Skip to main content
Erschienen in: Optical and Quantum Electronics 5/2024

01.05.2024

Double iris image asymmetric encryption mechanism using rear mounted spiral phase mask in hybrid transform domain

verfasst von: Ayushi Bansal, Pankaj Rakheja, Hukum Singh

Erschienen in: Optical and Quantum Electronics | Ausgabe 5/2024

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper represents a unique approach to augment the security of iris images by utilizing twin decomposition techniques in a hybrid transform domain, coupled with a rear-mounted spiral phase mask. To introduce non-linearity into the scheme, the amplitudes of input iris image pixels are squared, and the QZS algorithm is employed to translate two-channel input iris images into a single channel for convenience, thereby escalating the key space of the proposed scheme. The amalgamation of Fresnel transform, and hybrid transform develops a distinctive combination. The techniques of random decomposition and unequal modulus decomposition are employed to strengthen the system against attacks based on iterative transformations. Adding an extra layer of security, a spiral phase mask mounted at the back addresses the problem of the second lens becoming invalid in the traditional double random phase mask scheme. This approach combines both public and private keys, making it asymmetric in nature. MATLAB based numerical simulations have been executed to confirm the performance of the presented mechanism, concentrating on key sensitivity, statistics, and resistance to attacks aspects. The proposed scheme proves to be effective against various types of attacks, such as noise, classical, and special attacks, while also displaying heightened sensitivity to various keys and parameters.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Anjana, S., Rakheja, P., Yadav, A., Singh, P., Singh, H.: Asymmetric double image encryption, compression and watermarking scheme based on orthogonal-triangular decomposition with column pivoting. Opt. Appl. 52, 283 (2022) Anjana, S., Rakheja, P., Yadav, A., Singh, P., Singh, H.: Asymmetric double image encryption, compression and watermarking scheme based on orthogonal-triangular decomposition with column pivoting. Opt. Appl. 52, 283 (2022)
Zurück zum Zitat Biryukov, A.: Chosen Ciphertext Attack. In: Encyclopedia of Cryptography and Security, pp. 205–205. Springer, Boston, MA (2011a) Biryukov, A.: Chosen Ciphertext Attack. In: Encyclopedia of Cryptography and Security, pp. 205–205. Springer, Boston, MA (2011a)
Zurück zum Zitat Biryukov, A.: Known Plaintext Attack. In: Encyclopedia of Cryptography and Security, pp. 704–705. Springer, Boston, MA (2011b)CrossRef Biryukov, A.: Known Plaintext Attack. In: Encyclopedia of Cryptography and Security, pp. 704–705. Springer, Boston, MA (2011b)CrossRef
Zurück zum Zitat Kekre, H.B., Thepade, S.D.: IMAGE RETRIEVAL USING NON-INVOLUTIONAL ORTHOGONAL KEKRE’S TRANSFORM. 1 (2009) Kekre, H.B., Thepade, S.D.: IMAGE RETRIEVAL USING NON-INVOLUTIONAL ORTHOGONAL KEKRE’S TRANSFORM. 1 (2009)
Zurück zum Zitat Rakheja, P., Vig, R., Singh, P.: Cryptosystem Based on Double Random Phase Encryption in Hybrid Transform Domain. In: Pant, M., Sharma, T.K., Verma, O.P., Singla, R., Sikander, A. (eds.) Soft Computing: Theories and Applications, pp. 269–279. Springer, Singapore (2020c)CrossRef Rakheja, P., Vig, R., Singh, P.: Cryptosystem Based on Double Random Phase Encryption in Hybrid Transform Domain. In: Pant, M., Sharma, T.K., Verma, O.P., Singla, R., Sikander, A. (eds.) Soft Computing: Theories and Applications, pp. 269–279. Springer, Singapore (2020c)CrossRef
Zurück zum Zitat Sachin, Archana, Singh, P.: Optical Image Encryption Algorithm Based on Chaotic Tinker Bell Map with Random Phase Masks in Fourier Domain. In: Ray, K., Roy, K.C., Toshniwal, S.K., Sharma, H., and Bandyopadhyay, A. (eds.) Proceedings of International Conference on Data Science and Applications. pp. 249–262. Springer Singapore, Singapore (2021) Sachin, Archana, Singh, P.: Optical Image Encryption Algorithm Based on Chaotic Tinker Bell Map with Random Phase Masks in Fourier Domain. In: Ray, K., Roy, K.C., Toshniwal, S.K., Sharma, H., and Bandyopadhyay, A. (eds.) Proceedings of International Conference on Data Science and Applications. pp. 249–262. Springer Singapore, Singapore (2021)
Zurück zum Zitat Tobria, A., Singh, P.: Hybrid cryptosystem based on deterministic phase masks in Fresnel domain and Yang-Gu mixture amplitude-phase retrieval algorithm. In Review (2022) Tobria, A., Singh, P.: Hybrid cryptosystem based on deterministic phase masks in Fresnel domain and Yang-Gu mixture amplitude-phase retrieval algorithm. In Review (2022)
Zurück zum Zitat Wang, X., Zhao, D.: Security enhancement of a phase-truncation based image encryption algorithm. Appl. Opt. 50, 6645–6651 (2011)ADSCrossRef Wang, X., Zhao, D.: Security enhancement of a phase-truncation based image encryption algorithm. Appl. Opt. 50, 6645–6651 (2011)ADSCrossRef
Zurück zum Zitat Wang, X., Zhao, D.: Simultaneous nonlinear encryption of grayscale and color images based on phase-truncated fractional Fourier transform and optical superposition principle. Appl. Opt. 52, 6170–6178 (2013a)ADSCrossRef Wang, X., Zhao, D.: Simultaneous nonlinear encryption of grayscale and color images based on phase-truncated fractional Fourier transform and optical superposition principle. Appl. Opt. 52, 6170–6178 (2013a)ADSCrossRef
Zurück zum Zitat Wang, Y., Quan, C., Tay, C.J.: New method of attack and security enhancement on an asymmetric cryptosystem based on equal modulus decomposition. Appl. Opt. 55, 679–686 (2016)ADSCrossRef Wang, Y., Quan, C., Tay, C.J.: New method of attack and security enhancement on an asymmetric cryptosystem based on equal modulus decomposition. Appl. Opt. 55, 679–686 (2016)ADSCrossRef
Metadaten
Titel
Double iris image asymmetric encryption mechanism using rear mounted spiral phase mask in hybrid transform domain
verfasst von
Ayushi Bansal
Pankaj Rakheja
Hukum Singh
Publikationsdatum
01.05.2024
Verlag
Springer US
Erschienen in
Optical and Quantum Electronics / Ausgabe 5/2024
Print ISSN: 0306-8919
Elektronische ISSN: 1572-817X
DOI
https://doi.org/10.1007/s11082-024-06599-x

Weitere Artikel der Ausgabe 5/2024

Optical and Quantum Electronics 5/2024 Zur Ausgabe

Neuer Inhalt