Nonlinear QR code based optical image encryption using spiral phase transform, equal modulus decomposition and singular value decomposition

被引:34
作者
Kumar, Ravi [1 ]
Bhaduri, Basanta [1 ]
Nishchal, Naveen K. [2 ]
机构
[1] Indian Sch Mines, Indian Inst Technol, Dept Appl Phys, Opt Imaging & Image Proc Lab, Dhanbad 826004, Jharkhand, India
[2] Indian Inst Technol Patna, Dept Phys, Patna 801106, Bihar, India
关键词
spiral phase transform; optical image encryption; QR code; singular value decomposition; FULLY PHASE; COHERENT SUPERPOSITION; FRACTIONAL FOURIER; GYRATOR TRANSFORM; PLAINTEXT ATTACK; INTERFERENCE; DEMODULATION; HARTLEY; SCHEME;
D O I
10.1088/2040-8986/aa9943
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
In this study, we propose a quick response (QR) code based nonlinear optical image encryption technique using spiral phase transform (SPT), equal modulus decomposition (EMD) and singular value decomposition (SVD). First, the primary image is converted into a QR code and then multiplied with a spiral phase mask (SPM). Next, the product is spiral phase transformed with particular spiral phase function, and further, the EMD is performed on the output of SPT, which results into two complex images, Z(1) and Z(2). Among these, Z(1) is further Fresnel propagated with distance d, and Z(2) is reserved as a decryption key. Afterwards, SVD is performed on Fresnel propagated output to get three decomposed matrices i. e. one diagonal matrix and two unitary matrices. The two unitary matrices are modulated with two different SPMs and then, the inverse SVD is performed using the diagonal matrix and modulated unitary matrices to get the final encrypted image. Numerical simulation results confirm the validity and effectiveness of the proposed technique. The proposed technique is robust against noise attack, specific attack, and brutal force attack. Simulation results are presented in support of the proposed idea.
引用
收藏
页数:10
相关论文
共 54 条
[1]   SINGULAR VALUE DECOMPOSITIONS AND DIGITAL IMAGE-PROCESSING [J].
ANDREWS, HC ;
PATTERSON, CL .
IEEE TRANSACTIONS ON ACOUSTICS SPEECH AND SIGNAL PROCESSING, 1976, 24 (01) :26-53
[2]   Fault tolerances using toroidal zone plate encryption [J].
Barrera, JF ;
Henao, R ;
Torroba, R .
OPTICS COMMUNICATIONS, 2005, 256 (4-6) :489-494
[3]   Optical encryption method using toroidal zone plates [J].
Barrera, JF ;
Henao, R ;
Torroba, R .
OPTICS COMMUNICATIONS, 2005, 248 (1-3) :35-40
[4]   Security-enhanced asymmetric optical cryptosystem based on coherent superposition and equal modulus decomposition [J].
Cai, Jianjun ;
Shen, Xueju ;
Lin, Chao .
OPTICS COMMUNICATIONS, 2016, 359 :26-30
[5]   Asymmetric optical cryptosystem based on coherent superposition and equal modulus decomposition [J].
Cai, Jianjun ;
Shen, Xueju ;
Lei, Ming ;
Lin, Chao ;
Dou, Shuaifeng .
OPTICS LETTERS, 2015, 40 (04) :475-478
[6]   Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys [J].
Carnicer, A ;
Montes-Usategui, M ;
Arcos, S ;
Juvells, I .
OPTICS LETTERS, 2005, 30 (13) :1644-1646
[7]   Asymmetric optical cryptosystem for color image based on equal modulus decomposition in gyrator transform domains [J].
Chen, Hang ;
Tanougast, Camel ;
Liu, Zhengjun ;
Sieler, Loic .
OPTICS AND LASERS IN ENGINEERING, 2017, 93 :1-8
[8]   Image encryption based on singular value decomposition and Arnold transform in fractional domain [J].
Chen, Linfei ;
Zhao, Daomu ;
Ge, Fan .
OPTICS COMMUNICATIONS, 2013, 291 :98-103
[9]   Advances in optical security systems [J].
Chen, Wen ;
Javidi, Bahram ;
Chen, Xudong .
ADVANCES IN OPTICS AND PHOTONICS, 2014, 6 (02) :120-155
[10]   Space-based optical image encryption [J].
Chen, Wen ;
Chen, Xudong .
OPTICS EXPRESS, 2010, 18 (26) :27095-27104