Skip to main content

2018 | OriginalPaper | Buchkapitel

Asymmetric Cryptosystem Using Affine Transform in Fourier Domain

verfasst von : Savita Anjana, Indu Saini, Phool Singh, A. K. Yadav

Erschienen in: Advanced Computational and Communication Paradigms

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

An improved image encryption scheme that uses affine transform and asymmetric keys in Fourier transform domain has been proposed. The scheme is validated for grayscale images through numerical simulation using MATLAB 7.14. In the proposed scheme, the decryption keys are different from the encryption keys and are obtained by phase truncation Fourier transform method. The performance of the scheme is evaluated in terms of the metrics such as correlation coefficient, mean-squared error, and peak signal-to-noise ratio. We have carried out the sensitivity analysis relative to the affine transform parameter, which serves as an additional security feature. The robustness of the scheme is demonstrated by showing its resistance against noise and occlusion attacks. Since this is the first study that uses affine transform in the phase-truncated Fourier transform based asymmetric cryptosystem, it provides a new scheme for image encryption with enhanced security.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Stallings, W.: Cryptography and Network Security: Principles and Practices. Pearson/Prentice Hall (2006) Stallings, W.: Cryptography and Network Security: Principles and Practices. Pearson/Prentice Hall (2006)
2.
Zurück zum Zitat Refregier, P., Javidi, B.: Optical image encryption based on input plane and Fourier plane random encoding. Opt. Lett. 20, 767–769 (1995)CrossRef Refregier, P., Javidi, B.: Optical image encryption based on input plane and Fourier plane random encoding. Opt. Lett. 20, 767–769 (1995)CrossRef
3.
Zurück zum Zitat Situ, G., Zhang, J.: Double random-phase encoding in the Fresnel domain. Opt. Lett. 29, 1584–1586 (2004)CrossRef Situ, G., Zhang, J.: Double random-phase encoding in the Fresnel domain. Opt. Lett. 29, 1584–1586 (2004)CrossRef
4.
Zurück zum Zitat Unnikrishnan, G., Singh, K.: Double random fractional Fourier-domain encoding for optical security. Opt. Eng. 39, 2853–2859 (2000)CrossRef Unnikrishnan, G., Singh, K.: Double random fractional Fourier-domain encoding for optical security. Opt. Eng. 39, 2853–2859 (2000)CrossRef
5.
Zurück zum Zitat Singh, P., Yadav, A.K., Singh, K., Saini, I.: Optical image encryption in the fractional Hartley domain, using Arnold transform and singular value decomposition. AIP Conf. Proc. 1802, 020017 (2017)CrossRef Singh, P., Yadav, A.K., Singh, K., Saini, I.: Optical image encryption in the fractional Hartley domain, using Arnold transform and singular value decomposition. AIP Conf. Proc. 1802, 020017 (2017)CrossRef
6.
Zurück zum Zitat Singh, P., Yadav, A.K., Singh, K.: Phase image encryption in the fractional Hartley domain using Arnold transform and singular value decomposition. Opt. Lasers Eng. 91, 187–195 (2017)CrossRef Singh, P., Yadav, A.K., Singh, K.: Phase image encryption in the fractional Hartley domain using Arnold transform and singular value decomposition. Opt. Lasers Eng. 91, 187–195 (2017)CrossRef
7.
Zurück zum Zitat Carnicer, A., Montes-Usategui, M., Arcos, S., Juvells, I.: Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. Opt. Lett. 30, 1644–1646 (2005)CrossRef Carnicer, A., Montes-Usategui, M., Arcos, S., Juvells, I.: Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. Opt. Lett. 30, 1644–1646 (2005)CrossRef
8.
Zurück zum Zitat Peng, X., Zhang, P., Wei, H., Yu, B.: Known-plaintext attack on optical encryption based on double random phase keys. Opt. Lett. 31, 1044–1046 (2006)CrossRef Peng, X., Zhang, P., Wei, H., Yu, B.: Known-plaintext attack on optical encryption based on double random phase keys. Opt. Lett. 31, 1044–1046 (2006)CrossRef
9.
Zurück zum Zitat Qin, W., Peng, X.: Asymmetric cryptosystem based on phase-truncated Fourier transforms. Opt. Lett. 35, 118–120 (2010)CrossRef Qin, W., Peng, X.: Asymmetric cryptosystem based on phase-truncated Fourier transforms. Opt. Lett. 35, 118–120 (2010)CrossRef
10.
Zurück zum Zitat Sui, L., Lu, H., Ning, X., Wang, Y.: Asymmetric double-image encryption method by using iterative phase retrieval algorithm in fractional Fourier transform domain. Opt. Eng. 53, 026108 (2014)CrossRef Sui, L., Lu, H., Ning, X., Wang, Y.: Asymmetric double-image encryption method by using iterative phase retrieval algorithm in fractional Fourier transform domain. Opt. Eng. 53, 026108 (2014)CrossRef
11.
Zurück zum Zitat Liu, H., Kadir, A.: Asymmetric color image encryption scheme using 2D discrete-time map. Signal Process. 113, 104–112 (2015)CrossRef Liu, H., Kadir, A.: Asymmetric color image encryption scheme using 2D discrete-time map. Signal Process. 113, 104–112 (2015)CrossRef
12.
Zurück zum Zitat Wang, Y., Quan, C., Tay, C.J.: Asymmetric optical image encryption based on an improved amplitude–phase retrieval algorithm. Opt. Lasers Eng. 78, 8–16 (2016)CrossRef Wang, Y., Quan, C., Tay, C.J.: Asymmetric optical image encryption based on an improved amplitude–phase retrieval algorithm. Opt. Lasers Eng. 78, 8–16 (2016)CrossRef
13.
Zurück zum Zitat Chen, H., Tanougast, C., Liu, Z., Sieler, L.: Asymmetric optical cryptosystem for color image based on equal modulus decomposition in gyrator transform domains. Opt. Lasers Eng. 93, 1–8 (2017)CrossRef Chen, H., Tanougast, C., Liu, Z., Sieler, L.: Asymmetric optical cryptosystem for color image based on equal modulus decomposition in gyrator transform domains. Opt. Lasers Eng. 93, 1–8 (2017)CrossRef
14.
Zurück zum Zitat Nag, A., Singh, J.P., Khan, S., Ghosh, S., Biswas, S., Sarkar, D., Sarkar, P.P.: Image encryption using affine transform and XOR operation. In: 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies, pp. 309–312 (2011) Nag, A., Singh, J.P., Khan, S., Ghosh, S., Biswas, S., Sarkar, D., Sarkar, P.P.: Image encryption using affine transform and XOR operation. In: 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies, pp. 309–312 (2011)
Metadaten
Titel
Asymmetric Cryptosystem Using Affine Transform in Fourier Domain
verfasst von
Savita Anjana
Indu Saini
Phool Singh
A. K. Yadav
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-8237-5_4

Neuer Inhalt