Skip to main content

Radon Transforms and Chaotic Mask Based Image Encryption for Information Security

  • Conference paper
  • First Online:
Advances in Optical Science and Engineering

Part of the book series: Springer Proceedings in Physics ((SPPHY,volume 194))

Abstract

Recent advances in image encryption techniques are capable of protecting the digital images which are being communicated over various transmission media from leakage. Images related to medical or military applications, corporate video conference, etc. need reliable and secure transmission, which can be achieved by encryption. Here we propose an efficient optical image encryption technique using Radon Transforms and Chaotic phase mask.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. H.K.L. Chang, J.L. Liu, A linear quad tree compression scheme for image encryption, Signal Process. 10 (4) (1997) 279–290.

    Google Scholar 

  2. 769 J. Scharinger, Fast encryption of image data using chaotic Kolmogrov flow, J. Electronic Eng 7 (2) (1998) 318–325.

    Google Scholar 

  3. N. Bourbakis, C. Alexopoulos, Picture data encryption using SCAN pattern, Pattern Recogn. 25 (1992) 567–581.

    Google Scholar 

  4. Fridrich Jiri, Symmetric ciphers based on two dimensional chaotic maps, Int. J. Bifurcat Chaos 8 (6) (1998) 1259–1284.

    Google Scholar 

  5. Refregier, B Javidi, Optical image encryption based on input plane and fourier plane random encoding, Opt. Lett. 20 (1995) 767.

    Google Scholar 

  6. H. Cheng, X.B. Li, Partial encryption of compressed image and videos, IEEE Trans. Signal Process. 48 (8) (2000) 2439–2451.

    Google Scholar 

  7. J.C. Yen, J.I. Guo, An efficient hierarchical chaotic image encryption algorithm and its VLSI realization, IEE Proc. Vis. Image Process. 147 (2000) 167–175.

    Google Scholar 

  8. J.C. Yen, J.I. Guo, A new image encryption algorithm and its VLSI architecture, in: Proceedings of the IEEE workshop signal processing systems, 1999, pp. 430–437.

    Google Scholar 

  9. C.C. Chang, M.S. Hwang, T.S. Chen, A new encryption algorithm for image cryptosystems, J. Syst. Software 58 (2001) 83–91. 749–761.

    Google Scholar 

  10. J.C. Yen, J.I. Guo, A new chaotic key based design for image encryption and decryption, Proceedings of the IEEE International Symposium Circuits and Systems, vol. 4, 2000, pp. 49–52.

    Google Scholar 

  11. Nishchal NK, Joseph J, Singh K. Fully phase-encrypted memory using cascaded extended fractional Fourier transform. Opt Lasers Eng 2004;42(2):141–51.

    Google Scholar 

  12. X. Li, D. Zhao, Optical color image encryption with re defined fractional Hartley transform, Opt. Int. J. Light Electron. Opt. (2009), doi:10.1016/j.ijleo.2008.10.008.

  13. Naveen Kumar Nishchal, Joby Joseph, Kehar Singh, “Fully phase-encrypted memory using cascaded extended fractional Fourier transform”, Optics and Lasers in Engineering 42 (2004) 141–151.

    Google Scholar 

  14. Madan Singh a, Arvind Kumar b,_, Kehar Singh, “Optical security system using jigsaw transforms of the second random phase mask and the encrypted image in a double random phase encoding system”, Optics and Lasers in Engineering 46 (2008) 763–768.

    Google Scholar 

  15. M. Singh, et al., Encryption and decryption using a sandwich phase diffuser made by using two speckle patterns and placed in the Fourier plane: Simulation results, Opt. Int. J. Light Electron. Opt. (2008), doi:10.1016/j.ijleo.2008.03.025.

  16. Yong-Ying Wang_, Yu-Rong Wang, Yong Wang, Hui-Juan Li, Wen-Jia Sun, “Optical image encryption based on binary Fourier transform computer-generated hologram and pixel scrambling technology”, Optics and Lasers in Engineering 45 (2007) 761–765.

    Google Scholar 

  17. Huijuan Li, Yurong Wang, “Double-image encryption based on iterative gyrator transform”, Optics Communications 281 (2008) 5745–5749.

    Google Scholar 

  18. Narendra Singh, Aloka Sinha, “Gyrator transform-based optical image encryption, using chaos”, Optics and Lasers in Engineering 47(2009) 539–546.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Avinash Kumar Jha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Jha, A.K., Ambadiyil, S., Shekhar, H. (2017). Radon Transforms and Chaotic Mask Based Image Encryption for Information Security. In: Bhattacharya, I., Chakrabarti, S., Reehal, H., Lakshminarayanan, V. (eds) Advances in Optical Science and Engineering. Springer Proceedings in Physics, vol 194. Springer, Singapore. https://doi.org/10.1007/978-981-10-3908-9_40

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3908-9_40

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3907-2

  • Online ISBN: 978-981-10-3908-9

  • eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)

Publish with us

Policies and ethics