An asymmetric single-channel color-image cryptosystem is presented that uses singular value decomposition and Tinkerbell map in the fractional Fourier domain. The input image is split into red, green, and blue channels. The red component is used as plaintext, and green and blue components are used as phase masks in the cryptosystem. MATLAB is used for computations of results presented in this paper. The proposed cryptosystem is validated for color images of size 256 × 256 × 3 pixels. The analysis of the attacks establishes the scheme’s resistance to occlusion and noise attack, and the key-space is big enough to endure a brute-force attack. The analysis based on the correlation distribution of neighboring pixels, along with statistical analysis has been performed to examine the efficacy of the cryptosystem. The results indicated high levels of security possessed by the proposed encryption scheme.
Motivated by recent research on asymmetric cryptosystems, a novel asymmetric scheme for image encryption that uses double random-decomposition technique in the fractional Fourier transform domain is proposed. The scheme endures the Special Attack as against conventional asymmetric cryptosystems based on phase-truncated Fourier transform (PTFT), and equal modulus decomposition. In the proposed scheme, an input image is bonded with a random phase mask and then it is subjected to a fractional Fourier transform. The resulting image is decomposed into two components using the random-decomposition technique. One of them will act as the first private key and the other component is subjected to the second fractional Fourier transform followed by another random-decomposition. Again, two new components are obtained, one will act as the second private key and the other is phase-truncated before subjecting it to LU decomposition followed by affine transform to get the encrypted image. The new scheme possesses enlarged key-space consisting of private keys obtained from random-decomposition, orders of fractional Fourier transform, affine transform parameters and permutation matrix of LU decomposition, thereby having a much greater capability to resist brute force attack. A sensitivity analysis has been carried out with respect to the encryption parameters. In addition to its resistance to the Special Attack, the scheme is immune to the basic attacks such as known-plaintext attack, chosen-plaintext attack, ciphertext-only attack, by virtue of its asymmetric nature. The above analysis along with statistical analysis through 3D plots and correlation distribution establish the strength of the proposed cryptosystem.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.