Laser & Optoelectronics Progress, Volume. 57, Issue 4, 041002(2020)
Image Encryption Based on Vector Decomposition and Chaotic Random Phase Mask
Fig. 1. Flow chart of encryption and decryption. (a) Flow chart of encryption; (b) flow chart of decryption
Fig. 2. Lena image, encryption and decryption image, M1, CRPM1 and CRPM2. (a) Lena image; (b) encryption image; (c) decryption image; (d) M1; (e) CRPM1; (f) CRPM2
Fig. 3. Decrypted results when the key is wrong. (a) x0=0.501+1×10-15; (b) y0=0.601+1×10-15; (c) a0=1.40+1×10-15; (d) b0=0.3+1×10-15; (e) x1=0.500+1×10-15; (f) y1=0.600+1×10-15; (g) a1=1.39+1×10-15; (h) b1=0.3+1×10-15; (i) α=0.3+1×10-2; (j) β=0.4+1×10
Fig. 4. Correlation coefficient value (CC)between the decrypted image and the original image. (a)Key secret x0 with a deviation of Δx0;(b) key secret y0 with a deviation of Δy0;(c) key secret a0 with a deviation of Δa0; (d) key secret b0 with a deviation of Δb0; (e) key secret x1 with a deviation of Δx1; (f) key secret y
Fig. 5. Results of occlusion attack resistance. (a) Encrypted image with 6.25% occlusion size obtained with our method; (b) decrypted image with 6.25% occlusion size obtained with our method; (c) decrypted image with 6.25% occlusion size obtained with the method in Ref.[28]; (d) encrypted image with 12.5% occlusion size obtained with our method; (e) decrypted image with 12.5% occlusion size with our method; (f) decrypted image with 12.5% occlusion size obtained with the method in Ref.[28]
Fig. 6. Correlation coefficient value CC between decrypted image and original image obtained with our method and methods in Ref.[28] and Ref.[33] vs. occlusion percent
Fig. 7. Decrypted images from noise-affected cipher image with different methods. (a) Our method, k=0.1; (b) our method, k=0.3; (c) method in Ref.[28], k=0.1; (d) method in Ref.[33], k=0.3
Fig. 8. Correlation coefficient value CC between decrypted image and original image obtained with our method and methods in Ref.[28] and Ref.[33] vs. noise attack intensity
Fig. 9. Original images and encryption results. (a) Lena image; (b) an image with a different pixel value than the Lena image; (c) encryption result of Lena image; (d) encryption result of figure (b)
Fig. 10. Results of encryption and decryption. (a) Peppers image; (b) encryption image of peppers; (c) decryption image of peppers
|
Get Citation
Copy Citation Text
Shan Tao, Chen Tang, Zhenkun Lei. Image Encryption Based on Vector Decomposition and Chaotic Random Phase Mask[J]. Laser & Optoelectronics Progress, 2020, 57(4): 041002
Category: Image Processing
Received: Apr. 26, 2019
Accepted: Jul. 22, 2019
Published Online: Feb. 20, 2020
The Author Email: Tang Chen (tangchen@tju.edu.cn)