Abstract

We introduce an image encryption method based on computer-generated hologram (CGH) and two-dimensional Sine Logistic modulation map (2D-SLMM). We combine CGH and 2D-SLMM to improve encryption security. During the encryption process, the hologram needs to be logistically modulated by 2D-SLMM. This logistic modulation technique can avoid complex algorithms. Simulation results and security analysis demonstrate that the proposed approach has a high security level, good invisibility of image information in ciphertext, large key space, and strong robustness.

Highlights

  • Since Refregier and Javidi proposed a double random-phase encryption technique in 1995 [1], various improved optical image encryption methods have been presented [2,3,4,5,6].data information of optical encryption is difficult to be transmitted through the network

  • We proposed an encryption method based on computer-generated hologram (CGH) and 2DSLMM

  • The experiments verify the resistance to multiple attacks: noise, occlusion, and the tiny change of keys

Read more

Summary

Introduction

Since Refregier and Javidi proposed a double random-phase encryption technique in 1995 [1], various improved optical image encryption methods have been presented [2,3,4,5,6]. Besides the fact that the virtual object, which does not yet exist in nature, can be recorded, CGH permits any wavelength to be selected and system parameters to be adjusted arbitrarily, which offers more flexibility Since this encryption method has only two secret keys of wavelength and diffraction distance, it is necessary to expand the key space of cipher system. Chaotic maps have the properties of unpredictability and sensitivity to their parameters and initial values. Compared with 1D chaotic maps, HD chaotic maps usually have more complex structures and better chaotic performance These make their chaotic orbits much difficult to predict [17, 18]. In order to expand secret key space further and make the encrypted information totally invisible, we proposed an encryption method combining CGH and 2D-SLMM in this paper. 2D-SLMM is modulated by the obtained hologram with a very simple way to get

Result
Proposed Encryption Method
Simulated Results and Security Analysis
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call