{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T08:11:44Z","timestamp":1775895104072,"version":"3.50.1"},"reference-count":36,"publisher":"MDPI AG","issue":"8","license":[{"start":{"date-parts":[[2015,8,5]],"date-time":"2015-08-05T00:00:00Z","timestamp":1438732800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Specialized Research Fund for the Doctoral Program of Higher Education of China (SRFDP)","award":["20130191110027"],"award-info":[{"award-number":["20130191110027"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Gyrator transform has been widely used for image encryption recently.  For gyrator transform-based image encryption, the rotation angle used in the gyrator transform is one of the secret keys. In this paper, by analyzing the properties of the gyrator transform, an improved particle swarm optimization (PSO) algorithm was proposed to search the rotation angle in a single gyrator transform. Since the gyrator transform is continuous, it is time-consuming to exhaustedly search the rotation angle, even considering the data precision in a computer. Therefore, a computational intelligence-based search may be an alternative choice. Considering the properties of severe local convergence and obvious global fluctuations of the gyrator transform, an improved PSO algorithm was proposed to be suitable for such situations. The experimental results demonstrated that the proposed improved PSO algorithm can significantly improve the efficiency of searching the rotation angle in a single gyrator transform. Since gyrator transform is the foundation of image encryption in gyrator transform domains, the research on the method of searching the rotation angle in a single gyrator transform is useful for further study on the security of such image encryption algorithms.<\/jats:p>","DOI":"10.3390\/s150819199","type":"journal-article","created":{"date-parts":[[2015,8,18]],"date-time":"2015-08-18T05:43:13Z","timestamp":1439876593000},"page":"19199-19211","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Security Analysis of Image Encryption Based on Gyrator Transform by Searching the Rotation Angle with Improved PSO Algorithm"],"prefix":"10.3390","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8703-7310","authenticated-orcid":false,"given":"Jun","family":"Sang","sequence":"first","affiliation":[{"name":"Key Laboratory of Dependable Service Computing in Cyber Physical Society of Ministry of Education, Chongqing University, Chongqing 400044, China"},{"name":"School of Software Engineering, Chongqing University, Chongqing 401331, China"}]},{"given":"Jun","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Automation, Huazhong University of Science and Technology, Wuhan 430074, China"}]},{"given":"Zhili","family":"Xiang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Dependable Service Computing in Cyber Physical Society of Ministry of Education, Chongqing University, Chongqing 400044, China"},{"name":"School of Software Engineering, Chongqing University, Chongqing 401331, China"}]},{"given":"Bin","family":"Cai","sequence":"additional","affiliation":[{"name":"Key Laboratory of Dependable Service Computing in Cyber Physical Society of Ministry of Education, Chongqing University, Chongqing 400044, China"},{"name":"School of Software Engineering, Chongqing University, Chongqing 401331, China"}]},{"given":"Hong","family":"Xiang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Dependable Service Computing in Cyber Physical Society of Ministry of Education, Chongqing University, Chongqing 400044, China"},{"name":"School of Software Engineering, Chongqing University, Chongqing 401331, China"}]}],"member":"1968","published-online":{"date-parts":[[2015,8,5]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"767","DOI":"10.1364\/OL.20.000767","article-title":"Optical image encryption based on input plane and Fourier plane random encoding","volume":"20","author":"Refregier","year":"1995","journal-title":"Opt. Lett."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"734","DOI":"10.1109\/TIFS.2010.2068289","article-title":"Image encryption with multiorders of fractional Fourier transforms","volume":"5","author":"Tao","year":"2010","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"2584","DOI":"10.1016\/j.optcom.2012.01.085","article-title":"Image encryption based on the reality-preserving multiple-parameter fractional Fourier transform","volume":"285","author":"Lang","year":"2012","journal-title":"Opt. Commun."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1352","DOI":"10.1016\/j.optlaseng.2012.05.021","article-title":"Image encryption based on the random rotation operation in the fractional Fourier transform domains","volume":"50","author":"Liu","year":"2012","journal-title":"Opt. Lasers Eng."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.optcom.2012.09.033","article-title":"Optical encryption by combining image scrambling techniques in fractional Fourier domains","volume":"287","author":"Liu","year":"2013","journal-title":"Opt. Commun."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"117001","DOI":"10.1117\/1.3643724","article-title":"Optical image encryption using multilevel Arnold transform and noninterferometric imaging","volume":"50","author":"Chen","year":"2011","journal-title":"Opt. Eng."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"14001","DOI":"10.1209\/0295-5075\/109\/14001","article-title":"Ghost imaging using labyrinth-like phase modulation patterns for high-efficiency and high-security optical encryption","volume":"109","author":"Chen","year":"2015","journal-title":"Europhys. Lett."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"035702","DOI":"10.1088\/2040-8978\/17\/3\/035702","article-title":"Security-enhanced phase encryption assisted by nonlinear optical correlation via sparse phase","volume":"17","author":"Chen","year":"2015","journal-title":"J. Opt."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"2190","DOI":"10.1364\/OE.15.002190","article-title":"Gyrator transform: Properties and applications","volume":"15","author":"Rodrigo","year":"2007","journal-title":"Opt. Express"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"539","DOI":"10.1016\/j.optlaseng.2008.10.013","article-title":"Gyrator transform-based optical image encryption, using chaos","volume":"47","author":"Singh","year":"2009","journal-title":"Opt. Lasers Eng."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"542","DOI":"10.1016\/j.optlaseng.2010.12.005","article-title":"Image encryption scheme by using iterative random phase encoding in gyrator transform domains","volume":"49","author":"Liu","year":"2011","journal-title":"Opt. Lasers Eng."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"3921","DOI":"10.1016\/j.optcom.2012.05.061","article-title":"Image encryption algorithm based on the random local phase encoding in gyrator transform domains","volume":"285","author":"Liu","year":"2012","journal-title":"Opt. Commun."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Daza, S.M., Vega, F., Matos, L., Moreno, C.T., Diaz, M.L., and Daza, Y.M. (2012, January 25\u201328). Image encryption based on convolution operation in the gyrator transform domain. Proceedings of the IECON 2012 38th Annual Conference on IEEE Industrial Electronics Society, Montreal, QC, Canada.","DOI":"10.1109\/IECON.2012.6388515"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"013020","DOI":"10.1117\/1.3557790","article-title":"Image encryption by using gyrator transform and Arnold transform","volume":"20","author":"Liu","year":"2011","journal-title":"J. Electron. Imaging"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"5745","DOI":"10.1016\/j.optcom.2008.09.001","article-title":"Double-image encryption based on iterative gyrator transform","volume":"281","author":"Li","year":"2008","journal-title":"Opt. Commun."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"12033","DOI":"10.1364\/OE.18.012033","article-title":"Double image encryption by using iterative random binary encoding in gyrator domains","volume":"18","author":"Liu","year":"2010","journal-title":"Opt. Express"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1016\/j.optlastec.2012.09.007","article-title":"Double image encryption scheme by using random phase encoding and pixel exchanging in the gyrator transform domains","volume":"47","author":"Liu","year":"2013","journal-title":"Opt. Lasers Technol."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1327","DOI":"10.1016\/j.optlaseng.2013.05.011","article-title":"Double-image encryption by using chaos-based local pixel scrambling technique and gyrator transform","volume":"51","author":"Li","year":"2013","journal-title":"Opt. Lasers Eng."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1016\/j.optlastec.2012.10.037","article-title":"Double image encryption based on phase-amplitude mixed encoding and multistage phase encoding in gyrator transform domains","volume":"48","author":"Wang","year":"2013","journal-title":"Opt. Lasers Technol."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"4932","DOI":"10.1364\/OE.22.004932","article-title":"Double color image encryption using iterative phase retrieval algorithm in quaternion gyrator domain","volume":"22","author":"Shao","year":"2014","journal-title":"Opt. Express"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/j.optcom.2014.01.041","article-title":"Multiple-image encryption system using cascaded phase mask encoding and a modified Gerchberg-Saxton algorithm in gyrator domain","volume":"320","author":"Wang","year":"2014","journal-title":"Opt. Commun."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"3006","DOI":"10.1364\/AO.51.003006","article-title":"Color image security system using double random-structured phase encoding in gyrator transform domain","volume":"51","author":"Abuturab","year":"2012","journal-title":"Appl. Opt."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1209","DOI":"10.1016\/j.optlaseng.2012.03.020","article-title":"Color information security system using discrete cosine transform in gyrator transform domain radial-Hilbert phase encoding","volume":"50","author":"Abuturab","year":"2012","journal-title":"Opt. Lasers Eng."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"7994","DOI":"10.1364\/AO.51.007994","article-title":"Color information cryptosystem based on optical superposition principle and phase-truncated gyrator transform","volume":"51","author":"Abuturab","year":"2012","journal-title":"Appl. Opt."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"530","DOI":"10.1016\/j.optlastec.2012.11.020","article-title":"Color image encryption based on gyrator transform and Arnold transform","volume":"48","author":"Sui","year":"2013","journal-title":"Opt. Lasers Technol."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"768","DOI":"10.1016\/j.optlaseng.2013.01.016","article-title":"Color image encryption based on the affine transform and gyrator transform","volume":"51","author":"Chen","year":"2013","journal-title":"Opt. Lasers Eng."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1016\/j.optcom.2014.02.061","article-title":"Single-channel color information security system using LU decomposition in gyrator transform domains","volume":"323","author":"Abuturab","year":"2014","journal-title":"Opt. Commun."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/j.optlaseng.2014.01.025","article-title":"An asymmetric color image cryptosystem based on Schur decomposition in gyrator transform domain","volume":"58","author":"Abuturab","year":"2014","journal-title":"Opt. Lasers Eng."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Sang, J., Cai, B., Zhang, B., Hong, D., and Hu, H. (2013, January 14\u201315). Security analysis of random phase encoding based image encryption in gyrator transform domains. Proceedings of the 9th International Conference on Computational Intelligence and Security, Leshan, China.","DOI":"10.1109\/CIS.2013.128"},{"key":"ref_30","unstructured":"Engelbrecht, A.P. (2005). Fundamentals of Computational Swarm Intelligence, John Wiley & Sons."},{"key":"ref_31","first-page":"824","article-title":"Chosen-plaintext attack on double phase encoding encryption technique","volume":"27","author":"Wei","year":"2007","journal-title":"Acta Opt. Sin."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"1644","DOI":"10.1364\/OL.30.001644","article-title":"Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys","volume":"30","author":"Carnicer","year":"2005","journal-title":"Opt. Lett."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"1044","DOI":"10.1364\/OL.31.001044","article-title":"Known-plaintext attack on optical encryption based on double random phase keys","volume":"31","author":"Peng","year":"2006","journal-title":"Opt. Lett."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"3181","DOI":"10.1364\/OE.14.003181","article-title":"A known-plaintext heuristic attack on the Fourier plane encryption algorithm","volume":"14","author":"Gopinathan","year":"2006","journal-title":"Opt. Express"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Qin, W., He, W., Meng, X., and Peng, X. (2009). Optical cryptanalysis of DRPE-based encryption systems. Proc. SPIE, 7512.","DOI":"10.1117\/12.839999"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Nakano, K., Suzuki, H., Yamaguchi, M., Obi, T., and Ohyama, N. (2011). Quantitative analysis on key estimation by known-plaintext attacks to DRPE. Proc. SPIE, 8011.","DOI":"10.1117\/12.903356"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/15\/8\/19199\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T20:50:13Z","timestamp":1760215813000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/15\/8\/19199"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,5]]},"references-count":36,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2015,8]]}},"alternative-id":["s150819199"],"URL":"https:\/\/doi.org\/10.3390\/s150819199","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,8,5]]}}}