4.7 Article

Optical image encryption algorithm based on phase-truncated short-time fractional Fourier transform and hyper-chaotic system

期刊

OPTICS AND LASERS IN ENGINEERING
卷 124, 期 -, 页码 -

出版社

ELSEVIER SCI LTD
DOI: 10.1016/j.optlaseng.2019.105816

关键词

Image encryption; Phase-truncated short-time fractional Fourier transform; Hyper-chaotic system; Wave-based permutation; Encryption unit; Diffusion operation

类别

资金

  1. National Natural Science Foundation of China [61861029, 61462061]
  2. Major Academic Discipline and Technical Leader of Jiangxi Province [20162BCB22011]
  3. Natural Science Foundation of Jiangxi Province [20171BAB202002]
  4. Cultivation Plan of Applied Research of Jiangxi Province [20181BBE58022]
  5. Department of Education of Guangdong Province Technological Innovation Program [2017GKTSCX060]

向作者/读者索取更多资源

To increase the robustness against common attacks, a novel image encryption algorithm is proposed based on the phase-truncated short-time fractional Fourier transform (PTSTFrFT) and the hyper-chaotic system. In the algorithm, the original image is divided into four sub-images to be encoded independently. Different from the traditional phase truncation coding, the PTSTFrFT is combined with wave-based permutation to construct the encryption unit (EU) for encoding the sub-images, where the confused phase information is recombined with the amplitude information to guarantee the integrity of image information and the nonlinearity of phase truncation. Besides, the encryption unit can be achieved optically. Furthermore, the corresponding results compose an interim image, whose pixel values and pixel positions are modified by the permutation and the diffusion operations. The diffusion operation is designed with the feedback system to increase the anti-interference ability. The proposed image encryption algorithm has large enough key space and high sensitivity to the keys because of the use of hyper-chaotic system. The simulation results demonstrate that the proposed image encryption algorithm based on the PTSTFrFT is secure and robust enough against the common attacks.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据