Triple-level cryptosystem using deterministic masks and modified gerchberg-saxton iterative algorithm in fractional Hartley domain by positioning singular value decomposition

被引:15
作者
Girija, R. [1 ]
Singh, Hukum [2 ]
机构
[1] NorthCap Univ, Dept Comp Sci, Gurugram, India
[2] NorthCap Univ, Dept Appl Sci, Gurugram, India
来源
OPTIK | 2019年 / 187卷
关键词
MGSIA; DMK; SVD; Triple-level encryption; Cipher image; OPTICAL-IMAGE ENCRYPTION; MELLIN TRANSFORM; PHASE MASK; COMPRESSION; SCHEME; SYSTEM; VORTEX; PLANE;
D O I
10.1016/j.ijleo.2019.04.090
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
We present a novel method for image encryption by Modified Gerchberg-Saxton Iterative Algorithm (MGSIA) using deterministic masks (DMKs) and singular value decomposition (SVD) in fractional Hartley transform (FrHT) domain. This proposal delivers triple-level encryption (L1, L2 and L3) and all these three levels can be iterated number of times. First and third level of encryption routines MGSIA, DMK and FrHT, whereas mid-level encryption uses SVD. Since L1 delivers single cipher image and L3 yields double cipher images, this technique is also known as multiple image encryption system. Each MGSIA generates private keys and these keys are engendered in such a way that decryption is to be expected with traditional DRPE system. Because of the nature of these two asymmetric keys, the proposed system is non-linear and by the way, it boosts security. In the place of traditional random phase masks, the proposed cryptosystem uses statistically independent deterministic masks in L1 and L3. DMKs are nothing but the class of structured phase masks. DMKs are generated and used as the phase for MGSIA in L1 and L3. These DMKs are formed by the deviation from conventional rectangular function and limited range values which delivers key components with reduced size, better performance and lower complexity. Deployment of SVD on L2 decomposes the cipher image1 into three components and out of these three components, due to the nature of diagonality, S components plays a major role in proposed work. Numerical simulations have been achieved to prove the strength and feasibility of the proposed scheme.
引用
收藏
页码:238 / 257
页数:20
相关论文
共 57 条
[1]   Optical image compression and encryption methods [J].
Alfalou, A. ;
Brosseau, C. .
ADVANCES IN OPTICS AND PHOTONICS, 2009, 1 (03) :589-636
[2]  
[Anonymous], 1996, Opt. Eng
[3]   Fault tolerances using toroidal zone plate encryption [J].
Barrera, JF ;
Henao, R ;
Torroba, R .
OPTICS COMMUNICATIONS, 2005, 256 (4-6) :489-494
[4]   Optical encryption method using toroidal zone plates [J].
Barrera, JF ;
Henao, R ;
Torroba, R .
OPTICS COMMUNICATIONS, 2005, 248 (1-3) :35-40
[5]   Optical image encryption with Hartley transforms [J].
Chen, Linfei ;
Zhao, Daomu .
OPTICS LETTERS, 2006, 31 (23) :3438-3440
[6]   Fractional-Fourier-transform calculation through the fast-Fourier-transform algorithm [J].
Garcia, J ;
Mas, D ;
Dorsch, RG .
APPLIED OPTICS, 1996, 35 (35) :7013-7018
[7]  
GERCHBERG RW, 1972, OPTIK, V35, P237
[8]   Enhancing Security of Double Random Phase Encoding Based on Random S-Box [J].
Girija, R. ;
Singh, Hukum .
3D RESEARCH, 2018, 9 (02)
[9]   A cryptosystem based on deterministic phase masks and fractional Fourier transform deploying singular value decomposition [J].
Girija, R. ;
Singh, Hukum .
OPTICAL AND QUANTUM ELECTRONICS, 2018, 50 (05)
[10]   An image compression and encryption algorithm based on chaotic system and compressive sensing [J].
Gong, Lihua ;
Qiu, Kaide ;
Deng, Chengzhi ;
Zhou, Nanrun .
OPTICS AND LASER TECHNOLOGY, 2019, 115 :257-267