Research on High Robust Multimedia Image Encryption Based on Gyrator Transform Domain Model

被引:2
作者
Cheng X. [1 ]
机构
[1] School of Mathematics and Computer Science, Shaanxi University of Technology, Hanzhong
关键词
Cryptography;
D O I
10.1155/2021/2225114
中图分类号
学科分类号
摘要
The encryption and privacy protection of multimedia image resources are of great value in the information age. The utilization of the gyrator transform domain model in multimedia image encryption can select parameters more accurately, so it has a wider scope of utilization and further ameliorates the stability of the whole system. On account of this, this paper first analyzes the concept and connotation of gyrator transform, then studies the image encryption algorithm on account of gyrator transform, and verifies the robustness of the gyrator transform algorithm under the influence of noise interference, shear attack, and other factors through the high robust multimedia image encryption and result analysis of gyrator transform. © 2021 Xiaojing Cheng.
引用
收藏
相关论文
共 15 条
  • [1] Faragallah O.S., Afifi A., Optical color image cryptosystem using chaotic baker mapping based-double random phase encoding, Optical and Quantum Electronics, 49, 3, pp. 1003-1012, (2017)
  • [2] Giuliano G.L., Miranda P.J., Lyapunov exponent for Lipschitz maps, Nonlinear Dynamics, 92, 3, pp. 1217-1224, (2018)
  • [3] Muhammad R.A., An asymmetric single-channel color image encryption on account of hartley transform and gyrator transforms, Optics & Lasers in Engineering, 69, 8, pp. 49-57, (2016)
  • [4] Lee C.C., Mandangana A., Muhamad Azlan D., Che Haziqah Che H., On the efficiency of the image encryption and decryption by using logistic - Sine chaotic system and logistic-tent chaotic-system, AIP Conference Proceedings, 18, 1, pp. 1-7, (2017)
  • [5] Tan Y., Tang P., Xia J., Research on panoramic image enhancement algorithm on account of adaptive guided filtering, Journal of Jinggangshan University (Natural Science Edition), 39, 4, pp. 34-42, (2018)
  • [6] Isha M., Sudheesh K.R., Naveen K., Cryptanalysis of an image encryption scheme on account of joint transform correlator with amplitudeand phase-truncation approach, Optics and Lasers in Engineering, 52, 9, pp. 167-173, (2014)
  • [7] Wang X.H., Sun Y.Q., Region of interest watermarking algorithm on account of QR code and schur decomposition, Photoelectron Laser, 28, 4, pp. 419-425, (2017)
  • [8] Singh H., Yadav A.K., Vashisth S., Optical image encryption using Devil's vortex toroidal lens in the fresnel transform domain, International Journal of Optics, 129, 10, pp. 101-109, (2015)
  • [9] Chen L., He B., Chen X., Gao X., Liu J., Optical image encryption on account of multi-beam interference and common vector decomposition, Optics Communications, 361, 15, pp. 6-12, (2016)
  • [10] Tu Z.H.W., Jin C., Applicable to pixel exclusive or image block encryption algorithm for android phones, Electronic Measurement Technology, 38, 10, pp. 46-52, (2015)