Color Information Encoding Based on Phase-Truncated Gyrator Transform Domain


A color information encryption method using phase-truncated gyrator transform domain is proposed. In this technique, the color image is decomposed into R, G and B channels. The decomposed three RBG channels evade the interference of crosstalks efficiently. Each channel is separately modulated to the first random phase mask and then gyrator transformed. The transformed image is phase-truncated to get first encoded image and amplitude-truncated to produce first asymmetric phase key. The obtained image is modulated to the second random phase mask and then again gyrator transformed. The resulted image is phase-truncated to obtain second encoded image and amplitude-truncated to generate second asymmetric phase key. The proposed system includes transformation angles of GT and asymmetric phase keys as decryption keys. The proposed system can be implemented digitally or optically. The optical setup is free from optical misalignment problem. The theoretical analysis and numerical simulation results both validate the proposed technique.

Share and Cite:

Abuturab, M. and Ahmad, T. (2014) Color Information Encoding Based on Phase-Truncated Gyrator Transform Domain. International Journal of Communications, Network and System Sciences, 7, 114-121. doi: 10.4236/ijcns.2014.74013.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] Refregier, P. and Javidi, B. (1995) Optical Image Encryption Based on Input Plane and Fourier Plane Random Encoding. Optics Letters, 20, 767-769.
[2] Unnikrishnan, G., Joseph, J. and Singh, K. (2000) Optical Encryption by Double-Random Phase Encoding in the Fractional Fourier Domain. Optics Letters, 25, 887-889.
[3] Situ, G. and Zhang, J. (2004) Double Random-Phase Encoding in the Fresnel Domain. Optics Letters, 29, 1584-1586.
[4] Hwang, H.-E., Chang, H.T. and Lie, W.-N. (2009) Fast Double-Phase Retrieval in Fresnel Domain Using Modified Gerchberg-Saxton Algorithm for Lensless Optical Security Systems. Optics Express, 17, 13700-13710.
[5] Tsang, P.W.M., Poon, T.-C. and Cheung, K.W.K. (2011) Fast Numerical Generation and Encryption of Computer-Generated Fresnel Holograms. Applied Optics, 50, B46-B52.
[6] Alfalou, A., Brosseau, C., Abdallah, N. and Jridi, M. (2013) Assessing the Performance of a Method of Simultaneous Compression and Encryption of Multiple Images and Its Resistance against Various Attacks. Optics Express, 21, 8025-8043.
[7] Zhang, S.Q. and Karim, M.A. (1999) Color Image Encryption Using Double Random Phase Encoding. Microwave and Optical Technology Letters, 21, 318-323.<318::AID-MOP4>3.0.CO;2-A
[8] Chen, L. and Zhao, D. (2006) Optical Color Image Encryption by Wavelength Multiplexing and Lensless Fresnel Transform Holograms. Optics Express, 14, 8552-8560.
[9] Liu, Z., Xu, L., Liu, T., Chen, H., Li, P., Lin, C. and Liu, S. (2011) Color Image Encryption by Using Arnold Transform and Color-Blend Operation in Discrete Cosine Transform Domains. Optics Communications, 284, 123-128.
[10] Chen, W., Chen, X. and Sheppard, C.J.R. (2012) Optical Color-Image Encryption and Synthesis Using Coherent Diffractive Imaging in the Fresnel Domain. Optics Express, 20, 3853-3865.
[11] Abuturab, M.R. (2012) Color Image Security System Using Double Random-Structured Phase Encoding in Gyrator Transform Domain. Applied Optics, 51, 3006-3016.
[12] Qin, W. and Peng, X. (2010) Asymmetric Cryptosystem Based on Phase-Truncated Fourier Transforms. Optics Letters, 35, 118-120.
[13] Wang, X. and Zhao, D. (2012) A Special Attack on the Asymmetric Cryptosystem Based on Phase-Truncated Fourier Transforms. Optics Communications, 285, 1078-1081.
[14] Abuturab, M.R. (2013) Security Enhancement of Color Image Cryptosystem by Optical Interference Principle and Spiral Phase Encoding. Applied Optics, 52, 1555-1563.
[15] Abuturab, M.R. (2012) Color Information Cryptosystem Based on Optical Superposition Principle and Phase-Truncated Gyrator Transform. Applied Optics, 51, 7994-8002.
[16] Abuturab, M.R. (2013) Authentication System of Color Information Using Interference of Two Beams in Gyrator Transform Domain. Applied Optics, 52, 5133-5142.
[17] Rodrigo, J.A., Alieva, T. and Calvo, M.L. (2007) Gyrator Transform: Properties and Applications. Optics Express, 15, 2190-2203.
[18] Rodrigo, J.A., Alieva, T. and Calvo, M.L. (2007) Experimental Implementation of the Gyrator Transform. Journal of the Optical Society of America A, 24, 3135-3139.
[19] Liu, Z., Xu, L., Chen, C., Dai, J. and Liu, S. (2011) Image Encryption Scheme by Using Iterative Random Phase Encoding in Gyrator Transform Domains. Optics and Lasers in Engineering, 49, 542-546.
[20] Liu, Z., Li, S., Liu, W., Liu, W. and Liu, S. (2013) Image Hiding Scheme by Use of Rotating Squared Sub-Image in the Gyrator Transform Domains. Optics & Laser Technology, 45, 198-203.

Copyright © 2023 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.