JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Hybrid Color and Grayscale Images Encryption Scheme Based on Quaternion Hartley Transform and Logistic Map in Gyrator Domain
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Hybrid Color and Grayscale Images Encryption Scheme Based on Quaternion Hartley Transform and Logistic Map in Gyrator Domain
Li, Jianzhong;
  PDF(new window)
 Abstract
A hybrid color and grayscale images encryption scheme based on the quaternion Hartley transform (QHT), the two-dimensional (2D) logistic map, the double random phase encoding (DRPE) in gyrator transform (GT) domain and the three-step phase-shifting interferometry (PSI) is presented. First, we propose a new color image processing tool termed as the quaternion Hartley transform, and we develop an efficient method to calculate the QHT of a quaternion matrix. In the presented encryption scheme, the original color and grayscale images are represented by quaternion algebra and processed holistically in a vector manner using QHT. To enhance the security level, a 2D logistic map-based scrambling technique is designed to permute the complex amplitude, which is formed by the components of the QHT-transformed original images. Subsequently, the scrambled data is encoded by the GT-based DRPE system. For the convenience of storage and transmission, the resulting encrypted signal is recorded as the real-valued interferograms using three-step PSI. The parameters of the scrambling method, the GT orders and the two random phase masks form the keys for decryption of the secret images. Simulation results demonstrate that the proposed scheme has high security level and certain robustness against data loss, noise disturbance and some attacks such as chosen plaintext attack.
 Keywords
Quaternion Hartley transform;Two-dimensional logistic map;Gyrator transform;Image encryption;
 Language
Korean
 Cited by
 References
1.
P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767-769 (1995). crossref(new window)

2.
E. Tajahuerce, O. Matoba, S. C. Verrall, and B. Javidi, “Optoelectronic information encryption with phase-shifting interferometry,” Appl. Opt. 39, 2313-2320 (2000). crossref(new window)

3.
I. H. Lee and M. J. Cho, “Double random phase encryption using orthogonal encoding for multiple-image transmission,” J. Opt. Soc. Korea 18, 201-206 (2014). crossref(new window)

4.
J. C. Zheng and X. Q. Li, “Image authentication using only partial phase information from a double-random-phase-encrypted image in the Fresnel domain,” J. Opt. Soc. Korea 19, 241-247 (2015). crossref(new window)

5.
S. Yuan, Y. H. Xin, M. T. Liu, S. X. Yao, and X. J. Sun, “An improved method to enhance the security of double random-phase encoding in the Fresnel domain,” Optics & Laser Technology 44, 51-56 (2012). crossref(new window)

6.
N. K. Nischal, J. Joseph, and K. Singh, “Securing information using fractional Fourier transform in digital holography,” Opt. Commun. 235, 253-259 (2004). crossref(new window)

7.
Q. Wang, Q. Guo, and L. Lei, “Double image encryption based on phase–amplitude mixed encoding and multistage phase encoding in gyrator transform domains,” Optics & Laser Technology 48, 267-279 (2013). crossref(new window)

8.
I. Muniraj, C. L. Guo, B. G. Lee, and J. T. Sheridan, “Interferometry based multispectral photonlimited 2D and 3D integral image encryption employing the Hartley transform,” Opt. Express 23, 15907-15920 (2015). crossref(new window)

9.
N. Sundararajan, “2-D Hartley transforms,” Geophysics 60, 262-267 (1995). crossref(new window)

10.
M. R. Abuturab, “Securing color information using Arnold transform in gyrator transform domain,” Optics and Lasers in Engineering 50, 772-779 (2012). crossref(new window)

11.
S. Q. Zhang and M. A. Karim, “Color image encryption using double random phase encoding,” Microwave Opt. Technol. Lett. 21, 318-323 (1999). crossref(new window)

12.
M. Joshi, C. Shakher, and K. Singh, “Color image encryption and decryption for twin images in fractional Fourier domain,” Opt. Commun. 281, 5713-5720 (2008). crossref(new window)

13.
W. Chen, C. Quan, and C. Tay, “Optical color image encryption based on arnold transform and interference method,” Opt. Commun. 282, 3680-3685 (2009). crossref(new window)

14.
S. K. Rajput and N. K. Nishchal, “Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask,” Appl. Opt. 51, 5377-5386 (2012). crossref(new window)

15.
I. Mehra and N. K. Nishchal, “Image fusion using wavelet transform and its application to asymmetric cryptosystem and hiding,” Opt. Express 22, 5474-5482 (2014). crossref(new window)

16.
X. X. Li and D. M. Zhao, “Optical color image encryption with redefined fractional Hartley transform,” Optik 121, 673-677 (2010). crossref(new window)

17.
X. L. Wang, H. C. Zhai, Z. L. Li, and Q. Ge, “Double random-phase encryption based on discrete quaternion Fourier-transforms,” Optik 122, 1856-1859 (2011). crossref(new window)

18.
Z. H. Shao, H. Z. Shu, J. S. Wu, Z. F. Dong, G. Coatrieux, and J. L. Coatrieux, “Double color image encryption using iterative phase retrieval algorithm in quaternion gyrator domain,” Opt. Express 22, 4932-4943 (2014). crossref(new window)

19.
M. R. Abuturab, “Generalized Arnold map-based optical multiple color-image encoding in gyrator transform domain,” Opt. Commun. 343, 157-171 (2015). crossref(new window)

20.
W. R. Hamilton, Elements of Quaternions (Cambridge University Press, Cambridge, UK, 2009), Chapter 2.

21.
N. Gupta and D. K. Saxena, “Implementation and contrasting comparision of transform techniques of OFDM,” International Journal of Computer Applications 72, 47-51 (2013).

22.
Z. J. Liu, D. Z. Chen, J. P. Ma, S. Y. Wei, Y. L. Zhang, J. M. Dai, and S. T. Liu, “Fast algorithm of discrete gyrator transform based on convolution operation,” Optik 122, 864-867 (2011). crossref(new window)

23.
S. Zhang, D. V. D. Weide, and J. Oliver, “Superfast phaseshifting method for 3-D shape measurement,” Opt. Express 18, 9684-9689 (2010). crossref(new window)

24.
L. Z. Cai, Q. Liu, and X. L. Yang, “Phase-shift extraction and wave-front reconstruction in phase-shifting interferometry with arbitrary phase steps,” Opt. Lett. 28, 1808-1810 (2003). crossref(new window)

25.
L. Z. Cai, M. Z. He, Q. Liu, and X. L. Yang, “Digital image encryption and watermarking by phase-shifting interferometry,” Appl. Opt. 43, 3078-3084 (2004). crossref(new window)

26.
D. M. Chen, Y. M. Liu, X. D. Chen, Y. P. Chang, and J. Wang, “A novel chaotic map and DES based file encryption algorithm,” International Journal of Advancements in Computing Technology 3, 198-205 (2011).

27.
M. Z. He, Q. F. Tan, L. C. Cao, Q. S. He, and G. F. Jin, “Security enhanced optical encryption system by random phase key and permutation key,” Opt. Express 17, 22462-22473 (2009). crossref(new window)

28.
Y. Wang, D. L. Zheng, and L. Ju, "Digital image encryption algorithm based on three-dimension Lorenz chaos," Journal of University of Science and Technology Beijing 26, 678-682 (2004). (in Chinese)

29.
M. Smila and S. Sankar, “Novel algorithms for finding an optimal scanning path for JPEG image compression,” IJETCSE 8, 230-236 (2014).

30.
T. K. Tsui, X. P. Zhang, and D. Androutsos, “Color image watermarking using multidimensional Fourier transforms,” IEEE Trans. Inform. Forensics Secur. 3, 16-28 (2008). crossref(new window)

31.
X. G. Wang and D. M. Zhao, “Image encryption based on anamorphic fractional Fourier transform and three-step phase-shifting interferometry,” Opt. Commun. 268, 240-244 (2006). crossref(new window)

32.
Y. Zhang and D. Xiao, “Double optical image encryption using discrete Chirikov standard map and chaos-based fractional random transform,” Opt. Lasers Eng. 51, 472-480 (2013). crossref(new window)

33.
R. C. Gonzalez and R. E. Woods, Digital Image Processing, 3rd ed. (Prentice Hall, New Jersey, USA, 2007), Chapter 5.

34.
X. Peng, H. Z. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31, 3261-3263 (2006). crossref(new window)

35.
P. Rajavel, “Directional Hartley transform and content based image retrieval,” Signal Processing 90, 1267-1278 (2010). crossref(new window)

36.
C. B. Li, Data Structure (Tsinghua University Press, Beijing, PRC, 2013), Chapter 9. (in Chinese)

37.
X. Su, "Virtual optical encryption system based on coupling sawtooth spatiotemporal chaos," Master Thesis, Nanjing University of Posts and Telecommunications (2014). (in Chinese)