Abstract
This work reports an optical double-image crosstalk free encryption scheme that employs equal modulus decomposition and random masks. For the encryption, two plaintexts by a random amplitude mask and a random phase mask have been encrypted into a single ciphertext mask and two private key masks. Owing to the two random masks introduced, the functional relation between the plaintext pair and the ciphertext indirectly cause the paucity of constraints employed for the specific attack. Unlike the traditional phase-truncation-based techniques, this scheme is immune to the information leakage and different types of attacks. Furthermore, the three different diffraction distances and the illuminating wavelength also function as four additional keys to significantly reinforce the security. Simulation results demonstrate the feasibility and validity of the proposal.
Similar content being viewed by others
Introduction
Recently, optical techniques1,2,3,4,5,6,7,8,9,10,11 in image encryption have been intensely studied, owing to their inherent superiority with respect to multiple parameters and parallel processing. The pioneering work of optical image encryption is on double-random phase encoding (DRPE)12, which is done on the Fourier transform domain. Several works that followed have reported the expansion of initial DRPE work into different transform domains13,14,15,16,17, comprising the domains such as fractional Fourier transform (FrFT), Fresnel transform (FrT), and fractional random transform. During the period, other optical encryption works18,19,20,21,22,23,24,25,26,27,28,29,30 that employ compressive sensing, optical interference, iterative phase retrieval, digital holography, photon counting, and polarized light, have also emerged to improve the image security in succession.
However, owing to intrinsic linearity, DRPE-based structures cannot withstand several types of attacks31,32,33,34. Various nonlinear encryption methods have been proposed to overcome these weaknesses, and the best illustrative work is on phase-truncated Fourier transform by Qin and Peng35. Subsequently, there are several works based on phase truncation (PT) in FrT and FrFT domains36,37,38,39. Wang et al.40 showed that there is an information leakage in the work35 if one of two private keys are utilized, and hence, proposed a solution. They also pointed out the works36,37,38,39 being susceptible to information-leakage issue. Chen et al.41 developed a multi-image encryption scheme through feature fusion, compressed sensing, and PT. Yi and Tan42 presented a binary-tree multiple image encryption scheme. Su et al.43 proposed an optical encryption strategy for multiple color images through a complete trinary tree structure. Besides, the specific attack (SA)44, which employs an amplitude-phase-retrieval method, indicates that it can break the traditional PT-based technique35. Unfortunately, these techniques41,42,43 cannot be also an alternative to SA44. Additionally, the work45 has utilized the coherent superposition and equal modulus decomposition (EMD) to fully address the silhouette problem. However, there is the same modulus (i.e. same amplitude information) of two masks in EMD. The complex-valued masks cannot directly display in optical system. Chen et al.46 presented an optical image cryptosystem via two-beam coherent superposition and unequal amplitude decomposition for security improvement. However, unequal amplitude decomposition requires an additional random phase distribution than EMD. Thus, constantly improving the security of encryption scheme based on PT, despite the progress in the field, is still inevitable.
This study presents a double-image crosstalk free encryption scheme. The scheme, which works by utilizing the equal modulus decomposition and random masks, generates a single ciphertext mask and two private key masks. The random masks have been introduced to bring the indirect mathematical relation between the plaintext pair and the ciphertext, where an illegal user has insufficient constraints utilized for SA. Compared with certain PT-based works35,36,37,38,39, the proposal eliminates information leakage. When compared with other existing PT-based work41,42,43, the proposal is still effective against SA. The additional keys, which comprise the three different diffraction distances and the illuminating wavelength, can strengthen the security. Simulation results and performance analysis demonstrate the reliability and validity of the proposal.
Principle of the method
The diagram of the proposed double-image cryptosystem is depicted as Fig. 1. The random amplitude mask (RAM) and a random phase mask (RPM) have been described with respect to the encryption (Fig. 1a) and decryption (Fig. 1b). The encryption keys have been generated from the random masks RAM and RPM by applying EMD in the Fresnel domain. Figure 2 shows the optical relationship between RAM, \(S_{1}\), and \(S_{2}\). In this setup, a collimated plane wave with the wavelength λ, perpendicularly illuminates RAM and the image which is subsequently Fresnel transformed with the diffraction distance d1. The first spatial light modulator (SLM1) were employed for amplitude modulation. SLM2 and SLM3 were utilized for phase modulation.
In the proposed double-image encryption process, \(R_{1} (x,y)\) and \(R_{2} \left( {u,v} \right)\) are the random functions, whose values fall in the interval [0, 1]. The following encryption steps have been depicted.
First, the RAM denoted as \(R_{1} \left( {x,y} \right)\) was Fresnel transformed given by Eq. (1).
where \(FrT_{{(d_{1} ,\lambda )}} \left[ \cdot \right]\) is the FrT operator, and d1 and λ are the diffraction distance and the wavelength, respectively. The amplitude part and the phase part of S are represented as \(A{ = }\left| S \right|\) and \(\varphi = \arg \left[ S \right]\), respectively, and “\(\left| \cdot \right|\)” and “\(\arg \left[ \cdot \right]\)” are the modulus and argument operators, respectively.
Subsequently, the complex-valued function S was separated into two masks, viz, S1 and S2, with equal moduli, as illustrated in Fig. 3. Owing to the random phase distribution RPM (denoted as, \(\theta (u,v)\)) introduced, and the geometrical relationship, \(S_{1}\) and \(S_{2}\) can be deduced as
The phase parts of \(S_{1}\) and \(S_{2}\) serve as the encryption keys.
Next, a new complex-value function \(f(x,y)\) was constructed by the two original images, viz., (\(I_{1} (x,y)\) and \(I_{2} (x,y)\)), and RAM, as follows
where \(k_{i} (i = 1,2,3)\) are the constants.
Then, by employing the encryption keys obtained in the above-mentioned step, the function \(f(x,y)\) was encrypted based on PT in the Fresnel domain. Thus, the ciphertext \(E\) can be expressed as
where d2 and d3 are the diffraction distances. Meanwhile, two decryption keys, viz., \(DK_{1}\) and \(DK_{2}\), generated are given by
where “\({\text{conj}}\left\{ \cdot \right\}\)” is the complex conjugate operator, \(PR\left[ \cdot \right]\) the phase reservation operator.
For the decryption, the retrieved function \(f{\prime} (x,y)\) by the authorized users can be derived as,
After obtaining the \(f{\prime} (x,y)\), two retrieved images, \(I_{1}{\prime} \left( {x,y} \right)\) and \(I_{2}{\prime} \left( {x,y} \right)\), are mathematically represented as,
Figure 4 illustrates the optical schematic apparatus for decryption. A light beam carrying the information of ciphertext E was modulated by SLM1. SLM1 and SLM2 are being employed for phase modulation. CCD captures the intensity part of \(f{\prime} (x,y)\). The phase part of \(f{\prime} (x,y)\) is digitally acquired. Then two decrypted images, viz.,\(I_{1}{\prime} \left( {x,y} \right)\) and \(I_{2}{\prime} \left( {x,y} \right)\), are digitally acquired with the function \(f{\prime} \left( {x,y} \right)\).
Numerical results and performance analysis
To demonstrate the validity and the advantages of the proposal, numerical simulations have been implemented. In those simulations, the illumination wavelength λ is 633 nm, and the three axial distances, viz., d1, d2, and d3, are 60, 50, and 70 mm, respectively, and the parameters k1, k2, and k3 are set as 0.6, 0.5, and 1.5, respectively. Furthermore, the correlation coefficient (CC) was utilized to objectively assess the similarity between the plaintext \(I_{k} (x,y)\) (k = 1, 2) and its corresponding decrypted image \(I_{k}{\prime} (x,y)\) as
For convenience of the analysis, the CC values were directly labelled in the recovered images.
Figure 5a, b show two original images having 512 × 512 pixels, which are employed as the two plaintexts. The two random masks, RAM and RPM, are shown in Fig. 5c, d. By employing RAM, RPM, and EMD, the encryption keys (Fig. 5e, f) are acquired. The ciphertext and decrypted keys, after conducting the proposed encryption process, are displayed in Fig. 5g–i, respectively. Finally, the decrypted images acquired by using all the correct keys are shown in Fig. 5j, k. These results signify that each decrypted image and its corresponding plaintext are completely equal, or the influence of crosstalk noise is non-existent. Thus, the proposal is feasible and effective, and can retrieve the high-quality images without the crosstalk noise.
To evaluate the information-leakage-free of the proposal, Fig. 6a–f show the decrypted images with releasing of E, DK1, and DK2. Figure 7a–f illustrate the decrypted images when two of these masks are utilized. According to Figs. 6 and 7, each of all the decrypted images has the noise-like distribution, where no useful information of the two plaintexts appears. We illustrated that the information-leakage issue has been thoroughly settled in the proposal.
We have further validated the sensitivity of the proposal for the additional keys, i.e., the three diffraction distances d1, d2, and d3, and the illuminating wavelength λ. Figures 8, 9, 10 and 11 illustrate the sensitive results of those keys, where the deviation ranges of those keys are [− 50 50]. These results invariably reveal that the CC values are one, only when the deviation is equal to zero. And for other values of the deviation, the CC values are below or equal to 0.0863. Moreover, when the deviations are − 1 and 1, all the decrypted images have no useful content of the two plaintexts. Therefore, the proposal has four sensitive additional keys, which can further reinforce the security of the proposal.
To further demonstrate the robustness of the proposal against noise and occlusion attacks, Fig. 12 illustrates the decrypted results when the ciphertext is contaminated by the zero-mean white additive Gaussian noise with \(\sigma = 0.2\) and \(\sigma = 0.3\). Figure 13 represents the decrypted results acquired from the ciphertexts with 3% and 5% occlusion. According to Figs. 12 and 13, the quality of the decrypted images steadily worsens with the increase of the noise or occlusion strength. Although the content of those images becomes blurred for \(\sigma = 0.3\) noise or 5% occlusion, the main-structure information can be still distinguished. Hence, it is verified for these results that the proposal has the resistance to noise and occlusion attacks.
Furthermore, we have proved the validity of the proposal against known-plaintext attack (KPA). The decryption keys of our scheme varies with the different plaintext pair. In the KPA simulation, Fig. 5a, b, g serve as a known plaintext pair and their corresponding ciphertext. Using the proposal, RAM (Fig. 5c) and RPM (Fig. 5d) encrypt the plaintext pair in Fig. 5a, b, and the private keys in Fig. 5h, i are generated. Figure 14a, b demonstrate the other plaintext pair. Figure 14c illustrates the ciphertext of Fig. 14a, b, which were produced by the proposal, RAM′ and RPM′. RAM and RPM are different from RAM′ and RPM′, respectively. When all the correct parameters, viz., RAM (Fig. 5c), RPM (Fig. 5d), and the private keys (Fig. 5h, i) are used, the two retrieved results of Fig. 14c are shown in Fig. 14d, e. For better explaining the security of this scheme, we have retrieved Fig. 14c in the other two cases in which we suppose that the attacker has known one out of RAM′ and RPM′. Figure 14f, g demonstrate the results of Fig. 14c with RPM′, \(DK_{1}^{{{\text{RPM}}^{\prime}}}\), \(DK_{2}^{{\text{RPM}}\prime }\), and for the other abovementioned conditions. Figure 14h, i illustrate the results of Fig. 14c using RAM′, \(DK_{1}^{{\text{RAM}}\prime }\), \(DK_{2}^{{\text{RAM}}\prime }\), and the other conditions mentioned above. The information of Fig. 14a, b cannot be deciphered from Fig. 14d–i. Hence, the proposal is immune to KPA.
Finally, we have also demonstrated that the proposal can resist SA44. SA is a single iteration process, which stem from the modified amplitude-phase retrieval algorithm. The results of SA with two unknown masks, viz., RAM and RPM, are illustrated in Fig. 15a–c. Moreover, the results of SA, when the knowledge of one of RAM and RPM is lacking, are illustrated in Fig. 15d–i. Figure 16 shows the results of SA using Qin and Peng’s scheme35. It is shown in Fig. 15a, d, g, that the six curves are unstable and non-convergent. According to Fig. 15b, c, e, f, h, i, no information can be deciphered of the two plaintexts (Fig. 15a, b). Therefore, we have shown that the proposal can effectively resist SA.
Concluding remarks
An optical phase-truncation-based double-image encryption was developed using the equal modulus decomposition and random masks. The proposal utilizes RAM and RPM to generate a single ciphertext and two private keys. This scheme is novel, and acquires the decrypted images immune to the crosstalk noise. Particularly, the random masks cause insufficient constraints to be utilized for SA. Our proposal, when compared with the reported techniques via PT, has no problem of information leakage, and can efficiently resist different types of attacks. Furthermore, the four parameters serve as additional keys for enhancing the security. Numerical simulation results validate the advantages of the proposal.
Data availability
Data are available from the corresponding author upon reasonable request.
References
Alfalou, A. & Brosseau, C. Optical image compression and encryption methods. Adv. Opt. Photonics 1(3), 589–636 (2009).
Chen, W., Javidi, B. & Chen, X. D. Advances in optical security systems. Adv. Opt. Photonics 6(2), 120–155 (2014).
Javidi, B. et al. Roadmap on optical security. J. Opt. 18(8), 083001 (2016).
Shikder, A. & Nishchal, N. K. Image encryption using binary polarization states of light beam. Sci. Rep. 13, 14028 (2023).
Abuturab, M. R. Multiple color image cryptosystem based on coupled-logistic-map-biometric keys, QR decomposition with column pivoting and optical Fresnel transform. Opt. Laser Technol. 161, 109109 (2023).
Wang, X. G., Chen, W. & Chen, X. D. Optical encryption and authentication based on phase retrieval and sparsity constraints. IEEE Photonics J. 7(2), 7800310 (2015).
Sui, L. S., Zhang, L. W., Wang, Q., Tian, A. L. & Anand, A. Multiple-image authentication based on the single-pixel correlated imaging and multiple-level wavelet transform. Opt. Lasers Eng. 130, 106102 (2020).
Wei, H. Y. & Wang, X. G. Optical multiple-image authentication and encryption based on phase retrieval and interference with sparsity constraints. Opt. Laser Technol. 142, 107257 (2021).
Sui, L. S., Zhao, X. Y., Huang, C. T., Tian, A. L. & Anand, A. An optical multiple-image authentication based on transport of intensity equation. Opt. Lasers Eng. 116, 116–124 (2019).
Qin, Y., Jiang, H. L. & Gong, Q. Interference-based multiple-image encryption by phase-only mask multiplexing with high quality retrieved images. Opt. Lasers Eng. 62, 95–102 (2014).
Luan, G. Y., Li, A. C., Zhang, D. M. & Wang, D. X. Asymmetric image encryption and authentication based on equal modulus decomposition in the Fresnel transform domain. IEEE Photonics J. 11(1), 6900207 (2019).
Refregier, P. & Javidi, B. Optical image encryption based on input plane and Fourier plane random encoding. Opt. Lett. 20(7), 767–769 (1995).
Li, Y. B., Zhang, F., Li, Y. C. & Tao, R. Asymmetric multiple-image encryption based on the cascaded fractional Fourier transform. Opt. Lasers Eng. 72, 18–25 (2015).
Sui, L. S., Duan, K. K., Liang, J. L. & Hei, X. H. Asymmetric double-image encryption based on cascaded discrete fractional random transform and logistic maps. Opt. Express 22(9), 10605–10621 (2014).
Chen, J. X. et al. A novel double-image encryption scheme based on cross-image pixel scrambling in gyrator domains. Opt. Express 22(6), 7349–7361 (2014).
Wang, X. G., Chen, W. & Chen, X. D. Fractional Fourier domain optical image hiding using phase retrieval algorithm based on iterative nonlinear double random phase encoding. Opt. Express 22(19), 22981–22995 (2014).
Xu, H. F., Xu, W. H., Wang, S. H. & Wu, S. F. Asymmetric optical cryptosystem based on modulus decomposition in Fresnel domain. Opt. Commun. 402, 302–310 (2017).
Zhang, Y. & Wang, B. Optical image encryption based on interference. Opt. Lett. 33(21), 2443–2445 (2008).
Perez-Cabre, E., Cho, M. J. & Javidi, B. Information authentication using photon-counting double-random-phase encrypted images. Opt. Lett. 36(1), 22–24 (2011).
Maluenda, D., Carnicer, A., Martinez-Herrero, R., Juvells, I. & Javidi, B. Optical encryption using photon-counting polarimetric imaging. Opt. Express 23(2), 655–666 (2015).
Chen, L. F., Chang, G. J., He, B. Y., Mao, H. D. & Zhao, D. M. Optical image conversion and encryption by diffraction, phase retrieval algorithm and incoherent superposition. Opt. Lasers Eng. 88, 221–232 (2017).
Li, X. W., Xiao, D. & Wang, Q. H. Error-free holographic frames encryption with CA pixel-permutation encoding algorithm. Opt. Lasers Eng. 100, 200–207 (2018).
Carnicer, A., Hassanfiroozi, A., Latorre-Carmona, P., Huang, Y. P. & Javidi, B. Security authentication using phase-encoded nanoparticle structures and polarized light. Opt. Lett. 40(2), 135–138 (2015).
Rawat, N., Hwang, I. C., Shi, Y. & Lee, B. G. Optical image encryption via photon-counting imaging and compressive sensing based ptychography. J. Opt. 17(6), 065704 (2015).
Fatima, A. & Nishchal, N. K. Optical image security using Stokes polarimetry of spatially variant polarized beam. Opt. Commun. 417, 30–36 (2018).
Wang, Y., Quan, C. & Tay, C. J. Asymmetric optical image encryption based on an improved amplitude-phase retrieval algorithm. Opt. Lasers Eng. 78, 8–16 (2016).
Moon, I., Yi, F., Han, M. & Lee, J. Efficient asymmetric image authentication schemes based on photon counting-double random phase encoding and RSA algorithms. Appl. Opt. 55(16), 4328–4335 (2016).
Chen, Y., Liu, Q., Wang, J. & Wang, Q. H. Single-channel optical encryption of color image using chessboard grating and diffraction imaging scheme. Opt. Eng. 56(12), 123106 (2017).
Su, Y. G. et al. Cascaded Fresnel holographic image encryption scheme based on a constrained optimization algorithm and Henon map. Opt. Lasers Eng. 88, 20–27 (2017).
Qin, Y., Wang, Z. P., Wang, H. J., Gong, Q. & Zhou, N. R. Robust information encryption diffractive-imaging-based scheme with special phase retrieval algorithm for a customized data container. Opt. Lasers Eng. 105, 118–124 (2018).
Gopinathan, U., Monaghan, D. S., Naughton, T. J. & Sheridan, J. T. A known-plaintext heuristic attack on the Fourier plane encryption algorithm. Opt. Express 14(8), 3181–3186 (2006).
Peng, X., Zhang, P., Wei, H. Z. & Yu, B. Known-plaintext attack on optical encryption based on double random phase keys. Opt. Lett. 31(8), 1044–1046 (2006).
Tashima, H. et al. Known plaintext attack on double random phase encoding using fingerprint as key and a method for avoiding the attack. Opt. Express 18(13), 13772–13781 (2010).
Zhang, Y. S., Xiao, D., Wen, W. Y. & Liu, H. Vulnerability to chosen-plaintext attack of a general optical encryption model with the architecture of scrambling-then-double random phase encoding. Opt. Lett. 38(21), 4506–4509 (2013).
Qin, W. & Peng, X. Asymmetric cryptosystem based on phase-truncated Fourier transforms. Opt. Lett. 35(2), 118–120 (2010).
Chen, W. & Chen, X. D. Optical color image encryption based on an asymmetric cryptosystem in the Fresnel domain. Opt. Commun. 284(16–17), 3913–3917 (2011).
Rajput, S. K. & Nishchal, N. K. Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask. Appl. Opt. 51(22), 5377–5386 (2012).
Rajput, S. K. & Nishchal, N. K. Image encryption based on interference that uses fractional Fourier domain asymmetric keys. Appl. Opt. 51(10), 1446–1452 (2012).
Mehra, I., Rajput, S. K. & Nishchal, N. K. Collision in Fresnel domain asymmetric cryptosystem using phase truncation and authentication verification. Opt. Eng. 52(2), 028202 (2013).
Wang, X. G., Zhao, D. M. & Chen, Y. X. Double-image encryption without information disclosure using phase-truncation Fourier transforms and a random amplitude mask. Appl. Opt. 53(23), 5100–5108 (2014).
Chen, X. D., Liu, Q., Wang, J. & Wang, Q. H. Asymmetric encryption of multi-image based on compressed sensing and feature fusion with high quality image reconstruction. Opt. Laser Technol. 107, 302–312 (2018).
Yi, J. W. & Tan, G. Z. Binary-tree encryption strategy for optical multiple-image encryption. Appl. Opt. 55(20), 5280–5291 (2016).
Su, Y. G. et al. Optical encryption scheme for multiple color images using complete trinary tree structure. Opt. Lasers Eng. 98, 46–55 (2017).
Wang, X. G., Chen, Y. X., Dai, C. Q. & Zhao, D. M. Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform. Appl. Opt. 53(2), 208–213 (2014).
Cai, J., Shen, X., Lei, M., Lin, C. & Dou, S. Asymmetric optical cryptosystem based on coherent superposition and equal modulus decomposition. Opt. Lett. 40(4), 475–478 (2015).
Chen, L. F. et al. A new optical image cryptosystem based on two-beam coherent superposition and unequal modulus decomposition. Opt. Laser Technol. 78, 167–174 (2016).
Acknowledgements
This study is supported by Science and Technology Planning Project of Daqing City of China (zd-2023-60), China Scholarship Council (202208230113), Basic Cultivation Project of Heilongjiang Bayi Agricultural University (ZRCPY202315), and Education Department Foundation of Heilongjiang Province of China (12541584).
Author information
Authors and Affiliations
Contributions
G.L. conceived idea, performed programming and numerical analysis, and wrote manuscript. C.Q. reviewed the manuscript.
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing interests.
Additional information
Publisher's note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Luan, G., Quan, C. Optical phase-truncation-based double-image encryption using equal modulus decomposition and random masks. Sci Rep 14, 7155 (2024). https://doi.org/10.1038/s41598-024-57790-9
Received:
Accepted:
Published:
DOI: https://doi.org/10.1038/s41598-024-57790-9
Comments
By submitting a comment you agree to abide by our Terms and Community Guidelines. If you find something abusive or that does not comply with our terms or guidelines please flag it as inappropriate.