Exploiting Optics Chaos for Image Encryption-Then-Transmission
A novel symmetric image encryption-then-transmission system based on optical chaos using semiconductor lasers is proposed. In this paper, with identical chaotic injection from a master laser, two slave lasers (SL1 and SL2) can output similar chaotic signals served as chaotic carrier to transmit imag...
Gespeichert in:
Veröffentlicht in: | Journal of lightwave technology 2016-11, Vol.34 (22), p.5101-5109 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 5109 |
---|---|
container_issue | 22 |
container_start_page | 5101 |
container_title | Journal of lightwave technology |
container_volume | 34 |
creator | Xie, Yiyuan Li, Jiachao Kong, Zhoufan Zhang, Yushu Liao, Xiaofeng Liu, Yong |
description | A novel symmetric image encryption-then-transmission system based on optical chaos using semiconductor lasers is proposed. In this paper, with identical chaotic injection from a master laser, two slave lasers (SL1 and SL2) can output similar chaotic signals served as chaotic carrier to transmit image. Meanwhile, the chaotic signal of SL1 can be used to generate the key of the encryption scheme. After employing the three-dimensional (3D) cat map and logistic chaotic map, the positions of image pixels are shuffled, and the relationship between the cipher-image and the plain-image is confused simultaneously. Therefore, the system can resist the common attacks such as statistical attack, differential attack, and brute force attack. Through numerical simulations, the high quality chaos synchronization between SL1 and SL2 is obtained. When the chaos masking technique is adopted, the image encrypted by the proposed encryption scheme can be successfully transmitted and decrypted in a 10 km single mode fiber channel from SL1 to SL2, which is accompanied by a bit error rate of less than 6.18 × 10 -19 . Exhaustive tests about security analysis are carried out, demonstrating the valuable feasibility and high security of the image encryption-then-transmission system. |
doi_str_mv | 10.1109/JLT.2016.2606121 |
format | Article |
fullrecord | <record><control><sourceid>crossref_RIE</sourceid><recordid>TN_cdi_crossref_primary_10_1109_JLT_2016_2606121</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7560661</ieee_id><sourcerecordid>10_1109_JLT_2016_2606121</sourcerecordid><originalsourceid>FETCH-LOGICAL-c333t-202354996fa8d0b8836270bec14dc381ebb8c5af32494d727c1188f059587aa33</originalsourceid><addsrcrecordid>eNo9j01Lw0AQhhdRMFbvgpf8gcSZnd3s5iJIqLUS6CWew2azaSNtUnZzsP_elBYv88K8H_Aw9oyQIkL--lVWKQfMUp5BhhxvWIRS6oRzpFsWgSJKtOLinj2E8AOAQmgVsbfl73E_9lM_bOPNceptiIudGUPcjT5eH8zWxcvB-tNsjUNS7dx8vBnCoQ9h_jyyu87sg3u66oJ9fyyr4jMpN6t18V4mloimhAMnKfI864xuodGaMq6gcRZFa0mjaxptpemIi1y0iiuLqHUHMpdaGUO0YHDZtX4MwbuuPvr-YPypRqjP_PXMX5_56yv_XHm5VHrn3H9cydnOkP4AkSBV1w</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Exploiting Optics Chaos for Image Encryption-Then-Transmission</title><source>IEEE Electronic Library (IEL)</source><creator>Xie, Yiyuan ; Li, Jiachao ; Kong, Zhoufan ; Zhang, Yushu ; Liao, Xiaofeng ; Liu, Yong</creator><creatorcontrib>Xie, Yiyuan ; Li, Jiachao ; Kong, Zhoufan ; Zhang, Yushu ; Liao, Xiaofeng ; Liu, Yong</creatorcontrib><description>A novel symmetric image encryption-then-transmission system based on optical chaos using semiconductor lasers is proposed. In this paper, with identical chaotic injection from a master laser, two slave lasers (SL1 and SL2) can output similar chaotic signals served as chaotic carrier to transmit image. Meanwhile, the chaotic signal of SL1 can be used to generate the key of the encryption scheme. After employing the three-dimensional (3D) cat map and logistic chaotic map, the positions of image pixels are shuffled, and the relationship between the cipher-image and the plain-image is confused simultaneously. Therefore, the system can resist the common attacks such as statistical attack, differential attack, and brute force attack. Through numerical simulations, the high quality chaos synchronization between SL1 and SL2 is obtained. When the chaos masking technique is adopted, the image encrypted by the proposed encryption scheme can be successfully transmitted and decrypted in a 10 km single mode fiber channel from SL1 to SL2, which is accompanied by a bit error rate of less than 6.18 × 10 -19 . Exhaustive tests about security analysis are carried out, demonstrating the valuable feasibility and high security of the image encryption-then-transmission system.</description><identifier>ISSN: 0733-8724</identifier><identifier>EISSN: 1558-2213</identifier><identifier>DOI: 10.1109/JLT.2016.2606121</identifier><identifier>CODEN: JLTEDG</identifier><language>eng</language><publisher>IEEE</publisher><subject>Chaos ; Encryption ; Image encryption-then-transmission ; Optical feedback ; Optical fibers ; Optical imaging ; optics chaos ; semiconductor laser ; synchronization ; three-dimensional (3D) cat map</subject><ispartof>Journal of lightwave technology, 2016-11, Vol.34 (22), p.5101-5109</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c333t-202354996fa8d0b8836270bec14dc381ebb8c5af32494d727c1188f059587aa33</citedby><cites>FETCH-LOGICAL-c333t-202354996fa8d0b8836270bec14dc381ebb8c5af32494d727c1188f059587aa33</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7560661$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/7560661$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Xie, Yiyuan</creatorcontrib><creatorcontrib>Li, Jiachao</creatorcontrib><creatorcontrib>Kong, Zhoufan</creatorcontrib><creatorcontrib>Zhang, Yushu</creatorcontrib><creatorcontrib>Liao, Xiaofeng</creatorcontrib><creatorcontrib>Liu, Yong</creatorcontrib><title>Exploiting Optics Chaos for Image Encryption-Then-Transmission</title><title>Journal of lightwave technology</title><addtitle>JLT</addtitle><description>A novel symmetric image encryption-then-transmission system based on optical chaos using semiconductor lasers is proposed. In this paper, with identical chaotic injection from a master laser, two slave lasers (SL1 and SL2) can output similar chaotic signals served as chaotic carrier to transmit image. Meanwhile, the chaotic signal of SL1 can be used to generate the key of the encryption scheme. After employing the three-dimensional (3D) cat map and logistic chaotic map, the positions of image pixels are shuffled, and the relationship between the cipher-image and the plain-image is confused simultaneously. Therefore, the system can resist the common attacks such as statistical attack, differential attack, and brute force attack. Through numerical simulations, the high quality chaos synchronization between SL1 and SL2 is obtained. When the chaos masking technique is adopted, the image encrypted by the proposed encryption scheme can be successfully transmitted and decrypted in a 10 km single mode fiber channel from SL1 to SL2, which is accompanied by a bit error rate of less than 6.18 × 10 -19 . Exhaustive tests about security analysis are carried out, demonstrating the valuable feasibility and high security of the image encryption-then-transmission system.</description><subject>Chaos</subject><subject>Encryption</subject><subject>Image encryption-then-transmission</subject><subject>Optical feedback</subject><subject>Optical fibers</subject><subject>Optical imaging</subject><subject>optics chaos</subject><subject>semiconductor laser</subject><subject>synchronization</subject><subject>three-dimensional (3D) cat map</subject><issn>0733-8724</issn><issn>1558-2213</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9j01Lw0AQhhdRMFbvgpf8gcSZnd3s5iJIqLUS6CWew2azaSNtUnZzsP_elBYv88K8H_Aw9oyQIkL--lVWKQfMUp5BhhxvWIRS6oRzpFsWgSJKtOLinj2E8AOAQmgVsbfl73E_9lM_bOPNceptiIudGUPcjT5eH8zWxcvB-tNsjUNS7dx8vBnCoQ9h_jyyu87sg3u66oJ9fyyr4jMpN6t18V4mloimhAMnKfI864xuodGaMq6gcRZFa0mjaxptpemIi1y0iiuLqHUHMpdaGUO0YHDZtX4MwbuuPvr-YPypRqjP_PXMX5_56yv_XHm5VHrn3H9cydnOkP4AkSBV1w</recordid><startdate>20161115</startdate><enddate>20161115</enddate><creator>Xie, Yiyuan</creator><creator>Li, Jiachao</creator><creator>Kong, Zhoufan</creator><creator>Zhang, Yushu</creator><creator>Liao, Xiaofeng</creator><creator>Liu, Yong</creator><general>IEEE</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20161115</creationdate><title>Exploiting Optics Chaos for Image Encryption-Then-Transmission</title><author>Xie, Yiyuan ; Li, Jiachao ; Kong, Zhoufan ; Zhang, Yushu ; Liao, Xiaofeng ; Liu, Yong</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c333t-202354996fa8d0b8836270bec14dc381ebb8c5af32494d727c1188f059587aa33</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Chaos</topic><topic>Encryption</topic><topic>Image encryption-then-transmission</topic><topic>Optical feedback</topic><topic>Optical fibers</topic><topic>Optical imaging</topic><topic>optics chaos</topic><topic>semiconductor laser</topic><topic>synchronization</topic><topic>three-dimensional (3D) cat map</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Xie, Yiyuan</creatorcontrib><creatorcontrib>Li, Jiachao</creatorcontrib><creatorcontrib>Kong, Zhoufan</creatorcontrib><creatorcontrib>Zhang, Yushu</creatorcontrib><creatorcontrib>Liao, Xiaofeng</creatorcontrib><creatorcontrib>Liu, Yong</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><jtitle>Journal of lightwave technology</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Xie, Yiyuan</au><au>Li, Jiachao</au><au>Kong, Zhoufan</au><au>Zhang, Yushu</au><au>Liao, Xiaofeng</au><au>Liu, Yong</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Exploiting Optics Chaos for Image Encryption-Then-Transmission</atitle><jtitle>Journal of lightwave technology</jtitle><stitle>JLT</stitle><date>2016-11-15</date><risdate>2016</risdate><volume>34</volume><issue>22</issue><spage>5101</spage><epage>5109</epage><pages>5101-5109</pages><issn>0733-8724</issn><eissn>1558-2213</eissn><coden>JLTEDG</coden><abstract>A novel symmetric image encryption-then-transmission system based on optical chaos using semiconductor lasers is proposed. In this paper, with identical chaotic injection from a master laser, two slave lasers (SL1 and SL2) can output similar chaotic signals served as chaotic carrier to transmit image. Meanwhile, the chaotic signal of SL1 can be used to generate the key of the encryption scheme. After employing the three-dimensional (3D) cat map and logistic chaotic map, the positions of image pixels are shuffled, and the relationship between the cipher-image and the plain-image is confused simultaneously. Therefore, the system can resist the common attacks such as statistical attack, differential attack, and brute force attack. Through numerical simulations, the high quality chaos synchronization between SL1 and SL2 is obtained. When the chaos masking technique is adopted, the image encrypted by the proposed encryption scheme can be successfully transmitted and decrypted in a 10 km single mode fiber channel from SL1 to SL2, which is accompanied by a bit error rate of less than 6.18 × 10 -19 . Exhaustive tests about security analysis are carried out, demonstrating the valuable feasibility and high security of the image encryption-then-transmission system.</abstract><pub>IEEE</pub><doi>10.1109/JLT.2016.2606121</doi><tpages>9</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 0733-8724 |
ispartof | Journal of lightwave technology, 2016-11, Vol.34 (22), p.5101-5109 |
issn | 0733-8724 1558-2213 |
language | eng |
recordid | cdi_crossref_primary_10_1109_JLT_2016_2606121 |
source | IEEE Electronic Library (IEL) |
subjects | Chaos Encryption Image encryption-then-transmission Optical feedback Optical fibers Optical imaging optics chaos semiconductor laser synchronization three-dimensional (3D) cat map |
title | Exploiting Optics Chaos for Image Encryption-Then-Transmission |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-30T17%3A22%3A36IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Exploiting%20Optics%20Chaos%20for%20Image%20Encryption-Then-Transmission&rft.jtitle=Journal%20of%20lightwave%20technology&rft.au=Xie,%20Yiyuan&rft.date=2016-11-15&rft.volume=34&rft.issue=22&rft.spage=5101&rft.epage=5109&rft.pages=5101-5109&rft.issn=0733-8724&rft.eissn=1558-2213&rft.coden=JLTEDG&rft_id=info:doi/10.1109/JLT.2016.2606121&rft_dat=%3Ccrossref_RIE%3E10_1109_JLT_2016_2606121%3C/crossref_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=7560661&rfr_iscdi=true |