Skip to main content

Known-Plaintext Attack on Cryptosystem Based on Fractional Hartley Transform Using Particle Swarm Optimization Algorithm

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 478))

Abstract

Known-plaintext attack based on particle swarm optimization algorithm is mounted successfully on an image encryption scheme that uses single-fractional Hartley transform. The results point out that the proposed algorithm successfully retrieved the fractional orders of the transform, which forms the secret keys. Robustness of the algorithm is tested on noisy and missing data encrypted images. The secret keys are successfully retrieved in the presence of Gaussian noise of considerable strength. This study brings out the success of particle swarm optimization algorithm in mounting known-plaintext attack on an optical image encryption scheme in fractional Hartley domain.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Refregier, P., Javidi, B.: Optical image encryption based on input plane and Fourier plane random encoding. Opt. Lett. 20, 767–769 (1995)

    Article  Google Scholar 

  2. Peng, X., Zhang, P., Wei, H., Yu, B.: Known-plaintext attack on optical encryption based on double random phase keys. Opt. Lett. 31, 1044–1046 (2006)

    Article  Google Scholar 

  3. Carnicer, A., Montes-Usategui, M., Arcos, S., Juvells, I.: Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. Opt. Lett. 30, 1644–1646 (2005)

    Article  Google Scholar 

  4. Jiao, S., Li, G., Zhou, C., Zou, W., Li, X.: Special ciphertext-only attack to double random phase encryption by plaintext shifting with speckle correlation. JOSA A. 35, A1–A6 (2018)

    Article  Google Scholar 

  5. Pei, S.-C., Tseng, C.-C., Yeh, M.-H., Shyu, J.-J.: Discrete fractional Hartley and Fourier transforms. IEEE Trans. Circuits Syst. II: Analog Digit. Signal Process. 45, 665–675 (1998)

    Article  Google Scholar 

  6. Zhao, D., Li, X., Chen, L.: Optical image encryption with redefined fractional Hartley transform. Opt. Commun. 281, 5326–5329 (2008)

    Article  Google Scholar 

  7. Singh, P., Yadav, A., Singh, K.: Color image encryption using affine transform in fractional Hartley domain. Opt. Appl. 47, 421–433 (2017)

    Google Scholar 

  8. Yao, L., Yuan, C., Qiang, J., Feng, S., Nie, S.: An asymmetric color image encryption method by using deduced gyrator transform. Opt. Lasers Eng. 89, 72–79 (2017)

    Article  Google Scholar 

  9. Unnikrishnan, G., Joseph, J., Singh, K.: Optical encryption by double-random phase encoding in the fractional Fourier domain. Opt. Lett. 25, 887–889 (2000)

    Article  Google Scholar 

  10. Qin, W., Peng, X.: Vulnerability to known-plaintext attack of optical encryption schemes based on two fractional Fourier transform order keys and double random phase keys. J. Opt. Pure Appl. Opt. 11, 075402 (2009)

    Article  Google Scholar 

  11. Yadav, A.K., Singh, P., Singh, K.: Cryptosystem based on devil’s vortex Fresnel lens in the fractional Hartley domain. J. Opt. (2017). https://doi.org/10.1007/s12596-017-0435-9

    Article  Google Scholar 

  12. Singh, P., Yadav, A.K., Singh, K., Saini, I.: Optical image encryption in the fractional Hartley domain, using Arnold transform and singular value decomposition. AIP Conf. Proc. 1802, 020017 (2017)

    Article  Google Scholar 

  13. Singh, P., Yadav, A.K., Singh, K.: Phase image encryption in the fractional Hartley domain using Arnold transform and singular value decomposition. Opt. Lasers Eng. 91, 187–195 (2017)

    Article  Google Scholar 

  14. Vilardy, J.M., Torres, C.O., Jimenez, C.J.: Double image encryption method using the Arnold transform in the fractional Hartley domain. In: Proceedings of SPIE 8785, 8th Iberoamerican Optics Meeting and 11th Latin American Meeting on Optics, Lasers, and Applications, vol. 87851R, pp. 87851R-5 (2013)

    Google Scholar 

  15. Singh, P., Yadav, A.K., Singh, K.: Color image encryption using affine transform in fractional Hartley domain. Opt. Appl. 47, 421–433 (2017)

    Google Scholar 

  16. Kennedy, J., Eberhart, R.: Particle swarm optimization. In: 1995 Proceedings of IEEE International Conference on Neural Networks (1995)

    Google Scholar 

  17. Li, J.: An optimized watermarking scheme using an encrypted gyrator transform computer generated hologram based on particle swarm optimization. Opt. Express 22, 10002 (2014)

    Article  Google Scholar 

  18. Sang, J., Zhao, J., Xiang, Z., Cai, B., Xiang, H.: Security analysis of image encryption based on gyrator transform by searching the rotation angle with improved pso algorithm. Sensors 15, 19199–19211 (2015)

    Article  Google Scholar 

  19. Poli, R., Kennedy, J., Blackwell, T.: Particle swarm optimization: An overview. Swarm Intell. 1, 33–57 (2007)

    Article  Google Scholar 

  20. Sharma, N., Saini, I., Yadav, A., Singh, P.: Phase-image encryption based on 3D-Lorenz chaotic system and double random phase encoding. 3D Res. 8, 1–17 (2017)

    Google Scholar 

  21. Anjana, S., Saini, I., Singh, P., Yadav, A.K.: Asymmetric Cryptosystem Using Affine Transform in Fourier Domain. In: Bhattacharyya, S., Chaki, N., Konar, D., Chakraborty, U.K., Singh, C.T., (eds.) Advanced Computational and Communication Paradigms. Springer, Singapore (2018)

    Google Scholar 

Download references

Acknowledgements

We thank Yarpiz team for putting exhaustive details of MATLAB coding of artificial intelligence techniques (particularly PSO) on yarpiz.com. One of the authors (Phool Singh) is guardian of the boy, whose image is used in the MATLAB simulation as Boy. The authors are fully authorized to use the image.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Phool Singh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Singh, P., Yadav, A.K., Singh, K. (2019). Known-Plaintext Attack on Cryptosystem Based on Fractional Hartley Transform Using Particle Swarm Optimization Algorithm. In: Ray, K., Sharan, S., Rawat, S., Jain, S., Srivastava, S., Bandyopadhyay, A. (eds) Engineering Vibration, Communication and Information Processing. Lecture Notes in Electrical Engineering, vol 478. Springer, Singapore. https://doi.org/10.1007/978-981-13-1642-5_29

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-1642-5_29

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-1641-8

  • Online ISBN: 978-981-13-1642-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics