In this paper, a hybrid multi-resolution wavelet transform based optical cryptosystem is proposed. The hybrid multi-resolution wavelet is formed by using conventional Walsh transform and fractional Fourier transform, here the fractional orders of the fractional Fourier transform extends the key-space of the proposed cryptosystem to avoid any brute-force attack. The designed cryptosystem possesses non-linear characteristics. To validate and verify the proposed cryptosystem computerized simulations have been carried out on the gray scale images. Results demonstrate that the proposed cryptosystem offers higher protection against occlusion and noise attacks.
REFERENCES
1.
P.
Refregier
and B.
Javidi
, Opt. Lett.
, 20
, 767
–769
(1995
).2.
X.
Peng
, P.
Zhang
, H.
Wei
, and B.
Yu
, Opt. Lett.
, 31
, 1044
–1046
(2006
).3.
U.
Gopinathan
, D. S.
Monaghan
, T. J.
Naughton
, and J. T.
Sheridan
, Opt. Express
, 14
, no. 8
, pp. 3181
–3186
, Apr. 2006
.4.
A.
Biryukov
, “Chosen Ciphertext Attack,” in Encyclopedia of Cryptography and Security
, Springer
, Boston, MA
, 2011
, pp. 205
–205
.5.
A.
Biryukov
, “Known Plaintext Attack,” in Encyclopedia of Cryptography and Security
, Springer
, Boston, MA
, 2011
, pp. 704
–705
.6.
Y.
Frauel
, A.
Castro
, T. J.
Naughton
, and B.
Javidi
, Opt. Express
, 15
, 10253
–10265
(2007
).7.
X.
Deng
and D.
Zhao
, Optics & Laser Technology
, 44
, 374
–377
(2012
).8.
G.
Unnikrishnan
, J.
Joseph
, and K.
Singh
, Opt. Lett.
, 25
, 887
–889
(2000
).9.
B.
Hennelly
and J. T.
Sheridan
, Opt. Lett.
, 28
, 269
–271
(2003
).10.
N.
Kumar
, J.
Joseph
, K.
Singh
, and Naveen
, Optics Comm.
, 235
, 253
–259
(2004
).11.
M. R.
Abuturab
, J. Opt. Soc. Am. A
, 32
, 1811
–1820
(2015
).12.
Z.
Liu
et al, J. Electron. Imaging
, 20
, 013020
, (2011
).13.
N.
Zhou
, Y.
Wang
, and L.
Gong
, Opt. Comm.
, 284
, 3234
–3242
(2011
).14.
L.
Chen
and D.
Zhao
, Opt. Lett.
, 31
, 3438
–3440
(2006
).15.
I.
Mehra
and N. K.
Nishchal
, Opt. Express
, 22
, 5474
–5482
(2014
).16.
G.
Situ
and J.
Zhang
, Opt. Lett.
, 29
, 1584
–1586
(2004
).17.
W.
Chen
, X.
Chen
, and C. J. R.
Sheppard
, Opt. Lett.
, 35
, 3817
–3819
(2010
).18.
W.
Liu
, Z.
Liu
, and S.
Liu
, Opt. Lett.
, 38
, 1651
–1653
(2013
).19.
T.
Nomura
and B.
Javidi
, Opt. Eng.
, 39
, 2031
–2036
(2000
).20.
B.
Javidi
and T.
Nomura
, Opt. Lett.
, 25
, 28
–30
(2000
).21.
P.
Singh
, A. K.
Yadav
, K.
Singh
, and I.
Saini
, “Optical image encryption in the fractional Hartley domain, using Arnold transform and singular value decomposition
,” AIP Conference Proceedings
, vol. 1802
, no. 1
, p. 020017
, Jan. 2017
.22.
N.
Zhou
, H.
Li
, D.
Wang
, S.
Pan
, and Z.
Zhou
, Opt. Comm.
, 343
, 10
–21
(2015
).23.
N.
Zhou
, S.
Pan
, S.
Cheng
, and Z.
Zhou
, Opt. Laser Tech.
, 82
, 121
–133
(2016
).24.
T.
Li
and Y.
Shi
, Opt. Express
, 23
, 21384
–21391
(2015
).25.
S.
Zhao
, L.
Wang
, W.
Liang
, W.
Cheng
, and L.
Gong
, Opt Comm.
, 353
, 90
–95
(2015
).26.
N. R.
Zhou
, T. X.
Hua
, L. H.
Gong
, D. J.
Pei
, and Q. H.
Liao
, Quan. Inf Process
, 14
, 1193
–1213
(2015
).27.
E.
Tajahuerce
, O.
Matoba
, S. C.
Verrall
, and B.
Javidi
, Appl. Opt.
, 39
, 2313
–2320
(2000
).28.
J.-J.
Huang
, H.-E.
Hwang
, C.-Y.
Chen
, and C.-M.
Chen
, Appl. Opt.
, 51
, 2388
–2394
, (2012
).29.
M.
Cho
and B.
Javidi
, Opt. Lett.
, 38
, 3198
–3201
(2013
).30.
D.
Maluenda
, A.
Carnicer
, R.
Martínez-Herrero
, I.
Juvells
, and B.
Javidi
, Opt. Express
, 23
, 655
–666
(2015
).31.
R.
Kumar
, J. T.
Sheridan
, and B.
Bhaduri
, Opt Laser Tech.
, 107
, 353
–360
(2018
).32.
H. B.
Kekre
, T. K.
Sarode
, and R.
Vig
, Int. J. Elec.
, 102
, 2108
–2126
(2015
).33.
P.
Rakheja
, R.
Vig
, and P.
Singh
, Optik
, 176
, 425
–437
(2019
).
This content is only available via PDF.
© 2019 Author(s).
2019
Author(s)
You do not currently have access to this content.