International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1431
A REVIEW OF THE EXPANDED DIFFIE-HELLMAN ALGORITHM
BASED VIRTUAL OPTICAL HOLOGRAPHIC ENCRYPTION SYSTEM
Amina Seyyadali S1, Prof. Meril Cyriac2
1 PG Student, Dept. of Electronics & Communication Engineering, LBSITW, Kerala, India
2 Assistant Professor, Dept. of Electronics & Communication Engineering, LBSITW, Kerala, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Optical encryption is used to secure data in the transport layer of the network as it is carried over optical waves
across fiber-optic cables. The acquisition and processing of holograms with a digital sensor array are called digital holograms.
Combining both yields holographic encryption VOHE is a method of encrypting information over a Virtual Optical Holographic
Encryption system. It includes a virtual optical system based on digital holography and Fourier lens. The VOHE system
provides parameters such as propagation wavelength (λ) and focal length (f) of the Fourier lens which are keys that are used
for encryption and decryption processes. This review highlights different optical encryption and decryption methods using
different algorithms and reviews digital holograms. Diffie-Hellman and Expanded Diffie-Hellman key exchange were also
briefly discussed.
Key Words: Optical encryption, Digital Hologram, Fourier lens, Holographic encryption, Diffie-Hellman
1. INTRODUCTION
One of the most important challenges in today’s world is data security. A lot of methods have been proposed in the last
decades to encrypt data signals to make them more secure and robust. The field of information security has grown and
evolved significantly. The vast outspread of the internet and advance in digital techniques have made it possible to copy
and edit images, audio, video, and other types of multimedia data. Digital information is exposed to a variety of
vulnerabilities including loss, misuse, duplication, and unauthorized usage of information. Optical techniques provide
great potential in information security applications. This paper gives a brief comparison between different optical
encryption and decryption techniques. This study extends to the performance parameters used in the encryption process
and analyzes their security issues.
Diffie-Hellman, Expanded Diffie-Hellman, RSA, Expanded RSA, etc., are different algorithms that are used in different
techniques for better security during the key exchange process. Since key exchange through the public channel is not
secure, the important challenge is to find a better algorithm that provides more security and authentication, which must be
efficient, accurate and robust.
Topics to be discussed in this review are: Virtual Optical Holographic Encryption System which provides optical
holographic encryption using Diffie-Hellman and Expanded DiffieHellman algorithms. One of its applications, the VOHE
system for underwater communications is proposed using RSA and ERSA algorithms. Some other optical encryption
methods we were going to discuss in this paper include angular multiplexing of multiple images, encryption and
decryption of chaotic systems, multi-user encryption and authentication system using joint transform correlation, angle
multiplexing of optical image encryption in the Fresnel transform domain using a phase-only computer-generated
hologram, etc.
The conclusion is drawn based on the efficiency, accuracy and computational complexity of these techniques.
2. REVIEW PART
Yang Peng, Tomoyuki Nagase, Oshiki Kanamoto et.al [1] introduced the concept of the Virtual Optical Holographic
Encryption [VOHE] System using Expanded Diffie-Hellman [EDH] Algorithm. The propagation wavelength (λ) and focal
length (f) of the Fourier lens are used as keys for encryption and decryption processes. Encryption is provided through the
EDH-C algorithm. C corresponds to a two-dimensional complex function which makes keys stronger.
Pollard’s Rho method, NIST tests, etc., were also performed for security evaluation. NIST test results show that the
message that was encrypted by the proposed EDH-C algorithm had higher security than DH in case of the unpredictability
and complexity of the transmitted message over an insecure channel.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1432
Y. Peng, T. Nagase, S. You, and T. Kanamoto et.al [2] present a new method for encrypting holographic information based
on optical and acoustic signals. It is called the VOHE system for underwater communications. The simulation was done
based on the COMSOL Multiphysics tool for holograms and Fourier lenses. The wavelength λ was considered the first key,
and the focal length f was considered the second key. Expanded RSA[ERSA] algorithm sends system information as a
message to the receiver. Pollard’s method is used for comparison between RSA mad ERSA. ERSA can achieve a more
significant security level than RSA. Pollard’s method is used for comparison between RSA mad ERSA. Its applications
include communications between deep submergence research vehicles. Utilizing the optical and acoustic waves together
will provide high communication stability also.
S.Xi, N. Yu, X. Wang, X. Wang, L. Lang, H. Wang, W. Liu, and H. Zhai et.al [3] proposed a system such that in the encryption
process original images are firstly modulated by two random phase keys in Fresnel Transform with different diffraction
distances. In decryption, SLM is used as an experimental system and multiple images can be encrypted synchronously with
high efficiency. It provides high storage efficiency and simple calculations. So that this optical multiple-image encryption
system improves the efficiency of information transmission and multi-user authentication. It has multiple kinds of keys
also.
S.Zhao and Y. Chi et.al [4] proposed a system where multiple users utilize their fingerprints to encrypt the plain text in the
encryption process. The decryption process can only be performed by people with legitimate identities. This system can
prevent the overlapping of images at the output when the distance is low. They also proposed a multi-user double-image
encryption method, that can meet the needs of different security environments.
R. Ren, Z. Jia, J. Yang, N. K. Kasabov, and X. Huang et.al [5] proposed a system that combines automatic GrabCut and guided
filtering to solve the problem of blurred image details in filtering reconstruction. The new algorithm achieves quasi-noise-
free (approximate the noisefree state) DH reconstruction and realizes the retention of details in the image. The quality of
the resulting holographic reconstruction is comparable with that achieved incoherent technology, which exceeds the
current level of DH and produces a good visual effect. When compared with other international advanced methods, the
algorithm is more prominent in terms of detail processing and background noise suppression.
H. T. Chang, Y.-T. Wang, and C.-Y. Chen et.al [6] proposed a new angle multiplexing method, implemented by three different
types of angle manipulation on the POCGH and/or image reconstruction planes. It is optics-based image encryption using a
phase-only computergenerated hologram (POCGH) in the tilted Fresnel transform (TFrT) domain. Modified Gerchberg-
Saxton algorithms are used. The methods proposed here show great potential for 3D image projection, as the rotated
images are no longer within the same two-dimensional plane. Due to the encrypted nature of the multiplexed images, a
higher system security level can be also achieved.
E. Swathika, N. Karthika, and B. Janet et.al [7] aim to develop an efficient encryption system that should accomplish
confidentiality, integrity, and security and also prevents the access of images by unauthorized users. This system used two
important techniques which are based on chaos theory namely: Confusion and Diffusion. This system also protects from
statistical and differential attacks. Mathematical results showed that the security of the images has been preserved at a
higher level and also prevents unauthorized access to sensitive information.
Aryan et.al [8] proposed an extended Diffie-Hellman algorithm by using the concept of the Diffie-Hellman algorithm to get
a stronger secret key. This secret key is further exchanged between the sender and the receiver so that for each message, a
new secret shared key will be generated. This helps to avoid so many threats like Man in the middle attack, access denial,
etc., that are present in the public channel while transmitting valuable information.
COMPARISON OF REVIEW PAPERS
YEAR AND WORK ALGORITHM/
METHOD
USED
DESCRIPTION LIMITATION RESULTS
2021
A Virtual Optical
Holographic Encryption
System Using Expanded
Diffie-Hellman
Algorithm
EDH-C Using a complex
function increases
the security of
encryption in the
VOHE system.
Key Calculation
Complexity
while using
complex function
EDH-C algorithm had
higher security than DH
in case of the
unpredictability and
complexity of the
transmitted message
over an insecure
channel.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1433
2020
A VOHE
system for underwater
communications
ERSA Performing VOHE
encryption scheme
for underwater
communications.
Data transmissions
over multi-node
network systems
are not possible in
this work
Utilizing the optical and
acoustic waves together
provided high
communication
stability
2020
Optical
encryption
scheme for multiple-
image
based on spatially
angular multiplexing and a
computer-generated
hologram
Fresnel
Transform
Multiple images are
encrypted
synchronously with
high efficiency
Need multiple
Keys
Improved efficiency of
information
transmission and multi-
user authentication
2019
A multi-user encryption
and authentication system
based on joint transform
correlation
JTC [Joint
Transform
Correlation]
Multiple users
utilize their
fingerprints to
encrypt the plain
text in the
encryption process
Research only
applies to Gray
images.
JTC-based image
encryption
system can avoid
overlapping
images at the output
2019 Quasi-noise free
and detail preserved
digital holographic
reconstruction
DH [Diffie-
Hellman]
combines
automatic GrabCut
and guided filtering
to solve the
problem of blurred
image details in
filtering
reconstruction
The segmentation is
initialized by user
interaction which
may lead to bad
segmentation if
initialization quality
is poor
The algorithm is more
prominent in terms of
detail processing and
background noise
suppression
2019 Angle multiplexing
optical image encryption
in the Fresnel transform
domain using a phase-
only computer-generated
hologram
Modified
GerchbergSaxt
on algorithm
A new angle
multiplexing
method,
implemented by
three different
types of angle
manipulation on
the
POCGH and/or
image
reconstruction
planes
The pixilation and
scaling effects due
to the rotation of
the POCGH and the
pixel response of
the device on which
the POCGH is
displayed have not
been
considered yet
The encrypted nature
of the multiplexed
images provides a
higher system security
level
2019 Image encryption
and decryption using a
chaotic system
Chaos theory An efficient
encryption system
that accomplished
confidentiality,
integrity, and
security and it also
prevents the access
of images by
unauthorized users
Complexity in
choosing input
parameters
The security of the
images has been
preserved at a higher
level and also prevents
the
unauthorized access to
the sensitive
information
2017
Enhanced
Diffie-Hellman algorithm
for reliable key exchange
Enhanced DH Generates a
stronger secret key
by
exchanging
different keys for
each message
Key calculation
complexity
while taking
roots
Using different keys for
each message preserves
confidentiality
3. CONCLUSION
This paper presented a review of the optical encryption and decryption schemes using different currently available
techniques. Throughout the review, we can understand that optical encryption has emerged as a strong and challenging
field during the last years. Different algorithms were introduced so that better security of data is possible while
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1434
transmission through an unsecured channel. Algorithms like RSA, ERSA, DH, EDH, etc., are used as encryption schemes in
some methods. One of the latest algorithms EDH-C’s security evaluation was also studied during this review. Multiple
image encryption system improves the efficiency of information transmission and multi-user authentication. Angle
multiplexing provides a higher security level. This paper also gives a brief comparison between different optical
encryption and decryption techniques. This conclusion is drawn based on the efficiency, accuracy, and computational
complexity of these techniques.
REFERENCES
[1] Yang Peng, Tomoyuki Nagase, Oshiki Kanamoto ‘‘A Virtual Optical Holographic Encryption System Using
Expanded Diffie-Hellman Algorithm,’’ Digital Object Identifier 10.1109/ACCESS. February 2021.3055866
[2] Y. Peng, T. Nagase, S. You, and T. Kanamoto, ‘‘A VOHE system for underwater communications,’’ Electronics, vol. 9,
no. 10, p. 1557, Sep. 2020
[3] S. Xi, N. Yu, X. Wang, X. Wang, L. Lang, H. Wang, W. Liu, and H. Zhai, ‘‘Optical encryption scheme for multiple-image
based on spatially angular multiplexing and computer-generated hologram,’’ Opt. Lasers Eng., vol. 127, Apr. 2020,
Art. no. 105953.
[4] T. Zhao and Y. Chi, ‘‘A multi-user encryption and authentication system based on joint transform correlation,’’
Entropy, vol. 21, no. 9, p. 850, Aug. 2019.
[5] R. Ren, Z. Jia, J. Yang, N. K. Kasabov, and X. Huang, ‘‘Quasi-noise-free and detailpreserved digital holographic
reconstruction,’’ IEEE Access, vol. 7, pp. 52155–52167, 2019.
[6] H. T. Chang, Y.-T. Wang, and C.-Y. Chen, ‘‘Angle multiplexing optical image encryption in the Fresnel transform
domain using a phase-only computer-generated hologram,’’ Photonics, vol. 7, no. 1, p. 1, Dec. 2019
[7] E. Swathika, N. Karthika, and B. Janet, ‘‘Image encryption and decryption using chaotic system,’’ in Proc. IEEE 9th
Int. Conf. Adv. Comput. (IACC), Dec. 2019, pp. 30–37
[8] Aryan, ‘‘Enhanced Diffie-hellman algorithm for reliable key exchange,’’ 2017 IOP Conf. Ser.: Mater. Sci. Eng. 263
042015

More Related Content

PDF
A REVIEW PAPER ON THE OPTICAL ENCRYPTION AND DECRYPTION TECHNOLOGY
PDF
IRJET- I-Share: A Secure Way to Share Images
PDF
Image Encryption Using Differential Evolution Approach in Frequency Domain
PPTX
mini project on some random bs lmao dont
PDF
Image encryption approach for security issues
PDF
Encrypted sensing of fingerprint image
PDF
F1803063236
PDF
Hf2513081311
A REVIEW PAPER ON THE OPTICAL ENCRYPTION AND DECRYPTION TECHNOLOGY
IRJET- I-Share: A Secure Way to Share Images
Image Encryption Using Differential Evolution Approach in Frequency Domain
mini project on some random bs lmao dont
Image encryption approach for security issues
Encrypted sensing of fingerprint image
F1803063236
Hf2513081311

Similar to A REVIEW OF THE EXPANDED DIFFIE-HELLMAN ALGORITHM BASED VIRTUAL OPTICAL HOLOGRAPHIC ENCRYPTION SYSTEM (20)

PDF
Hf2513081311
PDF
New Watermarking/Encryption Method for Medical ImagesFull Protection in m-Hea...
PDF
Data Steganography for Optical Color Image Cryptosystems
PDF
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
PDF
18. 23367.pdf
PDF
Proposed aes for image steganography in different medias
PDF
Proposed aes for image steganography in different medias
PDF
Transmission of cryptic text using rotational visual cryptography
PDF
Transmission of cryptic text using rotational visual
PDF
Dip year wise titles
PDF
Iaetsd implementation of lsb image steganography system using edge detection
PDF
7 rupali kasar_final paper--74-85
PDF
Valandar2019_Article_AnIntegerWaveletTransformImage.pdf
PDF
Performance analysis of transformation and bogdonov chaotic substitution base...
PDF
A Biometric Approach to Encrypt a File with the Help of Session Key
PDF
Significant Data Hiding through Discrete Wavelet Transformation Approach
PDF
Dual method cryptography image by two force secure and steganography secret m...
PDF
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
PDF
Secure Image Transfer in The Domain Transform DFT
PDF
Improved method for image security based on chaotic-shuffle and chaotic-diffu...
Hf2513081311
New Watermarking/Encryption Method for Medical ImagesFull Protection in m-Hea...
Data Steganography for Optical Color Image Cryptosystems
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
18. 23367.pdf
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
Transmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual
Dip year wise titles
Iaetsd implementation of lsb image steganography system using edge detection
7 rupali kasar_final paper--74-85
Valandar2019_Article_AnIntegerWaveletTransformImage.pdf
Performance analysis of transformation and bogdonov chaotic substitution base...
A Biometric Approach to Encrypt a File with the Help of Session Key
Significant Data Hiding through Discrete Wavelet Transformation Approach
Dual method cryptography image by two force secure and steganography secret m...
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Secure Image Transfer in The Domain Transform DFT
Improved method for image security based on chaotic-shuffle and chaotic-diffu...

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PPTX
CC PPTS unit-I PPT Notes of Cloud Computing
PPTX
1. Effective HSEW Induction Training - EMCO 2024, O&M.pptx
PDF
Introduction to Machine Learning -Basic concepts,Models and Description
PPTX
240409 Data Center Training Programs by Uptime Institute (Drafting).pptx
PDF
ASPEN PLUS USER GUIDE - PROCESS SIMULATIONS
PDF
1.-fincantieri-investor-presentation2.pdf
PDF
Application of smart robotics in the supply chain
PDF
AI agent, robotics based Smart Construction 2025
PDF
Traditional Programming vs Machine learning and Models in Machine Learning
PPTX
Unit IILATHEACCESSORSANDATTACHMENTS.pptx
PDF
Module 1 part 1.pdf engineering notes s7
PDF
August 2025 Top read articles in International Journal of Database Managemen...
PPTX
INTERNET OF THINGS - EMBEDDED SYSTEMS AND INTERNET OF THINGS
PPTX
L1111-Important Microbial Mechanisms.pptx
PDF
CB Công Nghiệp Slide .dh bách khoa đà nẵng
PDF
Project_Mgmt_Institute_- Marc Marc Marc.pdf
PPTX
non conventional energy resorses material unit-1
PDF
THE PEDAGOGICAL NEXUS IN TEACHING ELECTRICITY CONCEPTS IN THE GRADE 9 NATURAL...
PDF
02. INDUSTRIAL REVOLUTION & Cultural, Technical and territorial transformatio...
PPTX
operating system Module 5 Secondary storage
CC PPTS unit-I PPT Notes of Cloud Computing
1. Effective HSEW Induction Training - EMCO 2024, O&M.pptx
Introduction to Machine Learning -Basic concepts,Models and Description
240409 Data Center Training Programs by Uptime Institute (Drafting).pptx
ASPEN PLUS USER GUIDE - PROCESS SIMULATIONS
1.-fincantieri-investor-presentation2.pdf
Application of smart robotics in the supply chain
AI agent, robotics based Smart Construction 2025
Traditional Programming vs Machine learning and Models in Machine Learning
Unit IILATHEACCESSORSANDATTACHMENTS.pptx
Module 1 part 1.pdf engineering notes s7
August 2025 Top read articles in International Journal of Database Managemen...
INTERNET OF THINGS - EMBEDDED SYSTEMS AND INTERNET OF THINGS
L1111-Important Microbial Mechanisms.pptx
CB Công Nghiệp Slide .dh bách khoa đà nẵng
Project_Mgmt_Institute_- Marc Marc Marc.pdf
non conventional energy resorses material unit-1
THE PEDAGOGICAL NEXUS IN TEACHING ELECTRICITY CONCEPTS IN THE GRADE 9 NATURAL...
02. INDUSTRIAL REVOLUTION & Cultural, Technical and territorial transformatio...
operating system Module 5 Secondary storage

A REVIEW OF THE EXPANDED DIFFIE-HELLMAN ALGORITHM BASED VIRTUAL OPTICAL HOLOGRAPHIC ENCRYPTION SYSTEM

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1431 A REVIEW OF THE EXPANDED DIFFIE-HELLMAN ALGORITHM BASED VIRTUAL OPTICAL HOLOGRAPHIC ENCRYPTION SYSTEM Amina Seyyadali S1, Prof. Meril Cyriac2 1 PG Student, Dept. of Electronics & Communication Engineering, LBSITW, Kerala, India 2 Assistant Professor, Dept. of Electronics & Communication Engineering, LBSITW, Kerala, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Optical encryption is used to secure data in the transport layer of the network as it is carried over optical waves across fiber-optic cables. The acquisition and processing of holograms with a digital sensor array are called digital holograms. Combining both yields holographic encryption VOHE is a method of encrypting information over a Virtual Optical Holographic Encryption system. It includes a virtual optical system based on digital holography and Fourier lens. The VOHE system provides parameters such as propagation wavelength (λ) and focal length (f) of the Fourier lens which are keys that are used for encryption and decryption processes. This review highlights different optical encryption and decryption methods using different algorithms and reviews digital holograms. Diffie-Hellman and Expanded Diffie-Hellman key exchange were also briefly discussed. Key Words: Optical encryption, Digital Hologram, Fourier lens, Holographic encryption, Diffie-Hellman 1. INTRODUCTION One of the most important challenges in today’s world is data security. A lot of methods have been proposed in the last decades to encrypt data signals to make them more secure and robust. The field of information security has grown and evolved significantly. The vast outspread of the internet and advance in digital techniques have made it possible to copy and edit images, audio, video, and other types of multimedia data. Digital information is exposed to a variety of vulnerabilities including loss, misuse, duplication, and unauthorized usage of information. Optical techniques provide great potential in information security applications. This paper gives a brief comparison between different optical encryption and decryption techniques. This study extends to the performance parameters used in the encryption process and analyzes their security issues. Diffie-Hellman, Expanded Diffie-Hellman, RSA, Expanded RSA, etc., are different algorithms that are used in different techniques for better security during the key exchange process. Since key exchange through the public channel is not secure, the important challenge is to find a better algorithm that provides more security and authentication, which must be efficient, accurate and robust. Topics to be discussed in this review are: Virtual Optical Holographic Encryption System which provides optical holographic encryption using Diffie-Hellman and Expanded DiffieHellman algorithms. One of its applications, the VOHE system for underwater communications is proposed using RSA and ERSA algorithms. Some other optical encryption methods we were going to discuss in this paper include angular multiplexing of multiple images, encryption and decryption of chaotic systems, multi-user encryption and authentication system using joint transform correlation, angle multiplexing of optical image encryption in the Fresnel transform domain using a phase-only computer-generated hologram, etc. The conclusion is drawn based on the efficiency, accuracy and computational complexity of these techniques. 2. REVIEW PART Yang Peng, Tomoyuki Nagase, Oshiki Kanamoto et.al [1] introduced the concept of the Virtual Optical Holographic Encryption [VOHE] System using Expanded Diffie-Hellman [EDH] Algorithm. The propagation wavelength (λ) and focal length (f) of the Fourier lens are used as keys for encryption and decryption processes. Encryption is provided through the EDH-C algorithm. C corresponds to a two-dimensional complex function which makes keys stronger. Pollard’s Rho method, NIST tests, etc., were also performed for security evaluation. NIST test results show that the message that was encrypted by the proposed EDH-C algorithm had higher security than DH in case of the unpredictability and complexity of the transmitted message over an insecure channel.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1432 Y. Peng, T. Nagase, S. You, and T. Kanamoto et.al [2] present a new method for encrypting holographic information based on optical and acoustic signals. It is called the VOHE system for underwater communications. The simulation was done based on the COMSOL Multiphysics tool for holograms and Fourier lenses. The wavelength λ was considered the first key, and the focal length f was considered the second key. Expanded RSA[ERSA] algorithm sends system information as a message to the receiver. Pollard’s method is used for comparison between RSA mad ERSA. ERSA can achieve a more significant security level than RSA. Pollard’s method is used for comparison between RSA mad ERSA. Its applications include communications between deep submergence research vehicles. Utilizing the optical and acoustic waves together will provide high communication stability also. S.Xi, N. Yu, X. Wang, X. Wang, L. Lang, H. Wang, W. Liu, and H. Zhai et.al [3] proposed a system such that in the encryption process original images are firstly modulated by two random phase keys in Fresnel Transform with different diffraction distances. In decryption, SLM is used as an experimental system and multiple images can be encrypted synchronously with high efficiency. It provides high storage efficiency and simple calculations. So that this optical multiple-image encryption system improves the efficiency of information transmission and multi-user authentication. It has multiple kinds of keys also. S.Zhao and Y. Chi et.al [4] proposed a system where multiple users utilize their fingerprints to encrypt the plain text in the encryption process. The decryption process can only be performed by people with legitimate identities. This system can prevent the overlapping of images at the output when the distance is low. They also proposed a multi-user double-image encryption method, that can meet the needs of different security environments. R. Ren, Z. Jia, J. Yang, N. K. Kasabov, and X. Huang et.al [5] proposed a system that combines automatic GrabCut and guided filtering to solve the problem of blurred image details in filtering reconstruction. The new algorithm achieves quasi-noise- free (approximate the noisefree state) DH reconstruction and realizes the retention of details in the image. The quality of the resulting holographic reconstruction is comparable with that achieved incoherent technology, which exceeds the current level of DH and produces a good visual effect. When compared with other international advanced methods, the algorithm is more prominent in terms of detail processing and background noise suppression. H. T. Chang, Y.-T. Wang, and C.-Y. Chen et.al [6] proposed a new angle multiplexing method, implemented by three different types of angle manipulation on the POCGH and/or image reconstruction planes. It is optics-based image encryption using a phase-only computergenerated hologram (POCGH) in the tilted Fresnel transform (TFrT) domain. Modified Gerchberg- Saxton algorithms are used. The methods proposed here show great potential for 3D image projection, as the rotated images are no longer within the same two-dimensional plane. Due to the encrypted nature of the multiplexed images, a higher system security level can be also achieved. E. Swathika, N. Karthika, and B. Janet et.al [7] aim to develop an efficient encryption system that should accomplish confidentiality, integrity, and security and also prevents the access of images by unauthorized users. This system used two important techniques which are based on chaos theory namely: Confusion and Diffusion. This system also protects from statistical and differential attacks. Mathematical results showed that the security of the images has been preserved at a higher level and also prevents unauthorized access to sensitive information. Aryan et.al [8] proposed an extended Diffie-Hellman algorithm by using the concept of the Diffie-Hellman algorithm to get a stronger secret key. This secret key is further exchanged between the sender and the receiver so that for each message, a new secret shared key will be generated. This helps to avoid so many threats like Man in the middle attack, access denial, etc., that are present in the public channel while transmitting valuable information. COMPARISON OF REVIEW PAPERS YEAR AND WORK ALGORITHM/ METHOD USED DESCRIPTION LIMITATION RESULTS 2021 A Virtual Optical Holographic Encryption System Using Expanded Diffie-Hellman Algorithm EDH-C Using a complex function increases the security of encryption in the VOHE system. Key Calculation Complexity while using complex function EDH-C algorithm had higher security than DH in case of the unpredictability and complexity of the transmitted message over an insecure channel.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1433 2020 A VOHE system for underwater communications ERSA Performing VOHE encryption scheme for underwater communications. Data transmissions over multi-node network systems are not possible in this work Utilizing the optical and acoustic waves together provided high communication stability 2020 Optical encryption scheme for multiple- image based on spatially angular multiplexing and a computer-generated hologram Fresnel Transform Multiple images are encrypted synchronously with high efficiency Need multiple Keys Improved efficiency of information transmission and multi- user authentication 2019 A multi-user encryption and authentication system based on joint transform correlation JTC [Joint Transform Correlation] Multiple users utilize their fingerprints to encrypt the plain text in the encryption process Research only applies to Gray images. JTC-based image encryption system can avoid overlapping images at the output 2019 Quasi-noise free and detail preserved digital holographic reconstruction DH [Diffie- Hellman] combines automatic GrabCut and guided filtering to solve the problem of blurred image details in filtering reconstruction The segmentation is initialized by user interaction which may lead to bad segmentation if initialization quality is poor The algorithm is more prominent in terms of detail processing and background noise suppression 2019 Angle multiplexing optical image encryption in the Fresnel transform domain using a phase- only computer-generated hologram Modified GerchbergSaxt on algorithm A new angle multiplexing method, implemented by three different types of angle manipulation on the POCGH and/or image reconstruction planes The pixilation and scaling effects due to the rotation of the POCGH and the pixel response of the device on which the POCGH is displayed have not been considered yet The encrypted nature of the multiplexed images provides a higher system security level 2019 Image encryption and decryption using a chaotic system Chaos theory An efficient encryption system that accomplished confidentiality, integrity, and security and it also prevents the access of images by unauthorized users Complexity in choosing input parameters The security of the images has been preserved at a higher level and also prevents the unauthorized access to the sensitive information 2017 Enhanced Diffie-Hellman algorithm for reliable key exchange Enhanced DH Generates a stronger secret key by exchanging different keys for each message Key calculation complexity while taking roots Using different keys for each message preserves confidentiality 3. CONCLUSION This paper presented a review of the optical encryption and decryption schemes using different currently available techniques. Throughout the review, we can understand that optical encryption has emerged as a strong and challenging field during the last years. Different algorithms were introduced so that better security of data is possible while
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1434 transmission through an unsecured channel. Algorithms like RSA, ERSA, DH, EDH, etc., are used as encryption schemes in some methods. One of the latest algorithms EDH-C’s security evaluation was also studied during this review. Multiple image encryption system improves the efficiency of information transmission and multi-user authentication. Angle multiplexing provides a higher security level. This paper also gives a brief comparison between different optical encryption and decryption techniques. This conclusion is drawn based on the efficiency, accuracy, and computational complexity of these techniques. REFERENCES [1] Yang Peng, Tomoyuki Nagase, Oshiki Kanamoto ‘‘A Virtual Optical Holographic Encryption System Using Expanded Diffie-Hellman Algorithm,’’ Digital Object Identifier 10.1109/ACCESS. February 2021.3055866 [2] Y. Peng, T. Nagase, S. You, and T. Kanamoto, ‘‘A VOHE system for underwater communications,’’ Electronics, vol. 9, no. 10, p. 1557, Sep. 2020 [3] S. Xi, N. Yu, X. Wang, X. Wang, L. Lang, H. Wang, W. Liu, and H. Zhai, ‘‘Optical encryption scheme for multiple-image based on spatially angular multiplexing and computer-generated hologram,’’ Opt. Lasers Eng., vol. 127, Apr. 2020, Art. no. 105953. [4] T. Zhao and Y. Chi, ‘‘A multi-user encryption and authentication system based on joint transform correlation,’’ Entropy, vol. 21, no. 9, p. 850, Aug. 2019. [5] R. Ren, Z. Jia, J. Yang, N. K. Kasabov, and X. Huang, ‘‘Quasi-noise-free and detailpreserved digital holographic reconstruction,’’ IEEE Access, vol. 7, pp. 52155–52167, 2019. [6] H. T. Chang, Y.-T. Wang, and C.-Y. Chen, ‘‘Angle multiplexing optical image encryption in the Fresnel transform domain using a phase-only computer-generated hologram,’’ Photonics, vol. 7, no. 1, p. 1, Dec. 2019 [7] E. Swathika, N. Karthika, and B. Janet, ‘‘Image encryption and decryption using chaotic system,’’ in Proc. IEEE 9th Int. Conf. Adv. Comput. (IACC), Dec. 2019, pp. 30–37 [8] Aryan, ‘‘Enhanced Diffie-hellman algorithm for reliable key exchange,’’ 2017 IOP Conf. Ser.: Mater. Sci. Eng. 263 042015