Image encryption scheme by using iterative random phase encoding in gyrator transform domains

Abstract An image encryption is discussed based on the random phase encoding method in gyrator domains. An iterative structure of image encryption is designed for introducing more random phases to encrypt image. These random phase functions are generated by a two-dimensional chaotic mapping with the help of computer. The random phases are utilized for increasing the security of this encryption algorithm. In the chaotic mapping relation, the initial value and expression can serve as the key of algorithm. The mapping relation is considered secretly for storage and transmission in practical application in comparison to traditional algorithms. The angle parameter of gyrator transform is an additional key. Some numerical simulations have been given to validate the performance of the encryption scheme.

[1]  Huijuan Li,et al.  Double-image encryption based on iterative gyrator transform , 2008 .

[2]  Lu Xi,et al.  Information hiding based on double random-phase encoding and public-key cryptography. , 2009, Optics express.

[3]  Jingjuan Zhang,et al.  Double random-phase encoding in the Fresnel domain. , 2004, Optics letters.

[4]  Ramón Rodríguez-Vera,et al.  Image encryption based on phase encoding by means of a fringe pattern and computational algorithms , 2006 .

[5]  M. L. Calvo,et al.  Gyrator transform: properties and applications. , 2007, Optics express.

[6]  L Z Cai,et al.  Two-step phase-shifting interferometry and its application in image encryption. , 2006, Optics letters.

[7]  Zongwang Lü,et al.  A new cryptosystem based on spatial chaotic system , 2010 .

[8]  Chuang Lin,et al.  Image encryption by encoding with a nonuniform optical beam in gyrator transform domains. , 2010, Applied optics.

[9]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[10]  Unnikrishnan Gopinathan,et al.  Key-space analysis of double random phase encryption technique. , 2007, Applied optics.

[11]  Yan Zhang,et al.  Optical encryption based on iterative fractional Fourier transform , 2002 .

[12]  Peng Zhang,et al.  Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain. , 2006, Optics letters.

[13]  Zhengjun Liu,et al.  Double image encryption by using iterative random binary encoding in gyrator domains. , 2010, Optics express.

[14]  Peng Zhang,et al.  Known-plaintext attack on optical encryption based on double random phase keys. , 2006, Optics letters.

[15]  Ran Tao,et al.  Double image encryption based on random phase encoding in the fractional Fourier domain. , 2007, Optics express.

[16]  Guanglin Yang,et al.  A hybrid heuristic algorithm to improve known-plaintext attack on Fourier plane encryption. , 2009, Optics express.

[17]  José A Rodrigo,et al.  Experimental implementation of the gyrator transform. , 2007, Journal of the Optical Society of America. A, Optics, image science, and vision.

[18]  Zhengjun Liu,et al.  Color image encryption by using the rotation of color vector in Hartley transform domains , 2010 .

[19]  Aloka Sinha,et al.  Gyrator transform-based optical image encryption, using chaos , 2009 .

[20]  Bo Wang,et al.  Optical image encryption based on interference. , 2008, Optics letters.

[21]  G. Unnikrishnan,et al.  Optical encryption by double-random phase encoding in the fractional Fourier domain. , 2000, Optics letters.

[22]  Bahram Javidi,et al.  Resistance of the double random phase encryption against various attacks. , 2007, Optics express.

[23]  Linfei Chen,et al.  Optical image encryption with Hartley transforms. , 2006, Optics letters.

[24]  Zhengjun Liu,et al.  Image watermarking by using phase retrieval algorithm in gyrator transform domain , 2010 .

[25]  Ting Liu,et al.  Double-image encryption based on the affine transform and the gyrator transform , 2010 .

[26]  Fuyan Sun,et al.  A novel image encryption scheme based on spatial chaos map , 2008 .

[27]  Shutian Liu,et al.  Image encryption scheme based on the commutation and anti-commutation rules , 2007 .