Fig. 1. Working principle of PTFT optical compression encryption system
Fig. 2. Encryption flowchart of PTFT system based on compressed sensing
Fig. 3. Decryption flow of PTFT system based on compressed sensing
Fig. 4. Encryption and decryption image of the encryption system
Fig. 5. Grayscale histogram
Fig. 6. Correlation distribution of adjacent pixels
Fig. 7. The reconstructed image with different compression methods and different scales
Fig. 8. Comparison diagram of attack cracking and Mean Square Error(MSE)comparison chart
Fig. 9. Comparison diagram of attack cracking
Fig. 10. Decrypted images of salt and pepper noise interference under different noise ratios
Fig. 11. Decrypted images with Gaussian noise interference under different variances
Fig. 12. Cut encrypted and decrypted images of different sizes
Fig. 13. Selected plaintext attack effect diagram
Direction | Level | Vertical | Diagonal |
---|
Plaintext image | 0.927 244 | 0.963 116 | 0.899 516 | Amplitude as ciphertext | 0.117 206 | 0.108 999 | 0.104 825 | Phase angle as ciphertext | 0.030 592 | -0.003 942 | 0.006 044 |
|
Table 1. Correlation coefficient analysis
Compression method | Compression ratio | PSNR/dB |
---|
Ref.[14] | Compressed to 1/4 of the plaintext image | 21.467 1 | Ref.[14] | Compressed to 1/2 of the plaintext image | 24.464 5 | Ref.[14] | Compressed to 4/5 of the plaintext image | 26.746 4 | This article | Compressed to 1/4 of the plaintext image | 26.797 8 |
|
Table 2. Different methods of compressing different ratios of peak signal-to-noise ratio
Reference | Encryption time/s | Key transfer volume |
---|
[7] | 0.076 796 | 256×256×2 | [10] | 0.083 484 | 256×256×2 | [12] | 0.079 837 | 256×256×2 | This article | 0.022 088 | 128×128×2 |
|
Table 3. Comparative analysis of time and key transmission volume