Skip to main content

Asymmetric Image Encryption Using Gyrator Transform with Singular Value Decomposition

  • Conference paper
  • First Online:
Engineering Vibration, Communication and Information Processing

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 478))

Abstract

Motivated by the endurance of phase truncated asymmetric optical cryptosystems against basic attacks, single-channel encryption technique for a color image is proposed, that uses singular value decomposition, and affine transform in gyrator domain. Color 8 images have been used to validate the scheme. The input color image is split into its indexed components-RGB (red, green and blue). The red component of the input image is used as plaintext, and the other two components are used as phase in the encryption scheme. Experimental results presented in the paper are based on computation on MATLAB. The results show that the scheme endures occlusion and noise attacks. The simulation also confirmed the scheme’s sensitivity to the encryption parameters of affine transform and gyrator transform. The overall results show that the proposed encryption scheme exhibits high levels of security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Refregier, P., Javidi, B.: Optical image encryption based on input plane and Fourier plane random encoding. Opt. Lett. 20, 767–769 (1995)

    Article  Google Scholar 

  2. Sharma, N., Saini, I., Yadav, A., Singh, P.: Phase-image encryption based on 3D-Lorenz chaotic system and double random phase encoding. 3D Res. 8, 1–17 (2017)

    Google Scholar 

  3. Singh, P., Yadav, A.K., Singh, K., Saini, I.: Optical image encryption in the fractional Hartley domain, using Arnold transform and singular value decomposition. AIP Conf. Proc. 1802, 020017 (2017)

    Article  Google Scholar 

  4. Yadav, A.K., Singh, P., Singh, K.: Cryptosystem based on devil’s vortex Fresnel lens in the fractional Hartley domain. J. Opt. (2017). https://doi.org/10.1007/s12596-017-0435-9

    Article  Google Scholar 

  5. Peng, X., Zhang, P., Wei, H., Yu, B.: Known-plaintext attack on optical encryption based on double random phase keys. Opt. Lett. 31, 1044–1046 (2006)

    Article  Google Scholar 

  6. Carnicer, A., Montes-Usategui, M., Arcos, S., Juvells, I.: Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. Opt. Lett. 30, 1644–1646 (2005)

    Article  Google Scholar 

  7. Jiao, S., Li, G., Zhou, C., Zou, W., Li, X.: Special ciphertext-only attack to double random phase encryption by plaintext shifting with speckle correlation. JOSA A. 35, A1–A6 (2018)

    Article  Google Scholar 

  8. Qin, W., Peng, X.: Asymmetric cryptosystem based on phase-truncated Fourier transforms. Opt. Lett. 35, 118–120 (2010)

    Article  Google Scholar 

  9. Abuturab, M.R.: Color information cryptosystem based on optical superposition principle and phase-truncated gyrator transform. Appl. Opt. 51, 7994–8002 (2012)

    Article  Google Scholar 

  10. Sui, L., Duan, K., Liang, J., Zhang, Z., Meng, H.: Asymmetric multiple-image encryption based on coupled logistic maps in fractional Fourier transform domain. Opt. Lasers Eng. 62, 139–152 (2014)

    Article  Google Scholar 

  11. Singh, P., Yadav, A.K., Singh, K.: Color image encryption using affine transform in fractional Hartley domain. Opt. Appl. 47, 421–433 (2017)

    Google Scholar 

  12. Singh, P., Yadav, A.K., Singh, K.: Phase image encryption in the fractional Hartley domain using Arnold transform and singular value decomposition. Opt. Lasers Eng. 91, 187–195 (2017)

    Article  Google Scholar 

  13. Mehra, I., Nishchal, N.K.: Optical asymmetric image encryption using gyrator wavelet transform. Opt. Commun. 354, 344–352 (2015)

    Article  Google Scholar 

  14. Liu, Z., Guo, Q., Xu, L., Ahmad, M.A., Liu, S.: Double image encryption by using iterative random binary encoding in gyrator domains. Opt. Express 18, 12033–12043 (2010)

    Article  Google Scholar 

  15. Anjana, S., Saini, I., Singh, P., Yadav, A.K.: Asymmetric cryptosystem using affine transform in Fourier domain. In: Bhattacharyya, S., Chaki, N., Konar, D., Chakraborty, U.K., Singh, C.T. (eds.) Advanced Computational and Communication Paradigms. Springer Singapore, Singapore (2018)

    Google Scholar 

Download references

Acknowledgements

The authors would like to thank the anonymous reviewers for their suggestions to improve the overall quality of the paper. The image ‘Man’ used for the MATLAB simulation in this paper, belongs to one of the authors (Jaideep Kumar). The authors are fully authorized to use the image.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jaideep Kumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kumar, J., Singh, P., Yadav, A.K., Kumar, A. (2019). Asymmetric Image Encryption Using Gyrator Transform with Singular Value Decomposition. In: Ray, K., Sharan, S., Rawat, S., Jain, S., Srivastava, S., Bandyopadhyay, A. (eds) Engineering Vibration, Communication and Information Processing. Lecture Notes in Electrical Engineering, vol 478. Springer, Singapore. https://doi.org/10.1007/978-981-13-1642-5_34

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-1642-5_34

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-1641-8

  • Online ISBN: 978-981-13-1642-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics