• Laser & Optoelectronics Progress
  • Vol. 57, Issue 4, 041002 (2020)
Shan Tao1, Chen Tang1、*, and Zhenkun Lei2
Author Affiliations
  • 1School of Electrical and Information Engineering, Tianjin University, Tianjin 300072, China
  • 2State Key Laboratory of Structural Analysis for Industrial Equipment, Dalian University of Technology, Dalian, Liaoning 116024, China
  • show less
    DOI: 10.3788/LOP57.041002 Cite this Article Set citation alerts
    Shan Tao, Chen Tang, Zhenkun Lei. Image Encryption Based on Vector Decomposition and Chaotic Random Phase Mask[J]. Laser & Optoelectronics Progress, 2020, 57(4): 041002 Copy Citation Text show less
    Flow chart of encryption and decryption. (a) Flow chart of encryption; (b) flow chart of decryption
    Fig. 1. Flow chart of encryption and decryption. (a) Flow chart of encryption; (b) flow chart of decryption
    Lena image, encryption and decryption image, M1, CRPM1 and CRPM2. (a) Lena image; (b) encryption image; (c) decryption image; (d) M1; (e) CRPM1; (f) CRPM2
    Fig. 2. Lena image, encryption and decryption image, M1, CRPM1 and CRPM2. (a) Lena image; (b) encryption image; (c) decryption image; (d) M1; (e) CRPM1; (f) CRPM2
    Decrypted results when the key is wrong. (a) x0=0.501+1×10-15; (b) y0=0.601+1×10-15; (c) a0=1.40+1×10-15; (d) b0=0.3+1×10-15; (e) x1=0.500+1×10-15; (f) y1=0.600+1×10-15; (g) a1=1.39+1×10-15; (h) b1=0.3+1×10-15; (i) α=0.3+1×10-2; (j) β=0.4+1×10
    Fig. 3. Decrypted results when the key is wrong. (a) x0=0.501+1×10-15; (b) y0=0.601+1×10-15; (c) a0=1.40+1×10-15; (d) b0=0.3+1×10-15; (e) x1=0.500+1×10-15; (f) y1=0.600+1×10-15; (g) a1=1.39+1×10-15; (h) b1=0.3+1×10-15; (i) α=0.3+1×10-2; (j) β=0.4+1×10
    Correlation coefficient value (CC)between the decrypted image and the original image. (a)Key secret x0 with a deviation of Δx0;(b) key secret y0 with a deviation of Δy0;(c) key secret a0 with a deviation of Δa0; (d) key secret b0 with a deviation of Δb0; (e) key secret x1 with a deviation of Δx1; (f) key secret y</i
    Fig. 4. Correlation coefficient value (CC)between the decrypted image and the original image. (a)Key secret x0 with a deviation of Δx0;(b) key secret y0 with a deviation of Δy0;(c) key secret a0 with a deviation of Δa0; (d) key secret b0 with a deviation of Δb0; (e) key secret x1 with a deviation of Δx1; (f) key secret y
    Results of occlusion attack resistance. (a) Encrypted image with 6.25% occlusion size obtained with our method; (b) decrypted image with 6.25% occlusion size obtained with our method; (c) decrypted image with 6.25% occlusion size obtained with the method in Ref.[28]; (d) encrypted image with 12.5% occlusion size obtained with our method; (e) decrypted image with 12.5% occlusion size with our method; (f) decrypted image with 12.5% occlusion size obtained with the method in Ref.[28]
    Fig. 5. Results of occlusion attack resistance. (a) Encrypted image with 6.25% occlusion size obtained with our method; (b) decrypted image with 6.25% occlusion size obtained with our method; (c) decrypted image with 6.25% occlusion size obtained with the method in Ref.[28]; (d) encrypted image with 12.5% occlusion size obtained with our method; (e) decrypted image with 12.5% occlusion size with our method; (f) decrypted image with 12.5% occlusion size obtained with the method in Ref.[28]
    Correlation coefficient value CC between decrypted image and original image obtained with our method and methods in Ref.[28] and Ref.[33] vs. occlusion percent
    Fig. 6. Correlation coefficient value CC between decrypted image and original image obtained with our method and methods in Ref.[28] and Ref.[33] vs. occlusion percent
    Decrypted images from noise-affected cipher image with different methods. (a) Our method, k=0.1; (b) our method, k=0.3; (c) method in Ref.[28], k=0.1; (d) method in Ref.[33], k=0.3
    Fig. 7. Decrypted images from noise-affected cipher image with different methods. (a) Our method, k=0.1; (b) our method, k=0.3; (c) method in Ref.[28], k=0.1; (d) method in Ref.[33], k=0.3
    Correlation coefficient value CC between decrypted image and original image obtained with our method and methods in Ref.[28] and Ref.[33] vs. noise attack intensity
    Fig. 8. Correlation coefficient value CC between decrypted image and original image obtained with our method and methods in Ref.[28] and Ref.[33] vs. noise attack intensity
    Original images and encryption results. (a) Lena image; (b) an image with a different pixel value than the Lena image; (c) encryption result of Lena image; (d) encryption result of figure (b)
    Fig. 9. Original images and encryption results. (a) Lena image; (b) an image with a different pixel value than the Lena image; (c) encryption result of Lena image; (d) encryption result of figure (b)
    Results of encryption and decryption. (a) Peppers image; (b) encryption image of peppers; (c) decryption image of peppers
    Fig. 10. Results of encryption and decryption. (a) Peppers image; (b) encryption image of peppers; (c) decryption image of peppers
    DirectionLenaimageProposedmethodMethod inRef.[33]Method inRef.[28]
    Horizontal0.97740.00180.03730.0163
    Vertical0.95560.00100.02280.0215
    Diagonal0.94630.00140.02210.0283
    Table 1. Correlation coefficients of two adjacent pixels in the Lena image and the cipher images encrypted by different encryption systems
    Shan Tao, Chen Tang, Zhenkun Lei. Image Encryption Based on Vector Decomposition and Chaotic Random Phase Mask[J]. Laser & Optoelectronics Progress, 2020, 57(4): 041002
    Download Citation