DOI QR코드

DOI QR Code

Efficient Compression Schemes for Double Random Phase-encoded Data for Image Authentication

  • Received : 2019.03.28
  • Accepted : 2019.06.27
  • Published : 2019.10.25

Abstract

Encrypted images obtained through double random phase-encoding (DRPE) occupy considerable storage space. We propose efficient compression schemes to reduce the size of the encrypted data. In the proposed schemes, two state-of-art compression methods of JPEG and JP2K are applied to the quantized encrypted phase images obtained by combining the DRPE algorithm with the virtual photon counting imaging technique. We compute the nonlinear cross-correlation between the registered reference images and the compressed input images to verify the performance of the compression of double random phase-encoded images. We show quantitatively through experiments that considerable compression of the encrypted image data can be achieved while security and authentication factors are completely preserved.

Keywords

References

  1. P. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995). https://doi.org/10.1364/OL.20.000767
  2. I. Moon, F. Yi, Y. H. Lee, and B. Javidi, "Avalanche and bit independence characteristics of double random phase encoding in the Fourier and Fresnel domains," J. Opt. Soc. Am. A 31, 1104-1111 (2014). https://doi.org/10.1364/JOSAA.31.001104
  3. R. Tao, Y. Xin, and Y. Wang, "Double image encryption based on random phase encoding in the fractional Fourier domain," Opt. Express 15, 16067-16079 (2007). https://doi.org/10.1364/OE.15.016067
  4. Z. Liu, Y. Zhang, S. Li, W. Liu, W. Liu, Y. Wang, and S. Liu, "Double image encryption scheme by using random phase encoding and pixel exchanging in the gyrator transform domains," Opt. Lasers Technol. 47, 152-158 (2013). https://doi.org/10.1016/j.optlastec.2012.09.007
  5. G. Unnikrishnan, J. Joseph, and K. Singh, "Optical encryption by double-random phase encoding in the fractional Fourier domain," Opt. Lett. 25, 887-889 (2000). https://doi.org/10.1364/OL.25.000887
  6. W. Chen, "Multiple-wavelength double random phase encoding with CCD-plane sparse-phase multiplexing for optical information verification," Appl. Opt. 54, 10711-10716 (2015). https://doi.org/10.1364/AO.54.010711
  7. F. Yi, Y. Jeoung, and I. Moon, "Three-dimensional image authentication scheme using sparse phase information in double random phase encoded integral imaging," Appl. Opt. 56, 4381-4387 (2017). https://doi.org/10.1364/AO.56.004381
  8. X. Wang, W. Chen, and X. Chen, "Optical information authentication using compressed double-random-phase-encoded images and quick-response codes," Opt. Express 23, 6239- 6253 (2015). https://doi.org/10.1364/OE.23.006239
  9. Z. Leihong, Y. Xiao, Z. Dawei, and C. Jian, "Research on multiple-image encryption scheme based on Fourier transform and ghost imaging algorithm," Curr. Opt. Photon. 2, 315-323 (2018). https://doi.org/10.3807/COPP.2018.2.4.315
  10. J. Chen, N. Bao, L. Y. Zhang, and Z. Zhu, "Optical information authentication using optical encryption and sparsity constraint," Opt. Lasers Eng. 107, 352-363 (2018). https://doi.org/10.1016/j.optlaseng.2018.04.009
  11. Z. Shao, Y. Shang, Q. Tong, H. Ding, X. Zhao, and X. Fu, "Multiple color image encryption and authentication based on phase retrieval and partial decryption in quaternion gyrator domain," Multimed. Tools Appl. 77, 25821-25840 (2018). https://doi.org/10.1007/s11042-018-5818-7
  12. G. Luan, A. Li, D. Zhang, and D. Wang, "Asymmetric image encryption and authentication based on equal modulus decomposition in the Fresnel transform domain," IEEE Photon. J. 11, 6900207 (2019).
  13. S. Liu, B. M. Hennelly, C. Guo, and J. T. Sheridan, "Robustness of double random phase encoding spread-space spread-spectrum watermarking technique," Sig. Process. 109, 345-361 (2015). https://doi.org/10.1016/j.sigpro.2014.06.024
  14. S. Gholami, K. Jaferzadeh, S. Shin, and I. Moon, "An efficient image-based verification scheme by fusion of double random phase encoding and dynamic chaotic map," Multimed. Tools Appl. 78, 25001-25018 (2019). https://doi.org/10.1007/s11042-019-7714-1
  15. A. V. Zea, J. F. Barrera, and R. Torroba, "Cryptographic salting for security enhancement of double random phase encryption schemes," J. Opt. 19, 105703 (2017). https://doi.org/10.1088/2040-8986/aa8738
  16. X. Liu, J. Wu, W. He, M. Liao, C. Zhang, and X. Peng, "Vulnerability to ciphertext-only attack of optical encryption scheme based on double random phase encoding," Opt. Express 23, 18955-18968 (2015). https://doi.org/10.1364/OE.23.018955
  17. Y. Frauel, A. Castro, T. Naughton, and B. Javidi, "Resistance of the double random phase encryption against various attacks," Opt. Express 15, 10253-10265 (2007). https://doi.org/10.1364/OE.15.010253
  18. F. Yi, I. Moon, and Y. H. Lee, "A Multispectral photoncounting double random phase encoding scheme for image authentication," Sensors 14, 8877-8894 (2014). https://doi.org/10.3390/s140508877
  19. I. Moon, F. Yi, M. Han, and J. Lee, "Efficient asymmetric image authentication schemes based on photon countingdouble random phase encoding and RSA algorithms," Appl. Opt. 55, 4328-4335 (2016). https://doi.org/10.1364/AO.55.004328
  20. E. Perez-Cabre, M. Cho, and B. Javidi, "Information authentication using photon-counting double-random-phase encrypted images," Opt. Lett 36, 22-24 (2011). https://doi.org/10.1364/OL.36.000022
  21. E. Perez-Cabre, H. C. Abril, M. S. Millan, and B. Javidi, "Photon-counting double-random-phase encoding for secure image verification and retrieval," J. Opt. 14, 094001 (2012). https://doi.org/10.1088/2040-8978/14/9/094001
  22. F. Yi, Y. Jeoung, and I. Moon, "Three-dimensional image authentication scheme using sparse phase information in double random phase encoded integral imaging," Appl. Opt. 56, 4381-4387 (2017). https://doi.org/10.1364/AO.56.004381
  23. S. K. Rajput, D. Kumar, and N. K. Nishchal, "Photon counting imaging and phase mask multiplexing for multiple images authentication and digital hologram security," Appl. Opt. 54, 1657-1666 (2015). https://doi.org/10.1364/AO.54.001657
  24. J. Lee, N. Sultana, F. Yi, and I. Moon, "Avalanche and bit independence properties of photon-counting double random phase encoding in gyrator domain," Curr. Opt. Photon. 2, 368-377 (2018). https://doi.org/10.3807/COPP.2018.2.4.368
  25. Y. Wiseman, "The still image lossy compression standard-JPEG," in Encyclopedia of Information Science and Technology, D. B. A. M. Khosrow-Pour, ed. 3rd ed. (IGI Global, PA, 2015).
  26. P. Schelkens, A. Skodras, and T. Ebrahimi, The JPEG 2000 Suite (John Wiley & Sons, NY, 2009).
  27. D. Santa-Cruz, T. Ebrahimi, J. Askelof, M. Larsson, and C. Christopoulos, "JPEG 2000 still image coding versus other standards," Proc. SPIE 4115, 446-454 (2000).
  28. A. N. Skodras, C. A. Christopoulos, and T. Ebrahimi, "JPEG2000: the upcoming still image compression standard," Pattern Recogn. Lett. 22, 1337-1345 (2001). https://doi.org/10.1016/S0167-8655(01)00079-4
  29. D. Santa-Cruz, R. Grosbois, and T. Ebrahimi, "JPEG 2000 performance evaluation and assessment," Signal Process. Image Commun. 17, 113-130 (2002). https://doi.org/10.1016/S0923-5965(01)00025-X
  30. S. N. Sivanandam, A. Pasumpon, and P. Rani, "Lossy still image compression standards: JPEG and JPEG2000 - a survey," Int. J. Comput., Internet Manage. 17, 69-84 (2009).
  31. A. Skodras, C. Christopoulos, and T. Ebrahimi, "The JPEG 2000 still image compression standard," IEEE Signal Process. Mag. 18, 36-58 (2001). https://doi.org/10.1109/79.952804
  32. G. K. Wallace, "The JPEG still picture compression standard," IEEE Trans. Consum. Electron. 38, xviii-xxxiv (1992). https://doi.org/10.1109/30.125072
  33. K. Jaferzadeh, S. Gholami, and I. Moon, "Lossless and lossy compression of quantitative phase images of red blood cells obtained by digital holographic imaging," Appl. Opt. 55, 10409-10416 (2016). https://doi.org/10.1364/AO.55.010409
  34. P. Li and K. T. Lo, "A content-adaptive joint image compression and encryption scheme," IEEE Trans. Multimedia 20, 1960-1972 (2018). https://doi.org/10.1109/TMM.2017.2786860
  35. V. Itier, P. Puteaux, and W. Puech, "Recompression of JPEG crypto-compressed images without a key," IEEE Trans. Circuits Syst. Video Technol. (to be published).