Skip to main content
Erschienen in: 3D Research 4/2017

01.12.2017 | 3DR Express

Phase-Image Encryption Based on 3D-Lorenz Chaotic System and Double Random Phase Encoding

verfasst von: Neha Sharma, Indu Saini, AK Yadav, Phool Singh

Erschienen in: 3D Research | Ausgabe 4/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, an encryption scheme for phase-images based on 3D-Lorenz chaotic system in Fourier domain under the 4f optical system is presented. The encryption scheme uses a random amplitude mask in the spatial domain and a random phase mask in the frequency domain. Its inputs are phase-images, which are relatively more secure as compared to the intensity images because of non-linearity. The proposed scheme further derives its strength from the use of 3D-Lorenz transform in the frequency domain. Although the experimental setup for optical realization of the proposed scheme has been provided, the results presented here are based on simulations on MATLAB. It has been validated for grayscale images, and is found to be sensitive to the encryption parameters of the Lorenz system. The attacks analysis shows that the key-space is large enough to resist brute-force attack, and the scheme is also resistant to the noise and occlusion attacks. Statistical analysis and the analysis based on correlation distribution of adjacent pixels have been performed to test the efficacy of the encryption scheme. The results have indicated that the proposed encryption scheme possesses a high level of security.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Abundiz-Pérez, F., Cruz-Hernández, C., Murillo-Escobar, M. A., López-Gutiérrez, R. M., & Arellano-Delgado, A. (2016). A fingerprint image encryption scheme based on hyperchaotic rössler map. Mathematical Problems in Engineering, 2016, 1–15. https://doi.org/10.1155/2016/2670494.CrossRef Abundiz-Pérez, F., Cruz-Hernández, C., Murillo-Escobar, M. A., López-Gutiérrez, R. M., & Arellano-Delgado, A. (2016). A fingerprint image encryption scheme based on hyperchaotic rössler map. Mathematical Problems in Engineering, 2016, 1–15. https://​doi.​org/​10.​1155/​2016/​2670494.CrossRef
3.
Zurück zum Zitat Alvarez, G., & Li, S. (2006). Some basic cryptographic requirements for chaos-based cryptosystems. International Journal of Bifurcation and Chaos, 16(08), 2129–2151.MathSciNetCrossRefMATH Alvarez, G., & Li, S. (2006). Some basic cryptographic requirements for chaos-based cryptosystems. International Journal of Bifurcation and Chaos, 16(08), 2129–2151.MathSciNetCrossRefMATH
11.
Zurück zum Zitat Cristobal, G., Schelkens, P., & Thienpont, H. (2013). Optical and digital image processing: Fundamentals and applications. New York: Wiley. Cristobal, G., Schelkens, P., & Thienpont, H. (2013). Optical and digital image processing: Fundamentals and applications. New York: Wiley.
12.
15.
Zurück zum Zitat Farajallah, M., Fawaz, Z., El Assad, S. & Deforges, O. (2013). Efficient image encryption and authentication scheme based on chaotic sequences. In SECURWARE 2013: The Seventh International Conference on Emerging Security Information, Systems and Technologies (pp. 150–155). Farajallah, M., Fawaz, Z., El Assad, S. & Deforges, O. (2013). Efficient image encryption and authentication scheme based on chaotic sequences. In SECURWARE 2013: The Seventh International Conference on Emerging Security Information, Systems and Technologies (pp. 150–155).
17.
Zurück zum Zitat Goodman, J. W. (2005). Introduction to Fourier optics. New York: Roberts and Company Publishers. Goodman, J. W. (2005). Introduction to Fourier optics. New York: Roberts and Company Publishers.
18.
Zurück zum Zitat Goudail, F., Bollaro, F., Javidi, B., & Réfrégier, P. (1998). Influence of a perturbation in a double phase-encoding system. JOSA A, 15(10), 2629–2638.CrossRef Goudail, F., Bollaro, F., Javidi, B., & Réfrégier, P. (1998). Influence of a perturbation in a double phase-encoding system. JOSA A, 15(10), 2629–2638.CrossRef
19.
Zurück zum Zitat Healy, J. J., Kutay, M. A., Ozaktas, H. M., & Sheridan, J. T. (Eds.). (2016). Linear canonical transforms: Theory and applications. New York: Springer.MATH Healy, J. J., Kutay, M. A., Ozaktas, H. M., & Sheridan, J. T. (Eds.). (2016). Linear canonical transforms: Theory and applications. New York: Springer.MATH
20.
Zurück zum Zitat Javidi, B. (2006). Optical and digital techniques for information security. Berlin: Springer. Javidi, B. (2006). Optical and digital techniques for information security. Berlin: Springer.
24.
Zurück zum Zitat Jiang, H.Y. & Fu, C. (2008). An image encryption scheme based on lorenz chaos system. In 2008 Fourth International Conference on Natural Computation (Vol. 4, pp. 600–604). Presented at the 2008 Fourth International Conference on Natural Computation. https://doi.org/10.1109/ICNC.2008.813 Jiang, H.Y. & Fu, C. (2008). An image encryption scheme based on lorenz chaos system. In 2008 Fourth International Conference on Natural Computation (Vol. 4, pp. 600–604). Presented at the 2008 Fourth International Conference on Natural Computation. https://​doi.​org/​10.​1109/​ICNC.​2008.​813
26.
Zurück zum Zitat Kumar, P., Joseph, J., & Singh, K. (2016). Double random phase encoding based optical encryption systems using some linear canonical transforms: Weaknesses and countermeasures. In J. J. Healy, M. A. Kutay, H. M. Ozaktas, & J. T. Sheridan (Eds.), Linear canonical transforms (p. 367). New York: Springer. https://doi.org/10.1007/978-1-4939-3028-9_13.CrossRef Kumar, P., Joseph, J., & Singh, K. (2016). Double random phase encoding based optical encryption systems using some linear canonical transforms: Weaknesses and countermeasures. In J. J. Healy, M. A. Kutay, H. M. Ozaktas, & J. T. Sheridan (Eds.), Linear canonical transforms (p. 367). New York: Springer. https://​doi.​org/​10.​1007/​978-1-4939-3028-9_​13.CrossRef
32.
Zurück zum Zitat Lorenz, E. N. (1963). Deterministic nonperiodic flow. Journal of the Atmospheric Sciences, 20(2), 130–141.CrossRef Lorenz, E. N. (1963). Deterministic nonperiodic flow. Journal of the Atmospheric Sciences, 20(2), 130–141.CrossRef
33.
Zurück zum Zitat Lorenz, E. (1995). The essence of chaos (Reprint edition.). Seattle: University of Washington Press. Lorenz, E. (1995). The essence of chaos (Reprint edition.). Seattle: University of Washington Press.
37.
Zurück zum Zitat Poon, T.-C., & Banerjee, P. P. (2001). Contemporary optical image processing with MATLAB. Amsterdam: Elsevier. Poon, T.-C., & Banerjee, P. P. (2001). Contemporary optical image processing with MATLAB. Amsterdam: Elsevier.
39.
Zurück zum Zitat Schalkoff, R. J. (1989). Digital image processing and computer vision. New Jersey: Wiley. Schalkoff, R. J. (1989). Digital image processing and computer vision. New Jersey: Wiley.
44.
Zurück zum Zitat Sparrow, C. (2012). The lorenz equations: Bifurcations, chaos, and strange attractors. Berlin: Springer.MATH Sparrow, C. (2012). The lorenz equations: Bifurcations, chaos, and strange attractors. Berlin: Springer.MATH
47.
Zurück zum Zitat Xu, S., Wang, Y., Guo, Y., & Wang, C. (2010). A novel image encryption scheme based on a nonlinear chaotic map. International Journal of Image, Graphics and Signal Processing, 2(1), 61.CrossRef Xu, S., Wang, Y., Guo, Y., & Wang, C. (2010). A novel image encryption scheme based on a nonlinear chaotic map. International Journal of Image, Graphics and Signal Processing, 2(1), 61.CrossRef
48.
Zurück zum Zitat Yadav, A., Vashisth, S., Singh, H., & Singh, K. (2015). An asymmetric cryptography system for watermarking of phase-images using gyrator transform. Asian Journal of Physics, 24(12), 1611–1624. Yadav, A., Vashisth, S., Singh, H., & Singh, K. (2015). An asymmetric cryptography system for watermarking of phase-images using gyrator transform. Asian Journal of Physics, 24(12), 1611–1624.
Metadaten
Titel
Phase-Image Encryption Based on 3D-Lorenz Chaotic System and Double Random Phase Encoding
verfasst von
Neha Sharma
Indu Saini
AK Yadav
Phool Singh
Publikationsdatum
01.12.2017
Verlag
3D Display Research Center
Erschienen in
3D Research / Ausgabe 4/2017
Elektronische ISSN: 2092-6731
DOI
https://doi.org/10.1007/s13319-017-0149-4

Weitere Artikel der Ausgabe 4/2017

3D Research 4/2017 Zur Ausgabe