Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram

被引:211
作者
Yu, Chuying [1 ]
Li, Jianzhong [2 ]
Li, Xuan [3 ]
Ren, Xuechang [4 ]
Gupta, B. B. [5 ]
机构
[1] Hanshan Normal Univ, Sch Phys & Elect Engn, Chaozhou, Peoples R China
[2] Hanshan Normal Univ, Coll Math & Stat, Chaozhou, Peoples R China
[3] Fujian Normal Univ, Sch Software, Fuzhou, Fujian, Peoples R China
[4] Xiamen Univ, Dept Phys & Mech & Elect Engn, Xiamen, Peoples R China
[5] Natl Inst Technol Kurukshetra, Kurukshetra, Haryana, India
关键词
Image encryption; Quaternion Fresnel transform; Computer generated hologram; Logistic-adjusted-Sine map; COLOR IMAGE ENCRYPTION; DOMAIN; ALGORITHM; EFFICIENT; SHIFT;
D O I
10.1007/s11042-017-4637-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A novel four-image encryption scheme based on the quaternion Fresnel transforms (QFST), computer generated hologram and the two-dimensional (2D) Logistic-adjusted-Sine map (LASM) is presented. To treat the four images in a holistic manner, two types of the quaternion Fresnel transform (QFST) are defined and the corresponding calculation method for a quaternion matrix is derived. In the proposed method, the four original images, which are represented by quaternion algebra, are processed holistically in a vector manner by using QFST first. Then the input complex amplitude, which is constructed by the components of the QFST-transformed plaintext images, is encoded by Fresnel transform with two virtual independent random phase masks (RPM). In order to avoid sending entire RPMs to the receiver side for decryption, the RPMs are generated by utilizing 2D-LASM, which results that the amount of the key data is reduced dramatically. Subsequently, by using Burch's method and the phase-shifting interferometry, the encrypted computer generated hologram is fabricated. To improve the security and weaken the correlation, the encrypted hologram is scrambled base on 2D-LASM. Experiments demonstrate the validity of the proposed image encryption technique.
引用
收藏
页码:4585 / 4608
页数:24
相关论文
共 28 条
  • [1] A novel scheme for image encryption based on 2D piecewise chaotic maps
    Akhshani, A.
    Behnia, S.
    Akhavan, A.
    Abu Hassan, H.
    Hassan, Z.
    [J]. OPTICS COMMUNICATIONS, 2010, 283 (17) : 3259 - 3266
  • [2] Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms
    Belazi, Akram
    El-Latif, Ahmed A. Abd
    Diaconu, Adrian-Viorel
    Rhouma, Rhouma
    Belghith, Safya
    [J]. OPTICS AND LASERS IN ENGINEERING, 2017, 88 : 37 - 50
  • [3] Phase-shift extraction and wave-front reconstruction in phase-shifting interferometry with arbitrary phase steps
    Cai, LZ
    Liu, Q
    Yang, XL
    [J]. OPTICS LETTERS, 2003, 28 (19) : 1808 - 1810
  • [4] Color Image Analysis by Quaternion-Type Moments
    Chen, Beijing
    Shu, Huazhong
    Coatrieux, Gouenou
    Chen, Gang
    Sun, Xingming
    Coatrieux, Jean Louis
    [J]. JOURNAL OF MATHEMATICAL IMAGING AND VISION, 2015, 51 (01) : 124 - 144
  • [5] Hypercomplex Fourier transforms of color images
    Ell, Todd A.
    Sangwine, Stephen J.
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2007, 16 (01) : 22 - 35
  • [6] Enabling Semantic Search Based on Conceptual Graphs over Encrypted Outsourced Data
    Fu, Zhangjie
    Huang, Fengxiao
    Sun, Xingming
    Vasilakos, Athanasios V.
    Yang, Ching-Nung
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2019, 12 (05) : 813 - 823
  • [7] Gonzalez R. C., 2007, DIGITAL IMAGE PROCES
  • [8] Image encryption using 2D Logistic-adjusted-Sine map
    Hua, Zhongyun
    Zhou, Yicong
    [J]. INFORMATION SCIENCES, 2016, 339 : 237 - 253
  • [9] Disequilibrium-induced initial Os isotopic heterogeneity in gram aliquots of single basaltic rock powders: Implications for dating and source tracing
    Li, Jie
    Wang, Xuan-Ce
    Xu, Ji-Feng
    Xu, Yi-Gang
    Tang, Gong-Jian
    Wang, Qiang
    [J]. CHEMICAL GEOLOGY, 2015, 406 : 10 - 17
  • [10] Identity-Based Encryption with Outsourced Revocation in Cloud Computing
    Li, Jin
    Li, Jingwei
    Chen, Xiaofeng
    Jia, Chunfu
    Lou, Wenjing
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (02) : 425 - 437