PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Asymmetric cryptosystem with random decomposition using fractional Fourier and Fourier transforms

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
In this paper, an asymmetric cryptosystem based on random decomposition is proposed. The suggested scheme used three different decryption keys to get decrypted image, two of which are generated using phase truncation and one through random decomposition. The combination of these keys and fractional Fourier transform parameter increase the security of cryptosystem against various attacks. MATLAB simulations are used to validate the scheme’s conclusions. The effectiveness of a scheme is validated by the key sensitivity performance of the cryptosystem. This research also includes a 3D plot for both grayscale and binary images. Correlation coefficient (CC) values between the original and recovered images is also calculated to validate the cryptosystem.
Czasopismo
Rocznik
Strony
591--602
Opis fizyczny
Bibliogr. 35 poz., rys., tab.
Twórcy
  • Department of Applied Sciences, The NorthCap University, Gurugram, India
autor
  • Department of Applied Sciences, The NorthCap University, Gurugram, India
  • Department of Applied Sciences, The NorthCap University, Gurugram, India
Bibliografia
  • [1] REFREGIER P., JAVIDI B., Optical image encryption based on input plane and Fourier plane random encoding, Optics Letters 20(7), 1995: 767-769. https://doi.org/10.1364/OL.20.000767
  • [2] SITU G., ZHANG J., Double random-phase encoding in the Fresnel domain, Optics Letters 29(14), 2004: 1584-1586. https://doi.org/10.1364/OL.29.001584
  • [3] MATOBA O., JAVIDI B., Encrypted optical memory system using three-dimensional keys in the Fresnel domain, Optics Letters 24(11), 1999: 762-764. https://doi.org/10.1364/OL.24.000762
  • [4] UNNIKRISHNAN G., JOSEPH J., SINGH K., Optical encryption by double-random phase encoding in the fractional Fourier domain, Optics Letters 25(12), 2000: 887-889. https://doi.org/10.1364/OL.25.000887
  • [5] ZHON N., WANG Y., GONG L., Novel optical image encryption scheme based on fractional Mellin transform, Optics Communications 284(13), 2011: 3234-3242. https://doi.org/10.1016/j.optcom.2011.02.065
  • [6] CHEN L., ZHAO D., Optical image encryption with Hartley transforms, Optics Letters 31(23), 2006: 3438-3440. https://doi.org/10.1364/OL.31.003438
  • [7] PENG X., ZHANG P., WEI H., YU B., Known-plaintext attack on optical encryption based on double random phase keys, Optics Letters 31(8), 2006: 1044-1046. https://doi.org/10.1364/OL.31.001044
  • [8] PENG X., WEI H., ZHANG P., Chosen-plaintext atack on lensless double-random phase encoding in the Fresnel domain, Optics Letters 31(22), 2006: 3261-3263. https://doi.org/10.1364/OL.31.003261
  • [9] CARNICER A., MONTES-USATEGUI M., ARCOS S., JUVELLS I., Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys, Optics Letters 30(13), 2005: 1644-1646. https://doi.org/10.1364/OL.30.001644
  • [10] QIN W., PENG X., Asymmetric cryptosystem based on phase-truncated Fourier transforms, Optics Letters 35(2), 2010: 118-120. https://doi.org/10.1364/OL.35.000118
  • [11] LIU W., LIU Z., WU J., LIU S., Asymmetric cryptosystem by using modular arithmetic operation based on double random phase encoding, Optics Communications 301-302, 2013: 56-60. https://doi.org/10.1016/j.optcom.2013.03.053
  • [12] WANG Q., GUO Q., ZHOU J., Color image hiding based on phase-truncation and phase retrieval technique in fractional Fourier domain, Optik 124(12), 2013: 1224-1229. https://doi.org/10.1016/j.ijleo.2012.03.004
  • [13] MEHRA I., NISHCHAL N.K., Image fusion using wavelet transform and its application to asymmetric cryptosystem and hiding, Optics Express 22(5), 2014: 5474-5482. https://doi.org/10.1364/OE.22.005474
  • [14] LIU W., XIE Z., LIU Z., ZHANG Y., LIU S., Multiple-image encryption based on optical asymmetric key cryptosystem, Optics Communications 335, 2015: 205-211. https://doi.org/10.1016/j.optcom.2014.09.046
  • [15] SINGH H., Nonlinear optical double image encryption using random-optical vortex in fractional Hartley transform domain, Optica Applicata 47(4), 2017: 557-578. https://doi.org/10.5277/oa170406
  • [16] SACHIN S., KUMAR R., SINGH P., Unequal modulus decomposition and modified Gerchberg Saxton algorithm based asymmetric cryptosystem in Chirp-Z transform domain, Optical and Quantum Electronics 53, 2021: 254. https://doi.org/10.1007/s11082-021-02908-w
  • [17] KUMAR R., QUAN C., Asymmetric multi-user optical cryptosystem based on polar decomposition and Shearlet transform, Optics and Laser in Engineering 120, 2019: 118-126. https://doi.org/10.1016/j.optlaseng.2019.03.024
  • [18] GIRIJA R., SINGH H., Enhancing security of double radom phase encoding based on radom S-box, 3D Research 9, 2018: 15. https://doi.org/10.1007/s13319-018-0165-z
  • [19] GIRIJA R., SINGH H., An asymmetric cryptosystem based on the random weighted singular value decomposition and fractional Hartley domain, Multimedia Tools and Applications 79, 2020: 34717-34735. https://doi.org/10.1007/s11042-019-7733-y
  • [20] YADAV A.K., SINGH P., SAINI I., SINGH K., Asymmetric encryption algorithm for colour images based on fractional Hartley transform, Journal of Modern Optics 66(6), 2019: 629-642. https://doi.org/10.1080/09500340.2018.1559951
  • [21] KHURANA M., SINGH H., An asymmetric image encryption based on phase truncated hybrid transform, 3D Research 8, 2017: 28. https://doi.org/10.1007/s13319-017-0137-8
  • [22] ANSHULA, SINGH H., Security-enrichment of an asymmetric optical image encryption-based devil’s vortex Fresnel lens phase mask and lower upper decomposition with partial pivoting in gyrator transform domain, Optical Quantum Electronics 53, 2021: 204. https://doi.org/10.1007/s11082-021-02854-7
  • [23] SANGWAN A., SINGH H., A secure asymmetric optical image encryption based on phase truncation and singular value decomposition in linear canonical transform domain, International Journal of Optics, Vol. 2021, 2021: 5510125. https://doi.org/10.1155/2021/5510125
  • [24] CAI J., SHEN X., LEI M., LIN C., DOU S., Asymmetric optical cryptosystem based on coherent superposition and equal modulus decomposition, Optics Letters 40(4), 2015: 475-478. https://doi.org/10.1364/OL.40.000475
  • [25] ANJANA S., RAKHEJA P., YADAV A., SINGH P., SINGH H., Asymmetric double image encryption, compression and watermarking scheme based on orthogonal-triangular decomposition with column pivoting, Optica Applicata 52(2), 2022: 283-295. https://doi.org/10.37190/oa220210
  • [26] GAUR K.S., SINGH H., THAKRAN S., Asymmetric cryptosystem using QZ modulation with SPM in Fresnel domain, Journal of Optics 52, 2023: 1694-1703. https://doi.org/10.1007/s12596-022-00990-1
  • [27] BARRERA J.F., HENAO R., TORROBA R., Fault tolerances using toroidal zone plate encryption, Optics Communications 256(4-6), 2005: 489-494. https://doi.org/10.1016/j.optcom.2005.06.077
  • [28] DAVIS J.A., MCNAMARA D.E., COTTRELL D.M., CAMPOS J., Image processing with the radial Hilbert transform: Theory and experiments, Optics Letters 25(2), 2000: 99-101. https://doi.org/10.1364/OL.25.000099
  • [29] SINGH H., Watermarking image encryption using deterministic phase mask and singular value decomposition in fractional Mellin transform domain, IET Image Processing 12(11), 2018: 1994-2001. https://doi.org/10.1049/iet-ipr.2018.5399
  • [30] SINGH H., Devil’s vortex Fresnel lens phase masks on an asymmetric cryptosystem based on phase truncation in gyrator wavelet transform domain, Optics and Lasers in Engineering 81, 2016: 125-139. https://doi.org/10.1016/j.optlaseng.2016.01.014
  • [31] SINGH H., YADAV A.K., VASHISTH S., SINGH K., Fully phase image encryption using double random-structured phase masks in gyrator domain, Applied Optics 53(28), 2014: 6472-6481. https://doi.org/10.1364/AO.53.006472
  • [32] WANG Y., QUAN C., TAY C.J., New method of attack and security enhancement on an asymmetric cryptosystem based on equal modulus decomposition, Applied Optics 55(4), 2016: 679-686. https://doi.org/10.1364/AO.55.000679
  • [33] XU H., XU W., WANG S., WU S., Phase-only asymmetric optical cryptosystem based on random modulus decomposition, Journal of Modern Optics 65(10), 2018: 1245-1252. https://doi.org/10.1080/09500340.2018.1431314
  • [34] RAKHEJA P., VIG R., SINGH P., An asymmetric watermarking scheme based on random decomposition in hybrid multi-resolution wavelet domain using 3D Lorenz chaotic system, Optik 198, 2019: 163289. https://doi.org/10.1016/j.ijleo.2019.163289
  • [35] YADAV S., SINGH H., Image encryption algorithm based on rear-mounted phase mask and random decomposition, Optica Applicata 52(2), 2022: 195-212. https://doi.org/10.37190/oa220204
Uwagi
Opracowanie rekordu ze środków MNiSW, umowa nr SONP/SP/546092/2022 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2024).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-ff39bf4a-751a-4126-b1f7-184558ed940f
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.