Research Article

A Secure Asymmetric Optical Image Encryption Based on Phase Truncation and Singular Value Decomposition in Linear Canonical Transform Domain

Table 2

The entropy calculations of grayscale and text images.

S. NoImageType/sizeEntropy of input imageEntropy of encrypted imageEntropy of decrypted image

1BaboonJEPG/2567.05878.0005.3239
2TreeJEPG/2566.91818.0006.2558
3Optical image processingJEPG/2566.72727.6476.7272
4OPTJEPG/25607.6270
5LenaJEPG/2567.92167.83507.9216