Table of Contents Author Guidelines Submit a Manuscript
Advances in OptoElectronics
Volume 2017, Article ID 9802751, 15 pages
https://doi.org/10.1155/2017/9802751
Research Article

DWT versus WP Based Optical Color Image Encryption Robust to Composite Attacks

1Faculty of Engineering, Mansoura University, Mansoura, Egypt
2Delta Higher Institute for Engineering and Technology, Talkha, Egypt

Correspondence should be addressed to Mohamed Ismail Fath Allah; moc.oohay@5881liamsim

Received 9 February 2017; Revised 24 April 2017; Accepted 3 May 2017; Published 5 June 2017

Academic Editor: Samir K. Mondal

Copyright © 2017 M. A. Mohamed et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. R. Vijayaraghavan, S. Sathya, and N. R. Raajan, “Encryption for an image using circular budge on bit-planes,” International Journal of Applied Engineering Research, vol. 9, no. 2, pp. 60–153, 2014. View at Google Scholar · View at Scopus
  2. M. A. Mohamed, A. S. Samarah, and M. I. Fath Allah, “Optical encryption techniques: an overview,” International Journal for Computer Science Issues (IJCSI), vol. 11, no. 2, pp. 125–129, 2014. View at Google Scholar
  3. F. Mosso and M. Tebaldi, “All-optical encrypted movie,” Optical Society of America, vol. 19, no. 6, pp. 5706–5712, 2011. View at Google Scholar
  4. Y. Liu, J. Lin, J. Fan, and N. Zhou, “Image encryption based on cat map and fractional fourier transform,” Journal of Computational Information Systems, vol. 8, no. 18, pp. 7485–7492, 2012. View at Google Scholar
  5. P. Réfrégier and B. Javidi, “Optical Image Encryption Based on Input Plane & Fourier Plane Random Encoding,” Optics. Letters, vol. 20, pp. 767–769, 1995. View at Google Scholar
  6. R. Vijayaraghavan, S. Sathya, and N. R. Raajan, “Image encryption based on the reflected binary code method with the combination of FFT,” Indian Journal of Science and Technology, vol. 8, no. 36, Article ID 87852, 2015. View at Publisher · View at Google Scholar · View at Scopus
  7. D. Sharma, R. Saxena, and N. Singh, “Hybrid Encryption-Compression Scheme Based on Multiple Parameter Discrete Fractional Fourier Transform with Eigen Vector Decomposition Algorithm,” International Journal of Computer Network & Information Security, vol. 10, pp. 1–12, 2014. View at Google Scholar
  8. C. S. Narayanan and S. A. Durai, “A critical study on encryption based compression techniques,” Journal of Computers, vol. 11, no. 5, pp. 380–399, 2015. View at Google Scholar
  9. P. Palevicius and M. Ragulskis, “Image communication scheme based on dynamic visual cryptography and computer generated holography,” Optics Communications, vol. 335, pp. 161–167, 2015. View at Publisher · View at Google Scholar · View at Scopus
  10. M. V. Kanchana and V. K. Annapurna, “An enhanced VCS of image encryption using SDS algorithm without secret keys,” International Journal on Recent and Innovation Trends in Computing and Communication (IJRITCC), vol. 2, no. 7, pp. 1794–1798, 2014. View at Google Scholar
  11. X. Li, C. Li, S. T. Kim, and I. K. Lee, “An optical image encryption scheme based on depth conversion integral imaging and chaotic maps,” preprint submitted to Elsevier, pp. 1–18.
  12. Z. Shao, H. Shu, J. Wu, Z. Dong, G. Coatrieux, and J. L. Coatrieux, “Double color image encryption using iterative phase retrieval algorithm in quaternion gyrator domain,” Optics Express, vol. 22, no. 5, pp. 4932–4942, 2014. View at Publisher · View at Google Scholar · View at Scopus
  13. Q. Kester, “Image Encryption based on the RGB PIXEL Transposition and Shuffling,” International Journal of Computer Network and Information Security, vol. 5, no. 7, pp. 43–50, 2013. View at Publisher · View at Google Scholar
  14. Z. Liu, L. Xu, T. Liu et al., “Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains,” Optics Communications, vol. 284, no. 1, pp. 123–128, 2011. View at Publisher · View at Google Scholar · View at Scopus
  15. X. Deng and X. Zhu, “A simple and practical color image encryption with the help of QR code,” Optica Applicata, vol. 45, no. 4, pp. 513–521, 2015. View at Publisher · View at Google Scholar · View at Scopus
  16. M. A. Mohamed, H. M. Abdel-Atty, A. M. Abutaleb, M. G. Abdel-Fattah, and A. S. Samrah, “Hybrid watermarking scheme for copyright protection using chaotic maps cryptography,” International Journal of Computer Applications, vol. 128, no. 1, pp. 1–14, 2015. View at Google Scholar
  17. I. Hussain, N. A. Azam, and T. Shah, “Stego optical encryption based on chaotic S-box transformation,” Optics & Laser Technology, vol. 61, pp. 50–56, 2014. View at Publisher · View at Google Scholar · View at Scopus
  18. Ashutosh and D. Sharma, “Robust Technique for Image Encryption and Decryption Using Discrete Fractional Fourier Transform with Random Phase Masking,” Procedia Technology, vol. 10, pp. 707–714, 2013. View at Publisher · View at Google Scholar
  19. R. Tao, Y. Xin, and Y. Wang, “Double image encryption based on random phase encoding in the fractional Fourier domain,” Optics Express, vol. 15, no. 24, pp. 16067–16079, 2007. View at Publisher · View at Google Scholar · View at Scopus
  20. A. Alfalou, C. Brosseau, N. Abdallah, and M. Jridi, “Assessing the performance of a method of simultaneous compression and encryption of multiple images and its resistance against various attacks,” Optics Express, vol. 21, no. 7, pp. 8025–8043, 2013. View at Publisher · View at Google Scholar · View at Scopus
  21. G. Cristobal, P. Schelkens, and H. Thienpont, Optical and digital image processing: fundamentals and applications, Wiley-VCH Verlag GmbH & Co. KGaA, 2011. View at Publisher · View at Google Scholar
  22. A. Alfalou, C. Brosseau, and N. Abdallah, “Simultaneous compression and encryption of color video images,” Optics Communications, vol. 338, pp. 371–379, 2015. View at Publisher · View at Google Scholar · View at Scopus
  23. A. Alfalou and C. Brosseau, “Recent Advances in Optical Image Processing,” Progress in Optics, vol. 60, pp. 119–262, 2015. View at Publisher · View at Google Scholar · View at Scopus
  24. N. Soorma, J. Singh, and M. Tiwari, “Feature Extraction of ECG Signal Using HHT Algorithm,” International Journal of Engineering Trends and Technology, vol. 8, no. 8, pp. 454–460, 2014. View at Publisher · View at Google Scholar
  25. M. Dubreuil, A. Alfalou, and C. Brosseau, “Robustness against attacks of dual polarization encryption using the Stokes-Mueller formalism,” Journal of Optics (United Kingdom), vol. 14, no. 9, Article ID 094004, 2012. View at Publisher · View at Google Scholar · View at Scopus
  26. A. Alfalou and C. Brosseau, “Optical image compression and encryption methods,” Advances in Optics and Photonics, vol. 1, no. 3, pp. 589–636, 2009. View at Publisher · View at Google Scholar · View at Scopus
  27. P. W. M. Tsang, T.-C. Poon, and K. W. K. Cheung, “Fast numerical generation and encryption of computer-generated Fresnel holograms,” Applied Optics, vol. 50, no. 7, pp. B46–B52, 2011. View at Publisher · View at Google Scholar · View at Scopus
  28. G. K. Anusha and R. M. Nilajkar, “Optical method for images encryption based on chaotic baker map and double random phase encoding,” International Journal of Scientific Engineering and Research (IJSER), vol. 2, no. 6, 2014. View at Google Scholar
  29. 2017, http://www.scholarpedia.org/article/Chirikov_standard_map.