Please wait a minute...
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering)  2006, Vol. 7 Issue (8 ): 18-    DOI: 10.1631/jzus.2006.A1431
    
Optical encryption with cascaded fractional wavelet transforms
BAO Liang-hua, CHEN Lin-fei, ZHAO Dao-mu
Department of Physics, Zhejiang University, Hangzhou 310027, China; Department of Physics, Zhejiang Education College, Hangzhou 310012, China
Download:     PDF (0 KB)     
Export: BibTeX | EndNote (RIS)      

Abstract  On the basis of fractional wavelet transform, we propose a new method called cascaded fractional wavelet transform to encrypt images. It has the virtues of fractional Fourier transform and wavelet transform. Fractional orders, standard focal lengths and scaling factors are its keys. Multistage fractional Fourier transforms can add the keys easily and strengthen information security. This method can also realize partial encryption just as wavelet transform and fractional wavelet transform. Optical realization of encryption and decryption is proposed. Computer simulations confirmed its possibility.

Key wordsWavelet transform (WT)      Cascaded fractional wavelet transform (CFWT)      Encryption      Decryption     
Received: 06 January 2006     
CLC:  O43  
Cite this article:

BAO Liang-hua, CHEN Lin-fei, ZHAO Dao-mu. Optical encryption with cascaded fractional wavelet transforms. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2006, 7(8 ): 18-.

URL:

http://www.zjujournals.com/xueshu/zjus-a/10.1631/jzus.2006.A1431     OR     http://www.zjujournals.com/xueshu/zjus-a/Y2006/V7/I8 /18

[1] Cheng-qing LI, Dan ZHANG, Guan-rong CHEN. Cryptanalysis of an image encryption scheme based on the Hill cipher[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(8): 1118-1123.
[2] Y. RANGEL-ROMERO, R. VEGA-GARCÍA, A. MENCHACA-MÉNDEZ, D. ACOLTZI-CERVANTES, L. MARTÍNEZ-RAMOS, M. MECATE-ZAMBRANO, F. MONTALVO-LEZAMA, J. BARRÓN-VIDALES, N. CORTEZ-DUARTE, F. RODRÍGUEZ-HENRÍQUEZ. Comments on “How to repair the Hill cipher”[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(2): 211-214.
[3] HAN Yan-fang, SHI Peng-fei. Mean shift texture surface detection based on WT and COM feature image selection[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2006, 7(6 ): 6-.
[4] ISMAIL I.A., AMIN Mohammed, DIAB Hossam. How to repair the Hill cipher[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2006, 7(12): 11-.
[5] ZHAO Xiao-yu, CHEN Gang, ZHANG Dan, WANG Xiao-hong, DONG Guang-chang. Decryption of pure-position permutation algorithms[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2004, 5(7): 803-809.