An asymmetric approach is utilized to encrypt an RGB image using double random phase encoding (DRPE) in the Fourier transform (FT). The RGB image input is primarily divided in three passages: “red, green, blue”. To obtain the complex intermediate image, each passage of an input image is transformed in a phase image with coupling amplitude masking before being Fourier transformed. The amplitude portion is then merged with a random phase mask (RPM), which acts as the first private key. FT is based on the amplitude of every “red, green, and blue” passage to provide the matching encrypted image, with the phase part serving as an additional secret key. The compiled encrypted image from all three images yields the final encrypted colored image. Decryption is the polar opposite of encryption. In the decryption phase, the security of the cryptosystem is examined. During the decryption, the security of the optical asymmetric cryptosystem is also examined. The suggested cryptosystem formed an optical asymmetric method applied to encrypt the RGB image.

1.
P.
Refregier
and
B.
Javidi
, “
Optical image encryption based on input plane and fourier plane random encoding,”
20
,
767
769
(
1995
).
2.
N.
Chittora
and
D.
Babel
, “
A brief study on fourier transform and its applications
,”
05
,
5
(
2018
).
3.
J. V.
Fischer
, “
Four particular cases of the fourier transform
,”
6
,
335
(
2018
).
4.
M. K.
Asher
, “
Fourier series and fourier transform
,”,
73
76
(
2013
).
5.
N. A.
Khan
,
M. N.
Jafri
, and
S. A.
Qazi
, “
Improved resolution short time fourier transform
,” in
2011 7th International Conference on Emerging Technologies
(
2011
) pp.
1
3
.
6.
L.
Zhong
,
L.
Lichun
, and
L.
Huiqi
, “
Application research on sparse fast fourier transform algorithm in white gaussian noise
,”
Advances in Information and Communication Technology: Proceedings of 7th International Congress of Information and Communication Technology (ICICT2017
),
107
,
802
807
(
2017
).
7.
G.
Unnikrishnan
,
J.
Joseph
, and
K.
Singh
, “
Optical encryption by double-random phase encoding in the fractional fourier domain
,”
25
,
887
889
(
2000
).
8.
M.
Joshi
,
Chandrashakher
, and
K.
Singh
, “
Color image encryption and decryption using fractional fourier transform
,”
279
,
35
42
(
2007
).
9.
G.
Situ
and
J.
Zhang
, “
Double random-phase encoding in the fresnel domain
,”
29
,
1584
1586
(
2004
), publisher:
Optica Publishing Group
.
10.
H.
Singh
,
A. K.
Yadav
,
S.
Vashisth
, and
K.
Singh
, “
Double phase-image encryption using gyrator transforms, and structured phase mask in the frequency plane
,”
67
,
145
156
(
2015
).
11.
Z.
Liu
,
H.
Chen
,
T.
Liu
,
P.
Li
,
J.
Dai
,
X.
Sun
, and
S.
Liu
, “
Double-image encryption based on the affine transform and the gyrator transform
,”
12
,
035407
(
2010
).
12.
P.
Singh
,
A. K.
Yadav
,
K.
Singh
, and
I.
Saini
, “
Optical image encryption in the fractional hartley domain, using arnold transform and singular value decomposition
,”
1802
,
020017
(
2017
).
13.
A. K.
Yadav
,
P.
Singh
,
I.
Saini
, and
K.
Singh
, “
Asymmetric encryption algorithm for colour images based on fractional hartley transform
,”
66
,
629
642
(
2019
).
14.
P.
Singh
,
A.
Yadav
, and
K.
Singh
, “
Color image encryption using affine transform in fractional hartley domain,”
47
(
2017
), .
15.
N.
Zhou
,
Y.
Wang
, and
J.
Wu
, “
Image encryption algorithm based on the multi-order discrete fractional mellin transform
,”
284
,
5588
5597
(
2011
).
16.
N.
Zhou
,
Y.
Wang
, and
L.
Gong
, “
Novel optical image encryption scheme based on fractional mellin transform,”
284
,
3234
3242
(
2011
).
17.
P.
Rakheja
,
R.
Vig
, and
P.
Singh
, “
Asymmetric hybrid encryption scheme based on modified equal modulus decomposition in hybrid multi-resolution wavelet domain
,”
66
,
799
811
(
2019
), publisher:
Taylor & Francis_eprint
: .
18.
H.-E.
Hwang
, “
Optical color image encryption based on the wavelength multiplexing using cascaded phase-only masks in fresnel transform domain
,”
285
,
567
573
(
2012
).
19.
S. K.
Rajput
and
N. K.
Nishchal
, “
Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask
,”
51
,
5377
5386
(
2012
).
20.
S. K.
Rajput
and
N. K.
Nishchal
, “
Image encryption using polarized light encoding and amplitude and phase truncation in the fresnel domain
,”
52
,
4343
4352
(
2013
).
21.
S. S. S.
Ezhil
, “
Real time application of fourier transforms
,”
8
,
574
577
(
2017
).
22.
Ashutosh
and
D.
Sharma
, “
Robust technique for image encryption and decryption using discrete fractional fourier ransform with random phase masking
,”
First International Conference on Computational Intelligence: Modeling Techniques and Applications (CIMTA) 2013
,
10
,
707
714
(
2013
).
23.
U. S.
Hegde
, “
Fourier transforms and its applications in engineering field
,”
6
,
10294
10298
(
2007
).
24.
N.
Towghi
,
B.
Javidi
, and
Z.
Luo
, “
Fully phase encrypted image processor
,”
16
,
1915
1927
(
1999
).
25.
U.
Sara
,
M.
Akter
, and
M. S.
Uddin
, “
Image quality assessment through FSIM, SSIM, MSE and PSNR—a comparative study
,”
7
,
8
18
(
2019
), number: 3 Publisher:
Scientific Research Publishing
.
26.
F.
Memon
,
M. A.
Unar
, and
S.
Memon
, “
Image quality assessment for performance evaluation of focus measure operators
,” (
2016
), 1604.00546 [cs].
27.
P.
Sharma
,
S.
Sharma
, and
A.
Goyal
, “
An MSE (mean square error) based analysis of deconvolution techniques used for deblurring/restoration of MRI and CT images
,” in
Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies
,
ICTCS ’16 (Association for Computing Machinery
,
2016
) pp.
1
5
.
This content is only available via PDF.
You do not currently have access to this content.