1,755 research outputs found

    Multiplexing of encrypted data using fractal masks

    Full text link
    This paper was published in OPTICS LETTERS and is made available as an electronic reprint with the permission of OSA. The paper can be found at the following URL on the OSA website: http://dx.doi.org/10.1364/OL.37.002895. Systematic or multiple reproduction or distribution to multiple locations via electronic or other means is prohibited and is subject to penalties under lawIn this Letter, we present to the best of our knowledge a new all-optical technique for multiple-image encryption and multiplexing, based on fractal encrypting masks. The optical architecture is a joint transform correlator. The multiplexed encrypted data are stored in a photorefractive crystal. The fractal parameters of the key can be easily tuned to lead to a multiplexing operation without cross talk effects. Experimental results that support the potential of the method are presented.This research was performed under grants TWAS-UNESCO Associateship Scheme at Centres of Excellence in the South, CONICET No. 0863 (Argentina), ANCYT PICT 1167 (Argentina), and Facultad de Ingenieria, Universidad Nacional de La Plata No. 11/I125 (Argentina), Sostenibilidad 2011-2012, and CODI (Universidad de Antioquia-Colombia). W. D. Furlan and J. A. Monsoriua acknowledge financial support from Ministerio de Economia y Competitividad (grant FIS2011-23175), Generalitat Valenciana (grant PROMETEO2009-077), and Universitat Politecnica de Valencia (grants PAID-05-11 and PAID-02-11), Spain.Barrera, J.; Tebaldi, M.; Amaya, D.; Furlan, W.; Monsoriu Serra, JA.; Bolognini, NA.; Torroba, RD.... (2012). Multiplexing of encrypted data using fractal masks. Optics Letters. 37(14):2895-2897. doi:10.1364/OL.37.002895S289528973714Refregier, P., & Javidi, B. (1995). Optical image encryption based on input plane and Fourier plane random encoding. Optics Letters, 20(7), 767. doi:10.1364/ol.20.000767Matoba, O., & Javidi, B. (1999). Encrypted optical memory system using three-dimensional keys in the Fresnel domain. Optics Letters, 24(11), 762. doi:10.1364/ol.24.000762Unnikrishnan, G., Joseph, J., & Singh, K. (2000). Optical encryption by double-random phase encoding in the fractional Fourier domain. Optics Letters, 25(12), 887. doi:10.1364/ol.25.000887Nomura, T. (2000). Polarization encoding for optical security systems. Optical Engineering, 39(9), 2439. doi:10.1117/1.1288369Tebaldi, M., Furlan, W. D., Torroba, R., & Bolognini, N. (2009). Optical-data storage-readout technique based on fractal encrypting masks. Optics Letters, 34(3), 316. doi:10.1364/ol.34.000316Situ, G., & Zhang, J. (2005). Multiple-image encryption by wavelength multiplexing. Optics Letters, 30(11), 1306. doi:10.1364/ol.30.001306Liu, Z., & Liu, S. (2007). Double image encryption based on iterative fractional Fourier transform. Optics Communications, 275(2), 324-329. doi:10.1016/j.optcom.2007.03.039Hwang, H.-E., Chang, H. T., & Lie, W.-N. (2009). Multiple-image encryption and multiplexing using a modified Gerchberg-Saxton algorithm and phase modulation in Fresnel-transform domain. Optics Letters, 34(24), 3917. doi:10.1364/ol.34.003917Matoba, O., & Javidi, B. (1999). Encrypted optical storage with angular multiplexing. Applied Optics, 38(35), 7288. doi:10.1364/ao.38.007288Fredy Barrera, J., Henao, R., Tebaldi, M., Torroba, R., & Bolognini, N. (2006). Multiplexing encryption–decryption via lateral shifting of a random phase mask. Optics Communications, 259(2), 532-536. doi:10.1016/j.optcom.2005.09.027Henao, R., Rueda, E., Barrera, J. F., & Torroba, R. (2010). Noise-free recovery of optodigital encrypted and multiplexed images. Optics Letters, 35(3), 333. doi:10.1364/ol.35.000333Barrera, J. F., Henao, R., Tebaldi, M., Torroba, R., & Bolognini, N. (2006). Multiple image encryption using an aperture-modulated optical system. Optics Communications, 261(1), 29-33. doi:10.1016/j.optcom.2005.11.055Mosso, F., Barrera, J. F., Tebaldi, M., Bolognini, N., & Torroba, R. (2011). All-optical encrypted movie. Optics Express, 19(6), 5706. doi:10.1364/oe.19.005706Monsoriu, J. A., Saavedra, G., & Furlan, W. D. (2004). Fractal zone plates with variable lacunarity. Optics Express, 12(18), 4227. doi:10.1364/opex.12.00422

    A Box-Counting Method with Adaptable Box Height for Measuring the Fractal Feature of Images

    Get PDF
    Most of the existing box-counting methods for measuring fractal features are only applicable to square images or images with each dimension equal to the power of 2 and require that the box at the top of the box stack of each image block is of the same height as that of other boxes in the same stack, which gives rise to inaccurate estimation of fractal dimension. In this paper, we propose a more accurate box-counting method for images of arbitrary size, which allows the height of the box at the top of each grid block to be adaptable to the maximum and minimum gray-scales of that block so as to circumvent the common limitations of existing box-counting methods

    A strong construction of S-box using Mandelbrot set an image encryption scheme

    Get PDF
    The substitution box (S-box) plays a vital role in creating confusion during the encryption process of digital data. The quality of encryption schemes depends upon the S-box. There have been several attempts to enhance the quality of the S-box by using fractal chaotic mechanisms. However, there is still weakness in the robustness against cryptanalysis of fractal-based S-boxes. Due to their chaotic behavior, fractals are frequently employed to achieve randomness by confusion and diffusion process. A complex number-based S-box and a chaotic map diffusion are proposed to achieve high nonlinearity and low correlation. This study proposed a Mandelbrot set S-box construction based on the complex number and Chen chaotic map for resisting cryptanalytic attacks by creating diffusion in our proposed algorithm. The cryptosystem was built on the idea of substitution permutation networks (SPN). The complex nature of the proposed S-box makes it more random than other chaotic maps. The robustness of the proposed system was analyzed by different analysis properties of the S-box, such as nonlinearity, strict avalanche criterion, Bit independent criterion, and differential and linear probability. Moreover, to check the strength of the proposed S-box against differential and brute force attacks, we performed image encryption with the proposed S-box. The security analysis was performed, including statistical attack analysis and NIST analysis. The analysis results show that the proposed system achieves high-security standards than existing schemes

    A Novel Image Encryption Using an Integration Technique of Blocks Rotation Based on the Magic Cube and the AES Algorithm

    Get PDF
    In recent years, several encryption algorithms have been proposed to protect digital images from cryptographic attacks. These encryption algorithms typically use a relatively small key space and therefore, provide safe, especially if they are of a dimension. In this paper proposes an encryption algorithm for a new image protection scheme based on the rotation of the faces of a Magic Cube. The original image is divided into six sub-images and these sub-images are divided amongst a number of blocks and attached to the faces of a Magic Cube. The faces are then scrambled using rotation of the Magic Cube. Then the rotated image is fed to the AES algorithm which is applied to the pixels of the image to encrypt the scrambled image. Finally, experimental results and security analysis show that the proposed image encryption scheme not only encrypts the picture to achieve perfect hiding, but the algorithm can also withstand exhaustive, statistical and differential attacks

    Hybrid chaotic map with L-shaped fractal Tromino for image encryption and decryption

    Get PDF
    Insecure communication in digital image security and image storing are considered as important challenges. Moreover, the existing approaches face problems related to improper security at the time of image encryption and decryption. In this research work, a wavelet environment is obtained by transforming the cover image utilizing integer wavelet transform (IWT) and hybrid discrete cosine transform (DCT) to completely prevent false errors. Then the proposed hybrid chaotic map with L-shaped fractal Tromino offers better security to maintain image secrecy by means of encryption and decryption. The proposed work uses fractal encryption with the combination of L-shaped Tromino theorem for enhancement of information hiding. The regions of L-shaped fractal Tromino are sensitive to variations, thus are embedded in the watermark based on a visual watermarking technique known as reversible watermarking. The experimental results showed that the proposed method obtained peak signal-to-noise ratio (PSNR) value of 56.82dB which is comparatively higher than the existing methods that are, Beddington, free, and Lawton (BFL) map with PSNR value of 8.10 dB, permutation substitution, and Boolean operation with PSNR value of 21.19 dB and deoxyribonucleic acid (DNA) level permutation-based logistic map with PSNR value of 21.27 dB

    Review on Color Image Encryption Algorithm based on Pseudorandom Number Key

    Get PDF
    In secure communication, image encryption schemes transform clear images into unintelligible others. The fundamental techniques used to encrypt a block of pixels are substitution and permutation. In recent years focuses on designing of highly robust encryption schemes (i.e., which provide good confusion and diffusion properties, to ensure desired security factor), either using peculiar pixel shuffling methods, or using innovative digital chaos-based ciphers, or by making justified compositions between these different pixel shuffling and ciphering techniques. Almost some encryption schemes based on permutation had already been found insecure against the cipher text-only and known/chosen-plaintext attacks, due to the high information redundancy, and it is quite understandable since the secret permutations can be recovered by comparing the plaintexts and the permuted cipher texts. Generally, chaos-based image encryption algorithms are used more often than others but require high computational cost. Moreover, a chaos system is defined on real numbers while the cryptosystems are defined on finite sets of integers. Furthermore, spatial domain scrambling has defect that the statistical characteristics of image are not changed after scrambling. Therefore, it is not secure to perform scrambling in spatial domain. The image encryption methods based on frequency domain encrypt/decrypt the images by modifying the image frequencies. One can recover the original plain image exactly via a reverse process
    • …
    corecore