Skip to main content
Top

2018 | OriginalPaper | Chapter

Asymmetric Cryptosystem Using Affine Transform in Fourier Domain

Authors : Savita Anjana, Indu Saini, Phool Singh, A. K. Yadav

Published in: Advanced Computational and Communication Paradigms

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

An improved image encryption scheme that uses affine transform and asymmetric keys in Fourier transform domain has been proposed. The scheme is validated for grayscale images through numerical simulation using MATLAB 7.14. In the proposed scheme, the decryption keys are different from the encryption keys and are obtained by phase truncation Fourier transform method. The performance of the scheme is evaluated in terms of the metrics such as correlation coefficient, mean-squared error, and peak signal-to-noise ratio. We have carried out the sensitivity analysis relative to the affine transform parameter, which serves as an additional security feature. The robustness of the scheme is demonstrated by showing its resistance against noise and occlusion attacks. Since this is the first study that uses affine transform in the phase-truncated Fourier transform based asymmetric cryptosystem, it provides a new scheme for image encryption with enhanced security.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Stallings, W.: Cryptography and Network Security: Principles and Practices. Pearson/Prentice Hall (2006) Stallings, W.: Cryptography and Network Security: Principles and Practices. Pearson/Prentice Hall (2006)
2.
go back to reference Refregier, P., Javidi, B.: Optical image encryption based on input plane and Fourier plane random encoding. Opt. Lett. 20, 767–769 (1995)CrossRef Refregier, P., Javidi, B.: Optical image encryption based on input plane and Fourier plane random encoding. Opt. Lett. 20, 767–769 (1995)CrossRef
3.
go back to reference Situ, G., Zhang, J.: Double random-phase encoding in the Fresnel domain. Opt. Lett. 29, 1584–1586 (2004)CrossRef Situ, G., Zhang, J.: Double random-phase encoding in the Fresnel domain. Opt. Lett. 29, 1584–1586 (2004)CrossRef
4.
go back to reference Unnikrishnan, G., Singh, K.: Double random fractional Fourier-domain encoding for optical security. Opt. Eng. 39, 2853–2859 (2000)CrossRef Unnikrishnan, G., Singh, K.: Double random fractional Fourier-domain encoding for optical security. Opt. Eng. 39, 2853–2859 (2000)CrossRef
5.
go back to reference Singh, P., Yadav, A.K., Singh, K., Saini, I.: Optical image encryption in the fractional Hartley domain, using Arnold transform and singular value decomposition. AIP Conf. Proc. 1802, 020017 (2017)CrossRef Singh, P., Yadav, A.K., Singh, K., Saini, I.: Optical image encryption in the fractional Hartley domain, using Arnold transform and singular value decomposition. AIP Conf. Proc. 1802, 020017 (2017)CrossRef
6.
go back to reference Singh, P., Yadav, A.K., Singh, K.: Phase image encryption in the fractional Hartley domain using Arnold transform and singular value decomposition. Opt. Lasers Eng. 91, 187–195 (2017)CrossRef Singh, P., Yadav, A.K., Singh, K.: Phase image encryption in the fractional Hartley domain using Arnold transform and singular value decomposition. Opt. Lasers Eng. 91, 187–195 (2017)CrossRef
7.
go back to reference Carnicer, A., Montes-Usategui, M., Arcos, S., Juvells, I.: Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. Opt. Lett. 30, 1644–1646 (2005)CrossRef Carnicer, A., Montes-Usategui, M., Arcos, S., Juvells, I.: Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. Opt. Lett. 30, 1644–1646 (2005)CrossRef
8.
go back to reference Peng, X., Zhang, P., Wei, H., Yu, B.: Known-plaintext attack on optical encryption based on double random phase keys. Opt. Lett. 31, 1044–1046 (2006)CrossRef Peng, X., Zhang, P., Wei, H., Yu, B.: Known-plaintext attack on optical encryption based on double random phase keys. Opt. Lett. 31, 1044–1046 (2006)CrossRef
9.
go back to reference Qin, W., Peng, X.: Asymmetric cryptosystem based on phase-truncated Fourier transforms. Opt. Lett. 35, 118–120 (2010)CrossRef Qin, W., Peng, X.: Asymmetric cryptosystem based on phase-truncated Fourier transforms. Opt. Lett. 35, 118–120 (2010)CrossRef
10.
go back to reference Sui, L., Lu, H., Ning, X., Wang, Y.: Asymmetric double-image encryption method by using iterative phase retrieval algorithm in fractional Fourier transform domain. Opt. Eng. 53, 026108 (2014)CrossRef Sui, L., Lu, H., Ning, X., Wang, Y.: Asymmetric double-image encryption method by using iterative phase retrieval algorithm in fractional Fourier transform domain. Opt. Eng. 53, 026108 (2014)CrossRef
11.
go back to reference Liu, H., Kadir, A.: Asymmetric color image encryption scheme using 2D discrete-time map. Signal Process. 113, 104–112 (2015)CrossRef Liu, H., Kadir, A.: Asymmetric color image encryption scheme using 2D discrete-time map. Signal Process. 113, 104–112 (2015)CrossRef
12.
go back to reference Wang, Y., Quan, C., Tay, C.J.: Asymmetric optical image encryption based on an improved amplitude–phase retrieval algorithm. Opt. Lasers Eng. 78, 8–16 (2016)CrossRef Wang, Y., Quan, C., Tay, C.J.: Asymmetric optical image encryption based on an improved amplitude–phase retrieval algorithm. Opt. Lasers Eng. 78, 8–16 (2016)CrossRef
13.
go back to reference Chen, H., Tanougast, C., Liu, Z., Sieler, L.: Asymmetric optical cryptosystem for color image based on equal modulus decomposition in gyrator transform domains. Opt. Lasers Eng. 93, 1–8 (2017)CrossRef Chen, H., Tanougast, C., Liu, Z., Sieler, L.: Asymmetric optical cryptosystem for color image based on equal modulus decomposition in gyrator transform domains. Opt. Lasers Eng. 93, 1–8 (2017)CrossRef
14.
go back to reference Nag, A., Singh, J.P., Khan, S., Ghosh, S., Biswas, S., Sarkar, D., Sarkar, P.P.: Image encryption using affine transform and XOR operation. In: 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies, pp. 309–312 (2011) Nag, A., Singh, J.P., Khan, S., Ghosh, S., Biswas, S., Sarkar, D., Sarkar, P.P.: Image encryption using affine transform and XOR operation. In: 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies, pp. 309–312 (2011)
Metadata
Title
Asymmetric Cryptosystem Using Affine Transform in Fourier Domain
Authors
Savita Anjana
Indu Saini
Phool Singh
A. K. Yadav
Copyright Year
2018
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-8237-5_4