixels
    Fig. 6. Correlation distribution of adjacent pixels
    The reconstructed image with different compression methods and different scales
    Fig. 7. The reconstructed image with different compression methods and different scales
    Comparison diagram of attack cracking and Mean Square Error(MSE)comparison chart
    Fig. 8. Comparison diagram of attack cracking and Mean Square Error(MSE)comparison chart
    Comparison diagram of attack cracking
    Fig. 9. Comparison diagram of attack cracking
    Decrypted images of salt and pepper noise interference under different noise ratios
    Fig. 10. Decrypted images of salt and pepper noise interference under different noise ratios
    Decrypted images with Gaussian noise interference under different variances
    Fig. 11. Decrypted images with Gaussian noise interference under different variances
    Cut encrypted and decrypted images of different sizes
    Fig. 12. Cut encrypted and decrypted images of different sizes
    Selected plaintext attack effect diagram
    Fig. 13. Selected plaintext attack effect diagram
    DirectionLevelVerticalDiagonal
    Plaintext image0.927 2440.963 1160.899 516
    Amplitude as ciphertext0.117 2060.108 9990.104 825
    Phase angle as ciphertext0.030 592-0.003 9420.006 044
    Table 1. Correlation coefficient analysis
    Compression methodCompression ratioPSNR/dB
    Ref.[14Compressed to 1/4 of the plaintext image21.467 1
    Ref.[14Compressed to 1/2 of the plaintext image24.464 5
    Ref.[14Compressed to 4/5 of the plaintext image26.746 4
    This articleCompressed to 1/4 of the plaintext image26.797 8
    Table 2. Different methods of compressing different ratios of peak signal-to-noise ratio
    ReferenceEncryption time/sKey transfer volume
    70.076 796256×256×2
    100.083 484256×256×2
    120.079 837256×256×2
    This article0.022 088128×128×2
    Table 3. Comparative analysis of time and key transmission volume
    Yuan GUO, Lanlan WU, Shiwei JING. A Phase-truncated Fourier Transform Asymmetric Optical Compression and Encryption System[J]. Acta Photonica Sinica, 2022, 51(6): 0610001
    Download Citation