共 58 条
Mixed-multiple image encryption algorithm using RSA cryptosystem with fractional discrete cosine transform and 2D-Arnold Transform
被引:2
作者:
Kumar, Yashavant
[1
]
Guleria, Vandana
[1
]
机构:
[1] Birla Inst Technol Mesra, Dept Math, Ranchi 835215, India
关键词:
Mixed image elements;
RSA cryptosystem;
Big image;
Fractional discrete cosine transform;
Mixed image;
2D-Arnold Transform;
OPTICAL ENCRYPTION;
ARNOLD TRANSFORM;
CHAOTIC SYSTEM;
MAP;
TRUNCATION;
SECURITY;
DOMAIN;
D O I:
10.1007/s11042-023-16953-y
中图分类号:
TP [自动化技术、计算机技术];
学科分类号:
0812 ;
摘要:
This paper presents a novel multiple-image encryption (MIE) technique based on mixed image elements associated with RSA cryptosystem, fractional discrete cosine transform (FrDCT) and 2D-Arnold transform (AT). Firstly, we combine k-original images into a big image using knowledge of matrix theory. The big image is extracted into three components, i.e., red (R), green (G) and blue (B). The RSA cryptographic scheme is applied to each component R, G and B individually. Secondly, the FrDCT is used on each component with individual fractions. Thirdly, the 2D-AT is applied on three components to enhance the security as well as the key space. Finally, three components are concatenated to generate a final encrypted image. The resulting cipher image is a single-channel real-valued image that is easy to display, store and transmit over an unsecured network. The proposed algorithm offers multi-layered security in frequency, time and coordinate domains. Security of the presented MIE technique depends on both secrete keys and their proper arrangement. Simulation analysis and their results support the robustness and appropriateness of the introduced encryption technique. Sensitivity analysis confirms that the introduced technique is extremely sensitive to its private keys and their arrangement. The effectiveness and viability of our proposed cryptosystem are confirmed by statistical analysis, including MSE, PSNR, SSIM, entropy analysis, noise attack, correlation coefficient, occlusion attack analysis, histogram analysis, UACI, NPCR, classic types of attacks and comparison analysis. The proposed algorithm is proved to be very effective and secure for real-world image encryption, which is supported by the experimental results and algorithm analysis.
引用
收藏
页码:38055 / 38081
页数:27
相关论文