{"title":"使用离散分数阶变换的图像加密","authors":"N. Jindal, Kulbir Singh","doi":"10.1109/ARTCOM.2010.9","DOIUrl":null,"url":null,"abstract":"Digital images play an important role, both in daily life applications such as satellite television, magnetic resonance imaging, computer tomography as well as in the areas of engineering, research and technology. So, image security is an important part and issue in information exchange. In this paper, we present encryption of images using discrete fractional transform techniques, discrete fractional fourier transform (DFrFT), discrete fractional cosine transform (DFrCT). These techniques uses cascaded multi stages of discrete fractional fourier transforms with a random phase mask (RPM) at each stage. In decryption, at receiver all the keys and RPM should correctly known to user. Numerical simulations are presented for sensitivity of keys and their effect on mean square error (MSE).","PeriodicalId":398854,"journal":{"name":"2010 International Conference on Advances in Recent Technologies in Communication and Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Image Encryption Using Discrete Fractional Transforms\",\"authors\":\"N. Jindal, Kulbir Singh\",\"doi\":\"10.1109/ARTCOM.2010.9\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Digital images play an important role, both in daily life applications such as satellite television, magnetic resonance imaging, computer tomography as well as in the areas of engineering, research and technology. So, image security is an important part and issue in information exchange. In this paper, we present encryption of images using discrete fractional transform techniques, discrete fractional fourier transform (DFrFT), discrete fractional cosine transform (DFrCT). These techniques uses cascaded multi stages of discrete fractional fourier transforms with a random phase mask (RPM) at each stage. In decryption, at receiver all the keys and RPM should correctly known to user. Numerical simulations are presented for sensitivity of keys and their effect on mean square error (MSE).\",\"PeriodicalId\":398854,\"journal\":{\"name\":\"2010 International Conference on Advances in Recent Technologies in Communication and Computing\",\"volume\":\"18 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-10-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 International Conference on Advances in Recent Technologies in Communication and Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ARTCOM.2010.9\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Advances in Recent Technologies in Communication and Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ARTCOM.2010.9","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Image Encryption Using Discrete Fractional Transforms
Digital images play an important role, both in daily life applications such as satellite television, magnetic resonance imaging, computer tomography as well as in the areas of engineering, research and technology. So, image security is an important part and issue in information exchange. In this paper, we present encryption of images using discrete fractional transform techniques, discrete fractional fourier transform (DFrFT), discrete fractional cosine transform (DFrCT). These techniques uses cascaded multi stages of discrete fractional fourier transforms with a random phase mask (RPM) at each stage. In decryption, at receiver all the keys and RPM should correctly known to user. Numerical simulations are presented for sensitivity of keys and their effect on mean square error (MSE).