Abstract
Known-plaintext attack based on particle swarm optimization algorithm is mounted successfully on an image encryption scheme that uses single-fractional Hartley transform. The results point out that the proposed algorithm successfully retrieved the fractional orders of the transform, which forms the secret keys. Robustness of the algorithm is tested on noisy and missing data encrypted images. The secret keys are successfully retrieved in the presence of Gaussian noise of considerable strength. This study brings out the success of particle swarm optimization algorithm in mounting known-plaintext attack on an optical image encryption scheme in fractional Hartley domain.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Refregier, P., Javidi, B.: Optical image encryption based on input plane and Fourier plane random encoding. Opt. Lett. 20, 767–769 (1995)
Peng, X., Zhang, P., Wei, H., Yu, B.: Known-plaintext attack on optical encryption based on double random phase keys. Opt. Lett. 31, 1044–1046 (2006)
Carnicer, A., Montes-Usategui, M., Arcos, S., Juvells, I.: Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. Opt. Lett. 30, 1644–1646 (2005)
Jiao, S., Li, G., Zhou, C., Zou, W., Li, X.: Special ciphertext-only attack to double random phase encryption by plaintext shifting with speckle correlation. JOSA A. 35, A1–A6 (2018)
Pei, S.-C., Tseng, C.-C., Yeh, M.-H., Shyu, J.-J.: Discrete fractional Hartley and Fourier transforms. IEEE Trans. Circuits Syst. II: Analog Digit. Signal Process. 45, 665–675 (1998)
Zhao, D., Li, X., Chen, L.: Optical image encryption with redefined fractional Hartley transform. Opt. Commun. 281, 5326–5329 (2008)
Singh, P., Yadav, A., Singh, K.: Color image encryption using affine transform in fractional Hartley domain. Opt. Appl. 47, 421–433 (2017)
Yao, L., Yuan, C., Qiang, J., Feng, S., Nie, S.: An asymmetric color image encryption method by using deduced gyrator transform. Opt. Lasers Eng. 89, 72–79 (2017)
Unnikrishnan, G., Joseph, J., Singh, K.: Optical encryption by double-random phase encoding in the fractional Fourier domain. Opt. Lett. 25, 887–889 (2000)
Qin, W., Peng, X.: Vulnerability to known-plaintext attack of optical encryption schemes based on two fractional Fourier transform order keys and double random phase keys. J. Opt. Pure Appl. Opt. 11, 075402 (2009)
Yadav, A.K., Singh, P., Singh, K.: Cryptosystem based on devil’s vortex Fresnel lens in the fractional Hartley domain. J. Opt. (2017). https://doi.org/10.1007/s12596-017-0435-9
Singh, P., Yadav, A.K., Singh, K., Saini, I.: Optical image encryption in the fractional Hartley domain, using Arnold transform and singular value decomposition. AIP Conf. Proc. 1802, 020017 (2017)
Singh, P., Yadav, A.K., Singh, K.: Phase image encryption in the fractional Hartley domain using Arnold transform and singular value decomposition. Opt. Lasers Eng. 91, 187–195 (2017)
Vilardy, J.M., Torres, C.O., Jimenez, C.J.: Double image encryption method using the Arnold transform in the fractional Hartley domain. In: Proceedings of SPIE 8785, 8th Iberoamerican Optics Meeting and 11th Latin American Meeting on Optics, Lasers, and Applications, vol. 87851R, pp. 87851R-5 (2013)
Singh, P., Yadav, A.K., Singh, K.: Color image encryption using affine transform in fractional Hartley domain. Opt. Appl. 47, 421–433 (2017)
Kennedy, J., Eberhart, R.: Particle swarm optimization. In: 1995 Proceedings of IEEE International Conference on Neural Networks (1995)
Li, J.: An optimized watermarking scheme using an encrypted gyrator transform computer generated hologram based on particle swarm optimization. Opt. Express 22, 10002 (2014)
Sang, J., Zhao, J., Xiang, Z., Cai, B., Xiang, H.: Security analysis of image encryption based on gyrator transform by searching the rotation angle with improved pso algorithm. Sensors 15, 19199–19211 (2015)
Poli, R., Kennedy, J., Blackwell, T.: Particle swarm optimization: An overview. Swarm Intell. 1, 33–57 (2007)
Sharma, N., Saini, I., Yadav, A., Singh, P.: Phase-image encryption based on 3D-Lorenz chaotic system and double random phase encoding. 3D Res. 8, 1–17 (2017)
Anjana, S., Saini, I., Singh, P., Yadav, A.K.: Asymmetric Cryptosystem Using Affine Transform in Fourier Domain. In: Bhattacharyya, S., Chaki, N., Konar, D., Chakraborty, U.K., Singh, C.T., (eds.) Advanced Computational and Communication Paradigms. Springer, Singapore (2018)
Acknowledgements
We thank Yarpiz team for putting exhaustive details of MATLAB coding of artificial intelligence techniques (particularly PSO) on yarpiz.com. One of the authors (Phool Singh) is guardian of the boy, whose image is used in the MATLAB simulation as Boy. The authors are fully authorized to use the image.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Singh, P., Yadav, A.K., Singh, K. (2019). Known-Plaintext Attack on Cryptosystem Based on Fractional Hartley Transform Using Particle Swarm Optimization Algorithm. In: Ray, K., Sharan, S., Rawat, S., Jain, S., Srivastava, S., Bandyopadhyay, A. (eds) Engineering Vibration, Communication and Information Processing. Lecture Notes in Electrical Engineering, vol 478. Springer, Singapore. https://doi.org/10.1007/978-981-13-1642-5_29
Download citation
DOI: https://doi.org/10.1007/978-981-13-1642-5_29
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1641-8
Online ISBN: 978-981-13-1642-5
eBook Packages: EngineeringEngineering (R0)