Laser & Optoelectronics Progress, Volume. 57, Issue 4, 041002(2020)

Image Encryption Based on Vector Decomposition and Chaotic Random Phase Mask

Shan Tao1, Chen Tang1、*, and Zhenkun Lei2
Author Affiliations
  • 1School of Electrical and Information Engineering, Tianjin University, Tianjin 300072, China
  • 2State Key Laboratory of Structural Analysis for Industrial Equipment, Dalian University of Technology, Dalian, Liaoning 116024, China
  • show less
    Figures & Tables(11)
    Flow chart of encryption and decryption. (a) Flow chart of encryption; (b) flow chart of decryption
    Lena image, encryption and decryption image, M1, CRPM1 and CRPM2. (a) Lena image; (b) encryption image; (c) decryption image; (d) M1; (e) CRPM1; (f) CRPM2
    Decrypted results when the key is wrong. (a) x0=0.501+1×10-15; (b) y0=0.601+1×10-15; (c) a0=1.40+1×10-15; (d) b0=0.3+1×10-15; (e) x1=0.500+1×10-15; (f) y1=0.600+1×10-15; (g) a1=1.39+1×10-15; (h) b1=0.3+1×10-15; (i) α=0.3+1×10-2; (j) β=0.4+1×10
    Correlation coefficient value (CC)between the decrypted image and the original image. (a)Key secret x0 with a deviation of Δx0;(b) key secret y0 with a deviation of Δy0;(c) key secret a0 with a deviation of Δa0; (d) key secret b0 with a deviation of Δb0; (e) key secret x1 with a deviation of Δx1; (f) key secret y</i
    Results of occlusion attack resistance. (a) Encrypted image with 6.25% occlusion size obtained with our method; (b) decrypted image with 6.25% occlusion size obtained with our method; (c) decrypted image with 6.25% occlusion size obtained with the method in Ref.[28]; (d) encrypted image with 12.5% occlusion size obtained with our method; (e) decrypted image with 12.5% occlusion size with our method; (f) decrypted image with 12.5% occlusion size obtained with the method in Ref.[28]
    Correlation coefficient value CC between decrypted image and original image obtained with our method and methods in Ref.[28] and Ref.[33] vs. occlusion percent
    Decrypted images from noise-affected cipher image with different methods. (a) Our method, k=0.1; (b) our method, k=0.3; (c) method in Ref.[28], k=0.1; (d) method in Ref.[33], k=0.3
    Correlation coefficient value CC between decrypted image and original image obtained with our method and methods in Ref.[28] and Ref.[33] vs. noise attack intensity
    Original images and encryption results. (a) Lena image; (b) an image with a different pixel value than the Lena image; (c) encryption result of Lena image; (d) encryption result of figure (b)
    Results of encryption and decryption. (a) Peppers image; (b) encryption image of peppers; (c) decryption image of peppers
    • Table 1. Correlation coefficients of two adjacent pixels in the Lena image and the cipher images encrypted by different encryption systems

      View table

      Table 1. Correlation coefficients of two adjacent pixels in the Lena image and the cipher images encrypted by different encryption systems

      DirectionLenaimageProposedmethodMethod inRef.[33]Method inRef.[28]
      Horizontal0.97740.00180.03730.0163
      Vertical0.95560.00100.02280.0215
      Diagonal0.94630.00140.02210.0283
    Tools

    Get Citation

    Copy Citation Text

    Shan Tao, Chen Tang, Zhenkun Lei. Image Encryption Based on Vector Decomposition and Chaotic Random Phase Mask[J]. Laser & Optoelectronics Progress, 2020, 57(4): 041002

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category: Image Processing

    Received: Apr. 26, 2019

    Accepted: Jul. 22, 2019

    Published Online: Feb. 20, 2020

    The Author Email: Tang Chen (tangchen@tju.edu.cn)

    DOI:10.3788/LOP57.041002

    Topics