Next Article in Journal
Electrochemical Impedance Immunosensor Based on Self-Assembled Monolayers for Rapid Detection of Escherichia coli O157:H7 with Signal Amplification Using Lectin
Previous Article in Journal
Investigating Driver Fatigue versus Alertness Using the Granger Causality Network
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Security Analysis of Image Encryption Based on Gyrator Transform by Searching the Rotation Angle with Improved PSO Algorithm

1
Key Laboratory of Dependable Service Computing in Cyber Physical Society of Ministry of Education, Chongqing University, Chongqing 400044, China
2
School of Software Engineering, Chongqing University, Chongqing 401331, China
3
School of Automation, Huazhong University of Science and Technology, Wuhan 430074, China
*
Author to whom correspondence should be addressed.
Sensors 2015, 15(8), 19199-19211; https://doi.org/10.3390/s150819199
Submission received: 12 July 2015 / Revised: 31 July 2015 / Accepted: 31 July 2015 / Published: 5 August 2015
(This article belongs to the Section Physical Sensors)

Abstract

:
Gyrator transform has been widely used for image encryption recently. For gyrator transform-based image encryption, the rotation angle used in the gyrator transform is one of the secret keys. In this paper, by analyzing the properties of the gyrator transform, an improved particle swarm optimization (PSO) algorithm was proposed to search the rotation angle in a single gyrator transform. Since the gyrator transform is continuous, it is time-consuming to exhaustedly search the rotation angle, even considering the data precision in a computer. Therefore, a computational intelligence-based search may be an alternative choice. Considering the properties of severe local convergence and obvious global fluctuations of the gyrator transform, an improved PSO algorithm was proposed to be suitable for such situations. The experimental results demonstrated that the proposed improved PSO algorithm can significantly improve the efficiency of searching the rotation angle in a single gyrator transform. Since gyrator transform is the foundation of image encryption in gyrator transform domains, the research on the method of searching the rotation angle in a single gyrator transform is useful for further study on the security of such image encryption algorithms.

1. Introduction

Optical image encryption is one of the main research fields for image encryption. The basic idea is to apply random operations in optical transform domains to encrypt images. One of the typical optical image encryption techniques is the double-random phase-encoding (DRPE) technique [1]. By employing independent random phase encoding on both the input and the Fourier planes, it encodes an input image to a complex-amplitude encoded image, whose real and imaginary parts can be taken as independent stationary white noise. Following the basic idea, the image can also be encrypted in fractional Fourier transform domains [2,3,4,5]. In addition, Chen et al. proposed an optical image encryption method by using multilevel Arnold transform and noninterferometric imaging [6]. Reference [7] proposed ghost imaging using labyrinth-like phase modulation patterns for optical image encryption, which is highly efficient and highly secure, since only one phase-only mask should be pre-set and the labyrinth patterns occupy only a few spaces, while each labyrinth pattern possesses high randomness and flexibility. In [8], by employing a nonlinear optical correlation via a sparse phase, phase encryption with enhanced security was proposed.
Gyrator transform is a new optical transform which has been widely studied in recent years [9]. By employing the unique characteristics of gyrator transform, gyrator transform has been used for image encryption, including single image encryption [10,11,12,13,14], double image encryption [15,16,17,18,19,20], multi-image encryption [21], and color image encryption [22,23,24,25,26,27,28].
Image encryption in gyrator transform domains usually applies random operations in image gyrator transform domains to encrypt the secret image [10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28]. For example, random phase encoding may be applied in image gyrator transform domains [10,11,12]. In such a cryptosystem, since the rotation angle involved in gyrator transform is also one of the secret keys for image encryption, the security is higher than that of the traditional DRPE technique in the Fourier transform domain [1].
To analyze the security of image encryption in gyrator transform domains, the security of image encryption with single random phase encoding and a single gyrator transform was analyzed in [29]. For such a cryptosystem, the operation of random phase encoding only changes the phase angle of the original secret image instead of the amplitude of the image. Thus, the encryption security depends on the rotation angle used in a gyrator transform. Based on the periodicity of gyrator transform, [29] indicated that, by equally dividing the period interval [0, 2π] of a gyrator transform with enough precision, and applying an exhaustive search, the rotation angle used in a gyrator transform can be obtained approximately with a known-plaintext attack. Then, the secret image can be decrypted with various qualities in terms of the dividing precision of the interval [0, 2π]. The analysis results may be used as a starting point for further security analysis of image encryption in gyrator transform domains.
Reference [29] focused on exhaustively searching the rotation angle used in a single gyrator transform. However, since a gyrator transform is continuous, it is time-consuming to exhaustively search for the rotation angle, even considering the periodicity of a gyrator transform and the data precision in a computer. Thus, the computational intelligence method may be applied to speed up the searching.
In this paper, based on [29], by analyzing the properties of gyrator transform, an improved particle swarm optimization (PSO) algorithm was proposed to search for the rotation angle in a single gyrator transform. The research on the properties of a gyrator transform and the method of searching the rotation angle in a single gyrator transform is useful for further study on the security of the image encryption in gyrator transform domains.
This paper is organized as follows: in Section 2, gyrator transform is briefly introduced and analyzed. Section 3 proposes the improved PSO algorithm to search the rotation angle in single gyrator transform, while Section 4 performs the numerical simulation experiment. The final conclusions are presented in Section 5.

2. Brief Introduction and Analysis on Gyrator Transform

2.1. Gyrator Transform

Gyrator transform is a linear canonical integral transform, which introduces the rotation in position−spatial frequency planes of phase space. For a two-dimensional function f i ( r i ) , the gyrator transform with rotation angle α is as Equations (1) and [9]:
f 0 ( r 0 ) = R α [ f i ( r i ) ] ( r 0 ) = f i ( x i , y i ) K α ( x i , y i , x 0 , y 0 ) d x i d y i = 1 | sin α | f i ( x i , y i ) { exp [ i 2 π ( x 0 y 0 + x i y i ) cos α ( x i y 0 + x 0 y i ) sin α ] } d x i d y i
where r i and r 0 are the input and output plane coordinates, respectively. α is the rotation angle.
For α = 0 it corresponds to the identity transform, for α = π/2, it reduces to the Fourier transform with a rotation of the coordinates at π/2. For α = π, the reverse transform described by the kernel δ (ro + ri) is obtained. Meanwhile for α = 3π/2, it corresponds to the inverse Fourier transform with a rotation of the coordinates at π/2 [9].
The gyrator transform is periodic with 2π. The gyrator transform can be implemented with numerical methods, according to the following three steps to transform f i ( x , y ) to f o ( x , y ) :
Step 1:
B α ( x i , y i ) = f i ( x i , y i ) exp ( j 2 π x y i i cot α )
Step 2:
t = { F F T 2 ( B α ( x i , y i ) )       i f sin α 0 I F F T 2 ( B α ( x i , y i ) )     i f sin α < 0
where F F T and I F F T are fast Fourier transform and inverse Fourier transform, respectively.
Step 3:
f o ( x i , y i ) = t exp ( j 2 π x y i i cot α )

2.2 Analysis on Gyrator Transform

Suppose an image f ( x , y ) is transformed to g ( x , y ) with a gyrator transform. The rotation angle used in the gyrator transform is α. With known f ( x , y ) and g ( x , y ) , we want to find the value of α.
Due to the continuity of the gyrator transform, the number of the potential values of α used in the gyrator transform is infinite. However, as [29] indicates, since the gyrator transform is periodical with the period of 2π, the value of α may be obtained approximately by discretizing the interval [0, 2π] with enough precision and applying an exhaustive search.
For example, apply a gyrator transform on an image, using 2 as the value of the rotation angle. Then, equally divide the interval [0, 2π] into 100,000 sub-intervals and use the obtained discrete values as the rotation angle in an inverse gyrator transform to recover the image. The correlations between the recovered images and the original image were shown in Figure 1 [29].
Figure 1. Correlations between the recovered images and the original image by equally dividing [0, 2π] into 100,000 sub-intervals.
Figure 1. Correlations between the recovered images and the original image by equally dividing [0, 2π] into 100,000 sub-intervals.
Sensors 15 19199 g001
In Figure 1, the horizontal axis is the value of the rotation angle used in the inverse gyrator transform, while the vertical axis is the correlation between the recovered image and the original image.
From Figure 1, it can be seen that, if the interval [0, 2π] is equally divided into sub-intervals with great enough numbers, i.e., discretized with enough precision, e.g., 100,000, with an exhaustive search, the rotation angle used in a gyrator transform can be obtained approximately and the original image can be recovered with high quality (the correlation being close to 1), even though the obtained rotation angle may not be the same as the original one.
In [29], it is also indicated that, the obtained approximate rotation angle can be used to recover other images transformed with the same rotation angle. It demonstrated that, taking a single gyrator transform as a cryptosystem, by discretizing the interval [0, 2π] with enough precision and applying an exhaustive search, the rotation angle can be obtained with a known-plaintext attack.
Obviously, due to the continuity of the gyrator transform, to obtain the rotation angle used in a single gyrator transform, the interval [0, 2π] should be discretized with enough precision to apply an exhaustive search. It is time-consuming, even considering the data precision in a computer. To accelerate the search speed, by analyzing the properties of the gyrator transform, we proposed an improved PSO algorithm to search the rotation angle used in a single gyrator transform, which will be described in the next section.

3. Improved PSO Algorithm

Particle Swarm Optimization (PSO) is a kind of evolution algorithm. It sets a swarm of particles, where each particle represents a potential solution. By evaluating each particle with the value of the fitness function, the velocity and the position of each particle are updated. The procedure of fitness-value evaluation and particle updating are repeated iteratively until an acceptable solution has been found or the maximum number of iterations is reached [30].
Since the gyrator transform has severe local convergence and obvious global fluctuations (Figure 1), it is easy to fall into a locally-optimal solution by applying the typical PSO algorithm to search for the rotation angle in a single gyrator transform. To solve such problem, an improved PSO algorithm to be suitable for such situation was proposed.
The search scope of the proposed improved PSO algorithm is dynamically changed, which is similar to using a microscope. Firstly, the rough position of the solution is observed in a large scope, usually, in the global scope. Then, by adjusting the lens, the solution is observed in a smaller scope, i.e., in a local scope. This procedure may be repeated to gradually reduce the search scope until the final solution is either found or not. If the solution is not found after a certain number of iterations, amplify the observing scope for the next loop to try to search the solution again.
In the improved PSO algorithm, the basic idea of the PSO algorithm is kept, while the search stages corresponding to different search scopes are determined by the current best-fitness value.
Next, the specific procedure for searching the rotation angle in a single gyrator transform based on the improved PSO algorithm is described.
The definitions of the symbols used in the algorithm are listed in Table 1.
Table 1. The symbols used in the algorithm.
Table 1. The symbols used in the algorithm.
SymbolDefinition
NLoopThe maximum number of loop
NCLoopThe number of current loop
NGlobalThe maximum iterative number for global search
NCGlobalThe number of current global search
NLocalThe maximum iterative number for local search
NCLocalThe number of current local search
NParticleThe number of particle
FitoutThe fitness value when an acceptable solution is found
SerXThe sizes of local scope for local search
X maybe 1, 2, 3, ..., n, which is corresponding to the different sizes of local scope, since the local searching scope maybe getting smaller during the search procedure
FitXThe threshold values of the fitness corresponding to different local search scopes SerX
FitbestCurrent best fitness value
XbestCurrent best particle corresponding to Fitbest
The flowchart of the algorithm is shown in Figure 2.
Figure 2. The flowchart of searching the rotation angle in a single gyrator transform with the improved PSO algorithm.
Figure 2. The flowchart of searching the rotation angle in a single gyrator transform with the improved PSO algorithm.
Sensors 15 19199 g002
As Figure 2 illustrates, the procedure of the algorithm can be described as four major stages:
Stage 1: Initialize the parameters used in the algorithm, such as NLoop, NGlobal, NLocal, NParticle, Fitout, SerX, FitX, etc. Set NCLoop to be 0.
Stage 2: Global search.
In this stage, globally search the solution, i.e., the rotation angle used in a single gyrator transform.
Firstly, the particles are initialized by being randomly generated among the interval [0, 2π].
Secondly, the fitness values of the particles are calculated. The fitness function is the mean-square-error (MSE) between the recovered image f ( x , y ) , by applying an inverse gyrator transform on the transformed image, g ( x , y ) with the particle and the original image f ( x , y ) , which is defined as Equation (5):
M S E = 1 M N x = 0 M 1 y = 0 N 1 | g ( x , y ) f ( x , y ) | 2
If Fitbest < Fitout, the solution is found, output it and exit.
If Fitbest < FitX, go to local search with search scope SerX, and the current best particle Xbest is set to be the particle X(1) used for local search.
If NCGlobal > NGlobal, go to local search with search scope Ser1, and the current best particle Xbest is set to be the particle X(1) used for local search. This means that if the maximum iterative number for global search NGlobal is reached, even if the threshold value SerX for any local search is not reached, the algorithm will also go to local search.
Then, sort the particles according to their fitness values from least, and the particles are updated following Equation (6).
x i + 1 ( j ) = { x i ( j )               1 j 5 x i ( 1 ) + 0.001 × rand ( 1 ) 6 j 10 x i ( 2 ) + 0.01 × rand ( 1 )    11 j 15 x i ( 3 ) + 0.1 × rand ( 1 )      16 j 20 2 × π × rand ( 1 )      21 j N P a r t i c l e
where x i ( j ) is the position of current particle, x i + 1 ( j ) is the position of the particle after updating, and N P a r t i c l e is the number of particle.
As Equation (6) shows, the updating strategy for the global search can be described as keeping the five best particles, randomly generating five particles around each of the three best particles, and randomly generating the other particles globally.
Stage 3. Local search.
In this stage, locally search the solution in a reduced scope.
The local search scope is determined by SerX corresponding to FitX as the interval [X(1) − SerX, X(1) + SerX].
Firstly, the particles are updated following Equation (7).
x i + 1 ( j ) = { x i ( 1 )                               j = 1 x i ( 1 ) + SerX × rand ( 1 )                    2 j 5 x i ( 1 ) SerX + ( 2 × SerX ) / ( N P a r t i c l e 5 ) × ( j 6 ) 6 j N P a r t i c l e
where x i ( j ) is the position of current particle, x i + 1 ( j ) is the position of the particle after updating, N P a r t i c l e is the number of particle.
As Equation (7) shows, the updating strategy for local search can be described as keeping the best particle, randomly generating four particles around the best particle, uniformly generating the other particles in the interval [xi(1)-SerX, xi(1)+SerX].
Then, calculate the fitness values of the particles.
If Fitbest < Fitout, the solution is found, output it and exit.
If Fitbest < FitX, where the FitX is less than the threshold value used in the current local search, locally search again in a smaller scope, and the current best particle Xbest is set to be the particle X(1) used for next search. Therefore, during the local search stage, the search scope may be getting smaller.
If NCLocal <= NLocal, repeat local search with current search scope.
If NCLocal > NLocal, the solution is not found during the local search.
Stage 4. Loop again or exit.
If NCLoop <= NLoop, go to global search to repeat search again.
If NCLoop > NLoop, cannot find the solution and exit.
The experiments by applying the proposed improved PSO algorithm to search the rotation angle in a single gyrator transform were conducted in the next section.

4. Experiments and Analysis

The experiments were conduct under the following environment:
Computer: HP G42 Notebook
CPU: Intel Core i3 M390 @2.67 GHz
OS: Windows 8 Professional
Matlab: R2013a
The values of the parameters used in the experiments are listed in Table 2.
Table 2. The values of the parameters used in the experiments.
Table 2. The values of the parameters used in the experiments.
ParameterValue
NLoop20
NGlobal40
NLocal10
NParticle100
Fitout0.05
SerX0.001, 0.0001, 0.00001, 0.000001, 0.0000005
FitX100, 80, 60, 40, 20
The image used in the experiments was image Cameraman shown in Figure 3. Different values of the rotation angle in the gyrator transform were used to conduct the experiments several times. The experimental results were listed in Table 3.
Figure 3. Cameraman.
Figure 3. Cameraman.
Sensors 15 19199 g003
Table 3. The experimental results for image Cameraman with different values of rotation angle.
Table 3. The experimental results for image Cameraman with different values of rotation angle.
NGlobalOriginal Rotation AngleObtained Rotation AngleFitness Value (MSE)Number of IterationUsed Time (s)
401.7234560.8685455720.0001678563156.425792
2.4275064870.009478194.970638
1.7234560050217490.312829
0.4964251610.009077198.694923
2.9053479710.0294117298.661654
2.706924310.0285117291.795749
2.5234561.956698353074197.288178
2.52345603898.478521
1.035001755078198.249360
In order to compare, image Cameraman and the other three images Girl, Lena, and Testpat, shown in Figure 4, were used in the experiments and the results were list in Table 4.
Figure 4. (a) Image Girl; (b) Image Lena; (c) Image Testpat.
Figure 4. (a) Image Girl; (b) Image Lena; (c) Image Testpat.
Sensors 15 19199 g004
Table 4. The experimental results for four images.
Table 4. The experimental results for four images.
ImageOriginal Rotation AngleObtained Rotation AngleFitness Value (MSE)Number of IterationUsed Time (s)
Camerama1.1234560.5942829840.00001525938103.03
Girl1.1234561.12345599088240.76
Lena1.1234562.050489581050119.18859
Testpat1.1234561.123456002065164.377708
In Table 3 and Table 4, the number of iterations may be larger than NGlobal plus NLocal; because for each loop, the number of iterations is NGlobal plus NLocal. If the solution is not found, the algorithm will loop again. If the solution is found with several loops, the number of iterations is added together. On the other hand, when the maximum number of loops is reached and the solution is not found yet, it means that the solution cannot be found. According to a large number of experiments, by setting the maximum number of loops to 20, the ratio of not obtaining the solution is around 10%–15%.
To compare the time used for searching the rotation angle in a single gyrator transform, the experimental results for the above four images by using the improved PSO algorithm and the exhaustive search were listed in Table 5. Notice that for the improved PSO algorithm, the used time depends on the parameters and the original rotation angle. Here, we listed the used time for general situations following Table 3 and Table 4. For the exhaustive search, according to [29], to obtain the rotation angle in a single gyrator transform, the interval [0, 2π] should be divided into enough sub-intervals, e.g., the value of the rotation angle is accurate to six decimal places. Therefore, the time used for searching the rotation angle in a single gyrator transform was in terms of setting the value of the rotation angle to be accurate to six decimal places.
Table 5. The time used for searching the rotation angle in a single gyrator transform.
Table 5. The time used for searching the rotation angle in a single gyrator transform.
ImageImproved PSO Algorithm (s)Exhaustive Searching (s)
Cameramaless than 500around 71,200
Girlless than 500around 71,200
Lenaless than 500around 71,200
Testpatless than 500around 71,200
From Table 3, Table 4 and Table 5, it can be seen that the time to obtain the rotation angle in a gyrator transform with the improved PSO algorithm is usually less than 500 s. On the contrary, if the value of the rotation angle is accurate to six decimal places, with an exhaustive search, the search time will be around 71,200 s. Obviously, with the improved PSO algorithm, the time used to search the rotation angle in a single gyrator transform decreases significantly.
More experiments were conducted on many different images with different rotation angles and different parameters, and similar results were yielded. In addition, our experiments demonstrated that, for different images transformed by a single gyrator transform with the same rotation angle, the rotation angle obtained with an image via the improved PSO algorithm can also be used to recover the other images. It indicates that, taking a single gyrator transform as a cryptosystem, the rotation angle which plays the role of secret key, can be efficiently obtained with a known-plaintext attack via the improved PSO algorithm.
It should be pointed out that the parameters used in the algorithm, such as NLoop, NGlobal, NLocal, NParticle, Fitout, SerX and FitX, etc. may be adjusted to be different values and the results may be different. However, in general, the search time with the proposed improved PSO algorithm is usually much less than that of exhaustive search.
From the above experimental results and discussion, it can be seen that encrypting an image with a single gyrator transform is insecure. Therefore, the image encryption methods in the gyrator transform domain usually apply iterative gyrator transforms [10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28]. With iterative gyrator transforms, the encryption security may be enhanced. However, following the existing security analysis methods for double-random-phase-encoding-based image encryption [31,32,33,34,35,36], especially the chosen-plaintext attack method [31], while combing the proposed improved PSO algorithm, the rotation angles used in iterative gyrator transforms may be obtained. This will be our future work.

5. Conclusions

For gyrator transform-based image encryption, the rotation angle used in the gyrator transform is one of the secret keys. In this paper, considering the properties of the gyrator transform, an improved PSO algorithm was proposed and applied to search the rotation angle in a single gyrator transform. The experimental results demonstrate that the proposed improved PSO algorithm can significantly improve the efficiency of searching the rotation angle of a single gyrator transform. Since gyrator transform is the foundation of image encryption in gyrator transform domains, the research on the method of searching the rotation angle in a single gyrator transform is useful for further study on the security of the image encryption algorithms based on the gyrator transform.
The basic idea of the proposed improved PSO algorithm can also be used to search the optimization solutions for other problems with the similar characteristics of severe local convergence and obvious global fluctuations.

Acknowledgments

This work was supported by Specialized Research Fund for the Doctoral Program of Higher Education of China (SRFDP) (No. 20130191110027).

Author Contributions

Jun Sang supervised entire study. Jun Sang, Jun Zhao and Bin Cai contributed to theoretical study. Jun Zhao and Zhili Xiang contributed to literature research. Jun Zhao and Jun Sang conceived and designed the experiments. Jun Zhao and Zhili Xiang performed the experiments. Zhili Xiang and Hong Xiang analyzed the data. Jun Sang, Jun Zhao and Bin Cai wrote the draft manuscript. Bin Cai and Hong Xiang contributed to manuscript definition of important intellectual content and manuscript revision. Jun Sang approved the final version of the manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Refregier, P.; Javidi, B. Optical image encryption based on input plane and Fourier plane random encoding. Opt. Lett. 1995, 20, 767–769. [Google Scholar] [CrossRef] [PubMed]
  2. Tao, R.; Meng, X.; Wang, Y. Image encryption with multiorders of fractional Fourier transforms. IEEE Trans. Inf. Forensics Secur. 2010, 5, 734–738. [Google Scholar] [CrossRef]
  3. Lang, J. Image encryption based on the reality-preserving multiple-parameter fractional Fourier transform. Opt. Commun. 2012, 285, 2584–2590. [Google Scholar] [CrossRef]
  4. Liu, Z.; Li, S.; Yang, M.; Liu, W.; Liu, S. Image encryption based on the random rotation operation in the fractional Fourier transform domains. Opt. Lasers Eng. 2012, 50, 1352–1358. [Google Scholar] [CrossRef]
  5. Liu, S.; Sheridan, J.T. Optical encryption by combining image scrambling techniques in fractional Fourier domains. Opt. Commun. 2013, 287, 73–80. [Google Scholar] [CrossRef]
  6. Chen, W.; Chen, X. Optical image encryption using multilevel Arnold transform and noninterferometric imaging. Opt. Eng. 2011, 50, 117001. [Google Scholar] [CrossRef]
  7. Chen, W.; Chen, X. Ghost imaging using labyrinth-like phase modulation patterns for high-efficiency and high-security optical encryption. Europhys. Lett. 2015, 109, 14001. [Google Scholar] [CrossRef]
  8. Chen, W.; Wang, X.; Chen, X. Security-enhanced phase encryption assisted by nonlinear optical correlation via sparse phase. J. Opt. 2015, 17, 035702. [Google Scholar] [CrossRef]
  9. Rodrigo, J.A.; Alieva, T.; Calvo, M.L. Gyrator transform: Properties and applications. Opt. Express 2007, 15, 2190–2230. [Google Scholar] [CrossRef] [PubMed]
  10. Singh, N.; Sinha, A. Gyrator transform-based optical image encryption, using chaos. Opt. Lasers Eng. 2009, 47, 539–546. [Google Scholar] [CrossRef]
  11. Liu, Z.; Xu, L.; Lin, C.; Dai, J.; Liu, S. Image encryption scheme by using iterative random phase encoding in gyrator transform domains. Opt. Lasers Eng. 2011, 49, 542–546. [Google Scholar] [CrossRef]
  12. Liu, Z.; Yang, M.; Liu, W.; Li, S.; Gong, M.; Liu, W.; Liu, S. Image encryption algorithm based on the random local phase encoding in gyrator transform domains. Opt. Commun. 2012, 285, 3921–3925. [Google Scholar] [CrossRef]
  13. Daza, S.M.; Vega, F.; Matos, L.; Moreno, C.T.; Diaz, M.L.; Daza, Y.M. Image encryption based on convolution operation in the gyrator transform domain. In Proceedings of the IECON 2012 38th Annual Conference on IEEE Industrial Electronics Society, Montreal, QC, Canada, 25–28 October 2012; pp. 1527–1529.
  14. Liu, Z.; Chen, H.; Liu, T.; Li, P.; Xu, L.; Dai, J.; Liu, S. Image encryption by using gyrator transform and Arnold transform. J. Electron. Imaging 2011, 20, 013020. [Google Scholar] [CrossRef]
  15. Li, H.; Wang, Y. Double-image encryption based on iterative gyrator transform. Opt. Commun. 2008, 281, 5745–5749. [Google Scholar] [CrossRef]
  16. Liu, Z.; Guo, Q.; Xu, L.; Ahmad, M.A.; Liu, S. Double image encryption by using iterative random binary encoding in gyrator domains. Opt. Express 2010, 18, 12033–12043. [Google Scholar] [CrossRef] [PubMed]
  17. Liu, Z.; Zhang, Y.; Li, S.; Liu, W.; Liu, W.; Wang, Y.; Liu, S. Double image encryption scheme by using random phase encoding and pixel exchanging in the gyrator transform domains. Opt. Lasers Technol. 2013, 47, 152–158. [Google Scholar] [CrossRef]
  18. Li, H.; Wang, Y.; Yan, H.; Li, L.; Li, Q.; Zhao, X. Double-image encryption by using chaos-based local pixel scrambling technique and gyrator transform. Opt. Lasers Eng. 2013, 51, 1327–1331. [Google Scholar] [CrossRef]
  19. Wang, Q.; Guo, Q.; Lei, L. Double image encryption based on phase-amplitude mixed encoding and multistage phase encoding in gyrator transform domains. Opt. Lasers Technol. 2013, 48, 267–279. [Google Scholar] [CrossRef]
  20. Shao, Z.; Shu, H.; Wu, J.; Dong, Z.; Coatrieux, G.; Coatrieux, J.L. Double color image encryption using iterative phase retrieval algorithm in quaternion gyrator domain. Opt. Express 2014, 22, 4932–4942. [Google Scholar] [CrossRef] [PubMed]
  21. Wang, Q.; Guo, Q.; Lei, L. Multiple-image encryption system using cascaded phase mask encoding and a modified Gerchberg-Saxton algorithm in gyrator domain. Opt. Commun. 2014, 320, 12–21. [Google Scholar] [CrossRef]
  22. Abuturab, M.R. Color image security system using double random-structured phase encoding in gyrator transform domain. Appl. Opt. 2012, 51, 3006–3016. [Google Scholar] [CrossRef] [PubMed]
  23. Abuturab, M.R. Color information security system using discrete cosine transform in gyrator transform domain radial-Hilbert phase encoding. Opt. Lasers Eng. 2012, 50, 1209–1216. [Google Scholar] [CrossRef]
  24. Abuturab, M.R. Color information cryptosystem based on optical superposition principle and phase-truncated gyrator transform. Appl. Opt. 2012, 51, 7994–8002. [Google Scholar] [CrossRef] [PubMed]
  25. Sui, L.; Gao, B. Color image encryption based on gyrator transform and Arnold transform. Opt. Lasers Technol. 2013, 48, 530–538. [Google Scholar] [CrossRef]
  26. Chen, H.; Du, X.; Liu, Z.; Yang, C. Color image encryption based on the affine transform and gyrator transform. Opt. Lasers Eng. 2013, 51, 768–775. [Google Scholar] [CrossRef]
  27. Abuturab, M.R. Single-channel color information security system using LU decomposition in gyrator transform domains. Opt. Commun. 2014, 323, 100–109. [Google Scholar] [CrossRef]
  28. Abuturab, M.R. An asymmetric color image cryptosystem based on Schur decomposition in gyrator transform domain. Opt. Lasers Eng. 2014, 58, 39–47. [Google Scholar] [CrossRef]
  29. Sang, J.; Cai, B.; Zhang, B.; Hong, D.; Hu, H. Security analysis of random phase encoding based image encryption in gyrator transform domains. In Proceedings of the 9th International Conference on Computational Intelligence and Security, Leshan, China, 14–15 December 2013; pp. 579–582.
  30. Engelbrecht, A.P. Fundamentals of Computational Swarm Intelligence; John Wiley & Sons: New York, NY, USA, 2005. [Google Scholar]
  31. Wei, H.; Peng, X.; Zhang, P.; Liu, H.; Feng, S. Chosen-plaintext attack on double phase encoding encryption technique. Acta Opt. Sin. 2007, 27, 824–829. (In Chinese) [Google Scholar]
  32. Carnicer, A.; Montes-Usategui, M.; Arcos, S.; Juvells, I. Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. Opt. Lett. 2005, 30, 1644–1646. [Google Scholar] [CrossRef] [PubMed]
  33. Peng, X.; Zhang, P.; Wei, H.; Yu, B. Known-plaintext attack on optical encryption based on double random phase keys. Opt. Lett. 2006, 31, 1044–1046. [Google Scholar] [CrossRef] [PubMed]
  34. Gopinathan, U.; Monaghan, D.S.; Naughton, T.J.; Sheridan, J.T. A known-plaintext heuristic attack on the Fourier plane encryption algorithm. Opt. Express 2006, 14, 3181–3186. [Google Scholar] [CrossRef] [PubMed]
  35. Qin, W.; He, W.; Meng, X.; Peng, X. Optical cryptanalysis of DRPE-based encryption systems. Proc. SPIE 2009, 7512. [Google Scholar] [CrossRef]
  36. Nakano, K.; Suzuki, H.; Yamaguchi, M.; Obi, T.; Ohyama, N. Quantitative analysis on key estimation by known-plaintext attacks to DRPE. Proc. SPIE 2011, 8011. [Google Scholar] [CrossRef]

Share and Cite

MDPI and ACS Style

Sang, J.; Zhao, J.; Xiang, Z.; Cai, B.; Xiang, H. Security Analysis of Image Encryption Based on Gyrator Transform by Searching the Rotation Angle with Improved PSO Algorithm. Sensors 2015, 15, 19199-19211. https://doi.org/10.3390/s150819199

AMA Style

Sang J, Zhao J, Xiang Z, Cai B, Xiang H. Security Analysis of Image Encryption Based on Gyrator Transform by Searching the Rotation Angle with Improved PSO Algorithm. Sensors. 2015; 15(8):19199-19211. https://doi.org/10.3390/s150819199

Chicago/Turabian Style

Sang, Jun, Jun Zhao, Zhili Xiang, Bin Cai, and Hong Xiang. 2015. "Security Analysis of Image Encryption Based on Gyrator Transform by Searching the Rotation Angle with Improved PSO Algorithm" Sensors 15, no. 8: 19199-19211. https://doi.org/10.3390/s150819199

APA Style

Sang, J., Zhao, J., Xiang, Z., Cai, B., & Xiang, H. (2015). Security Analysis of Image Encryption Based on Gyrator Transform by Searching the Rotation Angle with Improved PSO Algorithm. Sensors, 15(8), 19199-19211. https://doi.org/10.3390/s150819199

Article Metrics

Back to TopTop