Two level phase retrieval in fractional Hartley domain for secure image encryption and authentication using digital signatures

被引:10
|
作者
Khurana, Mehak [1 ]
Singh, Hukum [2 ]
机构
[1] NorthCap Univ, Dept Comp Sci, Gurugram, India
[2] NorthCap Univ, Dept Appl Sci, Gurugram, India
关键词
Phase retrieval algorithm; Fractional Hartley transform; Convergence criteria; Digital signatures; GERCHBERG-SAXTON ALGORITHM; OPTICAL ENCRYPTION; FOURIER; ATTACK; AMPLITUDE; SCHEME; TRANSFORMS; INTERFERENCE; COMPRESSION; MODULATION;
D O I
10.1007/s11042-020-08658-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A novel image authentication scheme based on two level phase retrieval algorithm (PRA) propagated in fractional Hartley transform (FrHT) to extract two phase-only masks (POMs) is proposed. PRA is based on iterative phase mask which uses nonlinear process to generate POMs which in turn makes the system immune to chosen plaintext attack (CPA) and known plaintext attack (KPA). Random amplitude mask (RAM) and random phase mask (RPM) are used as encryption keys which makes the system immune to special attack. Further multiple level of security leads to the achievement of non-convergence of MSE and good performance in the retrieval process. Apart from encrypting the information, authentication has also been included in the scheme. The features incorporated in any plaintext have been shown to provide unique signatures, which can be used to verify their authenticity. The content of the original images can be authenticated only if the authentication key is correct. The robustness of the proposed multiple level cryptosystem has been examined based on various parameters by simulating on MATLAB 9.4.0 (R2018a). The experimental results highlight the suitability and shows the attacker cannot recover the original image without the knowledge of POMs. The scheme has also been compared with similar algorithms which proves that the proposed two-level scheme is more secure, feasible and effective.
引用
收藏
页码:13967 / 13986
页数:20
相关论文
共 50 条
  • [41] An Image Authentication Technique in Frequency Domain Using Secure Hash Algorithm (FDSHA)
    Nag, Amitava
    Biswas, Debasish
    Ghosh, Soumadip
    Biswas, Sushanta
    Sarkar, Debasree
    Sarkar, Partha Pratim
    ADVANCES IN COMPUTING, COMMUNICATION AND CONTROL, 2011, 125 : 335 - +
  • [42] Secure and Robust Digital Image Watermarking Using Coefficient Differencing and Chaotic Encryption
    Loan, Nazir A.
    Hurrah, Nasir N.
    Parah, Shabir A.
    Lee, Jong Weon
    Sheikh, Javaid A.
    Bhat, G. Mohiuddin
    IEEE ACCESS, 2018, 6 : 19876 - 19897
  • [43] Secure and robust digital image watermarking scheme using logistic and RSA encryption
    Liu, Yang
    Tang, Shanyu
    Liu, Ran
    Zhang, Liping
    Ma, Zhao
    EXPERT SYSTEMS WITH APPLICATIONS, 2018, 97 : 95 - 105
  • [44] Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain
    Meng, X. F.
    Cai, L. Z.
    Wang, Y. R.
    Yang, X. L.
    Xu, X. F.
    Dong, G. Y.
    Shen, X. X.
    Zhang, H.
    Cheng, X. C.
    JOURNAL OF OPTICS A-PURE AND APPLIED OPTICS, 2007, 9 (11): : 1070 - 1075
  • [45] Digital Biometric Facial Image Encryption using Chaotic Cellular Automata for Secure Image Storages
    Cheepchol, S.
    San-Um, W.
    Kiattisin, S.
    Leelasantitham, A.
    2014 FOURTH JOINT INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONIC AND ELECTRICAL ENGINEERING (JICTEE 2014), 2014,
  • [46] Multilevel image authentication using shared secret threshold and phase retrieval
    Pan, Xuemei
    Meng, Xiangfeng
    Wang, Yurong
    Yang, Xiulun
    Peng, Xiang
    He, Wenqi
    Dong, Guoyan
    Chen, Hongyi
    JOURNAL OF MODERN OPTICS, 2014, 61 (18) : 1470 - 1478
  • [47] Digital Image Watermarking Scheme in Wavelet Domain Using Chaotic Encryption
    Khare, Priyank
    Verma, Alok Kumar
    Srivastava, V. K.
    2014 STUDENTS CONFERENCE ON ENGINEERING AND SYSTEMS (SCES), 2014,
  • [48] Unsymmetric Image Encryption Using Lower-Upper Decomposition and Structured Phase Mask in the Fractional Fourier Domain
    Yadav S.
    Singh H.
    Recent Advances in Computer Science and Communications, 2021, 14 (08) : 2689 - 2702
  • [49] Watermarking image encryption using deterministic phase mask and singular value decomposition in fractional Mellin transform domain
    Singh, Hukum
    IET IMAGE PROCESSING, 2018, 12 (11) : 1994 - 2001
  • [50] Optical double image security using random phase fractional Fourier domain encoding and phase-retrieval algorithm
    Rajput, Sudheesh K.
    Nishchal, Naveen K.
    OPTICS COMMUNICATIONS, 2017, 388 : 38 - 46