Loading…

Nonlinear double image encryption using 2D non-separable linear canonical transform and phase retrieval algorithm

•A new nonlinear technique for double image encryption is proposed.•Combines 2D non-separable linear canonical transform and phase retrieval algorithm.•Ten parameters of 2D NS-LCT and private key are among the security parameters.•The original images can be exactly retrieved only if all the correct...

Full description

Saved in:
Bibliographic Details
Published in:Optics and laser technology 2018-11, Vol.107, p.353-360
Main Authors: Kumar, Ravi, Sheridan, John T., Bhaduri, Basanta
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:•A new nonlinear technique for double image encryption is proposed.•Combines 2D non-separable linear canonical transform and phase retrieval algorithm.•Ten parameters of 2D NS-LCT and private key are among the security parameters.•The original images can be exactly retrieved only if all the correct keys are used.•Proposed technique robust against noise, occlusion and chosen plaintext attacks. In this paper, we propose a new asymmetric method for double image encryption using the two-dimensional non-separable linear canonical transform (2D NS-LCT) and an iterative phase retrieval algorithm (PRA). First an encryption security key is generated using the PRA. Then two images (2D intensities) are combined to form a complex image. The 2D NS-LCT of this complex valued image is then obtained. A nonlinear phase truncation operation is applied to the transformed image and the amplitude is retained and used as the private key. The phase term is multiplied by the security PRA generated key and the inverse 2D NS-LCT is applied to the result giving the output encrypted image. The robustness of the proposed technique is tested against noise, occlusion and chosen-plaintext attacks. Numerical results are presented demonstrating the security of the proposed technique.
ISSN:0030-3992
1879-2545
DOI:10.1016/j.optlastec.2018.06.014