Abstract

A multi-image encryption with super-large-capacity is proposed by using spherical diffraction and filtering diffusion. In the proposed method, initial images are processed sequentially by filtering diffusion and chaos scrambling. The images are combined into one image using XOR operation. The combined image is encrypted by improved equal modulus decomposition after spherical diffraction. There are three main contributions of the proposed method—(1) resisting phase-retrieval attack due to the asymmetry of spherical diffraction; (2) high flexibility of decrypting images individually; and (3) super-large encryption capacity of the product of image resolution and grayscale level, which is the most significant advantage. The feasibility and effectiveness of the proposed encryption are verified by numerical simulation results.

Highlights

  • With the development of information technology, how to ensure the security of image information becomes an essential point

  • Refregier and Javidi proposed double random phase encoding (DRPE) in 1995, which pioneered the field of optical encryption [8]

  • Several nonlinear cryptosystems are proposed to improve the weaknesses of traditional symmetric cryptosystems, such as Fresnel domain [12], cylindrical diffraction transform [13,14,15], gyrator transform domain [16], and fractional Mellin transform [17]

Read more

Summary

Introduction

With the development of information technology, how to ensure the security of image information becomes an essential point. Li et al [28] proposed a multiple-image encryption method using the cascaded fractional Fourier transform, which cannot get a decrypted image individually from the ciphertext. Deepan et al [34] proposed a multi-image cryptosystem based on compressive sensing and the DPRE technique By this method, the space multiplexing method is used to integrate multiple-image data.

Encryption
Filtering
Principle scrambling are first used to diffuse
Suppose
Process of Decryption
Simulation Results
Histogram
Noise and Occlusion Attacks
Potential
Time and Computational Complexity Analysis
Capacity of Image Encryption
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call