Skip to main content
Log in

An asymmetric cryptosystem based on the random weighted singular value decomposition and fractional Hartley domain

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

A new asymmetric encryption system for double random phase encoding based on random weighted singular value decomposition and fractional Hartley transform domain has been proposed. Random weighted singular value decomposition is purely based upon random weights, isometric matrix and orthogonal triangular decomposition and all these fragments enhances the security of double random phase encoding cryptosystem. Random weights and orthogonal triangular decomposition are considered as heart of this cryptosystem. This system is carried out in fractional Hartley domain, where fractional orders play a vital role. On the receiver side, it is only possible to decrypt the image if anyone knows all the three components, its multiplication order, fractional order of fractional Hartley transform. Proposed cryptosystem is efficiently compared with singular value decomposition and truncated singular value decomposition. Similar to singular value decomposition and truncated singular value decomposition, proposed cryptosystem also yields three components. Because of random weights, these three components are highly differing from traditional singular value decomposition and truncated singular value decomposition components. Some analysis is offered to authenticate the opportunity.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Chen L, Zhao D, Ge F (2013) Image encryption based on singular value decomposition and Arnold transform in fractional domain. Opt Commun 291:98–103

    Article  Google Scholar 

  2. De Moor B, Van Dooren P (1992) Generalizations of the singular value and QR-decompositions. SIAM Journal on Matrix Analysis and Applications 13(4):993–1014

    Article  MathSciNet  Google Scholar 

  3. Dogan S, Tuncer T, Avci E, Gulten A (2011) A robust color image watermarking with singular value decomposition method. Adv Eng Softw 42(6):336–346

    Article  Google Scholar 

  4. Girija R, Singh H (2018) A cryptosystem based on deterministic phase masks and fractional Fourier transform deploying singular value decomposition. Opt Quant Electron 50(5):210

    Article  Google Scholar 

  5. Girija R, Singh H (2018) Symmetric cryptosystem based on chaos structured phase masks and equal modulus decomposition using fractional Fourier transform. 3D Res 9(42):1–20

    Google Scholar 

  6. Girija R, Singh H (2018) Enhancing security of double random phase encoding based on random S-box. 3D Res 9(15):1–20

    Google Scholar 

  7. Khurana M, Singh H (2017) An asymmetric image encryption based on phase truncated hybrid transform. 3D Res 8(28):1–17

    Google Scholar 

  8. Khurana M, Singh H (2019) A spiral-phase rear mounted triple masking for secure optical image encryption based on gyrator transform. Recent patents on Computer Science 12(2):80–84

    Article  Google Scholar 

  9. Liu Z, Zhao H, Liu S (2005) A discrete fractional random transform. Opt Commun 255(4–6):357–365

    Article  Google Scholar 

  10. Liu Z, Li S, Liu W, Wang Y, Liu S (2013) Image encryption algorithm by using fractional Fourier transform and pixel scrambling operation based on double random phase encoding. Opt and Lasers in Engg 51(1):8–14

    Article  Google Scholar 

  11. Maan P, Singh H (2018) Non-linear Cryptosystem for Image Encryption Using Radial Hilbert Mask in Fractional Fourier Transform Domain. 3D Research, 9(4), 9:53, 1–12

  12. Maan P, Singh H, Kumari AC (2019) Optical Asymmetric Cryptosystem Based on Kronecker Product, Hybrid Phase Mask and Optical Vortex Phase Masks in the Phase Truncated Hybrid Transform Domain. 3D Research, 10(1), 10: 8, 1–18

  13. Naidu VPS (2011) Image fusion technique using multi-resolution singular value decomposition. Def Sci J 61(5):479

    Article  MathSciNet  Google Scholar 

  14. Nishchal NK, Joseph J, Singh K (2003) Fully phase encryption using fractional Fourier transform. Opt Eng 42(6):1583–1589

    Article  Google Scholar 

  15. Pei SC, Ding JJ (2002) Fractional cosine, sine, and Hartley transforms. IEEE Trans Signal Process 50(7):1661–1680

    Article  MathSciNet  Google Scholar 

  16. Pei SC, Tseng CC, Yeh MH, Shyu JJ (1998) Discrete fractional Hartley and Fourier transforms. IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing 45(6):665–675

    Article  Google Scholar 

  17. Qin W, Peng X (2010) Asymmetric cryptosystem based on phase-truncated Fourier transform. Opt Lett 35:118–120

    Article  Google Scholar 

  18. Qin, W., Peng, X., Meng, X., Gao, B. (2011). Universal and special keys based on phase-truncated Fourier transform. Opt Eng 50, 080501–1–080501–3.

  19. Rajput SK, Nishchal NK (2012) Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask. Appl Opt 51:5377–5786

    Article  Google Scholar 

  20. Refregier P, Javidi B (1995) Optical image encryption based on input plane and Fourier plane random encoding. Opt Lett 20:767–769

    Article  Google Scholar 

  21. Rodrigo JA, Alieva T, Calvo ML (2017) Applications of gyrator transform for image processing. Opt Commun 278:279–284

    Article  Google Scholar 

  22. Singh H, Optical cryptosystem of color images using random phase masks in the fractional wavelet transform domain. AIP conf Proc 2016; 1728: 020063–020061/4.

  23. Singh H (2016) Devil′ s vortex Fresnel lens phase masks on an asymmetric cryptosystem based on phase-truncation in gyrator wavelet transform domain. Opt Lasers Eng 81:125–139

    Article  Google Scholar 

  24. Singh H (2016) Cryptosystem for securing image encryption using structured phase masks in Fresnel wavelet transform domain. 3D Res 7(4):34

    Article  Google Scholar 

  25. Singh H (2017) Nonlinear optical double image encryption using random-optical vortex in fractional Hartley transform domain. Opt Appl 47(4):557–578

    Google Scholar 

  26. Singh H (2018) Watermarking image encryption using deterministic phase mask and singular value decomposition in fractional Mellin transform domain. IET Image Process 12(11):1994–2001

    Article  Google Scholar 

  27. Singh H, Yadav AK, Vashisth S, Singh K (2014) Fully phase image encryption using double random-structured phase masks in gyrator domain. Appl Opt 53:6472–6481

    Article  Google Scholar 

  28. Singh H, Yadav AK, Vashisth S, Singh K (2015) Optical image encryption using devil’s vortex toroidal lens in the Fresnel transform domain. Int J Opt 2015:1–13

    Article  Google Scholar 

  29. Singh H, Yadav AK, Vashisth S, Singh K (2015) Double phase-image encryption using gyrator transforms, and structured phase mask in the frequency plane. Opt Lasers Eng 67:145–156

    Article  Google Scholar 

  30. Singh P, Yadav AK, Singh K (2017) Phase image encryption in the fractional Hartley domain using Arnold transform and singular value decomposition. Opt Lasers Eng 91:187–195

    Article  Google Scholar 

  31. Situ G, Zhang J (2004) Double random-phase encoding in the Fresnel domain. Opt Lett 29(14):1584–1586

    Article  Google Scholar 

  32. Towghi N, Javidi B, Luo Z (1999) Fully phase encrypted image processor. JOSA A 16(8):1915–1927

    Article  Google Scholar 

  33. Unnikrishnan G, Singh K (2000) Double random fractional Fourier domain encoding for optical security. Opt Eng 39(11):2853–2860

    Article  Google Scholar 

  34. Unnikrishnan G, Joseph J, Singh K (2000) Optical encryption by double-random phase encoding in the fractional Fourier domain. Opt Lett 25:887–889

    Article  Google Scholar 

  35. Vaidya SP, Mouli PC, Santosh KC (2018) Imperceptible watermark for a game-theoretic watermarking system. International Journal of Machine Learning and Cybernetics, 1–17

  36. Vashisth S, Singh H, Yadav AK, Singh K (2014) Image encryption using fractional Mellin transform, structured phase filters, and phase retrieval. Optik 125:5309–5315

    Article  Google Scholar 

  37. Vashisth S, Yadav AK, Singh H, Singh K (2015) Watermarking in gyrator domain using an asymmetric cryptosystem. In: Proceedings of SPIE, 9654 96542E-1/8

  38. Vilardy JM, Torres CO, Jimenez CJ (2013) A image encryption method using the Arnold transform in the fractional Hartley domain. In 8th Iberoamerican Optics Meeting and 11th Latin American Meeting on Optics, Lasers, and Applications (Vol. 8785, p. 87851R). International Society for Optics and Photonics

  39. Wu J, Zhang M, Zhou N (2017) Image encryption scheme based on random fractional discrete cosine transform and dependent scrambling and diffusion. J Mod Opt 64(4):334–346

    Article  Google Scholar 

  40. Xin-Xin L, Dao-Mu Z (2008) Optical image encryption with simplified fractional Hartley transform. Chin Phys Lett 25(7):2477

    Article  Google Scholar 

  41. Yadav PL, Singh H (2018) Optical double image hiding in the fractional Hartley transform using structured phase filter and Arnold transform. 3D Res 9(2):1–20

    Article  Google Scholar 

  42. Yadav AK, Vashisth S, Singh H, Singh K (2015) A phase-image watermarking scheme in gyrator domain using devil's vortex Fresnel lens as a phase mask. Opt Commun 344:172–180

    Article  Google Scholar 

  43. Yadav AK, Vashisth S, Singh H, Singh K (2015) Optical cryptography and watermarking using some Fractional canonical transforms, and structured masks. Advances in optical and Engg.: Proc. IEM Optronix 2014, Springer. 25–36

  44. Zamrani W, Ahouzi E, Lizana A, Campos J, Yzuel MJ (2016) Optical image encryption technique based on deterministic phase masks. Opt Eng 55(10):103108

    Article  Google Scholar 

  45. Zhao D, Li X, Chen L (2008) Optical image encryption with redefined fractional Hartley transform. Opt Commun 281(21):5326–5329

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Girija.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Girija, R., Singh, H. An asymmetric cryptosystem based on the random weighted singular value decomposition and fractional Hartley domain. Multimed Tools Appl 79, 34717–34735 (2020). https://doi.org/10.1007/s11042-019-7733-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-7733-y

Keywords

Navigation