共 49 条
Double-image encryption based on interference and logistic map under the framework of double random phase encoding
被引:63
作者:
Sui Liansheng
[1
,2
]
Du Cong
[1
]
Zhang Xiao
[1
]
Tian Ailing
[3
]
Anand, Asundi
[4
]
机构:
[1] Xian Univ Technol, Sch Comp Sci & Engn, Xian 710048, Shaanxi, Peoples R China
[2] Shaanxi Key Lab Network Comp & Secur Technol, Xian 710048, Shaanxi, Peoples R China
[3] Xian Technol Univ, Shaanxi Prov Key Lab Thin Film Technol & Opt Test, Xian 710048, Shaanxi, Peoples R China
[4] Nanyang Technol Univ, Sch Mech & Aerosp Engn, Singapore 639798, Singapore
关键词:
Double-image encryption;
Logistic map;
Interference;
RETRIEVAL ALGORITHM;
AUTHENTICATION;
TRANSFORM;
SCHEME;
DECOMPOSITION;
DIFFRACTION;
TRANSPORT;
ATTACK;
MASK;
D O I:
10.1016/j.optlaseng.2019.06.005
中图分类号:
O43 [光学];
学科分类号:
070207 ;
0803 ;
摘要:
A novel double-image encryption approach has been proposed based on optical interference and logistic map. Initially, original images are rearranged into two scrambled components with the use of the random sequence engendered based on the logistic map with the given conditions such as initial value and bifurcate parameter. One component is used as the input image of the framework of double random phase encoding and encrypted into the ciphertext. Another is decomposed into two phase masks, which are placed into the input plane and transform plane of double random phase encoding, respectively. To strength the nonlinearity of the cryptosystem, these phase masks considered as the main secret keys are further encoded by the aid of two random sequences. Because these keys are produced in the encryption process and directly related to original images, the proposed scheme has high resistance against the potential attacks such as chosen plaintext attack. Meanwhile, the parameters such as wavelength, axial distance, and conditions of the logistic map are considered as additional keys, which can enhance the security level further. Most importantly, the annoying silhouette problem existed in the interference-based encryption methods can be avoided effectively. A set of numerical simulations are presented to demonstrate the validity and feasibility of the proposed technique.
引用
收藏
页码:113 / 122
页数:10
相关论文