Abstract

We technically investigate the robustness of an image encryption technique that uses a virtual phase image and a joint transform correlator (JTC) in the frequency domain. An encrypted image is obtained by the Fourier transform of the product of a virtual phase image, which camouflages the original image, and a random phase image. The resulting image is then decrypted by use of a decrypting key made from the proposed phase assignment rule in order to enhance the level of security. We demonstrate that the encrypted image generated by the proposed JTC-based decryption technique is robust to data loss and image shift.

© 2004 Optical Society of America

Full Article  |  PDF Article

References

You do not have subscription access to this journal. Citation lists with outbound citation links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Figures (7)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Equations (16)

You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Metrics

You do not have subscription access to this journal. Article level metrics are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription