Abstract
Media security is an issue of great concern over the internet and during wireless transmissions. In this paper, a novel scheme for image encryption and decryption is proposed based on a Hermite-Gaussian matrix and an array of subkeys. The proposed scheme includes a secret key that is processed to extract an array of subkeys, which are employed with the extracted phase part of the inverse Fourier transform of a Hermite-Gaussian matrix to encrypt and decrypt a grayscale image. After key generation and the production of two columns of subkeys, the Hermite-Gaussian matrix is multiplied by the first group of subkeys and subjected to a modulus operation (the remainder) with the second group, and the resulting matrix is verified for singularity. If the singularity test is passed, then the resulting image is multiplied by the original image and the output is subjected to a modulus operation and is used for the following subkeys. However, if the singularity test fails, then a new subkey is chosen and the process is repeated until all subkeys are tested and used to produce the encrypted image. For subsequent decryption, the reverse process is implemented to recover the original image from the encrypted one. Statistical analysis shows that the proposed scheme is robust and is strong against attacks. The correlation factor, among other tests, shows that reshuffling the image pixels reduces the correlation between neighboring pixels to very low values (i.e., <1%).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ünal Çavuşoǧlu, S., Kaçar, S., Pehlivan, I., Zengin, A.: Secure image encryption algorithm design using a novel chaos based S-Box. Chaos, Solitons Fractals 95, 92–101 (2017)
Ye, G., Zhao, H., Chai, H.: Chaotic image encryption algorithm using wave-line permutation and block diffusion. Nonlinear Dyn. 83(4), 2067–2077 (2016)
Zhang, Z., Li, S., Ge, R., Yuan, M., Ma, Y.: A novel 1D hybrid chaotic map-based image compression and encryption using compressed sensing and Fibonacci-Lucas transform. Math. Probl. Eng. Article ID 7683687. Hindawi Publishing Corp (2016)
Zhu, H., Zhang, X., Yu, H., Zhao, C., Zhu, Z.: A novel image encryption scheme using the composite discrete chaotic system. Entropy 18(8), 276 (2016)
Zhou, N.R., Hua, T.X., Hua, G.L., Ju, P.D., Hong, L.Q.: Quantum image encryption based on generalized Arnold transform and double random-phase encoding. Quantum Inf. Process. 14, 1193–1213 (2015). https://doi.org/10.1007/s11128-015-0926-z
Khushboo, T., Tripathi, B.P., Sharma, B.K.: Implementation of Hermite normal form in NTRU matrix formulation algorithm. Int. J. Innov. Sci. Res. 12(1), 58–64 (2014)
Román, P.E., Asahi, T., Casassus, S.: Hermite-Gaussian functions for image synthesis. In: APSIPA (2014). ISBN 978-616-361-823-8
Hanna, M.T., Seif, N.P.A., Ahmad, W.A.E.M.: Hermite–Gaussian-like eigenvectors of the discrete Fourier transform matrix based on the direct utilization of the orthogonal projection matrices on its eigenspaces. IEEE Trans. Signal Process. 54(7), 2815–2819 (2006)
Wang, L., Wu, Y., Dai, M.: Some aspects of Gaussian-Hermite moments in image analysis. In: ICNC (2007). 7695-2875-9/07
Wang, L., Suo, H., Dai, M.: Fingerprint image segmentation based on Gaussian-Hermite moments. In: 1st International Conference on Advanced Data Mining and Applications (ADMA), pp. 446–454 (2005)
Wang, L., Dai, M.: Extraction of singular points in fingerprint by the distribution of Gaussian-Hermite moments. In: Proceedings of IEEE International Conference on Distributed Framework for Multimedia Applications (DFMA 2005), Besancon (France), pp. 206–209 (2005)
Enderlein, J., Pampaloni, F.: Unified operator approach for deriving Hermite-Gaussian and Laguerre-Gaussian laser modes. J. Opt. Soc. Am. 21(8), 1553–1558 (2004)
Martens, J.-B.: The Hermite transform theory. IEEE Trans. Acoust. Speech Signal Process. 38, 1595–1606 (1990)
Courant, R., Hilbert, D.: Methods of Mathematical Physics, vol. 1, p. 560. Wiley, New York (1989)
Andrews, L.C.: Special Functions for Engineers and Applied Mathematicians. MacMillan Publishing Co., New York (1985)
Abramowitz, M., Stegun, I.S.: Handbook of Mathematical Functions. Dover Publications Inc., New York (1965)
Arfken, G.: Mathematical Methods for Physicists, 3rd edn. Academic Press, New York (1985)
Gertner, I., Geri, G.A.: Image representation using Hermite Gaussian. Biol. Cybern. 71, 147–151 (1994)
Biham, E., Shamir, A.: Differential cryptanalysis of DES like cryptosystems. In: Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology. Springer (1991)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Alsaedi, M. (2020). Novel Scheme for Image Encryption and Decryption Based on a Hermite-Gaussian Matrix. In: Arai, K., Kapoor, S. (eds) Advances in Computer Vision. CVC 2019. Advances in Intelligent Systems and Computing, vol 943. Springer, Cham. https://doi.org/10.1007/978-3-030-17795-9_16
Download citation
DOI: https://doi.org/10.1007/978-3-030-17795-9_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-17794-2
Online ISBN: 978-3-030-17795-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)