{"title":"基于菲涅耳域QR分解和随机模量分解的音频图像加密方案","authors":"S. Anjana, Akash Yadav, Phool Singh, H. Singh","doi":"10.37190/oa220303","DOIUrl":null,"url":null,"abstract":"In this paper, an asymmetric audio and image encryption mechanism using QR decomposition and random modulus decomposition (RD) in the Fresnel domain is proposed. The audio file is recorded as a vector and converted to a two-dimensional array to act as an image or a sound map. This sound map is encrypted using the image encryption algorithm proposed in this paper. The proposed cryptosystem is validated for both audios and grayscale images. Fresnel parameters and the two private keys obtained from QR decomposition and random modulus decomposition (RD) form the key space. Computer-based reproductions have been carried out to prove the validity and authenticity of the scheme. Simulation results authenticate that the scheme is robust and efficient against various attacks and is sensitive to input parameters.","PeriodicalId":19589,"journal":{"name":"Optica Applicata","volume":null,"pages":null},"PeriodicalIF":0.7000,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Audio and image encryption scheme based on QR decomposition and random modulus decomposition in Fresnel domain\",\"authors\":\"S. Anjana, Akash Yadav, Phool Singh, H. Singh\",\"doi\":\"10.37190/oa220303\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, an asymmetric audio and image encryption mechanism using QR decomposition and random modulus decomposition (RD) in the Fresnel domain is proposed. The audio file is recorded as a vector and converted to a two-dimensional array to act as an image or a sound map. This sound map is encrypted using the image encryption algorithm proposed in this paper. The proposed cryptosystem is validated for both audios and grayscale images. Fresnel parameters and the two private keys obtained from QR decomposition and random modulus decomposition (RD) form the key space. Computer-based reproductions have been carried out to prove the validity and authenticity of the scheme. Simulation results authenticate that the scheme is robust and efficient against various attacks and is sensitive to input parameters.\",\"PeriodicalId\":19589,\"journal\":{\"name\":\"Optica Applicata\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.7000,\"publicationDate\":\"2022-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Optica Applicata\",\"FirstCategoryId\":\"101\",\"ListUrlMain\":\"https://doi.org/10.37190/oa220303\",\"RegionNum\":4,\"RegionCategory\":\"物理与天体物理\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"OPTICS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Optica Applicata","FirstCategoryId":"101","ListUrlMain":"https://doi.org/10.37190/oa220303","RegionNum":4,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"OPTICS","Score":null,"Total":0}
Audio and image encryption scheme based on QR decomposition and random modulus decomposition in Fresnel domain
In this paper, an asymmetric audio and image encryption mechanism using QR decomposition and random modulus decomposition (RD) in the Fresnel domain is proposed. The audio file is recorded as a vector and converted to a two-dimensional array to act as an image or a sound map. This sound map is encrypted using the image encryption algorithm proposed in this paper. The proposed cryptosystem is validated for both audios and grayscale images. Fresnel parameters and the two private keys obtained from QR decomposition and random modulus decomposition (RD) form the key space. Computer-based reproductions have been carried out to prove the validity and authenticity of the scheme. Simulation results authenticate that the scheme is robust and efficient against various attacks and is sensitive to input parameters.
期刊介绍:
Acoustooptics, atmospheric and ocean optics, atomic and molecular optics, coherence and statistical optics, biooptics, colorimetry, diffraction and gratings, ellipsometry and polarimetry, fiber optics and optical communication, Fourier optics, holography, integrated optics, lasers and their applications, light detectors, light and electron beams, light sources, liquid crystals, medical optics, metamaterials, microoptics, nonlinear optics, optical and electron microscopy, optical computing, optical design and fabrication, optical imaging, optical instrumentation, optical materials, optical measurements, optical modulation, optical properties of solids and thin films, optical sensing, optical systems and their elements, optical trapping, optometry, photoelasticity, photonic crystals, photonic crystal fibers, photonic devices, physical optics, quantum optics, slow and fast light, spectroscopy, storage and processing of optical information, ultrafast optics.