Submit Search
Upload
A REVIEW PAPER ON THE OPTICAL ENCRYPTION AND DECRYPTION TECHNOLOGY
•
0 likes
•
11 views
IRJET Journal
Follow
https://www.irjet.net/archives/V9/i5/IRJET-V9I5327.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 3
Download now
Download to read offline
Recommended
A REVIEW OF THE EXPANDED DIFFIE-HELLMAN ALGORITHM BASED VIRTUAL OPTICAL HOLOG...
A REVIEW OF THE EXPANDED DIFFIE-HELLMAN ALGORITHM BASED VIRTUAL OPTICAL HOLOG...
IRJET Journal
IRJET- A Review Paper on Chaotic Map Image Encryption Techniques
IRJET- A Review Paper on Chaotic Map Image Encryption Techniques
IRJET Journal
Iaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwt
Iaetsd Iaetsd
Blind Key Steganography Based on Multilevel Wavelet and CSF
Blind Key Steganography Based on Multilevel Wavelet and CSF
irjes
Encryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix Multiplication
ijcsit
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
sipij
Hf2513081311
Hf2513081311
IJERA Editor
Hf2513081311
Hf2513081311
IJERA Editor
Recommended
A REVIEW OF THE EXPANDED DIFFIE-HELLMAN ALGORITHM BASED VIRTUAL OPTICAL HOLOG...
A REVIEW OF THE EXPANDED DIFFIE-HELLMAN ALGORITHM BASED VIRTUAL OPTICAL HOLOG...
IRJET Journal
IRJET- A Review Paper on Chaotic Map Image Encryption Techniques
IRJET- A Review Paper on Chaotic Map Image Encryption Techniques
IRJET Journal
Iaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwt
Iaetsd Iaetsd
Blind Key Steganography Based on Multilevel Wavelet and CSF
Blind Key Steganography Based on Multilevel Wavelet and CSF
irjes
Encryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix Multiplication
ijcsit
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
sipij
Hf2513081311
Hf2513081311
IJERA Editor
Hf2513081311
Hf2513081311
IJERA Editor
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
IJERA Editor
Color image encryption based on chaotic shit keying with lossless compression
Color image encryption based on chaotic shit keying with lossless compression
IJECEIAES
Image encryption approach for security issues
Image encryption approach for security issues
IAEME Publication
A New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECF
IJAEMSJORNAL
Image Encryption Using Differential Evolution Approach in Frequency Domain
Image Encryption Using Differential Evolution Approach in Frequency Domain
sipij
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
CSCJournals
OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...
OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...
IJNSA Journal
OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...
OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...
IJNSA Journal
Encrypted sensing of fingerprint image
Encrypted sensing of fingerprint image
DhirendraKumar170
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
ijsrd.com
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
IJERA Editor
Ew4301904907
Ew4301904907
IJERA Editor
Lightweight digital imaging and communications in medicine image encryption f...
Lightweight digital imaging and communications in medicine image encryption f...
TELKOMNIKA JOURNAL
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic Maps
IJTET Journal
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
CSCJournals
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
CSCJournals
Medical image encryption using multi chaotic maps
Medical image encryption using multi chaotic maps
TELKOMNIKA JOURNAL
R04405103106
R04405103106
IJERA Editor
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
IJNSA Journal
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
More Related Content
Similar to A REVIEW PAPER ON THE OPTICAL ENCRYPTION AND DECRYPTION TECHNOLOGY
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
IJERA Editor
Color image encryption based on chaotic shit keying with lossless compression
Color image encryption based on chaotic shit keying with lossless compression
IJECEIAES
Image encryption approach for security issues
Image encryption approach for security issues
IAEME Publication
A New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECF
IJAEMSJORNAL
Image Encryption Using Differential Evolution Approach in Frequency Domain
Image Encryption Using Differential Evolution Approach in Frequency Domain
sipij
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
CSCJournals
OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...
OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...
IJNSA Journal
OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...
OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...
IJNSA Journal
Encrypted sensing of fingerprint image
Encrypted sensing of fingerprint image
DhirendraKumar170
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
ijsrd.com
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
IJERA Editor
Ew4301904907
Ew4301904907
IJERA Editor
Lightweight digital imaging and communications in medicine image encryption f...
Lightweight digital imaging and communications in medicine image encryption f...
TELKOMNIKA JOURNAL
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic Maps
IJTET Journal
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
CSCJournals
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
CSCJournals
Medical image encryption using multi chaotic maps
Medical image encryption using multi chaotic maps
TELKOMNIKA JOURNAL
R04405103106
R04405103106
IJERA Editor
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
IJNSA Journal
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
IRJET Journal
Similar to A REVIEW PAPER ON THE OPTICAL ENCRYPTION AND DECRYPTION TECHNOLOGY
(20)
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
Color image encryption based on chaotic shit keying with lossless compression
Color image encryption based on chaotic shit keying with lossless compression
Image encryption approach for security issues
Image encryption approach for security issues
A New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECF
Image Encryption Using Differential Evolution Approach in Frequency Domain
Image Encryption Using Differential Evolution Approach in Frequency Domain
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...
OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...
OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...
OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...
Encrypted sensing of fingerprint image
Encrypted sensing of fingerprint image
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
Ew4301904907
Ew4301904907
Lightweight digital imaging and communications in medicine image encryption f...
Lightweight digital imaging and communications in medicine image encryption f...
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Medical image encryption using multi chaotic maps
Medical image encryption using multi chaotic maps
R04405103106
R04405103106
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Suman Mia
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Suhani Kapoor
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
upamatechverse
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
DeepakSakkari2
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
RajkumarAkumalla
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
upamatechverse
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Anamika Sarkar
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
RajaP95
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Soham Mondal
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
slot gacor bisa pakai pulsa
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZTE
Recently uploaded
(20)
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
A REVIEW PAPER ON THE OPTICAL ENCRYPTION AND DECRYPTION TECHNOLOGY
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1404 A REVIEW PAPER ON THE OPTICAL ENCRYPTION AND DECRYPTION TECHNOLOGY Aswathy A P1, Meril Cyriac2 1PG Student Dept of Electronics & communication Engineering LBSITW, Kerala, India 2Assistant Professor, Dept of Electronics & Communication Engineering, LBSITW, Kerala, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Encryption is the process of transforming plain text data (plaintext) into something that appearsrandomand meaningless (ciphertext). The process of transforming ciphertext to plaintext is known as decryption. Optical encryption secures in-flight data in the network's transport layer as it travels over optical waves over fiber-optic cables. Because the technology integrates directly into the network element, optical encryption provides maximum throughput without compromising performance and transparenttransfer of any protocol without the need for additional hardware. The main focus of this paper is to make a comparative analysis of existing optical encryption and decryption technologies. Key Words: Optical Encryption, Ciphertext, Plaintext 1. INTRODUCTION Digital photos may now be widely distributed around the world over open networks, thanks to the rapiddevelopment of the Internet and current communication systems. The protection of image data from unauthorized copying and distribution has become critical. As a result, image encryption, authentication, and watermarking techniques have been extensively researched.Variousimageencryption algorithms have been presented in recent years. Optical image encryption techniques have gained a lot of attention because of its inherent capacity to process data in parallel and hide informationinseveral dimensions.Asymmetricand symmetric encryption are the two forms of encryption commonly used today. The name derives from the fact that the same key is used for both encryption and decryption. The same key is used to encrypt and decrypt data in symmetric encryption. It is also necessary to consider a secure way for transferring the key between the sender and the recipient. The concept of a key pair is employed in asymmetric encryption, with each key being used for encryption and decryption. One of the keys is usually referred to as the private key, while the other is referred to as the public key. Data encrypted using the recipient'spublic key can only be decrypted with the recipient's private key, which is kept private by the owner. As a result, data can be shared without fear of unauthorized or illegal access. The image is multiplied by random phase diffusers (masks) both in the input (space) and Fourier (spatial frequency) domains in one major optical encryption system known as "Double Random Phase Encoding (DRPE)”. The DRPEcanbe improved by adding additional degrees of freedom, and the DRPE has been extended to include the Fresnel transform (FrT) domain, fractional Fourier transform (FrFT) domain, Gyrator transform (GT)domain, and other special transform domains for this purpose. Other optical image encryption techniques investigated include interference, digital holography, phase retrieval algorithm, compressive sensing technique, diffractive imaging technique, ghost imaging technique, and integral imaging technique. The most successful approach to digitalize encrypted information is digital holography, often known as CGH (computer generated holography). CGH also has the capability of selecting any wavelength, adjusting system structure parameters arbitrarily, and recording virtual objects that do not exist in nature. Compressive sensing(CS) technology, which has been used in the field of image encryption, can reduce the amount of data and is beneficial to data preservation and transmission. Biometric keys have recently been introduced into the field of optical encryption. Biometric keys, which are unique and immutable, such as fingerprints, iris, face, and voiceprint, can strengthen security. We looked at some of the known optical encryption algorithms in this paper. 2. REVIEW OF THE DIFFERENT PAPERS Xueru Sun, Tao Hu, Lihong Ma and Weimin Jin proposed the encryption and decryption technology with chaotic iris and compressed sensing based on computer-generated holography [1]. Combiningchaotic mapping,irisphasemask, CGH, and CS, a new symmetric–asymmetric hybrid encryption technique was presented. In the encryption process, the encryption keys are chaotic iris phase mask (CIPM), Fresnel diffraction distance, and wavelength, which are still the decryption keys, known as public keys, in a symmetric key cryptography system. The two-phase masks obtained from phase reservation operations are the decryption keys, which are distinct from the CIPMs used as encryption keys, which are referred to as private keys, and so make up the asymmetric key cryptography system. Y. Su, W. Xu, T. Li, J. Zhao and S. Liu proposed an Optical color image encryption based on fingerprint key and phase- shifting digital holography [2]. The random phase masks generated from the fingerprint using the secure hash
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1405 technique (SHA-256) and chaotic Lozi map are only utilised as interim variables in the encryption process, and the fingerprint is used directly as a secret key. For the primary color image, the suggested encryption system can provide two levels of protection. The discrete wavelet transform hides the primary color image into a greyscale carrier image in the first security level (DWT). The changed carrier image is Fresnel converted at the second security level, and then encrypted into three noise-like hologramsusingfingerprint- based random phase encoding (FRPE) in the LCT domain and three-step phase-shifting digital holography. Hazer and R. Yıldırım proposed Multiple-image hybrid encryption based on compressive sensing and diffractive imaging [3]. A hybrid-II approach was created in this study by combining a CS method, simple modified diffractive imaging-basedencoding(SMDIBE),spacemultiplexing,anda method for lowering the pixel size of the carrier to be delivered. With the space multiplexing technology, separate encrypted images are mixed on a single plane, and different users are granted authorization. Using the hybridtechnique, picture carrying capacity and cross talk difficulties between images are reduced. Farah M A. Ben, R. Guesmi, A. Kachouri, and M. Samet proposed a novel chaos based optical image encryption using fractional Fourier transform and DNA sequence operation [4]. The approachisbasedonShannon'sconfusion and diffusion properties. The confusion technique is based on DNA encoding and employing DNA XOR to confuse the image's pixel values. There are three stages to the image encryption algorithm. In the first part, we use the DNA encoding technique to encode the image. The secondsection focuses on creating three chaotic sequences for use in the diffusion phase. In the third step of the procedure, the fractional Fourier transform will be applied three times. Most known attacks, such as statistical analysis and exhaustive attacks, are also resistant to the suggested technique. All of these characteristics indicate that the technique is well-suited to digital image encryption. Y. Su, W. Xu and J. Zhao presented an Optical image encryption based on chaotic fingerprint phase mask and pattern-illuminated Fourier ptychography [5]. The fingerprint image and chaotic parameters are directly employed as secret keys in the proposed encryption technique, while the CFPMs (chaotic fingerprint phase masks) are only used as interim variables and functions. Sharing the fingerprint image between the sender and authorized receivers can improve the security of the suggested encryption system. The proposed encryption system could benefit from the illumination pattern's added security. N. Yu, S. Xi, X. Wang, L. Lang, X. Wang, L. Zhang, H. Han, Z. Dong, X. Jiao, H. Wang and H. Zhai proposed an Optical implementation of image encryption based on digital holography and computer-generated hologram [6]. Createa realistic optical image encryption technology that combines digital holography and CGH, allowing both digital and physical pictures to be encrypted and decoded in real time. The resulting encrypted image is a binary real value image with high anti-noise ability called Fourier CGH. The encrypted image and random phase key are encoded in multi-pixel units, which simplifies image decryption system setup alignment. Y. Su, W. Xu, J. Zhao, L. Chen and X. Tian proposed Optical color image encryption based on chaotic fingerprint phase mask in various domains and comparative analysis [7]. Random phase masks are used as secret keys in the architecture of double random phase encoding. The chaotic masks in this paper. To encrypt color images, expand the chaotic fingerprint phase masks developed to the Fourier transform domain, fractional Fourier transform domain, Fresnel transform domain, and Gyrator transform domain. The chaotic fingerprint phase masks are only utilised as intermediate variables and functions, while the fingerprint and chaotic parameters serve as direct secret keys. The security of these four encryption systems can be considerably enhanced by fingerprint keys that are firmly linked to the sender or receiver. S. Rajput and O. Matoba proposeda digital holography-based optical multimodal biometric encryption system [8]. Physiological biometrics, such as fingerprints or iris scans, are recorded alongside behavioral biometrics, suchasvoice, as multimodal biometrics employing multi-parameter off- axis digital holography. The Fresnel domain double random phase encoding method, in which keys are produced from biometric data via a phase retrieval algorithm, is used to encrypt numerous biometrics embedded in the same hologram. By utilizing the advantages of optical technology, the suggested method deliversmultimodal biometricswitha greater level of security. G. Verma, M. Liao, D. Lu, W. He, X. Peng and A. Sinha presented an optical asymmetric encryption scheme with biometric keys [9]. The encryption keys in the proposed system are optically created biometric keys and the PTFT (phase-truncated Fourier transforms) technique's random phase mask keys, while the decryptionkeysarepreserved as the binary key and the generated phase-only mask of the PTFT scheme. The biometric key features arekeptsafeusing digital holography and are used in both encryption and decryption operations to verify the authenticity of the ciphertext utilizing biometric keys during the decryption process. L. Ma and W. Jin introduced Symmetric and asymmetric hybrid cryptosystem based on compressive sensing and computer-generated holography [10]. There are six encryption keys in this system, two of which are different from the two random phase masks used during the encryption process. As a result, the encryption system possesses both symmetric and asymmetric cryptography
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1406 capabilities. The suggested encryption approach improves security while also being resistant to noise and occlusion assaults. P. Refregier and B. Javidi established an optical image encryption scheme based on input plane and Fourier plane random encoding. [11]. The proposed encryption technique is double random phase encoding (DRPE) in Fourier transform (FT) domain. Two statistically independent random phase masks situated at the input plane and the Fourier plane, respectively, can encryptthe principal picture into a noise-like pattern in this DRPE-based encryption approach. Because the cypher picture created by the DRPE- based encryption system is complex-valued, it is necessary to store both the amplitude and phase information of the cypher image using digital holography. 3. CONCLUSIONS This paper looked at some of the most recent optical encryption techniques. Most of the optical encryption schemes are based on DRPE. Different techniqueshavebeen integrated with DRPE to increase security. To improve the security of DRPE-based encryption methods, biometric features that can be utilized for user authentication have been added. We can see from the review that optical encryption has developed into a strong and challengingfield in recent years. Different techniques have been devised to improve data security while being transmitted via an unsecured connection. The latest optical encryptionscheme is a combination of chaotic mapping, iris phase mask, CGH, and CS. This encryption method When compared to typical encryption schemes, the transmitted information can be substantially reduced if the chaotic map's initial value is transmitted without the CIPMs, which can greatly minimize the quantity of data transmitted. The RPMs are linkedtoiris, which further enhances the system's security. REFERENCES [1] Xueru Sun, Tao Hu, Lihong Ma, Weimin Jin, The encryption and decryption technology with chaotic iris and compressed sensing based on computer- generated holography. Journal of Optics volume 51, pages124–132 (2022). [2] Y. Su, W. Xu, T. Li, J. Zhao, S. Liu, Optical color image encryption based on fingerprint key and phase-shifting digital holography. Opt.LasersEng.140,106550(2021). [3] A. Hazer, R. Yıldırım, Multiple-image hybrid encryption based on compressive sensing and diffractiveimaging.J. Opt. 22, 1–11 (2020). [4] Farah M A. Ben, R. Guesmi, A. Kachouri, M. Samet, A novel chaos based optical image encryption using fractional Fourier transform and DNA sequence operation. Opt. Laser Technol. 121, 105777 (2020). [5] Y. Su, W. Xu, J. Zhao, Optical image encryption based on chaotic fingerprint phase mask and pattern-illuminated Fourier ptychography. Opt. Lasers Eng. 128, 106042(2020). [6] N. Yu, S. Xi, X. Wang, L. Lang, X. Wang, L. Zhang, H. Han,Z. Dong, X. Jiao, H. Wang, H. Zhai, Optical implementation of image encryption based on digital holography and computer-generated hologram. J. Opt. 22, 075702 (2020). [7] Y. Su, W. Xu, J. Zhao, L. Chen, X. Tian, Optical color image encryption based on chaotic fingerprint phase mask in various domains and comparative analysis. Appl. Opt. 59, 474–483 (2020). [8] S. Rajput, O. Matoba, Optical multimodal biometric encryption that uses digital holography. J. Opt. 22, 115703 (2020). [9] G. Verma, M. Liao, D. Lu, W. He, X. Peng, A. Sinha, An optical asymmetric encryption scheme with biometric keys. Opt. Lasers Eng. 116, 32–40 (2019). [10] L. Ma, W. Jin, Symmetric and asymmetric hybrid cryptosystem based on compressive sensing and computer-generated holography. Opt. Commun. 407, 51–56 (2018). [11] P. Refregier, B. Javidi, Optical imageencryptionbasedon input plane and Fourier plane random encoding. Opt. Lett. 20, 767–769 (1995).
Download now