کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
1534349 1512585 2015 12 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Color image encryption based on color blend and chaos permutation in the reality-preserving multiple-parameter fractional Fourier transform domain
ترجمه فارسی عنوان
رمزنگاری رنگی براساس ترکیب رنگ و تعویض هرج و مرج در دامنه تبدیل فوریه فرکانسی پارامتر چند پارامتر حفظ واقعیت
کلمات کلیدی
رمزنگاری رنگی، تحول فوریه فاقد چند پارامتر حفظ واقعیت، ترکیب رنگ، جایگزینی هرج و مرج، نقشه لجستیک دو طرفه،
موضوعات مرتبط
مهندسی و علوم پایه مهندسی مواد مواد الکترونیکی، نوری و مغناطیسی
چکیده انگلیسی
In this paper, we propose a novel color image encryption method by using Color Blend (CB) and Chaos Permutation (CP) operations in the reality-preserving multiple-parameter fractional Fourier transform (RPMPFRFT) domain. The original color image is first exchanged and mixed randomly from the standard red-green-blue (RGB) color space to R′G′B′ color space by rotating the color cube with a random angle matrix. Then RPMPFRFT is employed for changing the pixel values of color image, three components of the scrambled RGB color space are converted by RPMPFRFT with three different transform pairs, respectively. Comparing to the complex output transform, the RPMPFRFT transform ensures that the output is real which can save storage space of image and convenient for transmission in practical applications. To further enhance the security of the encryption system, the output of the former steps is scrambled by juxtaposition of sections of the image in the reality-preserving multiple-parameter fractional Fourier domains and the alignment of sections is determined by two coupled chaotic logistic maps. The parameters in the Color Blend, Chaos Permutation and the RPMPFRFT transform are regarded as the key in the encryption algorithm. The proposed color image encryption can also be applied to encrypt three gray images by transforming the gray images into three RGB color components of a specially constructed color image. Numerical simulations are performed to demonstrate that the proposed algorithm is feasible, secure, sensitive to keys and robust to noise attack and data loss.
ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Optics Communications - Volume 338, 1 March 2015, Pages 181-192
نویسندگان
,