کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
743495 1461735 2014 9 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
An asymmetric color image cryptosystem based on Schur decomposition in gyrator transform domain
موضوعات مرتبط
مهندسی و علوم پایه سایر رشته های مهندسی مهندسی برق و الکترونیک
پیش نمایش صفحه اول مقاله
An asymmetric color image cryptosystem based on Schur decomposition in gyrator transform domain
چکیده انگلیسی


• Color image encryption based on Schur decomposition in gyrator domain is proposed.
• The modulated color channels are combined into one gray image using convolution.
• The multiplication order, transformation angles and asymmetric keys are the main keys.
• The encryption is performed digitally while decryption can be realized optically.
• Numerical simulations prove the validity and security of the proposed approach.

A new asymmetric cryptosystem using Schur decomposition in gyrator transform (GT) domain is introduced. In this approach, the color image to be encoded is first dissociated into red, green and blue channels and then modulated by multiplying three different random phase masks. The three modulated color channels are combined into one gray image by using convolution. The convoluted image is gyrator transformed. The gyrator spectrum is then amplitude- and phase-truncated. The asymmetric decryption phase keys for red, green and blue channels are generated digitally during the encryption process. The phase-truncated image is divided into U and T parts by Schur decomposition. Finally, U and T parts are independently gyrator transformed to obtain two encoded images, which can be assigned to a joint authorized user (or two authorized users). GT evades optical alignment problems. The Schur decomposition represents an intermediate step in SVD decomposition, and thus requires less number of computations. The multiplication order of Schur decomposition, three transformation angles of GT, and three asymmetric keys are regarded as decryption keys, which boost the degree of security against existing attacks. The proposed encryption process can be carried out digitally, while the decryption process can be realized optically. Numerical simulations prove the validity and security of the proposed approach.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Optics and Lasers in Engineering - Volume 58, July 2014, Pages 39–47
نویسندگان
,