Abstract
In this paper, a dual optics paths optical image cryptosystem based on tilt Fresnel diffraction and a phase modulation in extend fractional Fourier transform (eFrFT) domain is presented. The tilt Fresnel is designed by using a non-spherical mirror. A part of data from the original image is modulated by the mirror, while the other part is encoded by an expanded fractional Fourier transform. Besides, the random data of the dual channels is combined for forming the encrypted image. The structure parameters in designing the optical hardware system and the random phase can be regarded as decryption keys. Various potential attack experiments are implemented to check the validity of the proposed cryptographic system.
Similar content being viewed by others
Introduction
With the rapidly development of multimedia application, the issue of security in transmission and storage of the confidential image has becoming more and more importance. Optical technologies have become increasingly attractive and extensively developed on information securing since the double random phase encoding (DRPE) was first reported by Refregier and Javidi first proposed in 19951,2,3,4,5,6,7,8,9,10,11,12,13. One of the motivations is that the characteristics of fast computing and parallelism of optics are significant in real-time applications. Besides, the various complex degrees of freedom offered by optics makes it possible to encode/decode data in secure way. In recent years, many optical image cryptosystem based on different optics information means, such as optical transform2, holography3, diffraction4,5, polarization6 and ptychography7 have been reported. In order to deal with the problem caused by distribution and management of secret keys, some asymmetric optical information cryptosystems have been proposed by using phase truncation9,10, Yang-Gu algorithm11 and equal modulus decomposition12,13. In addition, an information authentication system has been reported by using interference between two beams in gyrator domains14. In the ref. 14, the performance of the system in resisting some potential attacks has verified the robustness of the proposed algorithm. Recently, combing Fresnel diffraction and a phase modulation in FrFT domain, an novel optical encryption system for color image is presented15. However, in most of the optical cryptosystems mentioned above, including symmetric and asymmetric scheme, the beams are modulated by a single optics information mean in one beam path, one optical transform, for instance. To our best knowledge, the cryptosystem based on dual optics paths has not been reported yet.
In this paper, combing tilt Fresnel diffraction and a phase modulation in eFrFT domain, we present a security-enhanced encryption technique for optical image. The beam is split by a beam splitter into two optics paths after the secret image is encoded by spatial light modulator (SLM). A part of data from the secret image is encoded by an expanded fractional Fourier transform. The other part of the image is modulated by the non-spherical. Finally, two beam paths convergence at the output plane of the cryptosystem. The random data of the two channels is combined for forming the encrypted image. To verify the validity and capability of the proposed encryption technique, a series of experimental results are given in the following step.
The Cryptographic System
Our scheme begins with the concept of double optics paths encryption by using a beam splitter. In first path, the secret image is encoded in extended fractional Fourier transform16. The other path, the optical process can be expressed by employing phase modulation and tilt Fresnel diffraction alternately. With the help of the interference by a wave generated from one random mask, the secret signal propagated across the extended fractional Fourier transform lens is recorded and encrypted simultaneously. To simplify the expression, we use one-dimensional representation in the following explanation. Here, we suppose the random phase function is φ(x) and it distributed uniformly in the interval [0,2π]. Referring to16,17, the extended fractional Fourier transform can be expressed as follows:
where f(x) and F(u) represent the input and output function of the transform, respectively. The symbols a, b and φ are three parameters of extended fractional Fourier transform, while K is a complex constant. These parameters can be expressed by the physical parameter of the optical setup: wave length λ, focal length f of the lens and the propagate length before and after the lens l1 and l2. The mathematical definition can be described as follows:
For the other beam path, the half secret image is irradiated by a uniform beam and propagated with distance d1 into a random phase mask \({\varphi }_{2}(x,y)\). Thus, the left side light filed of the mask can be expressed as
where F denotes the operation of Fresnel diffraction and the parameter λ is the wavelength as mentioned above. Thereafter, with the help of a non-spherical mirror, the beam continues propagate with distance d2 and the finally tilted achive the CCD.
where dp represents the phase delay of tilt Fresnel diffraction. The symbols α and θ are the angle parameter in tilt diffraction as shown in Fig. 1.
The corresponding electro-optical setup for the proposed cryptosystem is depicted in Fig. 2. By using the spatial light modulator (SLM) controlled by a PC, the secret image is modulated by a uniform beam. As we can see from Fig. 2, the beam propagates into two paths S1 and S2 and finally the beams reaches the output plane and recorded by CCD. The secret data is encoded by two optical paths and storage in different part of the plane, respectively. In the output plane of the cryptosystem, the off-line holography technique is implemented for recording the phase data. In the decryption approaches, the encrypted image can be retrieved by the inverse optical system composed by inverse extended fractional Fourier transform and inverse tilt Fresnel diffraction, while the phase mask is set in the light path. For the correct decryption, the conjugate phase make placed in the light path need to be exchanged due to the reverse calculation.
To avoid the cross-talk effect, the eFrFT and Fresnel diffraction are divided into different optical structures. As shown in Fig. 3, two sub-images are selected with a pupil by turning on and off to enter two encryption optical units. This sub-image hiding scheme is to make a multifarious optical encryption, since some encryption approaches were designed by single transform or several transforms in serial state.
Numerical Simulations
In this section, the numerical simulations are given to verify the validity and security of the proposed cryptosystem. One grayscale image taken from Paris Eiffel Tower, which has a size of 256 × 256 pixels, is chosen to as the secret image. In the experiment, the wavelength of the beam is fixed in 632.3 nm. Besides, the focal length of the lens is set as 12 cm. By employing the parameters mentioned above, the secret image is encrypted by the proposed cryptosystem effectively and the image before and after encryption are illustrated in Fig. 4(a,b), respectively. Figure 4(c) shows the fail decrypted result using the fake keys. In calculation, the top part and the bottom part decryption approaches are performed by using fake propagation length and propagation wavelength, respectively. As shown in Fig. 4(c), the decryption result is almost a noise image and the secret information cannot be recognized by human eyes. By using the inverse optical system, the original image can be retrieved with all the correct parameters and the retrieved pattern is depicted in Fig. 4(d).
For the robustness and security analysis, some numerical simulation of occlusion attack18 and known-plaintext attack19 are performed. Before the security analysis, the peak-signal-to-noise ratio (PSNR) is presented firstly to estimate the similarity between the plaintext and ciphertext of the proposed cryptosystem. The equation interpretation of PSNR can be written as follows
where the symbol I0 and Id denote the secret image and decrypted data. The parameters M and N are the sizes of the function. In this experiment, the PSNR value between the original image and encrypted (correct decrypted) image are 5.9375 and 253.9735. Note that the value of PSNR large than 50 indicates that the difference between the two images is unrecognizable.
The correct decryption approach is employed with the partly occluded original image, which is depicted in Fig. 5(a). Here we emphasize that the occluded pixels of the data are filled with the number 0 in simulation and the corresponding result is displayed in Fig. 5(b). A worse situation is considered as larger part occluded attack, the occluded image and the corresponding attack result are given in Fig. 5(c,b), respectively. As shown in Fig. 5(c,d), the outline information of the original input image can be recognized in vision. Apparently, the decrypted data depicted in Fig. 5(b) has higher quality than the other one due to the smaller occluded area.
The known-plaintext attack is also tested by using the phase retrieval algorithm in extend fractional Fourier transform domain. To simplify the calculation, we chose two secret images having 128 × 128 pixels in the attack experiment and the two images are encrypted by the algorithm proposed in this paper, respectively. The secret images and the corresponding encrypted data are shown in Fig. 6(a–d). In simulation, we suppose that the illegal user usurp the first secret image and its encrypted data. Subsequently, the encrypted data of the second image shown in Fig. 6(d) is attacked by the illegal user by using the known-plaintext attack. In the known plaintext attack experiment, the phase retrieval algorithm is implemented for 1000 iterations. Finally, the attack result is displayed in Fig. 6(e), which the detail information of the second secret image cannot be identified entirely and the attack result is almost a random pattern. Obviously, the known plaintext attack is invalid to our proposed encryption scheme.
Conclusions
In conclusion, a cryptographic system composed by two independent beam paths is proposed. In this encryption scheme, half of the secret data is encoded by a phase modulation in extend fractional Fourier transform and the other half data is modulated by using tilt Fresnel diffraction. The physical structure parameters of the optical system and the phase delay in tilt Fresnel diffraction can be regarded as the keys of the proposed cryptosystem. Some numerical experiments have been performed to demonstrate the validity and robustness of the presented cryptosystem.
Change history
27 February 2020
An amendment to this paper has been published and can be accessed via a link at the top of the paper.
References
Refregier, P. & Javidi, B. Optical image encryption based on input plane and Fourier plane random encoding. Opt Lett 20, 767–769 (1995).
Chen, W., Chen, X. & Sheppard, C. J. R. Optical image encryption based on diffractive imaging. Opt Lett 35, 3817–3819 (2010).
Kishk, S. & Javidi, B. Watermarking of three-dimensional objects by digital holography. Opt Lett 28, 167–169 (2003).
Situ, G. & Zhang, J. Double random-phase encoding in the Fresnel domain. Opt Lett 29, 1584–1586 (2004).
Liu, Z., Chen, H., Blondel, W., Shen, Z. & Liu, S. Image security based on iterative random phase encoding in expanded fractional Fourier transform domains. Opt Lasers Eng 105, 1–5 (2018).
Alfalou, A. & Brosseau, C. Dual encryption scheme of images using polarized light. Opt Lett 35, 2185–2187 (2010).
Shi, Y. et al. Optical image encryption via ptychography. Opt Lett 38, 1425–1427 (2013).
Qin, Y., Wang, Z., Pan, Q. & Gong, Q. Optical color-image encryption in the diffractive-imaging scheme. Opt Lasers Eng 77, 191–202 (2016).
Qin, W. & Peng, X. Asymmetric cryptosystem based on phase-truncated Fourier transforms. Opt Lett 35(2), 118–120 (2010).
Rajput, S. K. & Nishchal, N. K. Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform. App Opt 52, 871–878 (2013).
Liu, W., Liu, Z. & Liu, S. Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang-Gu algorithm. Opt Lett 38, 1651–1653 (2013).
Liansheng, S., Meiting, X. & Ailing, T. Multiple-image encryption based on phase mask multiplexing in fractional Fourier transform domain. Opt Lett 38, 1996–1998 (2013).
Chen, H., Tanougast, C., Liu, Z. & Sieler, L. Asymmetric optical cryptosystem for color image based on equal modulus decomposition in gyrator transform domains. Opt Lasers Eng 93, 1–8 (2017).
Abuturab, M. R. Information authentication system using interference of two beams in gyrator transform domain. Appl Opt 52, 5133–5142 (2013).
Chen, H., Liu, Z., Chen, Q. & Blondel, W. Color image cryptosystem using Fresnel diffraction and phase modulation in an expanded fractional Fourier transform domain. Laser Phys 28, 055402 (2018).
Hua, J., Liu, L. & Li, G. Extended fractional Fourier transforms. JOSA A 14, 3316–3322 (1997).
Wang, X., Zhao, D. & Chen, L. Image encryption based on extended fractional Fourier transform and digital holography technique. Opt Commun 260, 449–453 (2006).
Chen, H., Du, X., Liu, Z. & Yang, C. Color image encryption based on the affine transform and gyrator transform. Opt Lasers Eng 51, 768–775 (2013).
Peng, X. et al. Known-plaintext attack on optical encryption based on double random phase keys. Opt Lett 31, 1044–1046 (2006).
Acknowledgements
This work was supported by the National Natural Science Foundation of China (grant no. 61575053), SpectroLive Project form CNRS foundation and the Program for New Century Excellent Talents in University (NCET-12-0148). The authors appreciate for the useful discussions from Dr. Pierre Varis. The authors are indebted for the editor and two anonymous reviewers for their useful comments and suggestions.
Author information
Authors and Affiliations
Contributions
H.C. and Z.L. conceived the method. H.C. and C.T. conducted the experiment. H.C. and W.B. arranged the data and prepared the manuscript. All authors reviewed the manuscript.
Corresponding authors
Ethics declarations
Competing interests
Prof. Liu and Dr Chen’s work has been funded by National Natural Science Foundation of China. Prof. Camel Tanougast and Prof. Walter Blondel declare no potential conflict of interest.
Additional information
Publisher’s note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Chen, H., Liu, Z., Tanougast, C. et al. Dual paths cryptosystem based on tilt Fresnel diffraction using non-spherical mirror and phase modulation in expanded fractional Fourier transform domain. Sci Rep 9, 15071 (2019). https://doi.org/10.1038/s41598-019-50263-4
Received:
Accepted:
Published:
DOI: https://doi.org/10.1038/s41598-019-50263-4
This article is cited by
-
Optical single-channel security system using 3D-logistic map biometric keys for multiple color images
Optical and Quantum Electronics (2023)
Comments
By submitting a comment you agree to abide by our Terms and Community Guidelines. If you find something abusive or that does not comply with our terms or guidelines please flag it as inappropriate.