A Secure Asymmetric Optical Image Encryption Based on Phase Truncation and Singular Value Decomposition in Linear Canonical Transform Domain

被引:13
作者
Sangwan, Anshula [1 ]
Singh, Hukum [2 ]
机构
[1] NorthCap Univ, Dept Comp Sci & Engn, Sect 23-A, Gurugram 122017, India
[2] NorthCap Univ, Dept Appl Sci, Sect 23-A, Gurugram 122017, India
关键词
FRACTIONAL FOURIER-TRANSFORM; CHOSEN-PLAINTEXT ATTACK; SEMI-TENSOR PRODUCT; VORTEX FRESNEL LENS; GYRATOR TRANSFORM; HARTLEY TRANSFORM; MELLIN TRANSFORM; ALGORITHM; CRYPTOSYSTEM; MASKS;
D O I
10.1155/2021/5510125
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
A new asymmetric optical double image encryption algorithm is proposed, which combines phase truncation and singular value decomposition. The plain text is encrypted with two-stage phase keys to obtain a uniformly distributed cipher text and two new decryption keys. These keys are generated during the encryption process and are different from encryption keys. It realizes asymmetric encryption and improves the security of the system. The unscrambling keys in the encryption operation are mainly related to plain text. At the same time, the system is more resistant to selective plain text attacks; it also improves the sensitivity of decryption keys. With the application of phase truncation, the key space expanded and the security of the cryptographic system is enhanced. The efficacy of the system is calculated by evaluating the estimated error between the input and retrieved images. The proposed technique provides innumerable security keys and is robust against various potential attacks. Numerical simulations verify the effectiveness and security of the proposed technique.
引用
收藏
页数:19
相关论文
共 84 条
[1]   Optical image compression and encryption methods [J].
Alfalou, A. ;
Brosseau, C. .
ADVANCES IN OPTICS AND PHOTONICS, 2009, 1 (03) :589-636
[2]   Asymmetric optical cryptosystem based on coherent superposition and equal modulus decomposition [J].
Cai, Jianjun ;
Shen, Xueju ;
Lei, Ming ;
Lin, Chao ;
Dou, Shuaifeng .
OPTICS LETTERS, 2015, 40 (04) :475-478
[3]   Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys [J].
Carnicer, A ;
Montes-Usategui, M ;
Arcos, S ;
Juvells, I .
OPTICS LETTERS, 2005, 30 (13) :1644-1646
[4]   A new chaos-based image encryption algorithm with dynamic key selection mechanisms [J].
Chai, Xiuli ;
Yang, Kang ;
Gan, Zhihua .
MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (07) :9907-9927
[5]   An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations [J].
Chai, Xiuli ;
Gan, Zhihua ;
Yang, Kang ;
Chen, Yiran ;
Liu, Xianxing .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2017, 52 :6-19
[6]  
Dahiya M, 2014, IEEE INT ADV COMPUT, P1048, DOI 10.1109/IAdCC.2014.6779470
[7]   A novel image encryption scheme based on 3D bit matrix and chaotic map with Markov properties [J].
Ge, Meng ;
Ye, Ruisong .
EGYPTIAN INFORMATICS JOURNAL, 2019, 20 (01) :45-54
[8]   An asymmetric cryptosystem based on the random weighted singular value decomposition and fractional Hartley domain [J].
Girija, R. ;
Singh, Hukum .
MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (47-48) :34717-34735
[9]   Triple-level cryptosystem using deterministic masks and modified gerchberg-saxton iterative algorithm in fractional Hartley domain by positioning singular value decomposition [J].
Girija, R. ;
Singh, Hukum .
OPTIK, 2019, 187 :238-257
[10]   A cryptosystem based on deterministic phase masks and fractional Fourier transform deploying singular value decomposition [J].
Girija, R. ;
Singh, Hukum .
OPTICAL AND QUANTUM ELECTRONICS, 2018, 50 (05)