A New Highly Secure Optical Image Security Technique Using Gyrator Transform for Image Security-Related Applications

被引:2
|
作者
Anusree, L. [1 ]
Rahiman, M. Abdul [2 ]
机构
[1] LBSITW, Dept Elect & Commun Engn, Thiruvananthapuram, Kerala, India
[2] LBSCST, Thiruvananthapuram, Kerala, India
关键词
ENCRYPTION; DCT; CODE;
D O I
10.1155/2022/6165901
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
New methods and apparatuses for information security have evolved as a result of the rapid expansion of optical information processing. Security is one of the major issues in digital image transmission because it can deliver very secret information to any corresponding agency such as the military, biomedical, and security agencies. Previously, various techniques are proposed to perform optical image encryption techniques using different transformation and pixel-level techniques. Each work has its advantages and disadvantages in terms of computational complexity, security level, flexibility, quality, and so on. To overcome the security issues present in the previous works, a novel optical image encryption standard is proposed in this paper. This work uses information hiding followed by image encryption using Gyrator Transform (GT) using mean gradient key-based block swapping techniques. The main advantage of this work is that the key generation is dynamic and it depends upon the pixel intensity of 8 x 8 blocks. Secret information hiding is performed in the Discrete Cosine Transform (DCT) domain to protect the data against noise attacks. To analyze the performance, various evaluation metrics are used to measure the quality of the decrypted image under various distortions such as cropping and rotation. The robustness of information hiding is analyzed using a noise attack on the received image. This work achieved 45.6 dB of Peak Signal-to-Noise Ratio (PSNR) and 0.965 of Structural Similarity Index (SSIM), which is the best when compared to the conventional image encryption standards.
引用
收藏
页数:16
相关论文
共 50 条
  • [31] Enhancing the Security and Quality of Image Steganography Using a Novel Hybrid Technique
    Verma, Vaidehi
    Ozha, Trapti
    SMART TRENDS IN INFORMATION TECHNOLOGY AND COMPUTER COMMUNICATIONS, SMARTCOM 2016, 2016, 628 : 668 - 673
  • [32] Security enhancement for watermarking technique using content based image segmentation
    Suhail, M. A.
    Obaidat, M. S.
    2007 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2007, : 772 - +
  • [33] Discrete Gyrator Transform Based Optical Image Encryption and Decryption using Double Random Phase Mask
    Karpagam, S.
    Sudheer, S. K.
    Pillai, V. P. Mahadevan
    2013 4TH INTERNATIONAL WORKSHOP ON FIBER OPTICS IN ACCESS NETWORK (FOAN), 2013,
  • [34] Optical security device using latent image in liquid crystal cell
    Yamaguchi, Rumiko
    Kyokai Joho Imeji Zasshi/Journal of the Institute of Image Information and Television Engineers, 2009, 63 (10): : 1370 - 1371
  • [35] An asymmetric optical cryptosystem of double image encryption based on optical vortex phase mask using gyrator transform domain
    Singh H.
    Khurana M.
    Recent Advances in Computer Science and Communications, 2020, 13 (04) : 672 - 685
  • [36] Security Analysis on Privacy-Secure Image Trading Framework Using Blind Watermarking
    Okada, Mitsuo
    Okabe, Yasuo
    Uehara, Tetsutaro
    2009 9TH ANNUAL INTERNATIONAL SYMPOSIUM ON APPLICATIONS AND THE INTERNET, 2009, : 243 - +
  • [37] Double-image encryption by using chaos-based local pixel scrambling technique and gyrator transform
    Li, Huijuan
    Wang, Yurong
    Yan, Haitao
    Li, Liben
    Li, Qiuze
    Zhao, Xiaoyan
    OPTICS AND LASERS IN ENGINEERING, 2013, 51 (12) : 1327 - 1331
  • [38] Asymmetric-image verification for security optical systems based on joint transform correlator architecture
    Chang, HT
    Chen, CT
    OPTICAL INFORMATION SYSTEMS, 2003, 5202 : 320 - 329
  • [39] Lightweight Encryption Technique to Enhance Medical Image Security on Internet of Medical Things Applications
    Hasan, Mohammad Kamrul
    Islam, Shayla
    Sulaiman, Rossilawati
    Khan, Sheroz
    Hashim, Aisha-Hassan Abdalla
    Habib, Shabana
    Islam, Mohammad
    Alyahya, Saleh
    Ahmed, Musse Mohamed
    Kamil, Samar
    Hassan, Md Arif
    IEEE ACCESS, 2021, 9 : 47731 - 47742
  • [40] Asymmetric-image verification for security optical systems based on joint transform correlator architecture
    Chang, HT
    Chen, CT
    OPTICS COMMUNICATIONS, 2004, 239 (1-3) : 43 - 54