Abstract
Motivated by the endurance of phase truncated asymmetric optical cryptosystems against basic attacks, single-channel encryption technique for a color image is proposed, that uses singular value decomposition, and affine transform in gyrator domain. Color 8 images have been used to validate the scheme. The input color image is split into its indexed components-RGB (red, green and blue). The red component of the input image is used as plaintext, and the other two components are used as phase in the encryption scheme. Experimental results presented in the paper are based on computation on MATLAB. The results show that the scheme endures occlusion and noise attacks. The simulation also confirmed the scheme’s sensitivity to the encryption parameters of affine transform and gyrator transform. The overall results show that the proposed encryption scheme exhibits high levels of security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Refregier, P., Javidi, B.: Optical image encryption based on input plane and Fourier plane random encoding. Opt. Lett. 20, 767–769 (1995)
Sharma, N., Saini, I., Yadav, A., Singh, P.: Phase-image encryption based on 3D-Lorenz chaotic system and double random phase encoding. 3D Res. 8, 1–17 (2017)
Singh, P., Yadav, A.K., Singh, K., Saini, I.: Optical image encryption in the fractional Hartley domain, using Arnold transform and singular value decomposition. AIP Conf. Proc. 1802, 020017 (2017)
Yadav, A.K., Singh, P., Singh, K.: Cryptosystem based on devil’s vortex Fresnel lens in the fractional Hartley domain. J. Opt. (2017). https://doi.org/10.1007/s12596-017-0435-9
Peng, X., Zhang, P., Wei, H., Yu, B.: Known-plaintext attack on optical encryption based on double random phase keys. Opt. Lett. 31, 1044–1046 (2006)
Carnicer, A., Montes-Usategui, M., Arcos, S., Juvells, I.: Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. Opt. Lett. 30, 1644–1646 (2005)
Jiao, S., Li, G., Zhou, C., Zou, W., Li, X.: Special ciphertext-only attack to double random phase encryption by plaintext shifting with speckle correlation. JOSA A. 35, A1–A6 (2018)
Qin, W., Peng, X.: Asymmetric cryptosystem based on phase-truncated Fourier transforms. Opt. Lett. 35, 118–120 (2010)
Abuturab, M.R.: Color information cryptosystem based on optical superposition principle and phase-truncated gyrator transform. Appl. Opt. 51, 7994–8002 (2012)
Sui, L., Duan, K., Liang, J., Zhang, Z., Meng, H.: Asymmetric multiple-image encryption based on coupled logistic maps in fractional Fourier transform domain. Opt. Lasers Eng. 62, 139–152 (2014)
Singh, P., Yadav, A.K., Singh, K.: Color image encryption using affine transform in fractional Hartley domain. Opt. Appl. 47, 421–433 (2017)
Singh, P., Yadav, A.K., Singh, K.: Phase image encryption in the fractional Hartley domain using Arnold transform and singular value decomposition. Opt. Lasers Eng. 91, 187–195 (2017)
Mehra, I., Nishchal, N.K.: Optical asymmetric image encryption using gyrator wavelet transform. Opt. Commun. 354, 344–352 (2015)
Liu, Z., Guo, Q., Xu, L., Ahmad, M.A., Liu, S.: Double image encryption by using iterative random binary encoding in gyrator domains. Opt. Express 18, 12033–12043 (2010)
Anjana, S., Saini, I., Singh, P., Yadav, A.K.: Asymmetric cryptosystem using affine transform in Fourier domain. In: Bhattacharyya, S., Chaki, N., Konar, D., Chakraborty, U.K., Singh, C.T. (eds.) Advanced Computational and Communication Paradigms. Springer Singapore, Singapore (2018)
Acknowledgements
The authors would like to thank the anonymous reviewers for their suggestions to improve the overall quality of the paper. The image ‘Man’ used for the MATLAB simulation in this paper, belongs to one of the authors (Jaideep Kumar). The authors are fully authorized to use the image.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kumar, J., Singh, P., Yadav, A.K., Kumar, A. (2019). Asymmetric Image Encryption Using Gyrator Transform with Singular Value Decomposition. In: Ray, K., Sharan, S., Rawat, S., Jain, S., Srivastava, S., Bandyopadhyay, A. (eds) Engineering Vibration, Communication and Information Processing. Lecture Notes in Electrical Engineering, vol 478. Springer, Singapore. https://doi.org/10.1007/978-981-13-1642-5_34
Download citation
DOI: https://doi.org/10.1007/978-981-13-1642-5_34
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1641-8
Online ISBN: 978-981-13-1642-5
eBook Packages: EngineeringEngineering (R0)