Browsing by Author "Yadav, AK"
Now showing 1 - 2 of 2
Results Per Page
Sort Options
Item Advances in Optical Visual Information Security: A Comprehensive Review(2024-01) Sachin; Kumar, R; Sakshi; Yadav, R; Yadav, AKIn the modern era, the secure transmission and storage of information are among the utmost priorities. Optical security protocols have demonstrated significant advantages over digital counterparts, i.e., a high speed, a complex degree of freedom, physical parameters as keys (i.e., phase, wavelength, polarization, quantum properties of photons, multiplexing, etc.) and multi-dimension processing capabilities. This paper provides a comprehensive overview of optical cryptosystems developed over the years. We have also analyzed the trend in the growth of optical image encryption methods since their inception in 1995 based on the data collected from various literature libraries such as Google Scholar, IEEE Library and Science Direct Database. The security algorithms developed in the literature are focused on two major aspects, i.e., symmetric and asymmetric cryptosystems. A summary of state-of-the-art works is described based on these two aspects. Current challenges and future perspectives of the field are also discussed.Item Asymmetric double-image encryption using twin decomposition in fractional Hartley domain(2022) Kumar, J; Singh, P; Yadav, AKTwin decomposition, consisting of equal and random modulus decompositions, not only makes a cryptosystem asymmetric but also resists special attack. A new double-image asymmetric crypto system using twin decomposition in fractional Hartley domain is proposed. An input grayscale image, bonded with another grayscale image as its phase mask, is transformed via fractional Hartley transform. Equal modulus decomposition is applied on the resulting image, giving us two inter mediate images. One of them is subjected to another fractional Hartley transform followed by ran dom modulus decomposition, whereas the other serves as the first private key. The application of random modulus decomposition also results in two images: encrypted image and the second private key. During the process of decryption, firstly the encrypted image is combined with second private key and thereafter it is subjected to inverse fractional Hartley transform. The resulting image is then combined with the first private key, and followed by another inverse fractional Hartley trans form, thus recovering the two original images. The proposed cryptosystem is validated for pairs of grayscale images.