scholarly journals A Multi-User Encryption and Authentication System Based on Joint Transform Correlation

Entropy ◽  
2019 ◽  
Vol 21 (9) ◽  
pp. 850
Author(s):  
Zhao ◽  
Chi

Optical image encryption technology based on joint transform correlation (JTC) has attracted increasing attention from researchers. We propose a multi-user secure communication system based on the special properties of JTC. Multiple users utilize their own fingerprints to encrypt the plain-text in the encryption process, and each user must be first authenticated at the beginning of the decryption process. Only users with legitimate identities can perform the decryption process, whereas unauthorized users with false identities cannot, so the security of the system is greatly improved. Furthermore, we propose a multi-user double-image encryption method, which can better meet the needs of different security environments. Considering the possibility of overlapping images at the output end, we prove that a JTC-based image encryption system can avoid overlapping images at the output when the distance between the input images is 3W (W is the side length of a square image), which provides a theoretical foundation for further research. Finally, a numerical simulation demonstrates the effectiveness and feasibility of the proposed idea.

2019 ◽  
Vol 48 (7) ◽  
pp. 710002 ◽  
Author(s):  
郭媛 GUO Yuan ◽  
许鑫 XU Xin ◽  
敬世伟 JING Shi-wei ◽  
杜松英 DU Song-ying

PLoS ONE ◽  
2020 ◽  
Vol 15 (11) ◽  
pp. e0242110
Author(s):  
Dejian Fang ◽  
Shuliang Sun

Image encryption is an effective method for protecting private images during communication. In this paper, a novel image encryption method is proposed based on a 5D hyperchaotic system. Since a 5D hyperchaotic system can generate more complex dynamic behavior than a low-dimensional system, it is used in this paper to generate pseudorandom number sequences. The generated sequences are processed to obtain new sequences. The randomness of the new sequences is improved by recombination and rearrangement. The experimental results and theoretical analysis show that the method possesses a large key space and can resist differential attacks, statistical analysis, entropy analysis, clipping attacks and noise attacks. Therefore, it is very secure and can be used for secure communication.


2015 ◽  
Vol 69 ◽  
pp. 80-86 ◽  
Author(s):  
Linfei Chen ◽  
Jingyu Liu ◽  
Jisen Wen ◽  
Xiong Gao ◽  
Haidan Mao ◽  
...  

2021 ◽  
Vol 2021 ◽  
pp. 1-19
Author(s):  
Anshula Sangwan ◽  
Hukum Singh

A new asymmetric optical double image encryption algorithm is proposed, which combines phase truncation and singular value decomposition. The plain text is encrypted with two-stage phase keys to obtain a uniformly distributed cipher text and two new decryption keys. These keys are generated during the encryption process and are different from encryption keys. It realizes asymmetric encryption and improves the security of the system. The unscrambling keys in the encryption operation are mainly related to plain text. At the same time, the system is more resistant to selective plain text attacks; it also improves the sensitivity of decryption keys. With the application of phase truncation, the key space expanded and the security of the cryptographic system is enhanced. The efficacy of the system is calculated by evaluating the estimated error between the input and retrieved images. The proposed technique provides innumerable security keys and is robust against various potential attacks. Numerical simulations verify the effectiveness and security of the proposed technique.


Sign in / Sign up

Export Citation Format

Share Document