Article

Gyrator transform: properties and applications

Complutense University of Madrid, Madrid, Madrid, Spain
Optics Express (Impact Factor: 3.53). 04/2007; 15(5):2190-203. DOI: 10.1364/OE.15.002190
Source: PubMed

ABSTRACT In this work we formulate the main properties of the gyrator operation which produces a rotation in the twisting (position-spatial frequency) phase planes. This transform can be easily performed in paraxial optics that underlines its possible application for image processing, holography, beam characterization, mode conversion and quantum information. As an example, it is demonstrated the application of gyrator transform for the generation of a variety of stable modes. (c) 2007 Optical Society of America.

3 Followers
 · 
224 Views
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: We demonstrate a multispectral double-image-based cryptosystem that exploits only a tiny number of random white noise samples for proper decryption. Primarily, one of the two downsampled images is converted into the phase function after being shuffled by Arnold transform (AT), while the other image is modulated as an amplitude-based image after AT. Consecutively, a full double-image encryption can be achieved by employing classical double random phase encryption (DRPE) technique in the fractional Fourier transform domain with corresponding fractional orders. In this study, the encrypted complex data is randomly sampled via compressive sensing (CS) framework by which only 25% of the sparse white noise samples are being reserved to realize decryption with zero or small errors. As a consequence, together with correct phase keys, fractional orders and proper inverse AT operators, l p minimization must be utilized to decrypt the original information. Thus, in addition to the perfect image reconstruction, the proposed cryptosystem provides an additional layer of security to the conventional DRPE system. Both the mathematical and numerical simulations were carried out to verify the feasibility as well as the robustness of the proposed system. The simulation results are presented in order to demonstrate the effectiveness of the proposed system. To the best of our knowledge, this is the first report on integrating CS with encrypted complex samples for information security.
    Applied Optics 03/2015; 54(7):1782-1793. DOI:10.1364/AO.54.001782 · 1.69 Impact Factor
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: A concept of spectrum information hidden technology is proposed in this paper. We present an optical encryption algorithm for hiding both the spatial and spectrum information by using the Baker mapping in gyrator transform domains. The Baker mapping is introduced for scrambling the every single band of the hyperspectral image before adding the random phase functions. Subsequently, three thin cylinder lenses are controlled by PC for implementing the gyrator transform. The amplitude and phase information in the output plane can be regarded as the encrypted information and main key. Some numerical simulations are made to test the validity and capability of the proposed encryption algorithm.
    Optics and Lasers in Engineering 10/2014; DOI:10.1016/j.optlaseng.2014.10.002 · 1.70 Impact Factor
  • [Show abstract] [Hide abstract]
    ABSTRACT: The gyrator transform has been proposed in optics a few years ago. By using the theory of quaternion numbers, this paper presents the quaternion gyrator transform (QGT). It is shown that the QGT can be computed via the left-side type of quaternion Fourier transforms. The new transform is applied to color image encryption for validation, where the rotation angles are used as encryption keys making it more secure compared to a recent method using discrete quaternion Fourier transforms (DQFTs). Experimental results show that the proposed encryption algorithm for color image performs as well as the DQFTs method in terms of noise robustness, so that it could be a useful tool for color image encryption.
    2013 20th IEEE International Conference on Image Processing (ICIP); 09/2013

Full-text

Download
62 Downloads
Available from
Jun 5, 2014