SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1404
A REVIEW PAPER ON THE OPTICAL ENCRYPTION AND DECRYPTION
TECHNOLOGY
Aswathy A P1, Meril Cyriac2
1PG Student Dept of Electronics & communication Engineering LBSITW, Kerala, India
2Assistant Professor, Dept of Electronics & Communication Engineering, LBSITW, Kerala, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Encryption is the process of transforming plain
text data (plaintext) into something that appearsrandomand
meaningless (ciphertext). The process of transforming
ciphertext to plaintext is known as decryption. Optical
encryption secures in-flight data in the network's transport
layer as it travels over optical waves over fiber-optic cables.
Because the technology integrates directly into the network
element, optical encryption provides maximum throughput
without compromising performance and transparenttransfer
of any protocol without the need for additional hardware. The
main focus of this paper is to make a comparative analysis of
existing optical encryption and decryption technologies.
Key Words: Optical Encryption, Ciphertext, Plaintext
1. INTRODUCTION
Digital photos may now be widely distributed around the
world over open networks, thanks to the rapiddevelopment
of the Internet and current communication systems. The
protection of image data from unauthorized copying and
distribution has become critical. As a result, image
encryption, authentication, and watermarking techniques
have been extensively researched.Variousimageencryption
algorithms have been presented in recent years. Optical
image encryption techniques have gained a lot of attention
because of its inherent capacity to process data in parallel
and hide informationinseveral dimensions.Asymmetricand
symmetric encryption are the two forms of encryption
commonly used today. The name derives from the fact that
the same key is used for both encryption and decryption.
The same key is used to encrypt and decrypt data in
symmetric encryption. It is also necessary to consider a
secure way for transferring the key between the sender and
the recipient. The concept of a key pair is employed in
asymmetric encryption, with each key being used for
encryption and decryption. One of the keys is usually
referred to as the private key, while the other is referred to
as the public key. Data encrypted using the recipient'spublic
key can only be decrypted with the recipient's private key,
which is kept private by the owner. As a result, data can be
shared without fear of unauthorized or illegal access.
The image is multiplied by random phase diffusers (masks)
both in the input (space) and Fourier (spatial frequency)
domains in one major optical encryption system known as
"Double Random Phase Encoding (DRPE)”. The DRPEcanbe
improved by adding additional degrees of freedom, and the
DRPE has been extended to include the Fresnel transform
(FrT) domain, fractional Fourier transform (FrFT) domain,
Gyrator transform (GT)domain, and other special transform
domains for this purpose. Other optical image encryption
techniques investigated include interference, digital
holography, phase retrieval algorithm, compressive sensing
technique, diffractive imaging technique, ghost imaging
technique, and integral imaging technique.
The most successful approach to digitalize encrypted
information is digital holography, often known as CGH
(computer generated holography). CGH also has the
capability of selecting any wavelength, adjusting system
structure parameters arbitrarily, and recording virtual
objects that do not exist in nature. Compressive sensing(CS)
technology, which has been used in the field of image
encryption, can reduce the amount of data and is beneficial
to data preservation and transmission. Biometric keys have
recently been introduced into the field of optical encryption.
Biometric keys, which are unique and immutable, such as
fingerprints, iris, face, and voiceprint, can strengthen
security. We looked at some of the known optical encryption
algorithms in this paper.
2. REVIEW OF THE DIFFERENT PAPERS
Xueru Sun, Tao Hu, Lihong Ma and Weimin Jin proposed the
encryption and decryption technology with chaotic iris and
compressed sensing based on computer-generated
holography [1]. Combiningchaotic mapping,irisphasemask,
CGH, and CS, a new symmetric–asymmetric hybrid
encryption technique was presented. In the encryption
process, the encryption keys are chaotic iris phase mask
(CIPM), Fresnel diffraction distance, and wavelength, which
are still the decryption keys, known as public keys, in a
symmetric key cryptography system. The two-phase masks
obtained from phase reservation operations are the
decryption keys, which are distinct from the CIPMs used as
encryption keys, which are referred to as private keys, and
so make up the asymmetric key cryptography system.
Y. Su, W. Xu, T. Li, J. Zhao and S. Liu proposed an Optical color
image encryption based on fingerprint key and phase-
shifting digital holography [2]. The random phase masks
generated from the fingerprint using the secure hash
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1405
technique (SHA-256) and chaotic Lozi map are only utilised
as interim variables in the encryption process, and the
fingerprint is used directly as a secret key. For the primary
color image, the suggested encryption system can provide
two levels of protection. The discrete wavelet transform
hides the primary color image into a greyscale carrier image
in the first security level (DWT). The changed carrier image
is Fresnel converted at the second security level, and then
encrypted into three noise-like hologramsusingfingerprint-
based random phase encoding (FRPE) in the LCT domain
and three-step phase-shifting digital holography.
Hazer and R. Yıldırım proposed Multiple-image hybrid
encryption based on compressive sensing and diffractive
imaging [3]. A hybrid-II approach was created in this study
by combining a CS method, simple modified diffractive
imaging-basedencoding(SMDIBE),spacemultiplexing,anda
method for lowering the pixel size of the carrier to be
delivered. With the space multiplexing technology, separate
encrypted images are mixed on a single plane, and different
users are granted authorization. Using the hybridtechnique,
picture carrying capacity and cross talk difficulties between
images are reduced.
Farah M A. Ben, R. Guesmi, A. Kachouri, and M. Samet
proposed a novel chaos based optical image encryption
using fractional Fourier transform and DNA sequence
operation [4]. The approachisbasedonShannon'sconfusion
and diffusion properties. The confusion technique is based
on DNA encoding and employing DNA XOR to confuse the
image's pixel values. There are three stages to the image
encryption algorithm. In the first part, we use the DNA
encoding technique to encode the image. The secondsection
focuses on creating three chaotic sequences for use in the
diffusion phase. In the third step of the procedure, the
fractional Fourier transform will be applied three times.
Most known attacks, such as statistical analysis and
exhaustive attacks, are also resistant to the suggested
technique. All of these characteristics indicate that the
technique is well-suited to digital image encryption.
Y. Su, W. Xu and J. Zhao presented an Optical image
encryption based on chaotic fingerprint phase mask and
pattern-illuminated Fourier ptychography [5]. The
fingerprint image and chaotic parameters are directly
employed as secret keys in the proposed encryption
technique, while the CFPMs (chaotic fingerprint phase
masks) are only used as interim variables and functions.
Sharing the fingerprint image between the sender and
authorized receivers can improve the security of the
suggested encryption system. The proposed encryption
system could benefit from the illumination pattern's added
security.
N. Yu, S. Xi, X. Wang, L. Lang, X. Wang, L. Zhang, H. Han, Z.
Dong, X. Jiao, H. Wang and H. Zhai proposed an Optical
implementation of image encryption based on digital
holography and computer-generated hologram [6]. Createa
realistic optical image encryption technology that combines
digital holography and CGH, allowing both digital and
physical pictures to be encrypted and decoded in real time.
The resulting encrypted image is a binary real value image
with high anti-noise ability called Fourier CGH. The
encrypted image and random phase key are encoded in
multi-pixel units, which simplifies image decryption system
setup alignment.
Y. Su, W. Xu, J. Zhao, L. Chen and X. Tian proposed Optical
color image encryption based on chaotic fingerprint phase
mask in various domains and comparative analysis [7].
Random phase masks are used as secret keys in the
architecture of double random phase encoding. The chaotic
masks in this paper. To encrypt color images, expand the
chaotic fingerprint phase masks developed to the Fourier
transform domain, fractional Fourier transform domain,
Fresnel transform domain, and Gyrator transform domain.
The chaotic fingerprint phase masks are only utilised as
intermediate variables and functions, while the fingerprint
and chaotic parameters serve as direct secret keys. The
security of these four encryption systems can be
considerably enhanced by fingerprint keys that are firmly
linked to the sender or receiver.
S. Rajput and O. Matoba proposeda digital holography-based
optical multimodal biometric encryption system [8].
Physiological biometrics, such as fingerprints or iris scans,
are recorded alongside behavioral biometrics, suchasvoice,
as multimodal biometrics employing multi-parameter off-
axis digital holography. The Fresnel domain double random
phase encoding method, in which keys are produced from
biometric data via a phase retrieval algorithm, is used to
encrypt numerous biometrics embedded in the same
hologram. By utilizing the advantages of optical technology,
the suggested method deliversmultimodal biometricswitha
greater level of security.
G. Verma, M. Liao, D. Lu, W. He, X. Peng and A. Sinha
presented an optical asymmetric encryption scheme with
biometric keys [9]. The encryption keys in the proposed
system are optically created biometric keys and the PTFT
(phase-truncated Fourier transforms) technique's random
phase mask keys, while the decryptionkeysarepreserved as
the binary key and the generated phase-only mask of the
PTFT scheme. The biometric key features arekeptsafeusing
digital holography and are used in both encryption and
decryption operations to verify the authenticity of the
ciphertext utilizing biometric keys during the decryption
process.
L. Ma and W. Jin introduced Symmetric and asymmetric
hybrid cryptosystem based on compressive sensing and
computer-generated holography [10]. There are six
encryption keys in this system, two of which are different
from the two random phase masks used during the
encryption process. As a result, the encryption system
possesses both symmetric and asymmetric cryptography
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1406
capabilities. The suggested encryption approach improves
security while also being resistant to noise and occlusion
assaults.
P. Refregier and B. Javidi established an optical image
encryption scheme based on input plane and Fourier plane
random encoding. [11]. The proposed encryption technique
is double random phase encoding (DRPE) in Fourier
transform (FT) domain. Two statistically independent
random phase masks situated at the input plane and the
Fourier plane, respectively, can encryptthe principal picture
into a noise-like pattern in this DRPE-based encryption
approach. Because the cypher picture created by the DRPE-
based encryption system is complex-valued, it is necessary
to store both the amplitude and phase information of the
cypher image using digital holography.
3. CONCLUSIONS
This paper looked at some of the most recent optical
encryption techniques. Most of the optical encryption
schemes are based on DRPE. Different techniqueshavebeen
integrated with DRPE to increase security. To improve the
security of DRPE-based encryption methods, biometric
features that can be utilized for user authentication have
been added. We can see from the review that optical
encryption has developed into a strong and challengingfield
in recent years. Different techniques have been devised to
improve data security while being transmitted via an
unsecured connection. The latest optical encryptionscheme
is a combination of chaotic mapping, iris phase mask, CGH,
and CS. This encryption method When compared to typical
encryption schemes, the transmitted information can be
substantially reduced if the chaotic map's initial value is
transmitted without the CIPMs, which can greatly minimize
the quantity of data transmitted. The RPMs are linkedtoiris,
which further enhances the system's security.
REFERENCES
[1] Xueru Sun, Tao Hu, Lihong Ma, Weimin Jin, The
encryption and decryption technology with chaotic
iris and compressed sensing based on computer-
generated holography. Journal of
Optics volume 51, pages124–132 (2022).
[2] Y. Su, W. Xu, T. Li, J. Zhao, S. Liu, Optical color image
encryption based on fingerprint key and phase-shifting
digital holography. Opt.LasersEng.140,106550(2021).
[3] A. Hazer, R. Yıldırım, Multiple-image hybrid encryption
based on compressive sensing and diffractiveimaging.J.
Opt. 22, 1–11 (2020).
[4] Farah M A. Ben, R. Guesmi, A. Kachouri, M. Samet, A
novel chaos based optical image encryption using
fractional Fourier transform and DNA sequence
operation. Opt. Laser Technol. 121, 105777 (2020).
[5] Y. Su, W. Xu, J. Zhao, Optical image encryption based on
chaotic fingerprint phase mask and pattern-illuminated
Fourier ptychography. Opt. Lasers Eng. 128,
106042(2020).
[6] N. Yu, S. Xi, X. Wang, L. Lang, X. Wang, L. Zhang, H. Han,Z.
Dong, X. Jiao, H. Wang, H. Zhai, Optical implementation
of image encryption based on digital holography and
computer-generated hologram. J. Opt. 22, 075702
(2020).
[7] Y. Su, W. Xu, J. Zhao, L. Chen, X. Tian, Optical color image
encryption based on chaotic fingerprint phase mask in
various domains and comparative analysis. Appl. Opt.
59, 474–483 (2020).
[8] S. Rajput, O. Matoba, Optical multimodal biometric
encryption that uses digital holography. J. Opt. 22,
115703 (2020).
[9] G. Verma, M. Liao, D. Lu, W. He, X. Peng, A. Sinha, An
optical asymmetric encryption scheme with biometric
keys. Opt. Lasers Eng. 116, 32–40 (2019).
[10] L. Ma, W. Jin, Symmetric and asymmetric hybrid
cryptosystem based on compressive sensing and
computer-generated holography. Opt. Commun. 407,
51–56 (2018).
[11] P. Refregier, B. Javidi, Optical imageencryptionbasedon
input plane and Fourier plane random encoding. Opt.
Lett. 20, 767–769 (1995).

More Related Content

PDF
A REVIEW OF THE EXPANDED DIFFIE-HELLMAN ALGORITHM BASED VIRTUAL OPTICAL HOLOG...
PDF
Data Steganography for Optical Color Image Cryptosystems
PDF
Hf2513081311
PDF
Hf2513081311
PDF
IRJET- Lossless Encryption Technique for Finger Biometric Images
PDF
Image Encryption Using Differential Evolution Approach in Frequency Domain
PDF
Hybrid chaos-based image encryption algorithm using Chebyshev chaotic map wit...
PPTX
research review committe review paper for discussion
A REVIEW OF THE EXPANDED DIFFIE-HELLMAN ALGORITHM BASED VIRTUAL OPTICAL HOLOG...
Data Steganography for Optical Color Image Cryptosystems
Hf2513081311
Hf2513081311
IRJET- Lossless Encryption Technique for Finger Biometric Images
Image Encryption Using Differential Evolution Approach in Frequency Domain
Hybrid chaos-based image encryption algorithm using Chebyshev chaotic map wit...
research review committe review paper for discussion

Similar to A REVIEW PAPER ON THE OPTICAL ENCRYPTION AND DECRYPTION TECHNOLOGY (20)

PPTX
research review committee review status new
PPTX
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
PPTX
mini project on some random bs lmao dont
PDF
IRJET- I-Share: A Secure Way to Share Images
PDF
A novel steganographic scheme based on
PDF
A novel efficient multiple encryption algorithm for real time images
PDF
Significant Data Hiding through Discrete Wavelet Transformation Approach
PDF
F1803063236
PDF
Color image encryption decryption using smt
PDF
Color image encryption decryption using smt
PDF
Color image encryption decryption using smt
PDF
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
PDF
Valandar2019_Article_AnIntegerWaveletTransformImage.pdf
PDF
Iaetsd implementation of lsb image steganography system using edge detection
PDF
A Hybrid Approach for Ensuring Security in Data Communication
PDF
Color image encryption based on chaotic shit keying with lossless compression
PDF
18. 23367.pdf
PDF
Iaetsd design of image steganography using haar dwt
PDF
New Watermarking/Encryption Method for Medical ImagesFull Protection in m-Hea...
PDF
Image encryption approach for security issues
research review committee review status new
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
mini project on some random bs lmao dont
IRJET- I-Share: A Secure Way to Share Images
A novel steganographic scheme based on
A novel efficient multiple encryption algorithm for real time images
Significant Data Hiding through Discrete Wavelet Transformation Approach
F1803063236
Color image encryption decryption using smt
Color image encryption decryption using smt
Color image encryption decryption using smt
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Valandar2019_Article_AnIntegerWaveletTransformImage.pdf
Iaetsd implementation of lsb image steganography system using edge detection
A Hybrid Approach for Ensuring Security in Data Communication
Color image encryption based on chaotic shit keying with lossless compression
18. 23367.pdf
Iaetsd design of image steganography using haar dwt
New Watermarking/Encryption Method for Medical ImagesFull Protection in m-Hea...
Image encryption approach for security issues
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Ad

Recently uploaded (20)

DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
additive manufacturing of ss316l using mig welding
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
Well-logging-methods_new................
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
Construction Project Organization Group 2.pptx
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
bas. eng. economics group 4 presentation 1.pptx
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Lecture Notes Electrical Wiring System Components
additive manufacturing of ss316l using mig welding
Internet of Things (IOT) - A guide to understanding
Well-logging-methods_new................
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Automation-in-Manufacturing-Chapter-Introduction.pdf
Foundation to blockchain - A guide to Blockchain Tech
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Model Code of Practice - Construction Work - 21102022 .pdf
Construction Project Organization Group 2.pptx
R24 SURVEYING LAB MANUAL for civil enggi
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
bas. eng. economics group 4 presentation 1.pptx

A REVIEW PAPER ON THE OPTICAL ENCRYPTION AND DECRYPTION TECHNOLOGY

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1404 A REVIEW PAPER ON THE OPTICAL ENCRYPTION AND DECRYPTION TECHNOLOGY Aswathy A P1, Meril Cyriac2 1PG Student Dept of Electronics & communication Engineering LBSITW, Kerala, India 2Assistant Professor, Dept of Electronics & Communication Engineering, LBSITW, Kerala, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Encryption is the process of transforming plain text data (plaintext) into something that appearsrandomand meaningless (ciphertext). The process of transforming ciphertext to plaintext is known as decryption. Optical encryption secures in-flight data in the network's transport layer as it travels over optical waves over fiber-optic cables. Because the technology integrates directly into the network element, optical encryption provides maximum throughput without compromising performance and transparenttransfer of any protocol without the need for additional hardware. The main focus of this paper is to make a comparative analysis of existing optical encryption and decryption technologies. Key Words: Optical Encryption, Ciphertext, Plaintext 1. INTRODUCTION Digital photos may now be widely distributed around the world over open networks, thanks to the rapiddevelopment of the Internet and current communication systems. The protection of image data from unauthorized copying and distribution has become critical. As a result, image encryption, authentication, and watermarking techniques have been extensively researched.Variousimageencryption algorithms have been presented in recent years. Optical image encryption techniques have gained a lot of attention because of its inherent capacity to process data in parallel and hide informationinseveral dimensions.Asymmetricand symmetric encryption are the two forms of encryption commonly used today. The name derives from the fact that the same key is used for both encryption and decryption. The same key is used to encrypt and decrypt data in symmetric encryption. It is also necessary to consider a secure way for transferring the key between the sender and the recipient. The concept of a key pair is employed in asymmetric encryption, with each key being used for encryption and decryption. One of the keys is usually referred to as the private key, while the other is referred to as the public key. Data encrypted using the recipient'spublic key can only be decrypted with the recipient's private key, which is kept private by the owner. As a result, data can be shared without fear of unauthorized or illegal access. The image is multiplied by random phase diffusers (masks) both in the input (space) and Fourier (spatial frequency) domains in one major optical encryption system known as "Double Random Phase Encoding (DRPE)”. The DRPEcanbe improved by adding additional degrees of freedom, and the DRPE has been extended to include the Fresnel transform (FrT) domain, fractional Fourier transform (FrFT) domain, Gyrator transform (GT)domain, and other special transform domains for this purpose. Other optical image encryption techniques investigated include interference, digital holography, phase retrieval algorithm, compressive sensing technique, diffractive imaging technique, ghost imaging technique, and integral imaging technique. The most successful approach to digitalize encrypted information is digital holography, often known as CGH (computer generated holography). CGH also has the capability of selecting any wavelength, adjusting system structure parameters arbitrarily, and recording virtual objects that do not exist in nature. Compressive sensing(CS) technology, which has been used in the field of image encryption, can reduce the amount of data and is beneficial to data preservation and transmission. Biometric keys have recently been introduced into the field of optical encryption. Biometric keys, which are unique and immutable, such as fingerprints, iris, face, and voiceprint, can strengthen security. We looked at some of the known optical encryption algorithms in this paper. 2. REVIEW OF THE DIFFERENT PAPERS Xueru Sun, Tao Hu, Lihong Ma and Weimin Jin proposed the encryption and decryption technology with chaotic iris and compressed sensing based on computer-generated holography [1]. Combiningchaotic mapping,irisphasemask, CGH, and CS, a new symmetric–asymmetric hybrid encryption technique was presented. In the encryption process, the encryption keys are chaotic iris phase mask (CIPM), Fresnel diffraction distance, and wavelength, which are still the decryption keys, known as public keys, in a symmetric key cryptography system. The two-phase masks obtained from phase reservation operations are the decryption keys, which are distinct from the CIPMs used as encryption keys, which are referred to as private keys, and so make up the asymmetric key cryptography system. Y. Su, W. Xu, T. Li, J. Zhao and S. Liu proposed an Optical color image encryption based on fingerprint key and phase- shifting digital holography [2]. The random phase masks generated from the fingerprint using the secure hash
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1405 technique (SHA-256) and chaotic Lozi map are only utilised as interim variables in the encryption process, and the fingerprint is used directly as a secret key. For the primary color image, the suggested encryption system can provide two levels of protection. The discrete wavelet transform hides the primary color image into a greyscale carrier image in the first security level (DWT). The changed carrier image is Fresnel converted at the second security level, and then encrypted into three noise-like hologramsusingfingerprint- based random phase encoding (FRPE) in the LCT domain and three-step phase-shifting digital holography. Hazer and R. Yıldırım proposed Multiple-image hybrid encryption based on compressive sensing and diffractive imaging [3]. A hybrid-II approach was created in this study by combining a CS method, simple modified diffractive imaging-basedencoding(SMDIBE),spacemultiplexing,anda method for lowering the pixel size of the carrier to be delivered. With the space multiplexing technology, separate encrypted images are mixed on a single plane, and different users are granted authorization. Using the hybridtechnique, picture carrying capacity and cross talk difficulties between images are reduced. Farah M A. Ben, R. Guesmi, A. Kachouri, and M. Samet proposed a novel chaos based optical image encryption using fractional Fourier transform and DNA sequence operation [4]. The approachisbasedonShannon'sconfusion and diffusion properties. The confusion technique is based on DNA encoding and employing DNA XOR to confuse the image's pixel values. There are three stages to the image encryption algorithm. In the first part, we use the DNA encoding technique to encode the image. The secondsection focuses on creating three chaotic sequences for use in the diffusion phase. In the third step of the procedure, the fractional Fourier transform will be applied three times. Most known attacks, such as statistical analysis and exhaustive attacks, are also resistant to the suggested technique. All of these characteristics indicate that the technique is well-suited to digital image encryption. Y. Su, W. Xu and J. Zhao presented an Optical image encryption based on chaotic fingerprint phase mask and pattern-illuminated Fourier ptychography [5]. The fingerprint image and chaotic parameters are directly employed as secret keys in the proposed encryption technique, while the CFPMs (chaotic fingerprint phase masks) are only used as interim variables and functions. Sharing the fingerprint image between the sender and authorized receivers can improve the security of the suggested encryption system. The proposed encryption system could benefit from the illumination pattern's added security. N. Yu, S. Xi, X. Wang, L. Lang, X. Wang, L. Zhang, H. Han, Z. Dong, X. Jiao, H. Wang and H. Zhai proposed an Optical implementation of image encryption based on digital holography and computer-generated hologram [6]. Createa realistic optical image encryption technology that combines digital holography and CGH, allowing both digital and physical pictures to be encrypted and decoded in real time. The resulting encrypted image is a binary real value image with high anti-noise ability called Fourier CGH. The encrypted image and random phase key are encoded in multi-pixel units, which simplifies image decryption system setup alignment. Y. Su, W. Xu, J. Zhao, L. Chen and X. Tian proposed Optical color image encryption based on chaotic fingerprint phase mask in various domains and comparative analysis [7]. Random phase masks are used as secret keys in the architecture of double random phase encoding. The chaotic masks in this paper. To encrypt color images, expand the chaotic fingerprint phase masks developed to the Fourier transform domain, fractional Fourier transform domain, Fresnel transform domain, and Gyrator transform domain. The chaotic fingerprint phase masks are only utilised as intermediate variables and functions, while the fingerprint and chaotic parameters serve as direct secret keys. The security of these four encryption systems can be considerably enhanced by fingerprint keys that are firmly linked to the sender or receiver. S. Rajput and O. Matoba proposeda digital holography-based optical multimodal biometric encryption system [8]. Physiological biometrics, such as fingerprints or iris scans, are recorded alongside behavioral biometrics, suchasvoice, as multimodal biometrics employing multi-parameter off- axis digital holography. The Fresnel domain double random phase encoding method, in which keys are produced from biometric data via a phase retrieval algorithm, is used to encrypt numerous biometrics embedded in the same hologram. By utilizing the advantages of optical technology, the suggested method deliversmultimodal biometricswitha greater level of security. G. Verma, M. Liao, D. Lu, W. He, X. Peng and A. Sinha presented an optical asymmetric encryption scheme with biometric keys [9]. The encryption keys in the proposed system are optically created biometric keys and the PTFT (phase-truncated Fourier transforms) technique's random phase mask keys, while the decryptionkeysarepreserved as the binary key and the generated phase-only mask of the PTFT scheme. The biometric key features arekeptsafeusing digital holography and are used in both encryption and decryption operations to verify the authenticity of the ciphertext utilizing biometric keys during the decryption process. L. Ma and W. Jin introduced Symmetric and asymmetric hybrid cryptosystem based on compressive sensing and computer-generated holography [10]. There are six encryption keys in this system, two of which are different from the two random phase masks used during the encryption process. As a result, the encryption system possesses both symmetric and asymmetric cryptography
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1406 capabilities. The suggested encryption approach improves security while also being resistant to noise and occlusion assaults. P. Refregier and B. Javidi established an optical image encryption scheme based on input plane and Fourier plane random encoding. [11]. The proposed encryption technique is double random phase encoding (DRPE) in Fourier transform (FT) domain. Two statistically independent random phase masks situated at the input plane and the Fourier plane, respectively, can encryptthe principal picture into a noise-like pattern in this DRPE-based encryption approach. Because the cypher picture created by the DRPE- based encryption system is complex-valued, it is necessary to store both the amplitude and phase information of the cypher image using digital holography. 3. CONCLUSIONS This paper looked at some of the most recent optical encryption techniques. Most of the optical encryption schemes are based on DRPE. Different techniqueshavebeen integrated with DRPE to increase security. To improve the security of DRPE-based encryption methods, biometric features that can be utilized for user authentication have been added. We can see from the review that optical encryption has developed into a strong and challengingfield in recent years. Different techniques have been devised to improve data security while being transmitted via an unsecured connection. The latest optical encryptionscheme is a combination of chaotic mapping, iris phase mask, CGH, and CS. This encryption method When compared to typical encryption schemes, the transmitted information can be substantially reduced if the chaotic map's initial value is transmitted without the CIPMs, which can greatly minimize the quantity of data transmitted. The RPMs are linkedtoiris, which further enhances the system's security. REFERENCES [1] Xueru Sun, Tao Hu, Lihong Ma, Weimin Jin, The encryption and decryption technology with chaotic iris and compressed sensing based on computer- generated holography. Journal of Optics volume 51, pages124–132 (2022). [2] Y. Su, W. Xu, T. Li, J. Zhao, S. Liu, Optical color image encryption based on fingerprint key and phase-shifting digital holography. Opt.LasersEng.140,106550(2021). [3] A. Hazer, R. Yıldırım, Multiple-image hybrid encryption based on compressive sensing and diffractiveimaging.J. Opt. 22, 1–11 (2020). [4] Farah M A. Ben, R. Guesmi, A. Kachouri, M. Samet, A novel chaos based optical image encryption using fractional Fourier transform and DNA sequence operation. Opt. Laser Technol. 121, 105777 (2020). [5] Y. Su, W. Xu, J. Zhao, Optical image encryption based on chaotic fingerprint phase mask and pattern-illuminated Fourier ptychography. Opt. Lasers Eng. 128, 106042(2020). [6] N. Yu, S. Xi, X. Wang, L. Lang, X. Wang, L. Zhang, H. Han,Z. Dong, X. Jiao, H. Wang, H. Zhai, Optical implementation of image encryption based on digital holography and computer-generated hologram. J. Opt. 22, 075702 (2020). [7] Y. Su, W. Xu, J. Zhao, L. Chen, X. Tian, Optical color image encryption based on chaotic fingerprint phase mask in various domains and comparative analysis. Appl. Opt. 59, 474–483 (2020). [8] S. Rajput, O. Matoba, Optical multimodal biometric encryption that uses digital holography. J. Opt. 22, 115703 (2020). [9] G. Verma, M. Liao, D. Lu, W. He, X. Peng, A. Sinha, An optical asymmetric encryption scheme with biometric keys. Opt. Lasers Eng. 116, 32–40 (2019). [10] L. Ma, W. Jin, Symmetric and asymmetric hybrid cryptosystem based on compressive sensing and computer-generated holography. Opt. Commun. 407, 51–56 (2018). [11] P. Refregier, B. Javidi, Optical imageencryptionbasedon input plane and Fourier plane random encoding. Opt. Lett. 20, 767–769 (1995).