Javascript must be enabled to continue!
Double-image encryption scheme based on the phase-truncated multiple-parameter Fresnel transform
View through CrossRef
A double-image encryption algorithm is proposed with the phase-truncated multiple-parameter Fresnel transform. Firstly, the pixel positions of two plaintext images are scrambled and then the results are merged into one image with the scrambling operation. Subsequently, the resulting image is encrypted by phase truncation and phase reservation in the multiple-parameter Fresnel transform domain. The phase information is scrambled by the affine transform and then recombined with the amplitude information. The final encryption image is obtained with the pixel scrambling and diffusion methods to further enhance the security of the image encryption system, where the scrambling and diffusion operations are based on logistic map, logistic-sine system and 2D logistic-adjusted-sine map. The image encryption scheme is robust against the common attacks due to the nonlinear properties of diffusion and phase truncation. Numerical simulation results verify the performance and the security of the proposed double-image algorithm based on the phase-truncated multiple-parameter Fresnel transform.
Politechnika Wroclawska Oficyna Wydawnicza
Title: Double-image encryption scheme based on the phase-truncated multiple-parameter Fresnel transform
Description:
A double-image encryption algorithm is proposed with the phase-truncated multiple-parameter Fresnel transform.
Firstly, the pixel positions of two plaintext images are scrambled and then the results are merged into one image with the scrambling operation.
Subsequently, the resulting image is encrypted by phase truncation and phase reservation in the multiple-parameter Fresnel transform domain.
The phase information is scrambled by the affine transform and then recombined with the amplitude information.
The final encryption image is obtained with the pixel scrambling and diffusion methods to further enhance the security of the image encryption system, where the scrambling and diffusion operations are based on logistic map, logistic-sine system and 2D logistic-adjusted-sine map.
The image encryption scheme is robust against the common attacks due to the nonlinear properties of diffusion and phase truncation.
Numerical simulation results verify the performance and the security of the proposed double-image algorithm based on the phase-truncated multiple-parameter Fresnel transform.
Related Results
Multi-color-image compression-encryption scheme in the quaternion discrete Fresnel domain
Multi-color-image compression-encryption scheme in the quaternion discrete Fresnel domain
A multiple color images compression-encryption scheme is designed with compressive sensing in the quaternion discrete Fresnel transform. To tackle multiple color images in a holist...
Digital Image Encryption Using Logistic Map
Digital Image Encryption Using Logistic Map
This study focuses on the application of the logistic map algorithm in the Python programming language for digital image encryption and decryption. It investigates the impact of im...
An Authorized Scheme Service Privately Shared Data
An Authorized Scheme Service Privately Shared Data
In the modern digital landscape, the secure sharing of data across distributed systems remains a critical challenge. This paper proposes a blockchain-based architecture that levera...
Image Statistics Preserving Encrypt-then-Compress Scheme Dedicated for JPEG Compression Standard
Image Statistics Preserving Encrypt-then-Compress Scheme Dedicated for JPEG Compression Standard
In this paper, the authors analyze in more details an image encryption scheme, proposed by the authors in their earlier work, which preserves input image statistics and can be used...
Image Encryption Scheme Based on Newly Designed Chaotic Map and Parallel DNA Coding
Image Encryption Scheme Based on Newly Designed Chaotic Map and Parallel DNA Coding
In this paper, a new one-dimensional fractional chaotic map is proposed and an image encryption scheme based on parallel DNA coding is designed by using the chaotic map. The mathem...
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
The advent of distributed cloud systems has revolutionized data storage and access, providing flexibility and scalability across various industries. However, these benefits come wi...
Dynamic Multi-Layered Image Encryption scheme using User Driven Chaotic Sequences
Dynamic Multi-Layered Image Encryption scheme using User Driven Chaotic Sequences
Abstract
With technological advances, sharing sensitive information, such as multimedia data, especially images, is common. To protect the integrity of such data, advanced ...
Double Exposure
Double Exposure
I. Happy Endings
Chaplin’s Modern Times features one of the most subtly strange endings in Hollywood history. It concludes with the Tramp (Chaplin) and the Gamin (Paulette Godda...

