A New Highly Secure Optical Image Security Technique Using Gyrator Transform for Image Security-Related Applications

被引:2
|
作者
Anusree, L. [1 ]
Rahiman, M. Abdul [2 ]
机构
[1] LBSITW, Dept Elect & Commun Engn, Thiruvananthapuram, Kerala, India
[2] LBSCST, Thiruvananthapuram, Kerala, India
关键词
ENCRYPTION; DCT; CODE;
D O I
10.1155/2022/6165901
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
New methods and apparatuses for information security have evolved as a result of the rapid expansion of optical information processing. Security is one of the major issues in digital image transmission because it can deliver very secret information to any corresponding agency such as the military, biomedical, and security agencies. Previously, various techniques are proposed to perform optical image encryption techniques using different transformation and pixel-level techniques. Each work has its advantages and disadvantages in terms of computational complexity, security level, flexibility, quality, and so on. To overcome the security issues present in the previous works, a novel optical image encryption standard is proposed in this paper. This work uses information hiding followed by image encryption using Gyrator Transform (GT) using mean gradient key-based block swapping techniques. The main advantage of this work is that the key generation is dynamic and it depends upon the pixel intensity of 8 x 8 blocks. Secret information hiding is performed in the Discrete Cosine Transform (DCT) domain to protect the data against noise attacks. To analyze the performance, various evaluation metrics are used to measure the quality of the decrypted image under various distortions such as cropping and rotation. The robustness of information hiding is analyzed using a noise attack on the received image. This work achieved 45.6 dB of Peak Signal-to-Noise Ratio (PSNR) and 0.965 of Structural Similarity Index (SSIM), which is the best when compared to the conventional image encryption standards.
引用
收藏
页数:16
相关论文
共 50 条
  • [21] Enhancement of Security Using Structured Phase Masked in Optical Image Encryption on Fresnel Transform Domain
    Yadav, Poonam Lata
    Singh, Hukum
    2ND INTERNATIONAL CONFERENCE ON CONDENSED MATTER AND APPLIED PHYSICS (ICC-2017), 2018, 1953
  • [22] A spiral-phase rear mounted triple masking for secure optical image encryption based on gyrator transform
    Khurana M.
    Singh H.
    Recent Patents on Computer Science, 2019, 12 (02) : 80 - 94
  • [23] Security Model for Secure Transmission of Medical Image Data Using Steganography
    Umeda, Tokuo
    Okawa, Akiko
    Gomi, Tsutomu
    INTEGRATING INFORMATION TECHNOLOGY AND MANAGEMENT FOR QUALITY OF CARE, 2014, 202 : 311 - 311
  • [24] Image recognition for security verification using real-time joint transform correlation with scanning technique
    Doh, KB
    Ohn, J
    Poon, TC
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 780 - 787
  • [25] Design a new scheme for image security using a deep learning technique of hierarchical parameters
    Khazaal, Yasmine M.
    Falih, Mohanaed Ajmi
    Majeed, Abbas Hamid
    OPEN ENGINEERING, 2024, 14 (01):
  • [26] Secure image encryption technique based on jigsaw transform and chaotic scrambling using digital image watermarking
    Arora, Monika
    Khurana, Mehak
    OPTICAL AND QUANTUM ELECTRONICS, 2020, 52 (02)
  • [27] Secure image encryption technique based on jigsaw transform and chaotic scrambling using digital image watermarking
    Monika Arora
    Mehak Khurana
    Optical and Quantum Electronics, 2020, 52
  • [28] Highly Secure Image Steganography Algorithm using Curvelet Transform and DCT Encryption
    ElSayed, Ahmed
    Elleithy, Abdelrahman
    Thunga, Prasanthi
    Wu, Zhengping
    2015 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE (LISAT), 2015,
  • [29] Security in Telehealth Applications: Issues in Medical Image Watermarking Scheme through the Shearlet Transform
    Al-Azzawi, Nemir Ahmed
    INTERNATIONAL CONFERENCE OF INFORMATION AND COMMUNICATION TECHNOLOGY (ICICT 2019), 2019, : 160 - 164
  • [30] Secure Image Restoration and Contrast Enhancement Using Wavelet Transform and Thresholding Technique
    Singh, Kumari Suniti
    Mishra, Yogesh Kumar
    Singh, Harsh Vikram
    ADVANCES IN VLSI, COMMUNICATION, AND SIGNAL PROCESSING, 2020, 587 : 829 - 839