The advancement in data transfer and storage technology has prompted new challenges for its
secure transmission. Everyday a huge amount of data (images, passwords, bank details etc.)
is transmitted through open channels, making it vulnerable to intruders. To ensure the safe
transmission, several optical and digital encryption techniques have been explored. Mostly,
the security keys used in the existing image encryption methods are computer generated noise
like distributions having uniformly distributed histogram. Statistically, an attacker may
retrieve these keys if he/she will have partial/full knowledge of the cryptosystem or its
constituents. In this paper, we propose a new asymmetric cryptosystem for phase image
encryption which uses the physically unclonable functions (PUFs) as security keys. The
PUFs are the speckle patterns recorded optically by scattering of vortex beams through
ground glass diffuser (GGD) having unique properties. For encryption, the original amplitude
image is first converted to a phase image and modulated with a PUF to get the complex
image. This complex image is then illuminated with a plane wave and the complex wavefront
at a distance d is recorded. The real part of the complex wavefront is further processed to get
the encrypted image and the imaginary part is kept as the first private key. Polar
decomposition approach is utilized for generating two more private security keys and to
enable the multi-user capability in the cryptosystem. Numerical simulation results consisting
of encryption/decryption, key sensitivity and robustness analysis will be shown in support of
the proposed method.
The advancement in data transfer and storage technology has prompted new challenges for its
secure transmission.
The advancement in data transfer and storage technology has prompted new challenges for its
secure transmission.
Enneagram Test Online is a remarkable platform that offers an accessible and insightful journey into self-discovery through the Enneagram system. As someone who values personal growth and understanding, I found this website to be an invaluable resource.
On the other hand, these keys might not be very complicated or variable in the long run, which could leave them open to advanced cryptanalysis attacks.
https://slope-2.io/