PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Audio and image encryption scheme based on QR decomposition and random modulus decomposition in Fresnel domain

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
In this paper, an asymmetric audio and image encryption mechanism using QR decomposition and random modulus decomposition (RD) in the Fresnel domain is proposed. The audio file is recorded as a vector and converted to a two-dimensional array to act as an image or a sound map. This sound map is encrypted using the image encryption algorithm proposed in this paper. The proposed cryptosystem is validated for both audios and grayscale images. Fresnel parameters and the two private keys obtained from QR decomposition and random modulus decomposition (RD) form the key space. Computer-based reproductions have been carried out to prove the validity and authenticity of the scheme. Simulation results authenticate that the scheme is robust and efficient against various attacks and is sensitive to input parameters.
Czasopismo
Rocznik
Strony
359--374
Opis fizyczny
Bibliogr. 37 poz., rys., tab.
Twórcy
  • Department of Applied Sciences, The NorthCap University, Gurugram, India 122017
autor
  • Department of Mathematics, SoET, Central University of Haryana, Mahendergarh, India 123031
autor
  • Department of Mathematics, SoET, Central University of Haryana, Mahendergarh, India 123031
autor
  • Department of Applied Sciences, The NorthCap University, Gurugram, India 122017
Bibliografia
  • [1] RAJPUT S.K., MATOBA O., Optical voice encryption based on digital holography, Optics Letters 42(22), 2017, pp. 4619–4622, DOI: 10.1364/OL.42.004619.
  • [2] YANG Y.-G., TIAN J., SUN S.-J., XU P., Quantum-assisted encryption for digital audio signals, Optik 126(21), 2015, pp. 3221–3226, DOI: 10.1016/j.ijleo.2015.07.082.
  • [3] MOSA E., MESSIHA N.W., ZAHRAN O., ABD EL-SAMIE F.E., Chaotic encryption of speech signals, International Journal of Speech Technology 14(4), 2011, 285, DOI: 10.1007/s10772-011-9103-7.
  • [4] PENG X., CUI Z., CAI L., YU L., Digital audio signal encryption with a virtual optics scheme, Optik 114(2), 2003, pp. 69–75, DOI: 10.1078/0030-4026-00224.
  • [5] GHASEMZADEH A., ESMAEILI E., A novel method in audio message encryption based on a mixture of chaos function, International Journal of Speech Technology 20(4), 2017, pp. 829–837, DOI: 10.1007/s10772-017-9452-y.
  • [6] LIMA J.B., DA SILVA NETO E.F., Audio encryption based on the cosine number transform, Multimedia Tools and Applications 75(14), 2016, pp. 8403–8418, DOI: 10.1007/s11042-015-2755-6.
  • [7] SAVITA A., SINGH P., YADAV A.K., SINGH K., Asymmetric audio encryption system based on Arnold transform and random decomposition, Asian Journal of Physics 27(9–12), 2018, pp. 711–719.
  • [8] REFREGIER P., JAVIDI B., Optical image encryption based on input plane and Fourier plane random encoding, Optics Letters 20(7), 1995, pp. 767–769, DOI: 10.1364/OL.20.000767.
  • [9] UNNIKRISHNAN G., SINGH K., Double random fractional Fourier domain encoding for optical security, Optical Engineering 39(11), 2000, pp. 2853–2859, DOI: 10.1117/1.1313498.
  • [10] QIN W., PENG X., Asymmetric cryptosystem based on phase-truncated Fourier transforms, Optics Letters 35(2), 2010, pp. 118–120, DOI: 10.1364/OL.35.000118.
  • [11] KUMAR R., BHADURI B., Double image encryption in Fresnel domain using wavelet transform, gyrator transform and spiral phase masks, Proc. SPIE 10449, Fifth International Conference on Optical and Photonics Engineering, 2017, 104490O, DOI: 10.1117/12.2269897.
  • [12] XU H., XU W., WANG S., WU S., Asymmetric optical cryptosystem based on modulus decomposition in Fresnel domain, Optics Communications 402, 2017, pp. 302–310, DOI: 10.1016/j.optcom.2017.05.035.
  • [13] SINGH H., Devil’s vortex Fresnel lens phase masks on an asymmetric cryptosystem based on phase-truncation in gyrator wavelet transform domain, Optics and Lasers in Engineering 81, 2016, pp. 125–139, DOI: 10.1016/j.optlaseng.2016.01.014.
  • [14] KUMAR R., BHADURI B., NISHCHAL N.K., Nonlinear QR code based optical image encryption using spiral phase transform, equal modulus decomposition and singular value decomposition, Journal of Optics 20(1), 2017, 015701, DOI: 10.1088/2040-8986/aa9943.
  • [15] YADAV A.K., VASHISTH S., SINGH H., SINGH K., Optical cryptography and watermarking using some fractional canonical transforms, and structured masks, [In] V. Lakshminarayanan, I. Bhattacharya [Eds], Advances in Optical Science and Engineering, Springer Proceedings in Physics, Vol. 166, Springer, New Delhi, 2015, pp. 25–36, DOI: 10.1007/978-81-322-2367-2_5.
  • [16] SINGH H., YADAV A.K., VASHISTH S., SINGH K., Optical image encryption using Devil’s vortex toroidal lens in the Fresnel transform domain, International Journal of Optics, Vol. 2015, 2015, 926135, DOI: 10.1155/2015/926135.
  • [17] HUANG J.-J., HWANG H.-E., CHEN C.-Y., CHEN C.-M., Optical multiple-image encryption based on phase encoding algorithm in the Fresnel transform domain, Optics & Laser Technology 44(7), 2012, pp. 2238–2244, DOI: 10.1016/j.optlastec.2012.02.032.
  • [18]JOSHI M., SHAKHER C., SINGH K., Image encryption and decryption using fractional Fourier transform and radial Hilbert transform, Optics and Lasers in Engineering 46(7), 2008, pp. 522–526, DOI: 10.1016/j.optlaseng.2008.03.001.
  • [19] FATIMA A., MEHRA I., NISHCHAL N.K., Optical image encryption using equal modulus decomposition and multiple diffractive imaging, Journal of Optics 18(8), 2016, 085701, DOI: 10.1088/2040-8978/18/8/085701.
  • [20] RAKHEJA P., VIG R., SINGH P., An asymmetric hybrid cryptosystem using hyperchaotic system and random decomposition in hybrid multi resolution wavelet domain, Multimedia Tools and Applications 78(15), 2019, pp. 20809–20834, DOI: 10.1007/s11042-019-7406-x.
  • [21] WANG Y., QUAN C., TAY C.J., New method of attack and security enhancement on an asymmetric cryptosystem based on equal modulus decomposition, Applied Optics 55(4), 2016, pp. 679–686, DOI: 10.1364/AO.55.000679.
  • [22] PAREEK N.K., PATIDAR V., SUD K.K., Image encryption using chaotic logistic map, Image and Vision Computing 24, 2006, pp. 926–934, DOI: 10.1016/j.imavis.2006.02.021.
  • [23] VASHISTH S., SINGH H., YADAV A.K., SINGH K., Devil’s vortex phase structure as frequency plane mask for image encryption using the fractional Mellin transform, International Journal of Optics, Vol. 2014, 2014, 728056, DOI: 10.1155/2014/728056.
  • [24] SHARMA N., SAINI I., YADAV A.K., SINGH P., Phase-image encryption based on 3D-Lorenz chaotic system and double random phase encoding, 3D Research 8(4), 2017, p. 39, DOI: 10.1007/s13319-017-0149-4.
  • [25] SAINI I., SINGH P., YADAV A.K., Analysis of Lorenz-chaos and exclusive-OR based image encryption scheme, International Journal of Social Computing and Cyber-Physical Systems 2(1), 2017, pp. 59–72, DOI: 10.1504/IJSCCPS.2017.088769.
  • [26] GE M., YE R., A novel image encryption scheme based on 3D bit matrix and chaotic map with Markov properties, Egyptian Informatics Journal 20(1), 2019, pp. 45–54, DOI: 10.1016/j.eij.2018.10.001.
  • [27] KUMAR P., JOSEPH J., SINGH K., Known-plaintext attack-free double random phase-amplitude optical encryption: vulnerability to impulse function attack, Journal of Optics 14(4), 2012, 045401, DOI: 10.1088/2040-8978/14/4/045401.
  • [28] QIN W., PENG X., Vulnerability to known-plaintext attack of optical encryption schemes based on two fractional Fourier transform order keys and double random phase keys, Journal of Optics A: Pure and Applied Optics 11(7), 2009, 075402, DOI: 10.1088/1464-4258/11/7/075402.
  • [29] WANG X., ZHAO D., A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms, Optics Communications 285(6), 2012, pp. 1078–1081, DOI: 10.1016/j.optcom.2011.12.017.
  • [30] LIU Y., ZHANG L.Y., WANG J., ZHANG Y., WONG K., Chosen-plaintext attack of an image encryption scheme based on modified permutation–diffusion structure, Nonlinear Dynamics 84(4), 2016, pp. 2241–2250, DOI: 10.1007/s11071-016-2642-3.
  • [31] XIONG Y., QUAN C., Hybrid attack free optical cryptosystem based on two random masks and lower upper decomposition with partial pivoting, Optics & Laser Technology 109, 2019, pp. 456–464, DOI: 10.1016/j.optlastec.2018.08.033.
  • [32] SU Q., NIU Y., WANG G., JIA S., YUE J., Color image blind watermarking scheme based on QR decomposition, Signal Processing 94, 2014, pp. 219–235, DOI: 10.1016/j.sigpro.2013.06.025.
  • [33] QAYUM A., KUMAR P., QR decomposition-based cryptography: Via image generation (QR-CRYPT), 2012 International Conference for Internet Technology and Secured Transactions, IEEE, 2012, https://ieeexplore.ieee.org/document/6470939 (accessed April 23, 2020).
  • [34] ABUTURAB M.R., Single-channel color information security system using LU decomposition in gyrator transform domains, Optics Communications 323, 2014, pp. 100–109, DOI: 10.1016/j.optcom.2014.02.061.
  • [35] BENESTY J., CHEN J., HUANG Y., COHEN I., Pearson correlation coefficient, [In] Noise Reduction in Speech Processing, [Eds.] I. Cohen, Y. Huang, J. Chen, J. Benesty, Vol. 2, Springer, Berlin, Heidelberg, 2009, DOI: 10.1007/978-3-642-00296-0_5.
  • [36] HORÉ A., ZIOU D., Image quality metrics: PSNR vs. SSIM, [In] 2010 20th International Conference on Pattern Recognition, 2010, pp. 2366–2369, DOI: 10.1109/ICPR.2010.579.
  • [37] SUI L., GAO B., Single-channel color image encryption based on iterative fractional Fourier transform and chaos, Optics & Laser Technology 48, 2013, pp. 117–127, DOI: 10.1016/j.optlastec.2012.10.016.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-f12e56f5-0172-4f21-922b-9555ecbe9fcb
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.