SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1404
A REVIEW PAPER ON THE OPTICAL ENCRYPTION AND DECRYPTION
TECHNOLOGY
Aswathy A P1, Meril Cyriac2
1PG Student Dept of Electronics & communication Engineering LBSITW, Kerala, India
2Assistant Professor, Dept of Electronics & Communication Engineering, LBSITW, Kerala, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Encryption is the process of transforming plain
text data (plaintext) into something that appearsrandomand
meaningless (ciphertext). The process of transforming
ciphertext to plaintext is known as decryption. Optical
encryption secures in-flight data in the network's transport
layer as it travels over optical waves over fiber-optic cables.
Because the technology integrates directly into the network
element, optical encryption provides maximum throughput
without compromising performance and transparenttransfer
of any protocol without the need for additional hardware. The
main focus of this paper is to make a comparative analysis of
existing optical encryption and decryption technologies.
Key Words: Optical Encryption, Ciphertext, Plaintext
1. INTRODUCTION
Digital photos may now be widely distributed around the
world over open networks, thanks to the rapiddevelopment
of the Internet and current communication systems. The
protection of image data from unauthorized copying and
distribution has become critical. As a result, image
encryption, authentication, and watermarking techniques
have been extensively researched.Variousimageencryption
algorithms have been presented in recent years. Optical
image encryption techniques have gained a lot of attention
because of its inherent capacity to process data in parallel
and hide informationinseveral dimensions.Asymmetricand
symmetric encryption are the two forms of encryption
commonly used today. The name derives from the fact that
the same key is used for both encryption and decryption.
The same key is used to encrypt and decrypt data in
symmetric encryption. It is also necessary to consider a
secure way for transferring the key between the sender and
the recipient. The concept of a key pair is employed in
asymmetric encryption, with each key being used for
encryption and decryption. One of the keys is usually
referred to as the private key, while the other is referred to
as the public key. Data encrypted using the recipient'spublic
key can only be decrypted with the recipient's private key,
which is kept private by the owner. As a result, data can be
shared without fear of unauthorized or illegal access.
The image is multiplied by random phase diffusers (masks)
both in the input (space) and Fourier (spatial frequency)
domains in one major optical encryption system known as
"Double Random Phase Encoding (DRPE)”. The DRPEcanbe
improved by adding additional degrees of freedom, and the
DRPE has been extended to include the Fresnel transform
(FrT) domain, fractional Fourier transform (FrFT) domain,
Gyrator transform (GT)domain, and other special transform
domains for this purpose. Other optical image encryption
techniques investigated include interference, digital
holography, phase retrieval algorithm, compressive sensing
technique, diffractive imaging technique, ghost imaging
technique, and integral imaging technique.
The most successful approach to digitalize encrypted
information is digital holography, often known as CGH
(computer generated holography). CGH also has the
capability of selecting any wavelength, adjusting system
structure parameters arbitrarily, and recording virtual
objects that do not exist in nature. Compressive sensing(CS)
technology, which has been used in the field of image
encryption, can reduce the amount of data and is beneficial
to data preservation and transmission. Biometric keys have
recently been introduced into the field of optical encryption.
Biometric keys, which are unique and immutable, such as
fingerprints, iris, face, and voiceprint, can strengthen
security. We looked at some of the known optical encryption
algorithms in this paper.
2. REVIEW OF THE DIFFERENT PAPERS
Xueru Sun, Tao Hu, Lihong Ma and Weimin Jin proposed the
encryption and decryption technology with chaotic iris and
compressed sensing based on computer-generated
holography [1]. Combiningchaotic mapping,irisphasemask,
CGH, and CS, a new symmetric–asymmetric hybrid
encryption technique was presented. In the encryption
process, the encryption keys are chaotic iris phase mask
(CIPM), Fresnel diffraction distance, and wavelength, which
are still the decryption keys, known as public keys, in a
symmetric key cryptography system. The two-phase masks
obtained from phase reservation operations are the
decryption keys, which are distinct from the CIPMs used as
encryption keys, which are referred to as private keys, and
so make up the asymmetric key cryptography system.
Y. Su, W. Xu, T. Li, J. Zhao and S. Liu proposed an Optical color
image encryption based on fingerprint key and phase-
shifting digital holography [2]. The random phase masks
generated from the fingerprint using the secure hash
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1405
technique (SHA-256) and chaotic Lozi map are only utilised
as interim variables in the encryption process, and the
fingerprint is used directly as a secret key. For the primary
color image, the suggested encryption system can provide
two levels of protection. The discrete wavelet transform
hides the primary color image into a greyscale carrier image
in the first security level (DWT). The changed carrier image
is Fresnel converted at the second security level, and then
encrypted into three noise-like hologramsusingfingerprint-
based random phase encoding (FRPE) in the LCT domain
and three-step phase-shifting digital holography.
Hazer and R. Yıldırım proposed Multiple-image hybrid
encryption based on compressive sensing and diffractive
imaging [3]. A hybrid-II approach was created in this study
by combining a CS method, simple modified diffractive
imaging-basedencoding(SMDIBE),spacemultiplexing,anda
method for lowering the pixel size of the carrier to be
delivered. With the space multiplexing technology, separate
encrypted images are mixed on a single plane, and different
users are granted authorization. Using the hybridtechnique,
picture carrying capacity and cross talk difficulties between
images are reduced.
Farah M A. Ben, R. Guesmi, A. Kachouri, and M. Samet
proposed a novel chaos based optical image encryption
using fractional Fourier transform and DNA sequence
operation [4]. The approachisbasedonShannon'sconfusion
and diffusion properties. The confusion technique is based
on DNA encoding and employing DNA XOR to confuse the
image's pixel values. There are three stages to the image
encryption algorithm. In the first part, we use the DNA
encoding technique to encode the image. The secondsection
focuses on creating three chaotic sequences for use in the
diffusion phase. In the third step of the procedure, the
fractional Fourier transform will be applied three times.
Most known attacks, such as statistical analysis and
exhaustive attacks, are also resistant to the suggested
technique. All of these characteristics indicate that the
technique is well-suited to digital image encryption.
Y. Su, W. Xu and J. Zhao presented an Optical image
encryption based on chaotic fingerprint phase mask and
pattern-illuminated Fourier ptychography [5]. The
fingerprint image and chaotic parameters are directly
employed as secret keys in the proposed encryption
technique, while the CFPMs (chaotic fingerprint phase
masks) are only used as interim variables and functions.
Sharing the fingerprint image between the sender and
authorized receivers can improve the security of the
suggested encryption system. The proposed encryption
system could benefit from the illumination pattern's added
security.
N. Yu, S. Xi, X. Wang, L. Lang, X. Wang, L. Zhang, H. Han, Z.
Dong, X. Jiao, H. Wang and H. Zhai proposed an Optical
implementation of image encryption based on digital
holography and computer-generated hologram [6]. Createa
realistic optical image encryption technology that combines
digital holography and CGH, allowing both digital and
physical pictures to be encrypted and decoded in real time.
The resulting encrypted image is a binary real value image
with high anti-noise ability called Fourier CGH. The
encrypted image and random phase key are encoded in
multi-pixel units, which simplifies image decryption system
setup alignment.
Y. Su, W. Xu, J. Zhao, L. Chen and X. Tian proposed Optical
color image encryption based on chaotic fingerprint phase
mask in various domains and comparative analysis [7].
Random phase masks are used as secret keys in the
architecture of double random phase encoding. The chaotic
masks in this paper. To encrypt color images, expand the
chaotic fingerprint phase masks developed to the Fourier
transform domain, fractional Fourier transform domain,
Fresnel transform domain, and Gyrator transform domain.
The chaotic fingerprint phase masks are only utilised as
intermediate variables and functions, while the fingerprint
and chaotic parameters serve as direct secret keys. The
security of these four encryption systems can be
considerably enhanced by fingerprint keys that are firmly
linked to the sender or receiver.
S. Rajput and O. Matoba proposeda digital holography-based
optical multimodal biometric encryption system [8].
Physiological biometrics, such as fingerprints or iris scans,
are recorded alongside behavioral biometrics, suchasvoice,
as multimodal biometrics employing multi-parameter off-
axis digital holography. The Fresnel domain double random
phase encoding method, in which keys are produced from
biometric data via a phase retrieval algorithm, is used to
encrypt numerous biometrics embedded in the same
hologram. By utilizing the advantages of optical technology,
the suggested method deliversmultimodal biometricswitha
greater level of security.
G. Verma, M. Liao, D. Lu, W. He, X. Peng and A. Sinha
presented an optical asymmetric encryption scheme with
biometric keys [9]. The encryption keys in the proposed
system are optically created biometric keys and the PTFT
(phase-truncated Fourier transforms) technique's random
phase mask keys, while the decryptionkeysarepreserved as
the binary key and the generated phase-only mask of the
PTFT scheme. The biometric key features arekeptsafeusing
digital holography and are used in both encryption and
decryption operations to verify the authenticity of the
ciphertext utilizing biometric keys during the decryption
process.
L. Ma and W. Jin introduced Symmetric and asymmetric
hybrid cryptosystem based on compressive sensing and
computer-generated holography [10]. There are six
encryption keys in this system, two of which are different
from the two random phase masks used during the
encryption process. As a result, the encryption system
possesses both symmetric and asymmetric cryptography
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1406
capabilities. The suggested encryption approach improves
security while also being resistant to noise and occlusion
assaults.
P. Refregier and B. Javidi established an optical image
encryption scheme based on input plane and Fourier plane
random encoding. [11]. The proposed encryption technique
is double random phase encoding (DRPE) in Fourier
transform (FT) domain. Two statistically independent
random phase masks situated at the input plane and the
Fourier plane, respectively, can encryptthe principal picture
into a noise-like pattern in this DRPE-based encryption
approach. Because the cypher picture created by the DRPE-
based encryption system is complex-valued, it is necessary
to store both the amplitude and phase information of the
cypher image using digital holography.
3. CONCLUSIONS
This paper looked at some of the most recent optical
encryption techniques. Most of the optical encryption
schemes are based on DRPE. Different techniqueshavebeen
integrated with DRPE to increase security. To improve the
security of DRPE-based encryption methods, biometric
features that can be utilized for user authentication have
been added. We can see from the review that optical
encryption has developed into a strong and challengingfield
in recent years. Different techniques have been devised to
improve data security while being transmitted via an
unsecured connection. The latest optical encryptionscheme
is a combination of chaotic mapping, iris phase mask, CGH,
and CS. This encryption method When compared to typical
encryption schemes, the transmitted information can be
substantially reduced if the chaotic map's initial value is
transmitted without the CIPMs, which can greatly minimize
the quantity of data transmitted. The RPMs are linkedtoiris,
which further enhances the system's security.
REFERENCES
[1] Xueru Sun, Tao Hu, Lihong Ma, Weimin Jin, The
encryption and decryption technology with chaotic
iris and compressed sensing based on computer-
generated holography. Journal of
Optics volume 51, pages124–132 (2022).
[2] Y. Su, W. Xu, T. Li, J. Zhao, S. Liu, Optical color image
encryption based on fingerprint key and phase-shifting
digital holography. Opt.LasersEng.140,106550(2021).
[3] A. Hazer, R. Yıldırım, Multiple-image hybrid encryption
based on compressive sensing and diffractiveimaging.J.
Opt. 22, 1–11 (2020).
[4] Farah M A. Ben, R. Guesmi, A. Kachouri, M. Samet, A
novel chaos based optical image encryption using
fractional Fourier transform and DNA sequence
operation. Opt. Laser Technol. 121, 105777 (2020).
[5] Y. Su, W. Xu, J. Zhao, Optical image encryption based on
chaotic fingerprint phase mask and pattern-illuminated
Fourier ptychography. Opt. Lasers Eng. 128,
106042(2020).
[6] N. Yu, S. Xi, X. Wang, L. Lang, X. Wang, L. Zhang, H. Han,Z.
Dong, X. Jiao, H. Wang, H. Zhai, Optical implementation
of image encryption based on digital holography and
computer-generated hologram. J. Opt. 22, 075702
(2020).
[7] Y. Su, W. Xu, J. Zhao, L. Chen, X. Tian, Optical color image
encryption based on chaotic fingerprint phase mask in
various domains and comparative analysis. Appl. Opt.
59, 474–483 (2020).
[8] S. Rajput, O. Matoba, Optical multimodal biometric
encryption that uses digital holography. J. Opt. 22,
115703 (2020).
[9] G. Verma, M. Liao, D. Lu, W. He, X. Peng, A. Sinha, An
optical asymmetric encryption scheme with biometric
keys. Opt. Lasers Eng. 116, 32–40 (2019).
[10] L. Ma, W. Jin, Symmetric and asymmetric hybrid
cryptosystem based on compressive sensing and
computer-generated holography. Opt. Commun. 407,
51–56 (2018).
[11] P. Refregier, B. Javidi, Optical imageencryptionbasedon
input plane and Fourier plane random encoding. Opt.
Lett. 20, 767–769 (1995).

More Related Content

Similar to A REVIEW PAPER ON THE OPTICAL ENCRYPTION AND DECRYPTION TECHNOLOGY

A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...IJERA Editor
 
Color image encryption based on chaotic shit keying with lossless compression
Color image encryption based on chaotic shit keying with lossless compression Color image encryption based on chaotic shit keying with lossless compression
Color image encryption based on chaotic shit keying with lossless compression IJECEIAES
 
Image encryption approach for security issues
Image encryption approach for security issuesImage encryption approach for security issues
Image encryption approach for security issuesIAEME Publication
 
A New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECFA New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECFIJAEMSJORNAL
 
Image Encryption Using Differential Evolution Approach in Frequency Domain
Image Encryption Using Differential Evolution Approach in Frequency DomainImage Encryption Using Differential Evolution Approach in Frequency Domain
Image Encryption Using Differential Evolution Approach in Frequency Domainsipij
 
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...CSCJournals
 
OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...
OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...
OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...IJNSA Journal
 
OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...
OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...
OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...IJNSA Journal
 
Encrypted sensing of fingerprint image
Encrypted sensing of fingerprint imageEncrypted sensing of fingerprint image
Encrypted sensing of fingerprint imageDhirendraKumar170
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
 
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueA Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueIJERA Editor
 
Lightweight digital imaging and communications in medicine image encryption f...
Lightweight digital imaging and communications in medicine image encryption f...Lightweight digital imaging and communications in medicine image encryption f...
Lightweight digital imaging and communications in medicine image encryption f...TELKOMNIKA JOURNAL
 
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsColor Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsIJTET Journal
 
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTSteganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTCSCJournals
 
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...CSCJournals
 
Medical image encryption using multi chaotic maps
Medical image encryption using multi chaotic mapsMedical image encryption using multi chaotic maps
Medical image encryption using multi chaotic mapsTELKOMNIKA JOURNAL
 
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERINGHYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERINGIJNSA Journal
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYIRJET Journal
 

Similar to A REVIEW PAPER ON THE OPTICAL ENCRYPTION AND DECRYPTION TECHNOLOGY (20)

A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
 
Color image encryption based on chaotic shit keying with lossless compression
Color image encryption based on chaotic shit keying with lossless compression Color image encryption based on chaotic shit keying with lossless compression
Color image encryption based on chaotic shit keying with lossless compression
 
Image encryption approach for security issues
Image encryption approach for security issuesImage encryption approach for security issues
Image encryption approach for security issues
 
A New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECFA New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECF
 
Image Encryption Using Differential Evolution Approach in Frequency Domain
Image Encryption Using Differential Evolution Approach in Frequency DomainImage Encryption Using Differential Evolution Approach in Frequency Domain
Image Encryption Using Differential Evolution Approach in Frequency Domain
 
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
 
OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...
OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...
OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...
 
OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...
OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...
OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...
 
Encrypted sensing of fingerprint image
Encrypted sensing of fingerprint imageEncrypted sensing of fingerprint image
Encrypted sensing of fingerprint image
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
 
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueA Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
 
Ew4301904907
Ew4301904907Ew4301904907
Ew4301904907
 
Lightweight digital imaging and communications in medicine image encryption f...
Lightweight digital imaging and communications in medicine image encryption f...Lightweight digital imaging and communications in medicine image encryption f...
Lightweight digital imaging and communications in medicine image encryption f...
 
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsColor Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic Maps
 
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTSteganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
 
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
 
Medical image encryption using multi chaotic maps
Medical image encryption using multi chaotic mapsMedical image encryption using multi chaotic maps
Medical image encryption using multi chaotic maps
 
R04405103106
R04405103106R04405103106
R04405103106
 
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERINGHYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 

Recently uploaded (20)

(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 

A REVIEW PAPER ON THE OPTICAL ENCRYPTION AND DECRYPTION TECHNOLOGY

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1404 A REVIEW PAPER ON THE OPTICAL ENCRYPTION AND DECRYPTION TECHNOLOGY Aswathy A P1, Meril Cyriac2 1PG Student Dept of Electronics & communication Engineering LBSITW, Kerala, India 2Assistant Professor, Dept of Electronics & Communication Engineering, LBSITW, Kerala, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Encryption is the process of transforming plain text data (plaintext) into something that appearsrandomand meaningless (ciphertext). The process of transforming ciphertext to plaintext is known as decryption. Optical encryption secures in-flight data in the network's transport layer as it travels over optical waves over fiber-optic cables. Because the technology integrates directly into the network element, optical encryption provides maximum throughput without compromising performance and transparenttransfer of any protocol without the need for additional hardware. The main focus of this paper is to make a comparative analysis of existing optical encryption and decryption technologies. Key Words: Optical Encryption, Ciphertext, Plaintext 1. INTRODUCTION Digital photos may now be widely distributed around the world over open networks, thanks to the rapiddevelopment of the Internet and current communication systems. The protection of image data from unauthorized copying and distribution has become critical. As a result, image encryption, authentication, and watermarking techniques have been extensively researched.Variousimageencryption algorithms have been presented in recent years. Optical image encryption techniques have gained a lot of attention because of its inherent capacity to process data in parallel and hide informationinseveral dimensions.Asymmetricand symmetric encryption are the two forms of encryption commonly used today. The name derives from the fact that the same key is used for both encryption and decryption. The same key is used to encrypt and decrypt data in symmetric encryption. It is also necessary to consider a secure way for transferring the key between the sender and the recipient. The concept of a key pair is employed in asymmetric encryption, with each key being used for encryption and decryption. One of the keys is usually referred to as the private key, while the other is referred to as the public key. Data encrypted using the recipient'spublic key can only be decrypted with the recipient's private key, which is kept private by the owner. As a result, data can be shared without fear of unauthorized or illegal access. The image is multiplied by random phase diffusers (masks) both in the input (space) and Fourier (spatial frequency) domains in one major optical encryption system known as "Double Random Phase Encoding (DRPE)”. The DRPEcanbe improved by adding additional degrees of freedom, and the DRPE has been extended to include the Fresnel transform (FrT) domain, fractional Fourier transform (FrFT) domain, Gyrator transform (GT)domain, and other special transform domains for this purpose. Other optical image encryption techniques investigated include interference, digital holography, phase retrieval algorithm, compressive sensing technique, diffractive imaging technique, ghost imaging technique, and integral imaging technique. The most successful approach to digitalize encrypted information is digital holography, often known as CGH (computer generated holography). CGH also has the capability of selecting any wavelength, adjusting system structure parameters arbitrarily, and recording virtual objects that do not exist in nature. Compressive sensing(CS) technology, which has been used in the field of image encryption, can reduce the amount of data and is beneficial to data preservation and transmission. Biometric keys have recently been introduced into the field of optical encryption. Biometric keys, which are unique and immutable, such as fingerprints, iris, face, and voiceprint, can strengthen security. We looked at some of the known optical encryption algorithms in this paper. 2. REVIEW OF THE DIFFERENT PAPERS Xueru Sun, Tao Hu, Lihong Ma and Weimin Jin proposed the encryption and decryption technology with chaotic iris and compressed sensing based on computer-generated holography [1]. Combiningchaotic mapping,irisphasemask, CGH, and CS, a new symmetric–asymmetric hybrid encryption technique was presented. In the encryption process, the encryption keys are chaotic iris phase mask (CIPM), Fresnel diffraction distance, and wavelength, which are still the decryption keys, known as public keys, in a symmetric key cryptography system. The two-phase masks obtained from phase reservation operations are the decryption keys, which are distinct from the CIPMs used as encryption keys, which are referred to as private keys, and so make up the asymmetric key cryptography system. Y. Su, W. Xu, T. Li, J. Zhao and S. Liu proposed an Optical color image encryption based on fingerprint key and phase- shifting digital holography [2]. The random phase masks generated from the fingerprint using the secure hash
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1405 technique (SHA-256) and chaotic Lozi map are only utilised as interim variables in the encryption process, and the fingerprint is used directly as a secret key. For the primary color image, the suggested encryption system can provide two levels of protection. The discrete wavelet transform hides the primary color image into a greyscale carrier image in the first security level (DWT). The changed carrier image is Fresnel converted at the second security level, and then encrypted into three noise-like hologramsusingfingerprint- based random phase encoding (FRPE) in the LCT domain and three-step phase-shifting digital holography. Hazer and R. Yıldırım proposed Multiple-image hybrid encryption based on compressive sensing and diffractive imaging [3]. A hybrid-II approach was created in this study by combining a CS method, simple modified diffractive imaging-basedencoding(SMDIBE),spacemultiplexing,anda method for lowering the pixel size of the carrier to be delivered. With the space multiplexing technology, separate encrypted images are mixed on a single plane, and different users are granted authorization. Using the hybridtechnique, picture carrying capacity and cross talk difficulties between images are reduced. Farah M A. Ben, R. Guesmi, A. Kachouri, and M. Samet proposed a novel chaos based optical image encryption using fractional Fourier transform and DNA sequence operation [4]. The approachisbasedonShannon'sconfusion and diffusion properties. The confusion technique is based on DNA encoding and employing DNA XOR to confuse the image's pixel values. There are three stages to the image encryption algorithm. In the first part, we use the DNA encoding technique to encode the image. The secondsection focuses on creating three chaotic sequences for use in the diffusion phase. In the third step of the procedure, the fractional Fourier transform will be applied three times. Most known attacks, such as statistical analysis and exhaustive attacks, are also resistant to the suggested technique. All of these characteristics indicate that the technique is well-suited to digital image encryption. Y. Su, W. Xu and J. Zhao presented an Optical image encryption based on chaotic fingerprint phase mask and pattern-illuminated Fourier ptychography [5]. The fingerprint image and chaotic parameters are directly employed as secret keys in the proposed encryption technique, while the CFPMs (chaotic fingerprint phase masks) are only used as interim variables and functions. Sharing the fingerprint image between the sender and authorized receivers can improve the security of the suggested encryption system. The proposed encryption system could benefit from the illumination pattern's added security. N. Yu, S. Xi, X. Wang, L. Lang, X. Wang, L. Zhang, H. Han, Z. Dong, X. Jiao, H. Wang and H. Zhai proposed an Optical implementation of image encryption based on digital holography and computer-generated hologram [6]. Createa realistic optical image encryption technology that combines digital holography and CGH, allowing both digital and physical pictures to be encrypted and decoded in real time. The resulting encrypted image is a binary real value image with high anti-noise ability called Fourier CGH. The encrypted image and random phase key are encoded in multi-pixel units, which simplifies image decryption system setup alignment. Y. Su, W. Xu, J. Zhao, L. Chen and X. Tian proposed Optical color image encryption based on chaotic fingerprint phase mask in various domains and comparative analysis [7]. Random phase masks are used as secret keys in the architecture of double random phase encoding. The chaotic masks in this paper. To encrypt color images, expand the chaotic fingerprint phase masks developed to the Fourier transform domain, fractional Fourier transform domain, Fresnel transform domain, and Gyrator transform domain. The chaotic fingerprint phase masks are only utilised as intermediate variables and functions, while the fingerprint and chaotic parameters serve as direct secret keys. The security of these four encryption systems can be considerably enhanced by fingerprint keys that are firmly linked to the sender or receiver. S. Rajput and O. Matoba proposeda digital holography-based optical multimodal biometric encryption system [8]. Physiological biometrics, such as fingerprints or iris scans, are recorded alongside behavioral biometrics, suchasvoice, as multimodal biometrics employing multi-parameter off- axis digital holography. The Fresnel domain double random phase encoding method, in which keys are produced from biometric data via a phase retrieval algorithm, is used to encrypt numerous biometrics embedded in the same hologram. By utilizing the advantages of optical technology, the suggested method deliversmultimodal biometricswitha greater level of security. G. Verma, M. Liao, D. Lu, W. He, X. Peng and A. Sinha presented an optical asymmetric encryption scheme with biometric keys [9]. The encryption keys in the proposed system are optically created biometric keys and the PTFT (phase-truncated Fourier transforms) technique's random phase mask keys, while the decryptionkeysarepreserved as the binary key and the generated phase-only mask of the PTFT scheme. The biometric key features arekeptsafeusing digital holography and are used in both encryption and decryption operations to verify the authenticity of the ciphertext utilizing biometric keys during the decryption process. L. Ma and W. Jin introduced Symmetric and asymmetric hybrid cryptosystem based on compressive sensing and computer-generated holography [10]. There are six encryption keys in this system, two of which are different from the two random phase masks used during the encryption process. As a result, the encryption system possesses both symmetric and asymmetric cryptography
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1406 capabilities. The suggested encryption approach improves security while also being resistant to noise and occlusion assaults. P. Refregier and B. Javidi established an optical image encryption scheme based on input plane and Fourier plane random encoding. [11]. The proposed encryption technique is double random phase encoding (DRPE) in Fourier transform (FT) domain. Two statistically independent random phase masks situated at the input plane and the Fourier plane, respectively, can encryptthe principal picture into a noise-like pattern in this DRPE-based encryption approach. Because the cypher picture created by the DRPE- based encryption system is complex-valued, it is necessary to store both the amplitude and phase information of the cypher image using digital holography. 3. CONCLUSIONS This paper looked at some of the most recent optical encryption techniques. Most of the optical encryption schemes are based on DRPE. Different techniqueshavebeen integrated with DRPE to increase security. To improve the security of DRPE-based encryption methods, biometric features that can be utilized for user authentication have been added. We can see from the review that optical encryption has developed into a strong and challengingfield in recent years. Different techniques have been devised to improve data security while being transmitted via an unsecured connection. The latest optical encryptionscheme is a combination of chaotic mapping, iris phase mask, CGH, and CS. This encryption method When compared to typical encryption schemes, the transmitted information can be substantially reduced if the chaotic map's initial value is transmitted without the CIPMs, which can greatly minimize the quantity of data transmitted. The RPMs are linkedtoiris, which further enhances the system's security. REFERENCES [1] Xueru Sun, Tao Hu, Lihong Ma, Weimin Jin, The encryption and decryption technology with chaotic iris and compressed sensing based on computer- generated holography. Journal of Optics volume 51, pages124–132 (2022). [2] Y. Su, W. Xu, T. Li, J. Zhao, S. Liu, Optical color image encryption based on fingerprint key and phase-shifting digital holography. Opt.LasersEng.140,106550(2021). [3] A. Hazer, R. Yıldırım, Multiple-image hybrid encryption based on compressive sensing and diffractiveimaging.J. Opt. 22, 1–11 (2020). [4] Farah M A. Ben, R. Guesmi, A. Kachouri, M. Samet, A novel chaos based optical image encryption using fractional Fourier transform and DNA sequence operation. Opt. Laser Technol. 121, 105777 (2020). [5] Y. Su, W. Xu, J. Zhao, Optical image encryption based on chaotic fingerprint phase mask and pattern-illuminated Fourier ptychography. Opt. Lasers Eng. 128, 106042(2020). [6] N. Yu, S. Xi, X. Wang, L. Lang, X. Wang, L. Zhang, H. Han,Z. Dong, X. Jiao, H. Wang, H. Zhai, Optical implementation of image encryption based on digital holography and computer-generated hologram. J. Opt. 22, 075702 (2020). [7] Y. Su, W. Xu, J. Zhao, L. Chen, X. Tian, Optical color image encryption based on chaotic fingerprint phase mask in various domains and comparative analysis. Appl. Opt. 59, 474–483 (2020). [8] S. Rajput, O. Matoba, Optical multimodal biometric encryption that uses digital holography. J. Opt. 22, 115703 (2020). [9] G. Verma, M. Liao, D. Lu, W. He, X. Peng, A. Sinha, An optical asymmetric encryption scheme with biometric keys. Opt. Lasers Eng. 116, 32–40 (2019). [10] L. Ma, W. Jin, Symmetric and asymmetric hybrid cryptosystem based on compressive sensing and computer-generated holography. Opt. Commun. 407, 51–56 (2018). [11] P. Refregier, B. Javidi, Optical imageencryptionbasedon input plane and Fourier plane random encoding. Opt. Lett. 20, 767–769 (1995).