Image Encryption Algo
Image Encryption Algo
I.
INTRODUCTION
II.
24
TABLE I.
exp i (
[ s ( x1 )] =
exp(+ 2 x
2
1
cot
(3)
lim
x2
) = ( x)
i
(4)
so that we have
F 0 [ s ( x1 )] =
( x x )s( x )dx
1
= s ( x1 )
(5)
F 2 [ s ( x1 )] =
( x + x )s( x )dx
1
0 or 2
( x x1 )
F0 = F4 = I
/2
exp(ixx1 )
F1 = F
( x + x1 )
F 2 = FF = I
3 / 2
exp( ixx1 )
F 3 = FF 2 = F 1
Identity
operator
Fourier
operator
Reflection
operator
Inverse
Fourier
operator
= s ( x1 )
( f , t )s(t )dt = S ( f )
(7)
ix1 x
) s ( x1 )dx1
sin
0 or 4
III.
(2)
where =a/2.
Some different cases are discussed in the following:
1) When =/2,
F a[s( x1)] = F1[S ( x)] =
Operation
on signal
)
4 2 exp(+ i x 2 cot )
2
2 sin
Fractional
operator
Kernel
F [ s(t )] =
exp i (
= a / 2
Value of
parameter
)
4 2 exp( i x 2 cot )
F [ s ( x1 )] = S ( x) =
2
2 sin
(1)
ix1 x
i 2
exp( x1 cot
) s ( x1 )dx1
2
sin
a
(6)
25
Original
Image
FRFT
(a)
Encrypted
Image
Inverse
Logistic Map
FRFT
( 2 , 2 )
MASK3
(b)
Figure 1.
Logistic
Map
( 2 , 2 )
MASK2
MASK1
Encrypted
Image
FRFT
(1, 1 )
FRFT
(1, 1)
Decrypted
Image
MASK4
Figure 2. Example of Encrypted Image: original image; real part; imaginary part; the different of real part and imaginary part (from left to right)
26
Figure 3. Example of decrypted image: decrypted image with correct keys; decrypted image with wrong logistic map; decrypted image with wrong FRFT
orders; decrypted image with wrong mask (from left to right)
IV.
CONCLUSION
[7]
[8]
[9]
ACKNOWLEDGMENTS
The work presented in this paper was supported by
Maoming Municipal Science & Technology Program
(No.203624) and the PHD startup fund of Maoming
University (No. 208054).
[10]
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
27