共 42 条
Optical image encryption algorithm based on phase-truncated short-time fractional Fourier transform and hyper-chaotic system
被引:153
作者:
Yu, Sha-Sha
[1
]
Zhou, Nan-Run
[1
]
Gong, Li-Hua
[1
]
Nie, Zhe
[2
]
机构:
[1] Nanchang Univ, Dept Elect Informat Engn, Nanchang 330031, Jiangxi, Peoples R China
[2] Shenzhen Polytech, Sch Comp Engn, Shenzhen 518055, Guangdong, Peoples R China
基金:
中国国家自然科学基金;
关键词:
Image encryption;
Phase-truncated short-time fractional Fourier transform;
Hyper-chaotic system;
Wave-based permutation;
Encryption unit;
Diffusion operation;
DISCRETE COSINE TRANSFORM;
WAVELET TRANSFORM;
FRESNEL TRANSFORM;
ARNOLD TRANSFORM;
SCHEME;
COMPRESSION;
OPERATION;
AMPLITUDE;
MAP;
D O I:
10.1016/j.optlaseng.2019.105816
中图分类号:
O43 [光学];
学科分类号:
070207 ;
0803 ;
摘要:
To increase the robustness against common attacks, a novel image encryption algorithm is proposed based on the phase-truncated short-time fractional Fourier transform (PTSTFrFT) and the hyper-chaotic system. In the algorithm, the original image is divided into four sub-images to be encoded independently. Different from the traditional phase truncation coding, the PTSTFrFT is combined with wave-based permutation to construct the encryption unit (EU) for encoding the sub-images, where the confused phase information is recombined with the amplitude information to guarantee the integrity of image information and the nonlinearity of phase truncation. Besides, the encryption unit can be achieved optically. Furthermore, the corresponding results compose an interim image, whose pixel values and pixel positions are modified by the permutation and the diffusion operations. The diffusion operation is designed with the feedback system to increase the anti-interference ability. The proposed image encryption algorithm has large enough key space and high sensitivity to the keys because of the use of hyper-chaotic system. The simulation results demonstrate that the proposed image encryption algorithm based on the PTSTFrFT is secure and robust enough against the common attacks.
引用
收藏
页数:11
相关论文