Browse > Article
http://dx.doi.org/10.3807/COPP.2018.2.6.540

Optical Image Encryption Technique Based on Hybrid-pattern Phase Keys  

Sun, Wenqing (Jiangsu Key Laboratory of Micro and Nano Heat Fluid Flow Technology and Energy Application, School of Mathematics and Physics, Suzhou University of Science and Technology)
Wang, Lei (Jiangsu Key Laboratory of Micro and Nano Heat Fluid Flow Technology and Energy Application, School of Mathematics and Physics, Suzhou University of Science and Technology)
Wang, Jun (Jiangsu Key Laboratory of Micro and Nano Heat Fluid Flow Technology and Energy Application, School of Mathematics and Physics, Suzhou University of Science and Technology)
Li, Hua (Jiangsu Key Laboratory of Micro and Nano Heat Fluid Flow Technology and Energy Application, School of Mathematics and Physics, Suzhou University of Science and Technology)
Wu, Quanying (Jiangsu Key Laboratory of Micro and Nano Heat Fluid Flow Technology and Energy Application, School of Mathematics and Physics, Suzhou University of Science and Technology)
Publication Information
Current Optics and Photonics / v.2, no.6, 2018 , pp. 540-546 More about this Journal
Abstract
We propose an implementation scheme for an optical encryption system with hybrid-pattern random keys. In the encryption process, a pair of random phase keys composed of a white-noise phase key and a structured phase key are positioned in the input plane and Fourier-spectrum plane respectively. The output image is recoverable by digital reconstruction, using the conjugate of the encryption key in the Fourier-spectrum plane. We discuss the system encryption performance when different combinations of phase-key pairs are used. To measure the effectiveness of the proposed method, we calculate the statistical indicators between original and encrypted images. The results are compared to those generated from a classical double random phase encoding. Computer simulations are presented to show the validity of the method.
Keywords
Information security; Optical encryption; Random phase key; 4f correlator;
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. Alfalou and C. Brosseau, "Optical image compression and encryption methods," Adv. Opt. Photon. 1, 590-636 (2009).
2 M. S. Millan, "Advanced optical correlation and digital methods for pattern matching-50th anniversary of Vander Lugt matched filter," J. Opt.-UK 14, 103001 (2012)   DOI
3 W. Chen, B. Javidi, and X. Chen, "Advances in optical security systems," Adv. Opt. Photon. 6, 121-155 (2014)
4 S. Liu, C. Guo, and J. T. Sheridan, "A review of optical image encryption techniques," Opt. Laser Technol. 57, 327-342 (2014).   DOI
5 B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, "Roadmap on optical security," J. Opt.-UK 18, 083001 (2016).
6 E. Perez-Cabre, M. Cho, and B. Javidi, "Information authentication using photon-counting double-random-phase encrypted images," Opt. Lett. 36, 22-24 (2011).   DOI
7 I. Lee and M. Cho, "Optical encryption and information authentication of 3D objects considering wireless channel characteristics," J. Opt. Soc. Korea 17, 494-499 (2013).   DOI
8 W. Qin and X. Peng, "Asymmetric cryptosystem based on phase-truncated Fourier transforms," Opt. Lett. 35, 118-120 (2010).   DOI
9 M. Khurana and H. Singh, "An asymmetric image encryption based on phase truncated hybrid transform," 3D Res. 8 (2017).
10 S. K. Gil, "Asymmetric public key cryptography by using logic-based optical processing," J. Opt. Soc. Korea 20, 55-63 (2016).   DOI
11 H. Yu, J. Chang, X. Liu, C. Wu, Y. He, and Y. Zhang, "Novel asymmetric cryptosystem based on distorted wavefront beam illumination and double-random phase encoding," Opt. Express 25, 8860 (2017).   DOI
12 H. Chen, C. Tanougast, Z. Liu, and L. Sieler, "Asymmetric optical cryptosystem for color image based on equal modulus decomposition in gyrator transform domains," Opt. Lasers Eng. 93, 1-8 (2017).
13 L. Yao, C. Yuan, J. Qiang, S. Feng, and S. Nie, "Asymmetric color image encryption based on singular value decomposition," Opt. Lasers Eng. 89, 80-87 (2017).   DOI
14 X. Li, M. Zhao, Y. Xing, L. Li, S. T. Kim, X. Zhou, and Q. H. Wang, "Optical encryption via monospectral integral imaging," Opt. Express 25, 31516-31527 (2017).   DOI
15 T. Zhao, Y. Jiang, and C. Liu, "Demonstration and a practical scheme of the optical asymmetric cryptosystem," Optik 138, 509-515 (2017).   DOI
16 L. Ma and W. Jin, "Symmetric and asymmetric hybrid cryptosystem based on compressive sensing and computer generated holography," Opt. Commun. 407, 51-56 (2018).   DOI
17 J. F. Barrera, R. Henao, and R. Torroba, "Optical encryption method using toroidal zone plates," Opt. Commun. 248, 35-40 (2005).   DOI
18 T. Li, Z. Miao, and Y. Shi, "Ciphertext-only attack on phase-shifting interferometery-based encryption," IEEE Photon. J. 9, 1-8 (2017).
19 M. Tebaldi, W. D. Furlan, R. Torroba, and N. Bolognini, "Optical-data storage-readout technique based on fractal encrypting masks," Opt. Lett. 34, 316 (2009).   DOI
20 W. Zamrani, E. Ahouzi, A. Lizana, J. Campos, and M. J. Yzuel, "Optical image encryption technique based on deterministic phase masks," Opt. Eng. 55, 103108 (2016).   DOI
21 J. F. Barrera, R. Henao, and R. Torroba, "Fault tolerances using toroidal zone plate encryption," Opt. Commun. 256, 489-494 (2005).   DOI
22 S. K. Rajput and N. K. Nishchal, "Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask," Appl. Opt. 51, 5377-5386 (2012).   DOI
23 C. Lin and X. Shen, "Design of reconfigurable and structured spiral phase mask for optical security system," Opt. Commun. 370, 127-134 (2016).   DOI
24 C. Lin, X. Shen, and M. Lei, "Generation of plaintextindependent private key based on conditional decomposition strategy," Opt. Lasers Eng. 86, 303-308 (2016).   DOI
25 H. Singh, "Nonlinear optical double image encryption using random-optical vortex in fractional Hartley transform domain," Opt. Appl. 47, 557-578 (2017).
26 R. Kumar and B. Bhaduri, "Optical image encryption in Fresnel domain using spiral phase transform," J. Opt.-UK 19, 095701 (2017).   DOI
27 M. Rafiq Abuturab, "Asymmetric multiple information cryptosystem based on chaotic spiral phase mask and random spectrum decomposition," Opt. Laser Technol. 98, 298-308 (2018).   DOI
28 M. R. Abuturab, "Securing multiple information using chaotic spiral phase encoding with simultaneous interference and superposition methods," Opt. Lasers Eng. 98, 1-16 (2017).   DOI
29 Q. Chen, X. Shen, S. Dou, C. Lin, and L. Wang, "Topological charge number multiplexing for JTC multiple-image encryption," Opt. Commun. 412, 155-160 (2018).   DOI
30 K. Ravi, B. Basanta, and K. N. Naveen, "Nonlinear QR code based optical image encryption using spiral phase transform, equal modulus decomposition and singular value decomposition," J. Opt.-UK 20, 015701 (2018).   DOI
31 M. R. Abuturab, "Color image security system using double random-structured phase encoding in gyrator transform domain," Appl. Opt. 51, 3006-3016 (2012).   DOI
32 M. R. Abuturab, "Color information security system using discrete cosine transform in gyrator transform domain radial- Hilbert phase encoding," Opt. Lasers Eng. 50, 1209-1216 (2012).   DOI
33 H. Singh, A. K. Yadav, S. Vashisth, and K. Singh, "Fully phase image encryption using double random-structured phase masks in gyrator domain," Appl. Opt. 53, 6472 (2014).   DOI
34 A. K. Yadav, S. Vashisth, H. Singh, and K. Singh, "A phase-image watermarking scheme in gyrator domain using devil's vortex Fresnel lens as a phase mask," Opt. Commun. 344, 172-180 (2015).   DOI
35 S. Liansheng, Z. Bei, N. Xiaojuan, and T. Ailing, "Optical multiple-image encryption based on the chaotic structured phase masks under the illumination of a vortex beam in the gyrator domain," Opt. Express 24, 499-515 (2016).   DOI
36 H. Singh, A. K. Yadav, S. Vashisth, and K. Singh, "Double phase-image encryption using gyrator transforms, and structured phase mask in the frequency plane," Opt. Lasers Eng. 67, 145-156 (2015).   DOI
37 P. Singh, A. K. Yadav, and K. Singh, "Phase image encryption in the fractional Hartley domain using Arnold transform and singular value decomposition," Opt. Lasers Eng. 91, 187-195 (2017).   DOI
38 H. Singh, "Cryptosystem for securing image encryption using structured phase masks in fresnel wavelet transform domain," 3D Res. 7 (2016).
39 H. Singh, "Devil's vortex Fresnel lens phase masks on an asymmetric cryptosystem based on phase-truncation in gyrator wavelet transform domain," Opt. Lasers Eng. 81, 125-139 (2016).   DOI
40 I. Lee and M. Cho, "Double random phase encryption using orthogonal encoding for multiple-image transmission," J. Opt. Soc. Korea 18, 201-206 (2014).   DOI
41 A. Vaish and M. Kumar, "Color image encryption using singular value decomposition in discrete cosine Stockwell transform domain," Opt. Appl. 48, 25-38 (2018).
42 Z. Shao, Y. Shang, Q. Tong, H. Ding, X. Zhao, and X. Fu, "Multiple color image encryption and authentication based on phase retrieval and partial decryption in quaternion gyrator domain," Multimedia Tools Appl. 77, 25821-25840 (2018).   DOI
43 X. Li, X. Meng, X. Yang, Y. Wang, Y. Yin, X. Peng, W. He, G. Dong, and H. Chen, "Multiple-image encryption via lifting wavelet transform and XOR operation based on compressive ghost imaging scheme," Opt. Laser Eng. 102, 106-111 (2018).   DOI
44 H. Xu, W. Xu, S. Wang, and S. Wu, "Phase-only asymmetric optical cryptosystem based on random modulus decomposition," J. Mod. Opt. 65, 1245-1252 (2018).   DOI
45 M. Liao, W. He, D. Lu, and X. Peng, "Ciphertext-only attack on optical cryptosystem with spatially incoherent illumination: from the view of imaging through scattering medium," Sci. Rep. 7, 41789 (2017).   DOI
46 K. Ravi, B. Basanta, and K. N. Naveen, "Nonlinear QR code based optical image encryption using spiral phase transform, equal modulus decomposition and singular value decomposition," J. Opt.-UK 20, 015701 (2018).   DOI
47 J. F. Barrera, R. Henao, and R. Torroba, "Optical encryption method using toroidal zone plates," Opt. Commun. 248, 35-40 (2005).   DOI
48 Y. Xiong, A. He, and C. Quan, "Security analysis of a double-image encryption technique based on an asymmetric algorithm," J. Opt. Soc. Am. A 35, 320-326 (2018).   DOI
49 M. Cho and B. Javidi, "Three-dimensional photon counting double-random-phase encryption," Opt. Lett. 38, 3198-3201 (2013).   DOI