TY - JOUR
T1 - Asymmetric multiple-image encryption based on the cascaded fractional Fourier transform
AU - Li, Yanbin
AU - Zhang, Feng
AU - Li, Yuanchao
AU - Tao, Ran
N1 - Publisher Copyright:
© 2015 The Authors.
PY - 2015/9/1
Y1 - 2015/9/1
N2 - A multiple-image cryptosystem is proposed based on the cascaded fractional Fourier transform. During an encryption procedure, each of the original images is directly separated into two phase masks. A portion of the masks is subsequently modulated into an interim mask, which is encrypted into the ciphertext image; the others are used as the encryption keys. Using phase truncation in the fractional Fourier domain, one can use an asymmetric cryptosystem to produce a real-valued noise-like ciphertext, while a legal user can reconstruct all of the original images using a different group of phase masks. The encryption key is an indivisible part of the corresponding original image and is still useful during decryption. The proposed system has high resistance to various potential attacks, including the chosen-plaintext attack. Numerical simulations also demonstrate the security and feasibility of the proposed scheme.
AB - A multiple-image cryptosystem is proposed based on the cascaded fractional Fourier transform. During an encryption procedure, each of the original images is directly separated into two phase masks. A portion of the masks is subsequently modulated into an interim mask, which is encrypted into the ciphertext image; the others are used as the encryption keys. Using phase truncation in the fractional Fourier domain, one can use an asymmetric cryptosystem to produce a real-valued noise-like ciphertext, while a legal user can reconstruct all of the original images using a different group of phase masks. The encryption key is an indivisible part of the corresponding original image and is still useful during decryption. The proposed system has high resistance to various potential attacks, including the chosen-plaintext attack. Numerical simulations also demonstrate the security and feasibility of the proposed scheme.
KW - Asymmetric encryption
KW - Chosen-plaintext attack
KW - Fractional Fourier transform
UR - http://www.scopus.com/inward/record.url?scp=84927937314&partnerID=8YFLogxK
U2 - 10.1016/j.optlaseng.2015.03.027
DO - 10.1016/j.optlaseng.2015.03.027
M3 - Article
AN - SCOPUS:84927937314
SN - 0143-8166
VL - 72
SP - 18
EP - 25
JO - Optics and Lasers in Engineering
JF - Optics and Lasers in Engineering
ER -