共查询到20条相似文献,搜索用时 12 毫秒
1.
We numerically demonstrate that the image encryption algorithm with intensity random filtering in the Hartley domain proposed in a recent Letter by Chen and Zhao [Opt. Lett.31, 3438 (2006)] has the problem of low security. Original image information can be visually revealed only by an inverse Hartley transform without any decryption key. 相似文献
2.
Narendra Singh 《Optik》2010,121(10):918-925
We propose a new method for image encryption using improper Hartley transform and chaos theory. Improper Hartley transform is a Hartley transform in which the phase between the two Fourier transforms is a fractional multiple of π/2. This fractional order is called fractional parameter and serves as a key in the image encryption and decryption process. Four types of chaos functions have been used. These functions are the logistic map, the tent map, the Kaplan-Yorke map and the Ikeda map. Random intensity masks have been generated using these chaotic functions and are called chaotic random intensity masks. The image is encrypted by using improper Hartley transform and two chaotic random intensity masks. The mean square error has been calculated. The robustness of the proposed technique in terms of blind decryption has been tested. The computer simulations are presented to verify the validity of the proposed technique. 相似文献
3.
A new method for optical image encryption is introduced on the basis of two-dimensional (2-D) generalization of 1-D fractional Hartley transform that has been redefined recently in search of its inverse transform. We encrypt the image by two fractional orders and random phase codes. It has an advantage over Hartley transform, for its fractional orders can also be used as additional keys, and that, of course, strengthens image security. Only when all of these keys are correct, can the image be well decrypted. The optical realization is then proposed and computer simulations are also performed to confirm the possibility of the proposed method. 相似文献
4.
We propose a new method for color image encryption by wavelength multiplexing on the basis of two-dimensional (2-D) generalization of 1-D fractional Hartley transform that has been redefined recently in search of its inverse transform. A color image can be considered as three monochromatic images and then divided into three components and each component is encrypted independently with different wavelength corresponding to red, green or blue light. The system parameters of fractional Hartley transform and random phase masks are keys in the color image encryption and decryption. Only when all of these keys are correct, can the image be well decrypted. The optical realization is then proposed and computer simulations are also performed to confirm the possibility of the proposed method. 相似文献
5.
Narendra Singh 《Optics Communications》2009,282(6):1104-5407
We propose a new method for image encryption using Hartley transform with jigsaw transform and logistic map. Logistic map has been used to generate the random intensity mask which is known as chaotic random intensity mask. The problem of bare decryption with Hartley transform has been solved by using the jigsaw transform. In the proposed technique, the image is encrypted using two methods in which the second method is the extension of the first method. In the first method, the image is encrypted using Hartley transform and jigsaw transform. In the second method, the image is encrypted using Hartley transform, jigsaw transform and logistic map. The mean square errors and the signal to noise ratio have been calculated. Robustness of the technique in terms of blind decryption and the algorithmic complexity has been evaluated. The optical implementation has been proposed. The computer simulations are presented to verify the validity of the proposed technique. 相似文献
6.
We propose a new image encryption algorithm based on a generalized fractional Fourier transform, to which we refer as a multifractional Fourier transform. We encrypt the input image simply by performing the multifractional Fourier transform with two keys. Numerical simulation results are given to verify the algorithm, and an optical implementation setup is also suggested. 相似文献
7.
Narendra Singh 《Optics & Laser Technology》2010,42(5):724-588
We propose a new method for multiple image encryption using linear canonical transforms and chaotic maps. Three linear canonical transforms and three chaotic maps are used in the proposed technique. The three linear canonical transforms that have been used are the fractional Fourier transform, the extended fractional Fourier transform and the Fresnel transform. The three chaotic maps that have been used are the tent map, the Kaplan-Yorke map and the Ikeda map. These chaotic maps are used to generate the random phase masks and these random phase masks are known as chaotic random phase masks. The mean square error and the signal to noise ratio have been calculated. Robustness of the proposed technique to blind decryption has been evaluated. Optical implementation of the technique has been proposed. Experimental and simulations results are presented to verify the validity of the proposed technique. 相似文献
8.
Optical image encryption based on interference 总被引:2,自引:0,他引:2
We proposed a novel architecture for optical image encryption based on interference. The encryption algorithm for this new method is quite simple and does not need iterative encoding. The parameters of the configuration can also serve as additional keys for encryption. Numerical simulation results demonstrate the flexibility of this new proposed method. 相似文献
9.
Optical image encryption based on diffractive imaging 总被引:3,自引:0,他引:3
In this Letter, we propose a method for optical image encryption based on diffractive imaging. An optical multiple random phase mask encoding system is applied, and one of the phase-only masks is selected and laterally translated along a preset direction during the encryption process. For image decryption, a phase retrieval algorithm is proposed to extract a high-quality plaintext. The feasibility and effectiveness of the proposed method are demonstrated by numerical results. The proposed method can provide a new strategy instead of conventional interference methods, and it may open up a new research perspective for optical image encryption. 相似文献
10.
An asymmetric single-channel color image encryption based on Hartley transform and gyrator transform
A novel asymmetric single-channel color image encryption using Hartley transform and gyrator transform is proposed. A color image is segregated into R, G, and B channels and then each channel is independently Hartley transformed. The three transformed channels are multiplied and then phase- and amplitude truncated to obtain first encrypted image and first decryption key. The encoded image is modulated with a conjugate of random phase mask. The modulated image is gyrator transformed and then phase- and amplitude truncated to get second encrypted image and second decryption key. The asymmetric (decryption) keys, random phase mask, and transformation angle of gyrator transform serve as main keys. The optoelectronic encryption and decryption systems are suggested. Numerical simulation results have been demonstrated to verify the performance and security of the proposed security system. 相似文献
11.
Optical image encryption with multistage and multichannel fractional Fourier-domain filtering 总被引:7,自引:0,他引:7
We present a novel image-encryption algorithm that employs multichannel and multistage fractional Fourier-domain filtering architecture. We perform the encryption and decryption by randomly filtering the spatial frequency of the image and then recombining the information from the algorithm in a multistage fractional Fourier domain with pure random-intensity-encoded masks and their complements in a multichannel scheme. The algorithm can be implemented iteratively in an electro-optical setup. Numerical simulations have verified the validity of the algorithm. 相似文献
12.
Zhengjun Liu Jingmin Dai Xiaogang Sun Shutian Liu 《Optics and Lasers in Engineering》2010,48(7-8):800-805
We propose an algorithm to encrypt color image by using the rotation of color vector based on discrete Hartley transform. The three component images (red, green and blue) of color image are regarded as the axes of Cartesian coordinates. Two random angle shifts are introduced to rotate the color vectors composed by the three color components in discrete Hartley transform domains in image encryption process. The corresponding rotation shifts of the two angles can serve as the key of the scheme. Moreover the encrypted image is encoded with real number. Some numerical simulations have demonstrated the possibility of the proposed scheme. 相似文献
13.
针对以往光学图像加密系统中输入面和频谱面对称性的缺点,在不增加系统元件的基础上,利用球面波照射不对称非标准傅里叶变换系统进行图像加密。通过把相位掩模置于该系统的傅里叶变换平面,利用不对称非标准傅里叶变换系统的输入面和频谱面的不对称性以及频谱面对于点光源相关参数的依赖性,克服了以前光学加密系统中输入面和频谱面的对称性所带来的安全隐患,并且获得了除相位掩模以外的另外四重密匙。理论分析和模拟实验表明:该方法不仅可行,而且多增加了几重密匙,增强了系统的安全性能。 相似文献
14.
We proposed a method for optical image encryption on the basis of interference theory. An optical image can be produced by the interference of two beams passed two different masks. One of the masks can only modulate the phase of the beam and another can only modulate the amplitude of the beam. The encryption method is quite simple and does not need iterative algorithm. The results of simulation coincide with our method and demonstrate the feasibility of this method. 相似文献
15.
We propose a new method for image encryption using fractional Fourier transform and chaos theory. Random phase masks are generated using iterative chaos functions. The input image is combined with the first random phase mask at the object plane and is then transformed using the fractional Fourier transform. After the first fractional Fourier transform, the second random phase mask, again generated by using the chaos functions, is used at the fractional plane. The second fractional Fourier transform operation is then carried out to obtain the encrypted image. Three types of chaos functions have been used: the logistic map, the tent map and the Kaplan–Yorke map. The mean square error and the signal-to-noise ratio between the decrypted image and the input image for the correct order and the incorrect order of the fractional Fourier transform have been calculated. The computer simulations are presented to verify the validity of the proposed technique. 相似文献
16.
In this paper, a new chaos-based partial image encryption scheme based on Substitution-boxes (S-box) constructed by chaotic system and Linear Fractional Transform (LFT) is proposed. It encrypts only the requisite parts of the sensitive information in Lifting-Wavelet Transform (LWT) frequency domain based on hybrid of chaotic maps and a new S-box. In the proposed encryption scheme, the characteristics of confusion and diffusion are accomplished in three phases: block permutation, substitution, and diffusion. Then, we used dynamic keys instead of fixed keys used in other approaches, to control the encryption process and make any attack impossible. The new S-box was constructed by mixing of chaotic map and LFT to insure the high confidentiality in the inner encryption of the proposed approach. In addition, the hybrid compound of S-box and chaotic systems strengthened the whole encryption performance and enlarged the key space required to resist the brute force attacks. Extensive experiments were conducted to evaluate the security and efficiency of the proposed approach. In comparison with previous schemes, the proposed cryptosystem scheme showed high performances and great potential for prominent prevalence in cryptographic applications. 相似文献
17.
A novel scheme for image encryption of phase images is proposed, using fractional Hartley transform followed by Arnold transform and singular value decomposition in the frequency domain. Since the plaintext is a phase image, the mask used in the spatial domain is a random amplitude mask. The proposed scheme has been validated for grayscale images and is sensitive to the encryption parameters such as the order of the Arnold transform and the fractional orders of the Hartley transform. We have also evaluated the scheme's resistance to the well-known noise and occlusion attacks. 相似文献
18.
A number of methods have recently been proposed in the literature for the encryption of two-dimensional information by use of optical systems based on the fractional Fourier transform. Typically, these methods require random phase screen keys for decrypting the data, which must be stored at the receiver and must be carefully aligned with the received encrypted data. A new technique based on a random shifting, or jigsaw, algorithm is proposed. This method does not require the use of phase keys. The image is encrypted by juxtaposition of sections of the image in fractional Fourier domains. The new method has been compared with existing methods and shows comparable or superior robustness to blind decryption. Optical implementation is discussed, and the sensitivity of the various encryption keys to blind decryption is examined. 相似文献
19.
A novel image encryption algorithm is proposed based on the multiple-parameter fractional Fourier transform, which is a generalized fractional Fourier transform, without the use of phase keys. The image is encrypted simply by performing a multiple-parameter fractional Fourier transform with four keys. Optical implementation is suggested. The method has been compared with existing methods and shows superior robustness to blind decryption. 相似文献
20.
Qu Wang 《Optics Communications》2012,285(21-22):4294-4301
To completely eliminate the silhouette problem that inherently exists in the earlier interference-based encryption scheme with two phase-only masks (POMs), we propose a simple new encryption method based on optical interference of one random POM and two analytically obtained POMs. Different from the previous methods which require time-consuming iterative computation or postprocessing of the POMs for silhouette removal, our method can resolve the problem during the production of the POMs based on interference principle. Information associated with the original image is smoothed away by modulation of the random POM. Illegal deciphers cannot retrieve the primitive image using only one or two of the POMs. Incorporated with the linear phase blend operation, our method can provide higher robustness against brute force attacks. Simulation results are presented to support the validity and feasibility of our method. 相似文献