Radon Transforms and Chaotic Mask Based Image Encryption for Information Security
Recent advances in image encryption techniques are capable of protecting the digital images which are being communicated over various transmission media from leakage. Images related to medical or military applications, corporate video conference, etc. need reliable and secure transmission, which can be achieved by encryption. Here we propose an efficient optical image encryption technique using Radon Transforms and Chaotic phase mask.
- 1.H.K.L. Chang, J.L. Liu, A linear quad tree compression scheme for image encryption, Signal Process. 10 (4) (1997) 279–290.Google Scholar
- 2.769 J. Scharinger, Fast encryption of image data using chaotic Kolmogrov flow, J. Electronic Eng 7 (2) (1998) 318–325.Google Scholar
- 3.N. Bourbakis, C. Alexopoulos, Picture data encryption using SCAN pattern, Pattern Recogn. 25 (1992) 567–581.Google Scholar
- 4.Fridrich Jiri, Symmetric ciphers based on two dimensional chaotic maps, Int. J. Bifurcat Chaos 8 (6) (1998) 1259–1284.Google Scholar
- 5.Refregier, B Javidi, Optical image encryption based on input plane and fourier plane random encoding, Opt. Lett. 20 (1995) 767.Google Scholar
- 6.H. Cheng, X.B. Li, Partial encryption of compressed image and videos, IEEE Trans. Signal Process. 48 (8) (2000) 2439–2451.Google Scholar
- 7.J.C. Yen, J.I. Guo, An efficient hierarchical chaotic image encryption algorithm and its VLSI realization, IEE Proc. Vis. Image Process. 147 (2000) 167–175.Google Scholar
- 8.J.C. Yen, J.I. Guo, A new image encryption algorithm and its VLSI architecture, in: Proceedings of the IEEE workshop signal processing systems, 1999, pp. 430–437.Google Scholar
- 9.C.C. Chang, M.S. Hwang, T.S. Chen, A new encryption algorithm for image cryptosystems, J. Syst. Software 58 (2001) 83–91. 749–761.Google Scholar
- 10.J.C. Yen, J.I. Guo, A new chaotic key based design for image encryption and decryption, Proceedings of the IEEE International Symposium Circuits and Systems, vol. 4, 2000, pp. 49–52.Google Scholar
- 11.Nishchal NK, Joseph J, Singh K. Fully phase-encrypted memory using cascaded extended fractional Fourier transform. Opt Lasers Eng 2004;42(2):141–51.Google Scholar
- 12.X. Li, D. Zhao, Optical color image encryption with re defined fractional Hartley transform, Opt. Int. J. Light Electron. Opt. (2009), doi: 10.1016/j.ijleo.2008.10.008.
- 13.Naveen Kumar Nishchal, Joby Joseph, Kehar Singh, “Fully phase-encrypted memory using cascaded extended fractional Fourier transform”, Optics and Lasers in Engineering 42 (2004) 141–151.Google Scholar
- 14.Madan Singh a, Arvind Kumar b,_, Kehar Singh, “Optical security system using jigsaw transforms of the second random phase mask and the encrypted image in a double random phase encoding system”, Optics and Lasers in Engineering 46 (2008) 763–768.Google Scholar
- 15.M. Singh, et al., Encryption and decryption using a sandwich phase diffuser made by using two speckle patterns and placed in the Fourier plane: Simulation results, Opt. Int. J. Light Electron. Opt. (2008), doi: 10.1016/j.ijleo.2008.03.025.
- 16.Yong-Ying Wang_, Yu-Rong Wang, Yong Wang, Hui-Juan Li, Wen-Jia Sun, “Optical image encryption based on binary Fourier transform computer-generated hologram and pixel scrambling technology”, Optics and Lasers in Engineering 45 (2007) 761–765.Google Scholar
- 17.Huijuan Li, Yurong Wang, “Double-image encryption based on iterative gyrator transform”, Optics Communications 281 (2008) 5745–5749.Google Scholar
- 18.Narendra Singh, Aloka Sinha, “Gyrator transform-based optical image encryption, using chaos”, Optics and Lasers in Engineering 47(2009) 539–546.Google Scholar