Skip to main content

A REVIEW PAPER ON THE OPTICAL ENCRYPTION AND DECRYPTION TECHNOLOGY

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395-0056

Volume: 09 Issue: 05 | May 2022

p-ISSN: 2395-0072

www.irjet.net

A REVIEW PAPER ON THE OPTICAL ENCRYPTION AND DECRYPTION TECHNOLOGY Aswathy A P1, Meril Cyriac2 1PG

Student Dept of Electronics & communication Engineering LBSITW, Kerala, India Professor, Dept of Electronics & Communication Engineering, LBSITW, Kerala, India ---------------------------------------------------------------------***--------------------------------------------------------------------2Assistant

Abstract - Encryption is the process of transforming plain

"Double Random Phase Encoding (DRPE)”. The DRPE can be improved by adding additional degrees of freedom, and the DRPE has been extended to include the Fresnel transform (FrT) domain, fractional Fourier transform (FrFT) domain, Gyrator transform (GT)domain, and other special transform domains for this purpose. Other optical image encryption techniques investigated include interference, digital holography, phase retrieval algorithm, compressive sensing technique, diffractive imaging technique, ghost imaging technique, and integral imaging technique.

text data (plaintext) into something that appears random and meaningless (ciphertext). The process of transforming ciphertext to plaintext is known as decryption. Optical encryption secures in-flight data in the network's transport layer as it travels over optical waves over fiber-optic cables. Because the technology integrates directly into the network element, optical encryption provides maximum throughput without compromising performance and transparent transfer of any protocol without the need for additional hardware. The main focus of this paper is to make a comparative analysis of existing optical encryption and decryption technologies.

The most successful approach to digitalize encrypted information is digital holography, often known as CGH (computer generated holography). CGH also has the capability of selecting any wavelength, adjusting system structure parameters arbitrarily, and recording virtual objects that do not exist in nature. Compressive sensing (CS) technology, which has been used in the field of image encryption, can reduce the amount of data and is beneficial to data preservation and transmission. Biometric keys have recently been introduced into the field of optical encryption. Biometric keys, which are unique and immutable, such as fingerprints, iris, face, and voiceprint, can strengthen security. We looked at some of the known optical encryption algorithms in this paper.

Key Words: Optical Encryption, Ciphertext, Plaintext

1. INTRODUCTION Digital photos may now be widely distributed around the world over open networks, thanks to the rapid development of the Internet and current communication systems. The protection of image data from unauthorized copying and distribution has become critical. As a result, image encryption, authentication, and watermarking techniques have been extensively researched. Various image encryption algorithms have been presented in recent years. Optical image encryption techniques have gained a lot of attention because of its inherent capacity to process data in parallel and hide information in several dimensions. Asymmetric and symmetric encryption are the two forms of encryption commonly used today. The name derives from the fact that the same key is used for both encryption and decryption.

2. REVIEW OF THE DIFFERENT PAPERS Xueru Sun, Tao Hu, Lihong Ma and Weimin Jin proposed the encryption and decryption technology with chaotic iris and compressed sensing based on computer-generated holography [1]. Combining chaotic mapping, iris phase mask, CGH, and CS, a new symmetric–asymmetric hybrid encryption technique was presented. In the encryption process, the encryption keys are chaotic iris phase mask (CIPM), Fresnel diffraction distance, and wavelength, which are still the decryption keys, known as public keys, in a symmetric key cryptography system. The two-phase masks obtained from phase reservation operations are the decryption keys, which are distinct from the CIPMs used as encryption keys, which are referred to as private keys, and so make up the asymmetric key cryptography system.

The same key is used to encrypt and decrypt data in symmetric encryption. It is also necessary to consider a secure way for transferring the key between the sender and the recipient. The concept of a key pair is employed in asymmetric encryption, with each key being used for encryption and decryption. One of the keys is usually referred to as the private key, while the other is referred to as the public key. Data encrypted using the recipient's public key can only be decrypted with the recipient's private key, which is kept private by the owner. As a result, data can be shared without fear of unauthorized or illegal access.

Y. Su, W. Xu, T. Li, J. Zhao and S. Liu proposed an Optical color image encryption based on fingerprint key and phaseshifting digital holography [2]. The random phase masks generated from the fingerprint using the secure hash

The image is multiplied by random phase diffusers (masks) both in the input (space) and Fourier (spatial frequency) domains in one major optical encryption system known as

© 2022, IRJET

|

Impact Factor value: 7.529

|

ISO 9001:2008 Certified Journal

|

Page 1404


Turn static files into dynamic content formats.

Create a flipbook