Communities & Collections
Researchers & Labs
Titles
DGIST
LIBRARY
DGIST R&D
Detail View
Department of Robotics and Mechatronics Engineering
Robotics Engineering Research Center
1. Journal Articles
Interference-based multiple-image encryption using binary phase masks
Kim, You Hyun
;
Song, Jae Hun
;
Moon, In Kyu
;
Lee, Yeon Ho
Department of Robotics and Mechatronics Engineering
Robotics Engineering Research Center
1. Journal Articles
Department of Robotics and Mechatronics Engineering
Intelligent Imaging and Vision Systems Laboratory
1. Journal Articles
Citations
WEB OF SCIENCE
Citations
SCOPUS
Metadata Downloads
XML
Excel
Title
Interference-based multiple-image encryption using binary phase masks
DGIST Authors
Kim, You Hyun
;
Song, Jae Hun
;
Moon, In Kyu
;
Lee, Yeon Ho
Issued Date
2018-08
Citation
Kim, You Hyun. (2018-08). Interference-based multiple-image encryption using binary phase masks. doi: 10.1016/j.optlaseng.2018.01.012
Type
Article
Article Type
Article
Author Keywords
Multiple-image encryption
;
Interference
;
Phase-encoded image
;
Hadamard matrix
Keywords
COHERENT SUPERPOSITION
;
OPTICAL ENCRYPTION
;
MODULUS DECOMPOSITION
;
FOURIER DOMAIN
;
TRANSFORM
;
PRINCIPLE
;
SECURITY
;
SCHEME
;
SYSTEM
ISSN
0143-8166
Abstract
We propose a new scheme to encrypt multiple images simultaneously using two-dimensional binary phase masks. Each of the original greyscale images is first decomposed into two pure phase-only images, which corresponds to the reverse process of an optical interference. Two phase-only images have random distributions of phases in the range from 0 to 2π and will serve as a secret image and a private key. Next, each pixel of the secret image is subdivided into four equal segments. Then, the four pixel-quadrants are separately phase encoded in accordance with the four elements of a row of a 4-order Hadamard matrix. By applying this procedure to other secret images, we obtain four phase-encoded images, which are then superimposed to yield the final encrypted image. We can successfully restore the four original images separately when the correct Hadamard matrix and the correct private key are used. We also show that the correlation coefficient (CC) is as low as 0.05 when the decryption is done by wrong Hadamard matrices and/or private keys. © 2018
URI
http://hdl.handle.net/20.500.11750/6246
DOI
10.1016/j.optlaseng.2018.01.012
Publisher
Elsevier BV
Show Full Item Record
File Downloads
There are no files associated with this item.
공유
공유하기
Related Researcher
Moon, Inkyu
문인규
Department of Robotics and Mechatronics Engineering
read more
Total Views & Downloads