An Image Encryption Scheme of Logistic Modulation Using Computer-Generated Hologram and Chaotic Map

被引:4
|
作者
Ren, Hui [1 ]
Wang, Jun [1 ]
Wang, Qiong-Hua [1 ]
机构
[1] Sichuan Univ, Sch Elect & Informat Engn, Chengdu 610065, Sichuan, Peoples R China
关键词
D O I
10.1155/2018/3987105
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We introduce an image encryption method based on computer-generated hologram (CGH) and two-dimensional Sine Logistic modulation map (2D-SLMM). We combine CGH and 2D-SLMM to improve encryption security. During the encryption process, the hologram needs to be logistically modulated by 2D-SLMM. This logistic modulation technique can avoid complex algorithms. Simulation results and security analysis demonstrate that the proposed approach has a high security level, good invisibility of image information in ciphertext, large key space, and strong robustness.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Computer-generated image hologram
    Takeshi Yamaguchi
    Hiroshi Yoshikawa
    [J]. Chinese Optics Letters, 2011, 9 (12) : 24 - 27
  • [2] Computer-generated image hologram
    Yamaguchi, Takeshi
    Yoshikawa, Hiroshi
    [J]. CHINESE OPTICS LETTERS, 2011, 9 (12)
  • [3] Fast computer-generated hologram computation using rendered depth map image
    Kazempourradi, Seyedmahdi
    Ulusoy, Erdem
    Urey, Hakan
    [J]. PRACTICAL HOLOGRAPHY XXXI: MATERIALS AND APPLICATIONS, 2017, 10127
  • [4] Image encryption using chaotic logistic map
    Pareek, N. K.
    Patidar, Vinod
    Sud, K. K.
    [J]. IMAGE AND VISION COMPUTING, 2006, 24 (09) : 926 - 934
  • [5] Optical image encryption and authentication using phase-only computer-generated hologram
    Wang, Wenqi
    Wang, Xiaogang
    Xu, Bijun
    Chen, Junlang
    [J]. OPTICS AND LASERS IN ENGINEERING, 2021, 146
  • [6] On Improving an Image Encryption Scheme based on Chaotic Logistic Map
    Asim, Muhammad
    Jeoti, Varun
    [J]. ICIAS 2007: INTERNATIONAL CONFERENCE ON INTELLIGENT & ADVANCED SYSTEMS, VOLS 1-3, PROCEEDINGS, 2007, : 758 - 763
  • [7] Image encryption based on computer generated hologram and Rossler chaotic system
    Hamadi, Ibrahim A.
    Jamal, Raied K.
    Mousa, Salam K.
    [J]. OPTICAL AND QUANTUM ELECTRONICS, 2022, 54 (01)
  • [8] Image encryption based on computer generated hologram and Rossler chaotic system
    Ibrahim A. Hamadi
    Raied K. Jamal
    Salam K. Mousa
    [J]. Optical and Quantum Electronics, 2022, 54
  • [9] Robust image watermarking scheme against geometric attacks using a computer-generated hologram
    Li, Jianzhong
    [J]. APPLIED OPTICS, 2010, 49 (32) : 6302 - 6312
  • [10] Cryptanalyzing image encryption using chaotic logistic map
    Li, Chengqing
    Xie, Tao
    Liu, Qi
    Cheng, Ge
    [J]. NONLINEAR DYNAMICS, 2014, 78 (02) : 1545 - 1551