Please use this identifier to cite or link to this item:
https://gnanaganga.inflibnet.ac.in:8443/jspui/handle/123456789/15700
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Vardhan, Harsh | - |
dc.contributor.author | Sakshi | - |
dc.contributor.author | Reddy, Salla Gangi | - |
dc.contributor.author | Muniraj, Inbarasan | - |
dc.contributor.author | Kumar, Ravi | - |
dc.date.accessioned | 2024-05-29T08:53:06Z | - |
dc.date.available | 2024-05-29T08:53:06Z | - |
dc.date.issued | 2024 | - |
dc.identifier.citation | Vol. 56, No. 5 | en_US |
dc.identifier.issn | 0306-8919 | - |
dc.identifier.uri | http://dx.doi.org/10.1007/s11082-024-06740-w | - |
dc.identifier.uri | http://gnanaganga.inflibnet.ac.in:8080/jspui/handle/123456789/15700 | - |
dc.description.abstract | In this paper, we propose a new asymmetric optical cryptosystem for phase image encoding with the utilization of speckles generated by scattering the Hermite Gaussian beams (HGBs) through a rough surface. These speckle patterns are unique and almost impossible to clone as one cannot mimic the physical process. The generalized Schur decomposition, named as, QZ decomposition, approach is used to generate unique private keys for decrypting the encoded data. The plaintext image is first phase-encoded and then modulated with the pattern obtained by the convolution of HGBs and random phase masks. The modulated image is then Fresnel propagated for a distance of z1, and the QZ decomposition operation is performed on the complex wavefront to generate the private keys. Afterward, the gyrator transforms with a rotational angle (?), and the phase truncation is used to further process the information. The phase truncation and phase reservation (PT/PR) will result in another phase private key, which will be utilized for decryption. A non-linear power function is introduced to modify the amplitude part after PT/PR operation and the resultant is modulated using an HGB amplitude mask to get an intermediate wavefront. Finally, the encrypted image is obtained by Fresnel propagating the intermediate wavefront with a distance of z2. The effectiveness and validity of the proposed method are tested and verified through numerical simulations. A series of potential attacks such as contamination and plaintext attacks have been tried and tested to further check the robustness of the proposed method. The results confirm the efficacy of the proposed method. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Optical and Quantum Electronics | en_US |
dc.publisher | Springer | en_US |
dc.subject | Asymmetric Encryption | en_US |
dc.subject | Hermite Gaussian Beam Speckles (Hgbs) | en_US |
dc.subject | Non-Linear Power Function | en_US |
dc.subject | Optical Cryptosystem | en_US |
dc.subject | Qz Decomposition | en_US |
dc.title | A Symmetric Optical Cryptosystem Based on Qz Decomposition and Hermite Gaussian Beam Speckles | en_US |
dc.type | Article | en_US |
Appears in Collections: | Journal Articles |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.