gyrator变换域的高鲁棒多图像加密算法
Multiple image encryption of high robustness in gyrator transform domain
- 2020年25卷第7期 页码:1366-1379
收稿:2019-08-06,
修回:2020-2-10,
录用:2020-2-17,
纸质出版:2020-07-16
DOI: 10.11834/jig.190344
移动端阅览

浏览全部资源
扫码关注微信
收稿:2019-08-06,
修回:2020-2-10,
录用:2020-2-17,
纸质出版:2020-07-16
移动端阅览
目的
2
随着互联网通信和多媒体技术的快速发展,单幅图像加密技术难以满足日益增长的数据传输需求。为提高图像加密系统的传输效率,同时保证安全性和鲁棒性,本文构建一种基于gyrator变换和多分辨率奇异值分解(multi-resolution singular value decomposition,MRSVD)的多图像加密算法。
方法
2
首先,将明文图像每两幅组合为复数矩阵,利用改进的logistic映射生成混沌相位掩模,对复数矩阵进行gyrator域的双随机相位编码。其次,将变换后矩阵的实部分量和虚部分量组合为实数矩阵并进行多分辨率奇异值分解。最后,使用正交系数矩阵对多分辨率奇异值分解的结果进行线性组合得到密文图像。
结果
2
实验结果表明,使用本文算法得到的解密图像的峰值信噪比大于300 dB,解密图像质量相较于对比算法的解密图像质量更好;密钥发生微小改变前后密文相关系数(correlation coefficient,CC)远小于0.20,明文像素值发生微小变化时像素变化率(number of pixels change rate,NPCR)与归一化平均变化强度(unified average changing intensity,UACI)分别约为0.999 0和0.333 7;密钥空间大小为5.616 9×10
60
,可以抵御蛮力攻击;当密文图像受到一定强度的高斯白噪声和剪切攻击时,本文算法能够较好地恢复明文图像。
结论
2
所提出的多图像加密算法在高质量恢复明文图像的同时具有较高的安全性和较强的鲁棒性,可以应用于图像的内容保护与安全传输。
Objective
2
The rapid development of the Internet communication and multimedia technology has allowed the convenient transmission of substantial video
image
and other multimedia data through networks at any moment. On the one hand
these data may be leaked in the transmission process and illegally used due to the openness and sharing of the internet. On the other hand
several images may contain sensitive information
such as human body images that can potentially reveal the privacy information of one person
including gender
weight
and health status. Remote sensing images may include important information
such as geographical location
sensor parameters
and the spectral characteristics of ground objects. Therefore
the protection of image content and secure communication have become important issues in the field of information security. Since the double random phase encoding (DRPE) was proposed
numerous encryption schemes
such as fractional Fourier transform
gyrator transform
Fresnel transform
and multiparameter discrete fractional Fourier transform
have been introduced in other domains. The majority of such algorithms focus on a single image. Multi-image encryption technology has been widely investigated in recent years to meet the growing demand for data transmission. This paper introduces a multi-image encryption algorithm based on gyrator transform and multiresolution singular value decomposition (MRSVD).
Method
2
First
every two images are combined into a complex matrix by precoding and then DRPE in the gyrator domain is performed
where chaotic phase masks are constructed using a modified logistic map. Second
the real and imaginary parts of the transformed results are spliced into a real matrix. MRSVD is implemented to improve the security. With a given mean and variance values
a Gaussian matrix is generated and an orthogonal coefficient matrix is obtained by singular value decomposition. Cipher images are obtained by linear combination of the MRSVD results. Plaintext images can be recovered using an authorized key through the reverse encryption process. The phase masks
rotation angles of gyrator transforms
and parameter of Gaussian matrix are generated by using the modified logistic map
which makes the storage and transmission convenient. The initial states of the modified logistic map are closely related to plaintext images
and this condition results in high-level security.
Result
2
Numerical simulations are performed on 120 grayscale images to demonstrate the feasibility and reliability of the proposal. The peak signal-to-noise ratio (PSNR) values of the decrypted images by using the proposed method with granted keys are larger than 300 dB. This result indicates that the quality of the decrypted images by using the proposed method is better than that obtained using other methods. The histograms of cipher images obey the Gaussian distribution
which is different from the results of plaintext images. The correlation coefficient value of cipher images is much less than 0.20 when keys are slightly changed. The decrypted results with a key that deviates from the correct value of 10
-15
are chaotic. The average PSNR value is approximately 8.516 1 dB
and the average structural similarity is close to 0. When the pixel values of plaintext images increase by a small amount
the average number of pixel change rate and the unified average changing intensity are approximately 0.999 0 and 0.333 7
respectively. The key space is up to 5.616 9×10
60
which can resist a brute force attack. For the cipher images attacked by Gaussian white noise and cropping
the proposed algorithm can still recover plaintext images and shows better robustness than two other algorithms.
Conclusion
2
A multilevel multi-image encryption approach based on gyrator transform and MRSVD is proposed in this study. The chaotic random phase masks and real-valued cipher image is convenient to storage and transmit. The identity orthogonal matrix obtained by singular value decomposition is utilized to share the MRSVD results. Such utilization increases the security of ciphertext. Experimental results demonstrate that the proposed method can restitute plaintext images with high quality and achieves high security and strong robustness. It can be applied for the protection of image content and secure communication.
Azoug S E and Bouguezel S. 2016. A non-linear preprocessing for opto-digital image encryption using multiple-parameter discrete fractional Fourier transform. Optics Communications, 359:85-94[DOI:10.1016/j.optcom.2015.09.054]
Bao L and Zhou Y C. 2015. Image encryption:generating visually meaningful encrypted images. Information Sciences, 324:197-207[DOI:10.1016/j.ins.2015.06.049]
Bhatnagar G, Saha A, Wu Q M J and Atrey P K. 2014. Analysis and extension of multiresolution singular value decomposition. Information Sciences, 277:247-262[DOI:10.1016/j.ins.2014.02.018]
Bhatnagar G and Wu Q M J. 2014. Biometric inspired multimedia encryption based on dual parameter fractional Fourier transform. IEEE Transactions on Systems, Man, and Cybernetics:Systems, 44(9):1234-1247[DOI:10.1109/TSMC.2014.2303789]
Bhatnagar G, Wu Q M J and Raman B. 2013. Discrete fractional wavelet transform and its application to multiple encryption. Information Sciences, 223:297-316[DOI:10.1016/j.ins.2012.09.053]
Brewster T. 2018. We broke into a bunch of Android phones with a 3D-printed head[EB/OL].[2018-12-13] . https://www.forbes.com/sites/thomasbrewster/2018/12/13/we-broke-into-a-bunch-of-android-phones-with-a-3d-printed-head/#510662081330 https://www.forbes.com/sites/thomasbrewster/2018/12/13/we-broke-into-a-bunch-of-android-phones-with-a-3d-printed-head/#510662081330
Chen Y H, Liu Z Y and Zhou L Y. 2019. Optical image encryption algorithm based on differential mixed mask and chaotic Gyrator transform. Journal of Electronics and Information Technology, 41(4):888-895
陈艳浩, 刘中艳, 周丽宴. 2019.基于差异混合掩码与混沌Gyrator变换的光学图像加密算法.电子与信息学报, 41(4):888-895[DOI:10.11999/JEIT180456]
Deepan B, Quan C, Wang Y and Tay C J. 2014. Multiple-image encryption by space multiplexing based on compressive sensing and the double-random phase-encoding technique. Applied Optics, 53(20):4539-4547[DOI:10.1364/AO.53.004539]
Ge R J, Yang G Y, Wu J S, Chen Y, Coatrieux G and Luo L M. 2019. A novel chaos-based symmetric image encryption using bit-pair level process. IEEE Access, 7:99470-99480[DOI:10.1109/ACCESS.2019.2927415]
Gong L H, Deng C Z, Pan S M and Zhou N R. 2018. Image compression-encryption algorithms by combining hyper-chaotic system with discrete fractional random transform. Optics and Laser Technology, 103:48-58[DOI:10.1016/j.optlastec.2018.01.007]
Guo C, Wei C, Tan J B, Chen K N, Liu S T, Wu Q and Liu Z J. 2017. A review of iterative phase retrieval for measurement and encryption. Optics and Lasers in Engineering, 89:2-12[DOI:10.1016/j.optlaseng.2016.03.021]
Hanis S and Amutha R. 2019. A fast double-keyed authenticated image encryption scheme using an improved chaotic map and a butterfly-like structure. Nonlinear Dynamics, 95(1):421-432[DOI:10.1007/s11071-018-4573-7]
Jiang M and Guo G D. 2019. Body weight analysis from human body images. IEEE Transactions on Information Forensics and Security, 14(10):2676-2688[DOI:10.1109/TIFS.2019.2904840]
Liu S, Guo C L and Sheridan J T. 2014. A review of optical image encryption techniques. Optics and Laser Technology, 57:327-342[DOI:10.1016/j.optlastec.2013.05.023]
Liu Y J, Xu X P, Xu J H, Jiang Z G and Li Y D. 2019. Remote sensing image encryption using vector operations and secondary image phase masks. Acta Photonica Sinica, 48(2):0210002
刘禹佳, 徐熙平, 徐嘉鸿, 姜肇国, 李艳荻, 2019.基于矢量运算和副像相位掩模的遥感图像加密技术.光子学报, 48(2):0210002[DOI:10.3788/gzxb20194802.0210002]
Luan G Y, Li A C, Zhang D M and Wang D X. 2019. Asymmetric image encryption and authentication based on equal modulus decomposition in the Fresnel transform domain. IEEE Photonics Journal, 11(1):6900207[DOI:10.1109/JPHOT.2018.2886295]
Rodrigo J A, Alieva T and Calvo M L. 2007. Gyrator transform:properties and applications. Optics Express, 15(5):2190-2203[DOI:10.1364/OE.15.002190]
Shao Z H, Shang Y Y, Fu X Y, Yuan H M and Shu H Z. 2018. Double-image cryptosystem using chaotic map and mixture amplitude-phase retrieval in Gyrator domain. Multimedia Tools and Applications, 77(1):1285-1298[DOI:10.1007/s11042-016-4279-0]
Sui L S, Zhang X, Huang C T, Tian A L and Asundi A K. 2019. Silhouette-free interference-based multiple-image encryption using cascaded fractional Fourier transforms. Optics and Lasers in Engineering, 113:29-37[DOI:10.1016/j.optlaseng.2018.10.002]
Wang R D, Zhang Y P, Zhu X F, Wang F, Li C G, Zhang Y A and Xu W. 2019. Multi-section images parallel encryption based on optical scanning holographic cryptography technology, Acta Physica Sinica, 68(11):114202
王仁德, 张亚萍, 祝旭锋, 王帆, 李重光, 张永安, 许蔚. 2019.基于光学扫描全息密码术的多图像并行加密.物理学报, 68(11):114202[DOI:10.7498/aps.68.20190162]
Wang X G and Zhao D M. 2012. Fully phase multiple-image encryption based on superposition principle and the digital holographic technique. Optics Communications, 285(21/22):4280-4284[DOI:10.1016/j.optcom.2012.06.061]
Xi S X, Yu N N, Wang X L, Ying M, Dong Z, Zhu Q F, Wang W and Wang H Y. 2019. Optical encryption method of multiple-image based on θ modulation and computer generated hologram. Optics Communications, 445:19-23[DOI:10.1016/j.optcom.2019.03.072]
Yadav P L and Singh H. 2018. Enhancement of security using structured phase masked in optical image encryption on Fresnel transform domain. AIP Conference Proceedings, 1953(1):140049[DOI:10.1063/1.5033224]
Yao L L, Yuan C J, Qiang J J, Feng S T and Nie S P. 2016. Asymmetric image encryption method based on Gyrator transform and vector operation. Acta Physica Sinica, 65(21):214203
姚丽莉, 袁操今, 强俊杰, 冯少彤, 聂守平. 2016.基于Gyrator变换和矢量分解的非对称图像加密方法.物理学报, 65(21):214203[DOI:10.7498/aps.65.214203]
相关文章
相关作者
相关机构
京公网安备11010802024621