Phase mask generation for DRPE method using chaos theory and hash function
نویسندگان
چکیده
The aim of this paper is to increase security of double random phase encoding (DRPE) method using chaos theory and hash function for phase mask generation. DRPE encodes the input image by the use of two keys which are random phase masks. Having these keys, the original image can be easily obtained with the reverse process, called decoding. To enhance the system’s security, instead of sending random phase masks, initial conditions and parameter of two dimensional coupled logistic map and SHA-512 algorithm are transferred to the authorized user through a secure channel. The proposed method not only obviates the need for sending large phase masks, but it considerably increases DRPE security. Experimental results and computer simulation demonstrate promising results of the proposed technique. © 2012 Published by Elsevier GmbH.
منابع مشابه
Improving security of double random phase encoding with chaos theory using fractal images
This study presents a new method based on the combination of cryptography and information hiding methods. Firstly, the image is encoded by the Double Random Phase Encoding (DRPE) technique. The real and imaginary parts of the encoded image are subsequently embedded into an enlarged normalized host image. DRPE demands two random phase mask keys to decode the decrypted image at the destination. T...
متن کاملKey Phase Mask Updating Scheme with Spatial Light Modulator for Secure Double Random Phase Encryption
Double random phase encryption (DRPE) is one of the well-known optical encryption techniques, and many techniques with DRPE have been developed for information security. However, most of these techniques may not solve the fundamental security problem caused by using fixed phase masks for DRPE. Therefore, in this paper, we propose a key phase mask updating scheme for DRPE to improve its security...
متن کاملA Novel Image Encryption Model Based on Hybridization of Genetic Algorithm, Chaos Theory and Lattice Map
Encryption is an important issue in information security which is usually provided using a reversible mathematical model. Digital image as a most frequently used digital product needs special encryption algorithms. This paper presents a new encryption algorithm high security for digital gray images using genetic algorithm and Lattice Map function. At the first the initial value of Logistic Map ...
متن کاملThe Assessment of Applying Chaos Theory for Daily Traffic Estimation
Road traffic volumes in intercity roads are generally estimated by probability functions, statistical techniques or meta-heuristic approaches such as artificial neural networks. As the road traffic volumes depend on input variables and mainly road geometrical design, weather conditions, day or night time, weekend or national holidays and so on, these are also estimated by pattern recognition te...
متن کاملInvestigation and Control of Unstable Chaotic Behavior Using of Chaos Theory in Two Electrical Power Systems: 1-Buck Converter2- Power Transformer
This paper consist of two sections: control and stabilizing approach for chaotic behaviour of converter is introduced in first section of this paper for the removal of harmonic caused by the chaotic behaviour in current converter. For this work, a Time- Delayed Feedback Controller (TDFC) control method for stability chaotic behaviour of buck converter for switching courses in current control mo...
متن کامل