Data Computation and Secure Encryption Based ... - ScienceDirect.com

2 downloads 0 Views 3MB Size Report
Procedia Computer Science 132 (2018) 1636–1645 ... the scientific committee of the International Conference on Computational Intelligence and Data Science.
Available online at www.sciencedirect.com

ScienceDirect

Available online at www.sciencedirect.com Procedia Computer Science 00 (2018) 000–000

ScienceDirect

www.elsevier.com/locate/procedia

Procedia Computer Science 132 (2018) 1636–1645

International Conference on Computational Intelligence and Data Science (ICCIDS 2018)

Data Computation and Secure Encryption Based on Gyrator Transform using Singular Value Decomposition and Randomization a

Mehak Khuranaa, Hukum Singhb a

Department of Computer Science,The NorthCap University, Gurugram, India

b

Department of Applied sciences, The NorthCap University, Gurugram, India

Abstract A digital scheme based on singular value decomposition (SVD) encrypted using Gyrator transform is proposed to enhance the security of the system. In this technique, plain input image is multiplied with another image and is then masked with random phase mask (RPM) along with Double random Phase Encoding (DRPE) in gyrator domain. Then obtained image is decomposed into segments [U, S, V] using SVD and is then each decomposed segment is randomized to get three encrypted image. It will increases the key space and also increases the number of parameters which makes it difficult for an attacker to find exact key to recover original image. The robustness of the proposed cryptosystem has been analysed on the basis of different parameters by simulating on MATLAB 8.1.0 (R2012b). The experimental results are provided to highlight the effectiveness, robustness and suitability of the proposed cryptosystem and to prove the feasibility and validity of the proposal. © © 2018 2018 The The Authors. Authors. Published Published by by Elsevier Elsevier Ltd. B.V. This is an open access article under the CC BY-NC-ND license (https://creativecommons.org/licenses/by-nc-nd/3.0/) Peer-review under responsibility of the scientific committee of the International Conference on Computational Intelligence and Peer-review under responsibility of the scientific committee of the International Conference on Computational Intelligence and Data Science Science (ICCIDS (ICCIDS 2018). 2018). Data Keywords:Singular Value Decomposition, Randomization, Gyrator Transform, Noise Attack, Occlusion Attack.

Corresponding author: [email protected] 1877-0509© 2018 The Authors. Published by Elsevier B.V.

Peer-review under responsibility of the scientific committee of the International Conference on Computational Intelligence and Data Science (ICCIDS 2018).

1877-0509 © 2018 The Authors. Published by Elsevier Ltd. This is an open access article under the CC BY-NC-ND license (https://creativecommons.org/licenses/by-nc-nd/3.0/) Peer-review under responsibility of the scientific committee of the International Conference on Computational Intelligence and Data Science (ICCIDS 2018). 10.1016/j.procs.2018.05.129

2

Mehak Khurana et al. / Procedia Computer Science 132 (2018) 1636–1645 Mehak Khurana et al. / Procedia Computer Science 00 (2018) 000–000

1637

1. Introduction The digital communication has become a challenge to transmit the data securely. Digital images are used in many applications such as biometric, military applications, police identification etc. These images can easily be accessed and used by unauthorized person or hacker and can be transmitted over a communication network. Therefore optical image encryption is one of the secure method which can be used for communication. In 1995, Refregier and Javidi proposed a 4f scheme based double random phase encoding (DRPE) in Fourier domain to encrypt a plain image and to convert it into a white noise [1-4]. This suffered from many attacks and some security issues so therefore DRPE with different transformations such as Fractional Fourier transform (FrFT) [5-8], Fresnel transform (FrT) [9-11], Gyrator transforms (GT) [12], Cosine transform (CT) [13], Hartley transform (HT) [14], Arnoldtransform (AT) [15] and Mellin transform (MT) [16-18] were proposed to enhance security and to enhance the resistance against possible attacks. Many other optical image encryption schemes for reliable and secure transmission in this direction have been reported [19-23]. GT is one of the canonical transforms proposed by Rodrigo in the field of image processing and applications, properties and its implementation were presented subsequently [24-25]. Then Pei and Ding expanded the discussion and presented digital implementation of GT. It is known, that in conventional GT methods, the plain image is only encrypted by using random or chaotic mask, and there remains correlation between plain and ciphered image. Due to that attacker can easily attack and important information can be revealed [26-28]. To overcome the issues it was further extended by using another structured phase mask. In this paper a new scheme has been proposed where the plain image is combined with another image to form one single image, and then that image is encoded by multiplying pixel by pixel with the random key mask in GT domain [29-30]. GT rotation angles and are additional keys to ensure the security [31-35]. And two images are combined here to introduce the pixel scrambling of image which reduces the image correlation and give good effect which further enhances the security. This technique adds scrambling of image by randomizing which makes it resistant to many conventional attacks and gives good performance with an avalanche effect. It also adds non linearity in the path of encryption and decryption which makes it difficult for an attacker to find the actual key. The non-linear operation in this technique amplifies the error, as while decrypting the attacker needs to find another secret image to decrypt the plain image with correct parameters. This new proposed scheme includes diffusion property by introducing scrambling effect in encryption path which adds non linearity and makes it more secure from traditional attacks and increases the key space and enhances the security. It also uses SVD which decomposes into three segments which are required in the same order for multiplication at the time of decryption. If the order is not same then the correct image will not be recovered. SVD also increases the key space in the algorithm. The robustness of our proposed cryptosystem has been analysed and verified on the basis of various parameters by simulating on MATLAB 8.1.0 (R2012b) and experimental results are presented below to highlight the effectiveness of the algorithm. 2. Gyrator Transform 40]

The gyrator transform has only two-dimensional format. The 2-D function

for GT is given as [36-

where is the transform angle and GT is represented as the output of Gyrator Transform. When the value for , the gyrator transform reduces to a Fourier transform with the rotation of the coordinates . The is represented as . inverse of gyrator transform 3. Singular Value Decomposition Singular value decomposition (SVD) is one of the reliable matrix decomposition method [41-46]. It is analogous to the diagonalization of Hermitian or symmetric matrix based of eigen vectors. SVD is an effective method to decompose the system into a set of independent linear components. Let be a real matrix, where size of matrix is . This matrix can be decomposed into sets of three linear components .

Mehak Khurana et al. / Procedia Computer Science 132 (2018) 1636–1645 Mehak Khurana et al / Procedia Computer Science 00 (2018) 000–000

1638

3

Mathematically it can be represented as is a left singular orthogonal matrix of

. And is mathematically represented by

is a m diagonal matrix with non-diagonal entries all zero and And is mathematically represented by

is a right singular orthogonal matrix of

.

T is a transpose. SVD is mostly used in image processing because of its number of advantages. It is used in decomposing image into three components for encrypting image and their order of multiplication of these three components is important for decryption process to recover original image and hence enhances the security by introducing additional keys. 4. Image Encryption algorithm using SVD and randomization in Gyrator Domain In this paper, a symmetric image encryption technique based on Gyrator Transform using singular value decomposition is proposed. In the Encryption scheme, the original plain image is first multiplied withanother secret image which changes the image pixel value and then obtained image is multiplied by with Random Phase Mask (RPM) in GT and inverse GT domain. Then obtained result is decomposed into three segments to enhance the security. Then three segments are individually randomized to scramble the image and to introduce diffusion property in it. These segments can be communicated through different channels to secure the data but for decryption, these three segments are required to decrypt the image. The three cipher images are first de randomized and then three segments are multiplied to get one single image and decrypted using with random phase Mask in GT and inverse GT domain. To obtain the actual image the secret image is conjugated from obtained result. 4.1 Encryption Technique image

In encryption process, the original plain image .

Then multiplied with random phase mask

that is to be encrypted is multiplied with another

in Gyrator domain.

The obtained result is then multiplied by another random phase mask

in inverse gyrator domain.

denotes the order by which image is transformed. Then obtained result is decomposed into three segments to enhance the security. Then three segments are individually randomized to obtain encrypted image property.

and to introduce diffusion

The three segments of encrypted image are obtained is secure and can be transmitted through three different insecure channel.This is symmetric approach so the secret key used for encryption and decryption is same.

4

Mehak Khurana et al. / Procedia Computer Science 132 (2018) 1636–1645 Mehak Khurana et al. / Procedia Computer Science 00 (2018) 000–000

I(x, y)

x

G(u, v)

GT(α )

H(x, y)

E1(x, y)

U(x, y)

R2(x,y)

R1(x,y)

1639

S(x, y)

G(u, v)

GT(β)

R

E1(x, y)

V(x, y)

E3(x, y)

I1(x, y)

Fig. 1. (a) Encryption Flowchart

4.2 Decryption Technique In the decryption scheme, three encrypted images received at the receiver end is firstly decrypted by applying de-randomization function. Then three segments are multiplied in given order to form one single image. Then obtained image is multiplied with conjugate of Random Phase Mask (RPM) in GT and inverse GT domain. Finally conjugate of secret image used to obtain original image. If three segments are not received the original image cannot be recovered. Each segments of encrypted image is de_randomized to obtain U, S and V

U, S and V are multiplied in same order to obtain intermediate image The

.

is multiplied by

The intermediate result image . The obtained result

is now multiplied with another in Inverse GT domain to obtain final decrypted is then conjugate by secret image

to obtain the final image

Conjugate is represented by . The flow graph of proposed encryption and decryption using random key mask based on gyrator transform is shown in Fig 1(a) and 1(b)

U(x, y)

E1(x, y) E1(x, y) E3(x, y)

R

S(x, y)

R1*(x,y)

R2*(x,y) G(u, v)

GT(β)

G(u, v)

GT(α )

H(x, y)

x

I(x, y)

V(x, y)

I1*(x, y)

Fig. 1. (b) Decryption Flowchart

Mehak Khurana et al. / Procedia Computer Science 132 (2018) 1636–1645 Mehak Khurana et al / Procedia Computer Science 00 (2018) 000–000

1640

5

5. Simulations Results This paper demonstrates and verifies that proposed algorithm using SVD based on gyrator transform achieves better performance in terms of quality of the decrypted image. Consider an original input grayscale Lena image shown in Fig 2(a) and peeper Image and secondary image in Fig 2(b) of size pixels. RPM is shown in Fig 2(c), after applying SVD, it is decomposed into three segments are shown in fig 2(d-f). The encrypted image or stationary white noise is obtained after applying randomization in Fig 2(g). Fig 2(h-i) are the decrypted image for Lena and pepper respectively.

(a)

(b)

(c)

(d)

(e)

(f)

(g)

(h)

(i)

Fig. 2. (a-b)Input Image (c)RPM (d-f) U,S,V (g) CipherImage (h-i) Decrypted Images

5.1 Quality Metrics The quality performance has been analysed against Structural Similarity Index (SSIM) for measuring image quality, Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR) and Relative Error (RE). SSIM: Structural Similarity Index measures the image quality of the recovered image. It compares the Image to be encrypted with recovered image to check its quality. It calculates the global SSIM value for the image and local SSIM values for each pixel. The SSIM value obtained for our algorithm is 0.9898 MSE: The Mean Square Error (MSE) parameter measures the effectiveness and verifies the average squared difference between original image and recovered image pixel value. Mathematically MSE can be represented in equation (19)

is the size of the image in the pixels. Our paper uses Lena image of size 256 256. Smaller value of MSE states higher similarity between the recovered and original image and it shows that recovered image’s quality is high. For our paper MSE computed for Lena is which is very low which shows difference between the original and recovered image is very small. This also demonstrates the quality image has been recovered and difference between images is not visible from human eye. RMSE: The root mean square error also verifies the quality of the recovered image. It is the root of MSE. The RMSE between original image and its corresponding decrypted image is computed and analysed by varying topological charge, wavelength, focal length and are plotted and by calculating RMSE values. The corresponding RMSE from deviations of their original

Mehak Khurana et al. / Procedia Computer Science 00 (2018) 000–000 Mehak Khurana et al. / Procedia Computer Science 132 (2018) 1636–1645 180

180

160

160

140

140

120

120

100

Lena Pepper

80

RMSE

RMSE

6

100

60

40

40

0

(a) 0

20

5

10

15

20

Topological Charge

25

30

Lena Pepper

80

60

20

1641

(b)

0 450

460

470

480

490

500

510

Focal Length (nm)

520

530

540

550

180 160 140

RMSE

120 100

Lena Pepper

80 60 40 20 0

(c) 400

500

600

700

Wavelength (nm)

800

900

Fig. 3. (a) Topological Charge Vs RMSE (b) Focal Length Vs RMSE (c) Wavelength Vs RMSE

PSNR: It weighs the difference between original plain image and the decrypted recovered image obtained using our proposed algorithm. Equation (20) shows mathematical expression of the PSNR

Larger the value of PSNR means better is the quality of recovered image. For our proposed algorithm value of PSNR for Lena is 387.953 respectively. These values indicate high quality of the decrypted image. Relative Error: It can be computed between original image and the decrypted image obtained using our proposed algorithm. Equation (21) shows mathematical expression of the RE [47] If value of the RE is near about zero it indicates the image is perfectly recovered. The value of RE from our algorithm for images Lena is respectively which is nearly zero. These values indicate that through our algorithm images can be perfectly recovered. The obtained values of MSE, SSIM, PSNR and RE for our proposed algorithm shows that it recover a high quality image. 5.2 Noise attack In noise attack, the proposed algorithm, the algorithm has been verified and analysed on the basis of impact on the quality of the recovered image. The proposed algorithm has also been evaluated on the basis of resistance from noise. Let be the cipher image without noise and be the noise effected cipher image, so the noise interference can be represented as [47] represents noise strength and represents Gaussian noise with mean zero and unity standard deviation. The quality of the recovered images gets affected as noise strength increases as shown in Fig 4(a-c) with ranging from with increment of . The recovered images are low quality images but the still visible from normal human eye which means the proposed algorithm can tolerates the data loss and is resistant to noise.

Mehak Khurana et al / Procedia Computer Science 00 (2018) 000–000

7

Mehak Khurana et al. / Procedia Computer Science 132 (2018) 1636–1645

1642

(a)

(b)

(c)

Fig. 4. Effect of Gaussian noise on image by varying

MSE is also calculated by varying the noise intensity which indicates algorithm is secure and robust.

(a-c)

and is plotted for Lena image are shown in Fig 5,

7

2

x 10

1.8 1.6 1.4

MSE

1.2 1 0.8 Lena Pepper

0.6 0.4 0.2 0 0

0.5

1

1.5

2

2.5

Noise

3

3.5

4

4.5

5

Fig. 5. Noise Vs MSE graph

5.3 Occlusion Attack In occlusion attack [48], the proposed algorithm has been verified and analysed against on the basis of blocked part in images. The images recovered after decryption has loss of information due to which quality images are not recovered but are still visible from human eye. Different cases with block size of around 5%, 25% and 50% is cropped and are recovered image can be shown in Fig 6[a-f] for Lena. The MSE has also been evaluated for 5%, 25% and 50% for Lena image , ,4 . Larger the value of MSE means larger the loss of information which means larger the occluded the area of encrypted image larger will be the loss of information and good quality image is not recovered.

(a)

(b)

(c)

(d)

(e)

(f) Fig. 6. (a-f) Occlusion and decryption for 5%, 25%, 50%

8

Mehak Khurana et al. / Procedia Computer Science 132 (2018) 1636–1645 Mehak Khurana et al. / Procedia Computer Science 00 (2018) 000–000

1643

5.4 Key Sensitivity The algorithm is secure only if the key is strong and attacker is not able to recover the original image by applying wrong keys and wrong values for other parameters. The proposed algorithm has been verified against key sensitivity. In simulation, value of the one parameter has been changed and values of the other parameters have been kept fixed and results are shown in Fig 7 and MSE also changes which shows the quality of the recovered image. Fig 7(a) shows the original figures which is taken as input to the algorithm. In first case fig 7(b) the order of alpha ( is changed from to . In second case 7(c) the order of topological charge is changed to . In third case 7(d) the wavelength is changed to . In forth case 6(e) the focal length ) is changed to

(b)

(c)

(a)

(d)

(e)

Fig. 7. (a) Original Image (b-e) Output obtained by applying wrong keys

6. Conclusion and Future Work The proposed cryptosystem with Gyrator transform enhances the security of the system as encryption involves randomization which introduces the scrambling of image and adds diffusion which makes difficult for an attacker to find relation between cipherimage and key. This makes it resistant from various attacks. It also uses SVD which decomposes into three segments. With this decomposition three segments can be kept at three different places so even if attacker finds one segment cannot find the original image. And for decryption the order of three segments for multiplication has to be same to recover correct image. The system is simulated for greyscale and binary image and simulation results provided in this report demonstrates that proposed algorithm recovers quality images with computation in terms of MSE, SSIM and PSNR. The scheme is also verified against various attacks such as occlusion and noise attack which proves that loss of information during transmission over a channel does not affect decryption of the image to some extent. Simulation result demonstrates the feasibility and robustness of symmetric cryptosystem. In future, the encryption scheme can be modified by introducing Equal Modulus Decomposition so as to enhance the security which will add more number of parameters. Attacker will need more number of parameters to find the actual key and original image. References [1] Matoba O, Nomura T, Perez-Cabre E, Millan M S, Javidi B, (2009) Optical techniques for information security, Proc IEEE, 97, 1128-1148 [2] Alfalou A, Brosseau C, (2009) Optical image compression and encryption methods, Adv Opt Photon, 1:589-536 [3] Millan M S, Perez-Cabre E, (2011) Optical data encryption, Optical and Digital Image Processing: Fundamentals and Applications, G. [4] [5]

Cristobal P. Schelkens and H. Thienpont, eds (Wiley), 739-767 Refregier P &Javidi B, (1995) Optical image encryption based on input plane and Fourier plane random encoding, Opt. Lett. 20, 767–769. Unnikrishnan G, Joseph J. & Singh K, (2000) Optical encryption by double random phase encoding in the Fractional Fourier domain, Opt. Lett 25: 887-889

1644

[6]

Mehak Khurana et al. / Procedia Computer Science 132 (2018) 1636–1645 Mehak Khurana et al / Procedia Computer Science 00 (2018) 000–000

9

Liu X, Mei W & Du H, (2014) Optical image encryption based on compressive sensing and chaos in the Fractional Fourier domain. J Mod Opt 61(19):1570–1577 [7] Zhou N, Dong T, & Wu J, (2010) Novel image encryption algorithm based on multiple-parameter discrete fractional random transform, Opt. Commun. 283 (15), 3037–3042 [8] Singh H, (2016) Optical cryptosystem of color images using random phase masks in the fractional wavelet transform domain. In AIP Conference Proceedings, 1728, 020063-1/4 [9] Matoba O &Javidi B, (1999) Encrypted optical memory system using three-dimensional keys in the Fresnel Domain, Opt Lett 24: 762-764 [10] Situ G & Zhang J, (2004) Double random-phase encoding in the Fresnel domain, Opt Letter 29: 1584-1586 [11] Singh H, Yadav A K, Vashisth S & Singh K, (2015) Optical image encryption using devil’s vortex Toroidal lens in the Fresnel transform domain. International J. of Opt. 926135:1- 13 [12] Abuturab M R, (2013) Color information security system using Arnold transform and double structured phase encoding in gyrator transform domain, Opt Laser Technol. 45: 524-532 [13] Wu J, Zhang L & Zhou N, (2010), Image encryption based on the multiple-order discrete fractional cosine transform, Opt. Commun 283: 1720-1725 [14] Chen L & Zhao D, (2006) Optical image encryption with Hartley transforms, Opt. Letter 31:3438-3440 [15] Chen L & Zhao D., Ge F. (2013) Image encryption based on singular value decomposition and Arnold transform in fractional domain, Opt. Commun. 291, 98-103 [16] Zhon N, Wang Y, & Gong L, (2011), Novel optical image encryption scheme based on fractional Mellin transform. Opt. Commun. 284, 3234–3242 [17] Zhou N, Li H, Wang D, Pan S & Zhou Z, (2015), Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform. Opt Commun 343:10–21 [18] Vashisth S, Singh H, Yadav A K, Singh K, (2014), Devil’s vortex phase structure as frequency plane mask for imag e encryption using the fractional Mellin transform, Int. J. Opt. 728056:1-9 [19] G. Situ & J. Zhang, (2005) Multiple-image encryption by wavelength multiplexing, Opt. Lett. 30 1306-1308. [20] L. Chen and D. Zhao, (2006) Optical color image encryption by wavelength multiplexing and lensless Fresnel transform holograms,Opt. Express 14, 8552-8560 [21] U. Gopinathan, T.J. Naughton, J.T. Sheridan, (2006) Polarization encoding and multiplexing of two-dimensional signals: application to image encryption, Appl, opt. 45 5693-5700 [22] H. Li, (2009) Image encryption based on gyrator transform and two step phase shifting interferometry, Opt. Laser Eng. 47, 45-50. [23] J.Masajada and B. Dubik, (2001) Optical vortex generation by three plane wave interference,Opt Comm, 198, 21-27 [24] J. A. Rodrigo, T. Alieva and N.L. Calva (2007), Gyrator Transform: Properties and applications. Optics express 15, 2190-2203 [25] Rodrigo J A, Alieva T, Calvo M L, (2007), Applications of gyrator transform for image processing, Opt Commun, 278;279-284. [26] Carnicer A et al., (2005), Vulnerability to chosen–ciphertext attacks of optical encryption schemes based on double random phase keys, Opt. Letter 30:1644-1646 [27] Peng X et al., (2006), Known-plaintext attack on optical encryption based on double random phase keys, Opt. Letter 31, 1044-1046 [28] Meihua L, Wenqi H, Dajiang L & Xiang P , (2017) Ciphertext-only attack on optical cryptosystem with spatially incoherent illumination: from the view of imaging through scattering medium, Scientific Reports 7:41789 [29] Abuturab, M. R. (2012), Color image security system using double random-structured phase encoding in gyrator domain. Applied Optics, 51, 3006–3016. [30] Singh H, Yadav A K, Vashisth S & Singh K, (2014), Fully-Phase encryption using double random-structured phase masks in Gyrator Domain, Appl Opt. 53: 6472-6481 [31] Singh H, Yadav A K, Vashisth S & Singh K, (2015), Double phase-image encryption using Gyrator transforms, and structured phase mask in the frequency plane, Opt Lasers Eng 67; 145-156 [32] Sui L, Liu B, Wang Q, Li Y, Liang J. (2015), Color-image encryption by using Yang-Gu mixture amplitude-phase retrieval algorithm in gyrator transform domain and two-dimensional sine logistic modulation map. Opt Lasers Eng; 75:17–26. [33] Chen J-X, Zhu Z-L, Fu C, Zhang L-B, Yu H. (2015), Analysis and improvement of double image encryption scheme using pixel scrambling technique in gyrator domains. Opt Lasers Eng; 66:1–9. [34] Vashisth S, Yadav AK, Singh H, Singh K. (2015), Watermarking in gyrator domain using an asymmetric cryptosystem. Proc SPIE; 9654:96542E–1/8. [35] Abuturab M.R. (2015), An asymmetric single-channel color image encryption based on Hartley transform and gyrator transform. Opt Lasers Eng; 69:49–57. [36] Mehra I, Nishchal NK. (2015), Optical asymmetric image encryption using gyrator wavelet transform. Opt Commun; 354:344–52. [37] Abuturab M.R. (2015) Gyrator wavelet transform based non-linear multiple single channel information fusion authentication. Opt Commun; 355:462–78. [38] Abuturab M.R. (2015) Group multiple-image encoding and watermarking using coupled logistic maps and gyrator wavelet transform. J Opt Soc A; 32:1811–20. [39] Yadav A.K, Vashisth S, Singh H, Singh K. (2015) A phase-image watermarking scheme in gyrator domain using devil’s vortex Fresnel lens as a phase mask. Opt Commun; 344:172–80.

10

Mehak Khurana et al. / Procedia Computer Science 132 (2018) 1636–1645 Mehak Khurana et al. / Procedia Computer Science 00 (2018) 000–000

1645

[40] Sui, L., Zhou, B., Ning, X., & Tian, A. (2016), Optical multiple-image encryption based on the chaotic structured phase masks under the

illumination of a vortex beam in the gyrator domain. Optics Express, 24, 499–515. C., Patterson C. L. (1976) Singular value decompositions and digital image processing. IEEE trans. Acoust, speech, signal process ASSP 24:26–53. [42] Moonen M., Dooren P. V, Vandewalle J. (1992) Singular value decomposition updating algorithm for subspace tracking. SIAM J Matrix Anal Appl 13:1015–38. [43] Bhatnagar G, Wu Q. M. J, Raman B. (2010) SVD-based robust watermarking using fractional cosine transform, SPIE, 7708; 1–11. [44] Abd El-Latif AA, Li L, Wang N, Li Q (2012) A new image encryption based on chaotic systems and singular value decomposition. Proc SPIE 8334. http://dx.doi.org/ 10.1117/12.964281. [45] Abuturab M. R. (2014) Color information verification system based on singular value decomposition in gyrator transform domain. Opt Lasers Eng 57:13–9. [46] Makbol N. M., Khoo BE (2015) A new robust and secure digital image watermarking scheme based on the integer wavelet transform and singular value decomposition. Digit Signal Process 33:134–47 [47] Khurana M, Singh H, (2017) An Asymmetric Image Encryption Based on Phase Truncated Hybrid Transform, 3D Research 8:28, 17-28 [48] Khurana M, Singh H, Asymmetric Optical Image Encryption using Random Hilbert Mask based on Fast Walsh Hadamard Transform, International Conference on Computing and Communication Technologies for Smart Nation (IC3TSN 2017) IEEE, Oct 2017 10.1109/IC3TSN.2017.8284508, 374-377

[41] Andrews H.