Two level phase retrieval in fractional Hartley domain for secure image encryption and authentication using digital signatures

被引:10
|
作者
Khurana, Mehak [1 ]
Singh, Hukum [2 ]
机构
[1] NorthCap Univ, Dept Comp Sci, Gurugram, India
[2] NorthCap Univ, Dept Appl Sci, Gurugram, India
关键词
Phase retrieval algorithm; Fractional Hartley transform; Convergence criteria; Digital signatures; GERCHBERG-SAXTON ALGORITHM; OPTICAL ENCRYPTION; FOURIER; ATTACK; AMPLITUDE; SCHEME; TRANSFORMS; INTERFERENCE; COMPRESSION; MODULATION;
D O I
10.1007/s11042-020-08658-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A novel image authentication scheme based on two level phase retrieval algorithm (PRA) propagated in fractional Hartley transform (FrHT) to extract two phase-only masks (POMs) is proposed. PRA is based on iterative phase mask which uses nonlinear process to generate POMs which in turn makes the system immune to chosen plaintext attack (CPA) and known plaintext attack (KPA). Random amplitude mask (RAM) and random phase mask (RPM) are used as encryption keys which makes the system immune to special attack. Further multiple level of security leads to the achievement of non-convergence of MSE and good performance in the retrieval process. Apart from encrypting the information, authentication has also been included in the scheme. The features incorporated in any plaintext have been shown to provide unique signatures, which can be used to verify their authenticity. The content of the original images can be authenticated only if the authentication key is correct. The robustness of the proposed multiple level cryptosystem has been examined based on various parameters by simulating on MATLAB 9.4.0 (R2018a). The experimental results highlight the suitability and shows the attacker cannot recover the original image without the knowledge of POMs. The scheme has also been compared with similar algorithms which proves that the proposed two-level scheme is more secure, feasible and effective.
引用
收藏
页码:13967 / 13986
页数:20
相关论文
共 50 条
  • [1] Two level phase retrieval in fractional Hartley domain for secure image encryption and authentication using digital signatures
    Mehak Khurana
    Hukum Singh
    Multimedia Tools and Applications, 2020, 79 : 13967 - 13986
  • [2] Color image encryption using affine transform in fractional Hartley domain
    Singh, Phool
    Yadav, A. K.
    Singh, Kehar
    OPTICA APPLICATA, 2017, 47 (03) : 421 - 433
  • [3] Phase image encryption in the fractional Hartley domain using Arnold transform and singular value decomposition
    Singh, Phool
    Yadav, A. K.
    Singh, Kehar
    OPTICS AND LASERS IN ENGINEERING, 2017, 91 : 187 - 195
  • [4] Double image encryption method using the Arnold transform in the fractional Hartley domain
    Vilardy, Juan M.
    Torres, Cesar O.
    Jimenez, Carlos J.
    8TH IBEROAMERICAN OPTICS MEETING AND 11TH LATIN AMERICAN MEETING ON OPTICS, LASERS, AND APPLICATIONS, 2013, 8785
  • [5] Asymmetric double-image encryption using twin decomposition in fractional Hartley domain
    Kumar, Jaideep
    Singh, Phool
    Yadav, A. K.
    OPTICA APPLICATA, 2022, 52 (01) : 21 - 35
  • [6] Secure Image Encryption and Authentication using the Photon Counting Technique in the Gyrator Domain
    Juan, M. Vilardy O.
    Millan, Maria S.
    Perez-Cabre, Elisabet
    2015 20TH SYMPOSIUM ON SIGNAL PROCESSING, IMAGES AND COMPUTER VISION (STSIVA), 2015,
  • [7] Optical Image Encryption in the Fractional Hartley Domain, Using Arnold Transform and Singular Value Decomposition
    Singh, Phool
    Yadav, A. K.
    Singh, Kehar
    Saini, Indu
    MATHEMATICAL SCIENCES AND ITS APPLICATIONS, 2017, 1802
  • [8] Column Level Image Authentication Technique using Hidden Digital Signatures
    Khan, Sahib
    Wahid, Muneeza
    Khan, Tawab
    Ahmad, Nasir
    Zafar, Muhammad Haseeb
    2018 24TH IEEE INTERNATIONAL CONFERENCE ON AUTOMATION AND COMPUTING (ICAC' 18), 2018, : 107 - 112
  • [9] Digital Image Authentication and Encryption using Digital Signature
    Alam, Shahzad
    Jamil, Amir
    Saldhi, Ankur
    Ahmad, Musheer
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER ENGINEERING AND APPLICATIONS (ICACEA), 2015, : 332 - 336
  • [10] Double-image encryption by iterative phase retrieval algorithm in fractional Fourier domain
    Li, Huijuan
    Wang, Yurong
    JOURNAL OF MODERN OPTICS, 2008, 55 (21) : 3601 - 3609