Advertisement

Radon Transforms and Chaotic Mask Based Image Encryption for Information Security

  • Avinash Kumar JhaEmail author
  • Sajan Ambadiyil
  • Himanshu Shekhar
Conference paper
Part of the Springer Proceedings in Physics book series (SPPHY, volume 194)

Abstract

Recent advances in image encryption techniques are capable of protecting the digital images which are being communicated over various transmission media from leakage. Images related to medical or military applications, corporate video conference, etc. need reliable and secure transmission, which can be achieved by encryption. Here we propose an efficient optical image encryption technique using Radon Transforms and Chaotic phase mask.

References

  1. 1.
    H.K.L. Chang, J.L. Liu, A linear quad tree compression scheme for image encryption, Signal Process. 10 (4) (1997) 279–290.Google Scholar
  2. 2.
    769 J. Scharinger, Fast encryption of image data using chaotic Kolmogrov flow, J. Electronic Eng 7 (2) (1998) 318–325.Google Scholar
  3. 3.
    N. Bourbakis, C. Alexopoulos, Picture data encryption using SCAN pattern, Pattern Recogn. 25 (1992) 567–581.Google Scholar
  4. 4.
    Fridrich Jiri, Symmetric ciphers based on two dimensional chaotic maps, Int. J. Bifurcat Chaos 8 (6) (1998) 1259–1284.Google Scholar
  5. 5.
    Refregier, B Javidi, Optical image encryption based on input plane and fourier plane random encoding, Opt. Lett. 20 (1995) 767.Google Scholar
  6. 6.
    H. Cheng, X.B. Li, Partial encryption of compressed image and videos, IEEE Trans. Signal Process. 48 (8) (2000) 2439–2451.Google Scholar
  7. 7.
    J.C. Yen, J.I. Guo, An efficient hierarchical chaotic image encryption algorithm and its VLSI realization, IEE Proc. Vis. Image Process. 147 (2000) 167–175.Google Scholar
  8. 8.
    J.C. Yen, J.I. Guo, A new image encryption algorithm and its VLSI architecture, in: Proceedings of the IEEE workshop signal processing systems, 1999, pp. 430–437.Google Scholar
  9. 9.
    C.C. Chang, M.S. Hwang, T.S. Chen, A new encryption algorithm for image cryptosystems, J. Syst. Software 58 (2001) 83–91. 749–761.Google Scholar
  10. 10.
    J.C. Yen, J.I. Guo, A new chaotic key based design for image encryption and decryption, Proceedings of the IEEE International Symposium Circuits and Systems, vol. 4, 2000, pp. 49–52.Google Scholar
  11. 11.
    Nishchal NK, Joseph J, Singh K. Fully phase-encrypted memory using cascaded extended fractional Fourier transform. Opt Lasers Eng 2004;42(2):141–51.Google Scholar
  12. 12.
    X. Li, D. Zhao, Optical color image encryption with re defined fractional Hartley transform, Opt. Int. J. Light Electron. Opt. (2009), doi: 10.1016/j.ijleo.2008.10.008.
  13. 13.
    Naveen Kumar Nishchal, Joby Joseph, Kehar Singh, “Fully phase-encrypted memory using cascaded extended fractional Fourier transform”, Optics and Lasers in Engineering 42 (2004) 141–151.Google Scholar
  14. 14.
    Madan Singh a, Arvind Kumar b,_, Kehar Singh, “Optical security system using jigsaw transforms of the second random phase mask and the encrypted image in a double random phase encoding system”, Optics and Lasers in Engineering 46 (2008) 763–768.Google Scholar
  15. 15.
    M. Singh, et al., Encryption and decryption using a sandwich phase diffuser made by using two speckle patterns and placed in the Fourier plane: Simulation results, Opt. Int. J. Light Electron. Opt. (2008), doi: 10.1016/j.ijleo.2008.03.025.
  16. 16.
    Yong-Ying Wang_, Yu-Rong Wang, Yong Wang, Hui-Juan Li, Wen-Jia Sun, “Optical image encryption based on binary Fourier transform computer-generated hologram and pixel scrambling technology”, Optics and Lasers in Engineering 45 (2007) 761–765.Google Scholar
  17. 17.
    Huijuan Li, Yurong Wang, “Double-image encryption based on iterative gyrator transform”, Optics Communications 281 (2008) 5745–5749.Google Scholar
  18. 18.
    Narendra Singh, Aloka Sinha, “Gyrator transform-based optical image encryption, using chaos”, Optics and Lasers in Engineering 47(2009) 539–546.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2017

Authors and Affiliations

  • Avinash Kumar Jha
    • 1
    Email author
  • Sajan Ambadiyil
    • 2
  • Himanshu Shekhar
    • 1
  1. 1.Hindustan Institute of Technology & ScienceChennaiIndia
  2. 2.Center for Development of Imaging TechnologyTrivandrumIndia

Personalised recommendations