Binary image encryption based on interference of two phase-only masks

2012 ◽  
Vol 51 (21) ◽  
pp. 5253 ◽  
Author(s):  
Wei Jia ◽  
Fung Jacky Wen ◽  
Yuk Tak Chow ◽  
Changhe Zhou
2016 ◽  
Vol 19 (4) ◽  
pp. 1887-1894 ◽  
Author(s):  
Amrane Houas ◽  
Zouhir Mokhtari ◽  
Kamal Eddine Melkemi ◽  
Abdelmalik Boussaad

2016 ◽  
Vol 13 (3) ◽  
pp. 036201 ◽  
Author(s):  
Zhipeng Wang ◽  
Xiaodong Lv ◽  
Hongjuan Wang ◽  
Chenxia Hou ◽  
Qiong Gong ◽  
...  

2014 ◽  
Vol 34 (3) ◽  
pp. 0307001
Author(s):  
秦怡 Qin Yi ◽  
李婧 Li Jing ◽  
马毛粉 Ma Maofen ◽  
吕晓东 Lü Xiaodong

2013 ◽  
Vol 4 (1) ◽  
pp. 35-43 ◽  
Author(s):  
Hemanth V ◽  
Praveen Kumar R
Keyword(s):  

Complexity ◽  
2022 ◽  
Vol 2022 ◽  
pp. 1-22
Author(s):  
Adélaïde Nicole Kengnou Telem ◽  
Cyrille Feudjio ◽  
Balamurali Ramakrishnan ◽  
Hilaire Bertrand Fotsin ◽  
Karthikeyan Rajagopal

In this paper, we propose a new and simple method for image encryption. It uses an external secret key of 128 bits long and an internal secret key. The novelties of the proposed encryption process are the methods used to extract an internal key to apply the zigzag process, affine transformation, and substitution-diffusion process. Initially, an original gray-scale image is converted into binary images. An internal secret key is extracted from binary images. The two keys are combined to compute the substitution-diffusion keys. The zigzag process is firstly applied on each binary image. Using an external key, every zigzag binary image is reflected or rotated and a new gray-scale image is reconstructed. The new image is divided into many nonoverlapping subblocks, and each subblock uses its own key to take out a substitution-diffusion process. We tested our algorithms on many biomedical and nonmedical images. It is seen from evaluation metrics that the proposed image encryption scheme provides good statistical and diffusion properties and can resist many kinds of attacks. It is an efficient and secure scheme for real-time encryption and transmission of biomedical images in telemedicine.


2017 ◽  
Vol 2017 ◽  
pp. 1-13 ◽  
Author(s):  
Mervat Mikhail ◽  
Yasmine Abouelseoud ◽  
Galal ElKobrosy

This paper blends the ideas from recent researches into a simple, yet efficient image encryption scheme for colored images. It is based on the finite field cosine transform (FFCT) and symmetric-key cryptography. The FFCT is used to scramble the image yielding an image with a uniform histogram. The FFCT has been chosen as it works with integers modulo p and hence avoids numerical inaccuracies inherent to other transforms. Fractals are used as a source of randomness to generate a one-time-pad keystream to be employed in enciphering step. The fractal images are scanned in zigzag manner to ensure decorrelation of adjacent pixels values in order to guarantee a strong key. The performance of the proposed algorithm is evaluated using standard statistical analysis techniques. Moreover, sensitivity analysis techniques such as resistance to differential attacks measures, mean square error, and one bit change in system key have been investigated. Furthermore, security of the proposed scheme against classical cryptographic attacks has been analyzed. The obtained results show great potential of the proposed scheme and competitiveness with other schemes in literature. Additionally, the algorithm lends itself to parallel processing adding to its computational efficiency.


Sign in / Sign up

Export Citation Format

Share Document