首页 | 本学科首页   官方微博 | 高级检索  
     


Nonlinear image encryption using a fully phase nonzero-order joint transform correlator in the Gyrator domain
Affiliation:1. Grupo de Óptica e Informática, Department of Electronic Engineering, Universidad Popular del Cesar, Valledupar (Cesar), Colombia;2. Applied Optics and Image Processing Group, Department of Optics and Optometry, Universitat Politècnica de Catalunya ·BarcelonaTech, Terrassa (Barcelona), Spain;1. Universitat de Barcelona (UB), Facultat de Física, Departament de Física Aplicada, Martí i Franquès 1, 08028 Barcelona, Spain;2. Electrical and Computer Engineering Department, University of Connecticut, 371 Fairfield Road, Storrs, CT 06269-4157, USA;3. Universidad Complutense de Madrid, Facultad de Ciencias Físicas, Departamento de Óptica, Ciudad Universitaria s/n, 28040 Madrid, Spain
Abstract:A novel nonlinear image encryption scheme based on a fully phase nonzero-order joint transform correlator architecture (JTC) in the Gyrator domain (GD) is proposed. In this encryption scheme, the two non-overlapping data distributions of the input plane of the JTC are fully encoded in phase and this input plane is transformed using the Gyrator transform (GT); the intensity distribution captured in the GD represents a new definition of the joint Gyrator power distribution (JGPD). The JGPD is modified by two nonlinear operations with the purpose of retrieving the encrypted image, with enhancement of the decrypted signal quality and improvement of the overall security. There are three keys used in the encryption scheme, two random phase masks and the rotation angle of the GT, which are all necessary for a proper decryption. Decryption is highly sensitivity to changes of the rotation angle of the GT as well as to little changes in other parameters or keys. The proposed encryption scheme in the GD still preserves the shift-invariance properties originated in the JTC-based encryption in the Fourier domain. The proposed encryption scheme is more resistant to brute force attacks, chosen-plaintext attacks, known-plaintext attacks, and ciphertext-only attacks, as they have been introduced in the cryptanalysis of the JTC-based encryption system. Numerical results are presented and discussed in order to verify and analyze the feasibility and validity of the novel encryption–decryption scheme.
Keywords:Encryption and decryption systems  Joint transform correlator  Double random phase encoding  Gyrator transform  Phase retrieval
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号