Specifications

DOI: 10.1016/j.optlastec.2012.10.016
Database: Compendex
Compilation and indexing terms, © 2013 Elsevier Inc.
6.
Accession number: 20130215876943
Title: Color image encryption based on gyrator transform and Arnold transform
Authors: Sui, Liansheng1 ; Gao, Bo1/隋连升;高波
Author affiliation:
1 School of Computer Science and Engineering, Xi'An University of Technology, Xi'an 710048,
China
Corresponding author: Sui, L. (liudua2010@gmail.com)
Source title: Optics and Laser Technology
Abbreviated source title: Opt Laser Technol
Volume: 48
Issue date: 2013
Publication year: 2013
Pages: 530-538
Language: English
ISSN: 00303992
CODEN: OLTCAS
Document type: Journal article (JA)
Publisher: Elsevier Ltd, Langford Lane, Kidlington, Oxford, OX5 1GB, United Kingdom
Abstract: A color image encryption scheme using gyrator transform and Arnold transform is
proposed, which has two security levels. In the first level, the color image is separated into three
components: red, green and blue, which are normalized and scrambled using the Arnold
transform. The green component is combined with the first random phase mask and transformed
to an interim using the gyrator transform. The first random phase mask is generated with the sum
of the blue component and a logistic map. Similarly, the red component is combined with the
second random phase mask and transformed to three-channel-related data. The second random
phase mask is generated with the sum of the phase of the interim and an asymmetrical tent map.
In the second level, the three-channel-related data are scrambled again and combined with the
third random phase mask generated with the sum of the previous chaotic maps, and then
encrypted into a gray scale ciphertext. The encryption result has stationary white noise
distribution and camouflage property to some extent. In the process of encryption and
decryption, the rotation angle of gyrator transform, the iterative numbers of Arnold transform,
the parameters of the chaotic map and generated accompanied phase function serve as
encryption keys, and hence enhance the security of the system. Simulation results and security
analysis are presented to confirm the security, validity and feasibility of the proposed scheme. ©
2012 Elsevier Ltd. All rights reserved.
Number of references: 36
Main heading: Cryptography
Controlled terms: Chaotic systems - Gyrators - Image processing - White noise
Uncontrolled terms: Arnold transform - Chaotic map - Ciphertexts - Color
image encryptions - Color images - Encryption and decryption - Encryption key -