A method for both image encryption and watermarking by three-step phase-shifting interferometry is proposed. The image to be hidden is stored in three interferograms and then can be reconstructed by use of one random phase mask, several specific geometric parameters, and a certain algorithm. To further increase the security of the hidden image and confuse unauthorized receivers, images with the same or different content can be added to the interferograms, and these images will have no or only a small effect on the retrieval of the hidden image, owing to the specific property of this algorithm. All these features and the utility of this method for image retrieval from parts of interferograms are verified by computer simulations. This technique uses intensity maps as decrypted images for delivery, and both encryption and decryption can be conveniently achieved digitally. It is particularly suitable for the remote transmission of secret information via the Internet.

Download full-text PDF

Source
http://dx.doi.org/10.1364/ao.43.003078DOI Listing

Publication Analysis

Top Keywords

image encryption
8
encryption watermarking
8
phase-shifting interferometry
8
method image
8
hidden image
8
image
5
digital image
4
watermarking phase-shifting
4
interferometry method
4
watermarking three-step
4

Similar Publications

Metasurfaces have exhibited excellent capabilities in controlling main characteristics of electromagnetic fields. Thus, a lot of significant achievements have been attained in many areas especially in the fields of hologram and near-field imaging. However, some of these designs are implemented in a manner of interleaved subarrays that complicates the design and makes them difficult to achieve integration.

View Article and Find Full Text PDF

A combinatory approach of non-chain ring and henon map for image encryption application.

Sci Rep

January 2025

Department of Mathematics, College of Science, King Khalid, University, Abha, 61413, Saudi Arabia.

Algebraic structures play a vital role in securing important data. These structures are utilized to construct the non-linear components of block ciphers. Since constructing non-linear components through algebraic structures is crucial for the confusion aspects of encryption schemes, relying solely on these structures can result in limited key spaces.

View Article and Find Full Text PDF

The link between creativity and serious mental illness (SMI) is widely discussed. Jackson Pollock is one example of a giant in the field of art who was both highly creative and experiencing an SMI. Pollock created a new genre of art known as abstract expressionism ("action painting") defined as showing the frenetic actions of painting.

View Article and Find Full Text PDF

Carbene-metal-amide (CMA) complexes have diverse applications in luminescence, imaging and sensing. In this study, we designed and synthesized a series of CMA complexes, which were subsequently doped into a PMMA host. These materials demonstrate light-induced dynamic phosphorescence, attributed to their long intrinsic triplet state lifetime (τP,int, in the μs-ms scale), high intersystem crossing (ISC) rate constant (kISC, up to 107 s-1), and bright phosphorescence.

View Article and Find Full Text PDF

The motivation for this article stems from the fact that medical image security is crucial for maintaining patient confidentiality and protecting against unauthorized access or manipulation. This paper presents a novel encryption technique that integrates the Deep Convolutional Generative Adversarial Networks (DCGAN) and Virtual Planet Domain (VPD) approach to enhance the protection of medical images. The method uses a Deep Learning (DL) framework to generate a decoy image, which forms the basis for generating encryption keys using a timestamp, nonce, and 1-D Exponential Chebyshev map (1-DEC).

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!