Please use this identifier to cite or link to this item:
https://dspace.iiti.ac.in/handle/123456789/5222
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chatterjee, Amit | en_US |
dc.contributor.author | Dhanotia, Jitendra | en_US |
dc.contributor.author | Bhatia, Vimal | en_US |
dc.date.accessioned | 2022-03-17T01:00:00Z | - |
dc.date.accessioned | 2022-03-17T15:39:01Z | - |
dc.date.available | 2022-03-17T01:00:00Z | - |
dc.date.available | 2022-03-17T15:39:01Z | - |
dc.date.issued | 2018 | - |
dc.identifier.citation | Chatterjee, A., Dhanotia, J., Bhatia, V., Rana, S., & Prakash, S. (2018). Optical image encryption using fringe projection profilometry, fourier fringe analysis, and RSA algorithm. Paper presented at the 2017 14th IEEE India Council International Conference, INDICON 2017, doi:10.1109/INDICON.2017.8487849 | en_US |
dc.identifier.isbn | 9781538643181 | - |
dc.identifier.other | EID(2-s2.0-85056384952) | - |
dc.identifier.uri | https://doi.org/10.1109/INDICON.2017.8487849 | - |
dc.identifier.uri | https://dspace.iiti.ac.in/handle/123456789/5222 | - |
dc.description.abstract | Optical image encryption is one of the most promising technologies being investigated in the field of data communication and information technology. In this paper, a novel image encryption system based on virtual optical technique, Fourier transform phase retrieval algorithm and RSA public key exchange is proposed. In this strategy, a gray-level image is captured using a digital camera and encrypted using a linear grating superposed on the reflected intensity map of the object. A speckle mask is simulated and used as a secret key in both transmission and reception ends so that the receiver can identify the authenticity of the ciphertext by using the speckle pattern in the decryption process. The decryption method is performed to recover the phase of the deformed grating pattern. Towards this, Fourier transform based phase retrieval and sequential line scan phase unwrapping algorithm is utilized. The simulation results demonstrate the validity of the encryption method and the high robustness against potential attacks. To determines the accuracy of the information retrieved by the proposed technique, root mean square error is calculated between the original image and retrieved image. The proposed technique is also applicable for the information authentication. © 2017 IEEE. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
dc.source | 2017 14th IEEE India Council International Conference, INDICON 2017 | en_US |
dc.subject | Authentication | en_US |
dc.subject | Fourier transforms | en_US |
dc.subject | Geometrical optics | en_US |
dc.subject | Image processing | en_US |
dc.subject | Mean square error | en_US |
dc.subject | Optical communication | en_US |
dc.subject | Optical data processing | en_US |
dc.subject | Search engines | en_US |
dc.subject | Speckle | en_US |
dc.subject | Fourier transform phase | en_US |
dc.subject | Fringe projection | en_US |
dc.subject | Fringe projection profilometry | en_US |
dc.subject | Information authentications | en_US |
dc.subject | Optical image encryption | en_US |
dc.subject | Phase detection | en_US |
dc.subject | Phase unwrapping algorithm | en_US |
dc.subject | Security | en_US |
dc.subject | Cryptography | en_US |
dc.title | Optical Image Encryption using Fringe Projection Profilometry, Fourier Fringe Analysis, and RSA Algorithm | en_US |
dc.type | Conference Paper | en_US |
Appears in Collections: | Department of Electrical Engineering |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
Altmetric Badge: