4.6 Article

Color image encryption scheme based on fractional Hartley transform and chaotic substitution-permutation

期刊

VISUAL COMPUTER
卷 38, 期 3, 页码 1027-1050

出版社

SPRINGER
DOI: 10.1007/s00371-021-02066-w

关键词

Color image encryption; Fractional Hartley transform; Chaos; Substitution; Permutation

向作者/读者索取更多资源

The proposed method of color image encryption utilizes compound chaotic mappings, fractional Hartley transformation and piecewise linear chaotic map for substitution, optical processing and permutation of image pixels. It enhances security by combining optical transformation and chaos-based substitution and permutation processes. The scheme is lossless and symmetric, providing high sensitivity to keys and resistance to various forms of attacks.
We propose a novel opto-digital method of color image encryption which utilizes compound chaotic mappings, the reality preserving fractional Hartley transformation and piecewise linear chaotic map for substitution, optical processing and permutation of image pixels, respectively. The image to be encrypted initially undergoes a chaos-based substitution in the spatial domain through the compound chaotic maps followed by a transformation to the combined time-frequency domain using the fractional Hartley transform. A reality preserving version of the fractional Hartley transform is used to eliminate the complexity associated with transform coefficients. Optical transformation of the image, in the fractional Hartley domain, is followed by a permutation through piecewise linear chaotic maps. Due to the intertwined application of optical transformation and chaos-based substitution and permutation processes, the proposed image encryption scheme possesses higher security. The input parameters (initial conditions, control parameters, and number of iterations) of chaotic maps along with fractional orders of the fractional Hartley transform collectively form the secret keys for encryption/decryption. The proposed scheme is a lossless and symmetric encryption scheme. The level of security provided in terms of high sensitivity to keys, resistivity to brute-force attack, classical attacks, differential attacks, entropy attack, noise and occlusion attack along with the elimination of complex coefficients proves its better efficacy as compared to other similar state-of-the-art schemes.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据