Share Email Print
cover

Proceedings Paper

Asymmetric cryptosystem using double random-decomposition in fractional Fourier transform domain
Author(s): Jaideep Kumar; Phool Singh; A. K. Yadav
Format Member Price Non-Member Price
PDF $17.00 $21.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

Motivated by recent research on asymmetric cryptosystems, a novel asymmetric scheme for image encryption that uses double random-decomposition technique in the fractional Fourier transform domain is proposed. The scheme endures the Special Attack as against conventional asymmetric cryptosystems based on phase-truncated Fourier transform (PTFT), and equal modulus decomposition. In the proposed scheme, an input image is bonded with a random phase mask and then it is subjected to a fractional Fourier transform. The resulting image is decomposed into two components using the random-decomposition technique. One of them will act as the first private key and the other component is subjected to the second fractional Fourier transform followed by another random-decomposition. Again, two new components are obtained, one will act as the second private key and the other is phase-truncated before subjecting it to LU decomposition followed by affine transform to get the encrypted image. The new scheme possesses enlarged key-space consisting of private keys obtained from random-decomposition, orders of fractional Fourier transform, affine transform parameters and permutation matrix of LU decomposition, thereby having a much greater capability to resist brute force attack. A sensitivity analysis has been carried out with respect to the encryption parameters. In addition to its resistance to the Special Attack, the scheme is immune to the basic attacks such as known-plaintext attack, chosen-plaintext attack, ciphertext-only attack, by virtue of its asymmetric nature. The above analysis along with statistical analysis through 3D plots and correlation distribution establish the strength of the proposed cryptosystem.

Paper Details

Date Published: 7 September 2018
PDF: 10 pages
Proc. SPIE 10751, Optics and Photonics for Information Processing XII, 107510V (7 September 2018); doi: 10.1117/12.2321973
Show Author Affiliations
Jaideep Kumar, K.R. Mangalam Univ. (India)
Phool Singh, Avvaiyar Government College for Women (India)
A. K. Yadav, Amity Univ. (India)


Published in SPIE Proceedings Vol. 10751:
Optics and Photonics for Information Processing XII
Abdul A. S. Awwal; Khan M. Iftekharuddin; Mireya García Vázquez, Editor(s)

© SPIE. Terms of Use
Back to Top