Research Article
A Secure Asymmetric Optical Image Encryption Based on Phase Truncation and Singular Value Decomposition in Linear Canonical Transform Domain
Table 2
The entropy calculations of grayscale and text images.
| S. No | Image | Type/size | Entropy of input image | Entropy of encrypted image | Entropy of decrypted image |
| 1 | Baboon | JEPG/256 | 7.0587 | 8.000 | 5.3239 | 2 | Tree | JEPG/256 | 6.9181 | 8.000 | 6.2558 | 3 | Optical image processing | JEPG/256 | 6.7272 | 7.647 | 6.7272 | 4 | OPT | JEPG/256 | 0 | 7.627 | 0 | 5 | Lena | JEPG/256 | 7.9216 | 7.8350 | 7.9216 |
|
|