Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Asymmetric multiple image encryption using a wavelet transform and gyrator transform

Open Access Open Access

Abstract

A new asymmetric multiple information security system based on a wavelet transform and gyrator transform is proposed. In the proposed method, a set of four color images are allocated to each user. Each color image is a single-level 2-D discrete wavelet transformed to decompose into LL, HL, LH, and HH sub-bands. The LL sub-bands of four images are fused to obtain a single fused image as an input image, which is segregated into R, G, and B channels. Each channel is compressed by compressive sensing with measurement matrices and modulated by a measurement-matrices-based random phase mask. In similar fashion, n sets of modulated R, G, and B channels are individually multiplexed and then gyrator transformed. The phase of each encrypted channel is embedded into the corresponding channel of the host image to obtain a watermarked channel and its amplitude is used as a common decryption key. Each set has individual decryption keys and chaotic parameters as extremely sensitive decryption keys to ensure the nonlinearity of the system. Thus, it resists potential attacks. The proposed scheme significantly reduces the data volume to be processed, transmitted, and stored, and simplifies the keys to be distributed simultaneously. The retrieved images are devoid of cross-talk noise effects. A simple optoelectronic system can be employed to realize the proposed scheme. Numerical simulation results prove the feasibility of the strategy.

© 2018 Optical Society of America under the terms of the OSA Open Access Publishing Agreement

1. Introduction

With more and more threats to information communication systems, optical information security has attracted widespread interest due to their inherent properties of high-speed and multidimensional signal processing capabilities [1,2]. Since Réfrégier and Javidi proposed double random phase encoding (DRPE) [3], various methods for optical image encryption based on DRPE using different generalizations of the Fourier transform have been developed [4–13]. However, because of the inherent linearity property, DRPE-based encryption schemes are vulnerable to different types of attacks [14]. In order to remove the linearity, an asymmetric cryptosystem based on phase-truncated Fourier transforms has been proposed [15]. But it has been found susceptible to the specific attack based on an iterative amplitude-phase retrieval algorithm [16]. Several asymmetric encryption methods have been proposed to resist specific attack [17–19].

In recent years, multiple-image encryption (MIE) techniques particularly draw more and more attention due to its high application value in multiuser authentication, content distribution, enhancing the encryption capacity and the efficiency of secret information transmission. Many variations of MIE have been developed mainly to suppress the cross-talk noise effect and improve the data security [20–31].

Watermarking technique is an effective data security technique that protects the data by means of a watermark embedded within it for copyright protection purpose. Generally, the encryption and watermarking techniques are applied separately. If the watermark is encrypted prior to embedding into the host image, an unauthorized user cannot restitute the original watermark without using correct keys. Consequently, the joint encryption-watermarking technique can achieve a higher security level. A number of joint encryption-watermarking systems have been reported [32–37].

The newly introduced theory of compressive sensing (CS) [38] has attracted the interest of researchers. It is constructed on the inherent sparsity of images and can recover the compressed images with desirable quality from much fewer compressed data. Subsequently, various image encryption techniques based on compressive sensing have been studied [39–41].

Recently, an efficient double-image encryption system combining CS with the discrete fractional random transform (DFRT) has been designed. The measurement matrix in CS and the DFRT are constructed with the random circular matrix controlled by the 2D sine logistic modulation map. The images to be encrypted are represented in the discrete wavelet transform domain [42]. Further, a simultaneous image compression, fusion and encryption approach based on CS and chaos has been proposed to ensure the efficiency and security of image transmission [43]. A binary-tree encryption strategy has been put forwarded. In this approach, encryption units are regarded as nodes and plain images are input only into leaf nodes. This scheme is used to realize a secure authority management among the users sharing a cipher image [44]. Lately, a color image watermarking scheme based on CS in the gyrator transform domain has been presented. With the use of human visual characteristics, the significant blocks of the grayscale host image are chosen to formulate the appropriate reference image and the compressed color watermark is embedded into it to achieve camouflage property to some extent [45].

In this paper, for the first time to author’s knowledge, a new asymmetric multiple image security scheme using wavelet transform and gyrator transform is proposed. In this method, a set of four color images of each user are individually a single-level 2-D discrete wavelet transformed to split into their four sub-bands, corresponding LL sub-bands are fused to get a single fused image as an input image and then divided into R,G, and B channels. Each channel is compressed by compressive sensing with measurement matrices (which are constructed by exploiting the circulant matrices and controlling the original row vectors of the circulant matrices with logistic map) and modulated by random phase mask generated by using measurement matrices. The modulated R,G, and Bchannels of n sets are separately multiplexed and then gyrator transformed. The phase of encrypted R,G, and Bchannels are, respectively, embedded into R,G, and Bchannels of host image to get corresponding watermarked channels. The amplitudes of encrypted R,G, and Bchannels supply common decryption keys. The decrypted images are free from cross-talk noise effects. The security system can be implemented by using optoelectronic setup. Numerical simulation results show the validity and reliability of the proposed scheme.

Optical encryption systems evolved into multiple image encryption because, for the majority of data communications that take place today, several users must simultaneously share a common channel resource in a controlled and effective way. The usual multiplexed package is synthesized by superimposing individual encrypted images together. Digitally speaking, all the images are superimposed in one composite CCD frame, and each one of them can be independently reconstructed through a digital spatial filtering. Since no direct combination of the information of multiple hidden images is employed in the encryption process, each image can be perfectly retrieved without cross-talk caused by the existence of the other.

The proposed technique has three advantages compared with reported MIE systems. First, each set has initial value and bifurcation parameter as remarkably sensitive decryption keys as well as individual decryption key. Second, the security system has a common decryption key, which provides extra security layer. Third, the phase of encrypted image is embedded into host image to get watermarked image in order to achieve imperceptibility and robustness.

2. Theory

2.1 Compressive sensing

Compressive sensing (CS) is a mathematical paradigm which allows reconstructing the data from a substantially smaller number of measurements than those imposed by the Shannon–Nyquist theorem [38].

Suppose one-dimensional compressible signal (or image) fRN with Nsamples (or pixels) has a sparse representation under an arbitrary orthogonal basis matrix (or sparsifying operator) ΨRN×N.

Thatis,f=Ψθwithθ0=S<<N
where θ denotes the transform coefficient vector. It is an S-sparse representation of signal (or image) f projected on ΨT,meaning, that θ has only S nonzero entries while the remaining NS has zero entries.

The sensing (or measurement) vectorgRM can be written as

g=Φf=ΦΨθwithM<N
where ΦRM×Nis a measurement matrix (or optical sensing operator). If Φ satisfies the restricted isometry property (RIP) of order S with isometry constant δS(0,1),
Thatis,(1δS)f22Φf22(1+δS)f22
for all S-sparse signals f. Then original signal (or image) is reconstructed by solving l0 norm minimization problem [46]. The estimated coefficients vector θ^ is the solution of the non-convex optimization program:

θ^=argminθθ0subjecttog=ΦΨθ

In brief, a signal or image is transformed into its sparse form. The measurement matrix Φ is exploited to compress the data. The smoothed l0 norm (SL0) algorithm is adopted to recover the signal.

2.2 Logistic map

The one-dimensional (1D) non-linear chaos function is a logistic map and its iterative form is expressed as

xn+1=pxn(1xn)
wherepis called bifurcation parameter: 0<p<4. xn[0,1] and x0 are iterative and initial values.

The measurement matrix Φis constructed by circulant matrix [42]. First, the random sequence with length 2N is produced by logistic map with initial value x0. The preceding Nelements are discarded to get new sequence. Second, the new sequence is used as the first row vector of the circulant matrix Φ. The first row vector is circulated to construct its other row vectors as

Φ(i,1)=λΦ(i1,N)Φ(i,2:N)=Φ(i1,1:N1)
where 2iM and |λ|>1. In order to reduce the relevance among the column vectors, the first element of vector Φ(i,1) is set as λΦ(i1,N).

2.3 Gyrator transform

The gyrator transform (GT), at transformation angle α, of a two-dimensional functionfi(xi,yi) is given by [6]

fo(xo,yo)=Gα[fi(xi,yi)](xo,yo)=1|sinα|fi(xi,yi)exp(i2π(xoyo+xiyi)cosα(xiyo+xoyi)sinα)dxidyi
where Gα[] represents GT operator. (xi,yi) and (xo,yo) are the input and output coordinates, respectively. GT setup contains three generalized lenses with fixed distance z between them. Each generalized lens is an assembled set of two cylindrical lenses. The variation of the transformation parameter α is achieved by the rotation of the cylindrical lenses. The optical GT system does not require axial movements.

3. Proposed cryptosystem

The block diagram of proposed encryption method is shown in Fig. 1

 figure: Fig. 1

Fig. 1 Block diagram of proposed encryption system, part a.

Download Full Size | PDF

. It consists of following steps:

Step 1: A color image f(xi,yi) is a single-level 2-D discrete wavelet transformed to decompose into WLL,WHL,WLH,and WHH sub-bands where subscripts Land H represent low and high frequency parts, respectively.

[WLL,WHL,WLH,WHH]=DWT[f(xi,yi)]

Each set contains four color images. Let n(=1,2,,N) sets of four color images be fn1(xi,yi),fn2(xi,yi),fn3(xi,yi), andfn4(xi,yi). The corresponding sub-bands are represented as

[WLLn1,WHLn1,WLHn1,WHHn1]=DWT[fn1(xi,yi)]
[WLLn2,WHLn2,WLHn2,WHHn2]=DWT[fn2(xi,yi)]
[WLLn3,WHLn3,WLHn3,WHHn3]=DWT[fn3(xi,yi)]
[WLLn4,WHLn4,WLHn4,WHHn4]=DWT[fn4(xi,yi)]

Step 2: The n sets of four LLsub-bands WLLn1WLLn2WLLn3and WLLn4 are fused as

Fn(x,y)=[WLLn1,WLLn2;WLLn3WLLn4]

Step 3: The fused image is split into R,G, and B channels denoted as FRn(x,y), FGn(x,y) and FBn(x,y), respectively.

Step 4: The measurement matrices ΦRn,ΦGn, and ΦBn with size of (M/2)×Nare constructed with corresponding parameters (x0Rn,pRn,λ),(x0Gn,pGn,λ), and (x0Bn,pBn,λ) by using Eq. (6).

Step 5: FRn(x,y), FGn(x,y) and FBn(x,y) are, respectively, multiplied by ΦRn,ΦGn, and ΦBn, and then modulated by corresponding phase masks MRn(x,y)=exp[i2πΦRn(x,y)], MGn(x,y)=exp[i2πΦGn(x,y)], and MBn(x,y)=exp[i2πΦBn(x,y)].

CRn(x,y)=ΦRnFRn(x,y)MRn(x,y)CGn(x,y)=ΦGnFGn(x,y)MGn(x,y)CBn(x,y)=ΦBnFBn(x,y)MBn(x,y)}

Step 6: The n sets of compressed R,G, and B channels are separately combined together as

CR(x,y)=n=1NCRn(x,y)CG(x,y)=n=1NCGn(x,y)CB(x,y)=n=1NCBn(x,y)}

Step 7: The combined R,G, and B channels are, respectively, gyrator transformed at transformation angle αR, αG,and αB to obtain corresponding resultant images.

ER(xo,yo)=GαR[CR(x,y)]EG(xo,yo)=GαG[CG(x,y)]EB(xo,yo)=GαB[CB(x,y)]}

The phase and amplitude of the resultant images are given by

PR(xo,yo)=arg[ER(xo,yo)]PG(xo,yo)=arg[EG(xo,yo)]PB(xo,yo)=arg[EB(xo,yo)]}
AR(xo,yo)=|ER(xo,yo)|AG(xo,yo)=|EG(xo,yo)|AB(xo,yo)=|EB(xo,yo)|}
Equation (17) is used as the common asymmetric/decryption key.

Step 8: The host image H(xo,yo)of size 204×512×3 pixels is decomposed into R,G, and B channels denoted as HR(xo,yo), HG(xo,yo) and HB(xo,yo), respectively. PR(xo,yo), PG(xo,yo) and PB(xo,yo) (employed R,G, and B channels of watermark image) are embedded into corresponding HR(xo,yo), HG(xo,yo) and HB(xo,yo) to obtain watermarked image as

WR(xo,yo)=HR(xo,yo)+γ.[PR(xo,yo)]WG(xo,yo)=HG(xo,yo)+γ.[PG(xo,yo)]WB(xo,yo)=HB(xo,yo)+γ.[PB(xo,yo)]}
where γ is a real weight factor.
W(xo,yo)=[WR(xo,yo),WG(xo,yo),WB(xo,yo)]
The individual asymmetric/decryption keys of R,G, and B channels are generated as

KRm(x,y)=1n=1nmNCRn(x,y)
KGm(x,y)=1n=1nmNCGn(x,y)
KBm(x,y)=1n=1nmNCBn(x,y)

The block diagram of proposed decryption method is shown in Fig. 2

 figure: Fig. 2

Fig. 2 Block diagram of proposed decryption system, part b.

Download Full Size | PDF

. It consists of following steps:

Step 1: The R,G, and B channels of watermark image are retrieved as

PR(xo,yo)=[WR(xo,yo)HR(xo,yo)]/γPG(xo,yo)=[WG(xo,yo)HG(xo,yo)]/γPB(xo,yo)=[WB(xo,yo)HB(xo,yo)]/γ}

Step 2: The R,G, and B channels of watermark image are multiplied with corresponding second set of decryption keys and then gyrator transformed at transformation angle αR, αG,andαB.

DR(x,y)=GαR[exp[iPR(xo,yo)]AR(xo,yo)]DG(x,y)=GαG[exp[iPG(xo,yo)]AG(xo,yo)]DB(x,y)=GαB[exp[iPB(xo,yo)]AB(xo,yo)]}

Step 3: The obtained R,G, and Bchannels are modulated by corresponding conjugate of phase masks and then multiplied by corresponding decryption keys.

DRm(xi,yi)=DR(x,y){exp[i2πΦRn(x,y)]}KRm(x,y)DGm(xi,yi)=DG(x,y){exp[i2πΦGn(x,y)]}KGm(x,y)DBm(xi,yi)=DB(x,y){exp[i2πΦBn(x,y)]}KBm(x,y)}

Step 4: The R,G, and Bchannels are decrypted by using SL0algorithm with corresponding measurement matrices ΦRn,ΦGn, and ΦBn.

FRm(xi,yi)=SL0[DRm(x,y)]FGm(xi,yi)=SL0[DGm(x,y)]FBm(xi,yi)=SL0[DBm(x,y)]}
Fm(xi,yi)=[FRm(xi,yi),FGm(xi,yi),FBm(xi,yi)]

Step 5: Finally, the fused image Fm(xi,yi) is decomposed into WLLm1,WLLm2, WLLm3, and WLLm4, which represent decrypted images asfm1(xi,yi), fm2(xi,yi), fm3(xi,yi), andfm4(xi,yi), respectively.

A single-level 2-D discrete wavelet is exploited to decompose each original image. The low-frequency part occupies most of energy. So low-frequency parts of four images are fused into a new image (as a set of four images). As the number of the original images increases, the level of discrete wavelet increases, which means that the number of pixels in the low frequency part decreases and corresponding energy occupies less. In other words, if the number of images increases (more than four), the qualities of decrypted images deteriorate.

Asymmetric cryptography, also known as public key cryptography, uses public (/encryption) and private (/decryption) keys to encrypt and decrypt data, respectively. The key distribution scheme is as follows:

  • (1) If the sender (say Ali) wants to send information to multi-user, he first needs to register common decryption keys (as authentication keysA) in information database of the multi-user.
  • (2) Ali encrypts n sets of images Fn using the individual public keys of multi-user and common public keys and then generates common decryption keys. The encrypted image E embeds into a host image Hand then sends the resulting watermarked image W to multi-user.
  • (3) User 1 exploits Ali’s common public and decryption keys to recover the ciphertext and then decrypts the set of images F1 using the individual public and decryption keys.
  • (4) User 2 exploits Ali’s common public and decryption keys to recover the ciphertext and then decrypts the set of images F2 using the individual public and decryption keys, and so on.

The proposed encryption and decryption processes can be performed with the optoelectronic setup as shown in Figs. 3(a) and 3(b)

 figure: Fig. 3

Fig. 3 (a) Optoelectronic setup for proposed encryption system; (b) optoelectronic setup for proposed decryption system.

Download Full Size | PDF

, respectively. In encryption system, the pre-processing operations are achieved digitally by means of a computer system to obtain the final compressed red channelCR(x,y), which is imported into the spatial light modulator (SLM)and converted by the optical system of gyrator transform. The reference beam PR(xo,yo), similar to inline holography, is used to record the phase distribution of output image by a charge-coupled device (CCD) camera. The post-processing operations are carried out digitally by using the computer system to get the watermarked red-channel WR(xo,yo). In the same way, WG(xo,yo) and WB(xo,yo) are obtained.

In decryption system, the pre-processing operations are accomplished digitally by means of a computer system to get the red channel function exp[iPR(xo,yo)]AR(xo,yo), which is modulated on SLM and converted by the optical system of inverse gyrator transform. The reference beam is used to record the output image DR(x,y) by a CCDcamera and stored in the computer system to obtain decrypted image digitally. The output image is multiplied by corresponding conjugate of phase mask and decryption key. Subsequently, fused red channel is recovered by using SL0algorithm with measurement matrix. Similarly, fused blue and green channels are recovered using the same processes. Finally recovered fused red, blue, and green channels are combined to produce fused color image, which is decomposed into four color images of the selected set.

4. Numerical results

Numerical simulations have been performed on a Matlab 9.0 (R2016a) platform to test the validly and security of the proposed technique. The four images of set I, set II, and set III are, respectively, shown in Figs. 4(a)–4(d), 4(e)–4(h), and 4(i)–4(l)

 figure: Fig. 4

Fig. 4 Set I [(a) Babu, (b) Ali, (c) Mahdi, (d) Barbara], Set II [(e) Olive fruits, (f) Honey, (g) Date tree, (h) Pomegranate tree], Set III [(i) Butterfly, (j) Goat, (k) Horse, (l) Camel], (m) Fused color images of Set I, (n) fused color images of Set II, and (o) fused color images of Set III [(a)-(o) are of size 512×512×3 pixels].

Download Full Size | PDF

. The size of each image is 512×512×3 pixels. The fused color image of set I, set II, and set III are, respectively, shown in Figs. 4(m)–4(o). The parameters of set I, set II, and set III are, respectively, (x0R1=x0G1=x0B1=0.32, pR1=pG1=pB1=3.90, λ=20), (x0R2=x0G2=x0B2=0.36,pR1=pG1=pB1=3.94,λ=20), and (x0R3=x0G3=x0B3=0.40, pR1=pG1=pB1=3.98, λ=20). The compression ratio of column is taken as C=0.4, so the measurement matrix becomes 204×512×3 pixels. The transformation angles of the GT for R,G, and Bchannels are, respectively, αR=0.70, αG=0.80, and αB=0.90. The phase masks of set I, set II, and set III are, respectively, shown in Figs. 5(a)–5(c)
 figure: Fig. 5

Fig. 5 (a) Phase mask for set I, (b) phase mask for set II, (c) phase mask for set III, (d) individual decryption phase key for set I, (e) individual decryption phase key for set II, (f) individual decryption phase key for set III, (g) amplitude of encrypted image, (h) phase of encrypted image, and (i) watermarked host image [Figures (a)-(i) are of size 204×512×3 pixels].

Download Full Size | PDF

. The individual decryption phase keys of set I, set II, and set III are, respectively, demonstrated in Figs. 5(d)–5(f). The amplitude and phase of final encrypted images are depicted in Fig. 5(g) and Fig. 5(h), respectively. As the images are encoded into noise-like signals, no useful information can be detected. The watermarked host image is illustrated in Fig. 5(i). The size of each image displayed in Figs. 5(a)–5(i) is 204×512×3 pixels.

To weight the difference between the input image and output image, the correlation coefficient (CC) is given by

ρ=E{[IiE[Ii]]}{[IoE[Io]]}E{[IiE[Ii]]2}E{[IoE[Io]]2}
where Io and Ii are output and input images, respectively. E[] is the expected value operator. The CC has the value ρ=1 if the two images are fully correlated, ρ=0 if they are completely uncorrelated, and ρ=1 if they are totally anti-correlated. For simplicity, only the fused color image of set I has been studied.

First, the security analysis of the proposed system has been investigated. The reconstructed images of individual images of set I without individual decryption keys (/asymmetric keys) are displayed in Figs. 6(a)–6(d)

 figure: Fig. 6

Fig. 6 Decrypted individual images of set I: (a)-(d) without individual decryption keys, (e)-(h) without common decryption keys, (i)-(l) without conjugate phase masks.

Download Full Size | PDF

. The CC values of R, G, and B channels are, respectively, (0.0396, 0.0846, 0.0903), (0.1214, 0.0872, 0.1216), (0.0428, 0.0847,0.1110), and (0.0035, 0.0508, 0.0823). The CC values of R,G, and Bchannels are very low. The reconstructed images of individual images of set I without common decryption keys (/asymmetric keys) are displayed in Figs. 6(e)–6(h). The CC values of R,G, and B channels are, respectively, (0.0015, 0.0554, 0.0294), (0.0133, 0.2268, 0.1889), (0.1074, 0.0393,0.0221), and (0.0434, 0.0040, 0.0233). The CC values of R,G, and Bchannels are very low. The retrieved images of individual images of set I without conjugate phase keys are presented in Figs. 6(i)–6(l). The CC values of R,G, and B channels are, respectively, (0.0482, 0.0738, 0.0594), (0.0002, 0.1312, 0.1348), (0.0174, 0.0145,0.0094), and (0.0319, 0.0306, 0.0352). The CC values of R,G, and Bchannels are very low. It can be inferred that the decrypted images will not visually render any information about the input image without using decryption keys or conjugate phase keys.

The initial values x0R1, x0G1, and x0B1 of corresponding R,G, and Bchannels fused color image of set I are changed by 1×1016. The CC values of R,G, and Bchannels for individual images of set I as shown in Figs. 7(a)–7(d)

 figure: Fig. 7

Fig. 7 Retrieved individual images of set I: (a)-(d) with x0R1=x0G1=x0B1 changed by 1×1016,and (e)-(h) with pR1=pG1=pB1 changed by 1×1015.

Download Full Size | PDF

are, respectively, (0.0247, 0.0708, 0.0804), (0.1790, 0.1326,0.1456), (0.1299, 0.1282,0.1627), and (0.0501, 0.0224, 0.0222). The CC values of R,G, and Bchannels are low. Thus, no information about the input image can be extracted. The bifurcation parameters pR1, pG1, and pB1 of corresponding R,G, and Bchannels fused color image of set I are varied by1×1015. The CC values of R,G, and Bchannels for individual images of set I as demonstrated in Figs. 7(e)–7(h) are, respectively, (0.0391, 0.0451, 0.0575), (0.0955, 0.0401, 0.0888), (0.1343, 0.1794,0.1862), and (0.0577, 0.0303, 0.0528). The CC values of R,G, and Bchannels are very low. Hence, no information about the input image can be observed.

The transformation angles αR, αG, and αB of multiplexed image are independently changed by 1×1014. The recovered individual images of set I are, respectively, depicted in Figs. 8(a)–8(d), 8(e)–8(h), and 8(i)–8(l)

 figure: Fig. 8

Fig. 8 Recovered individual images of set I: (a)-(d) with αR changed by 1×1014, (e)-(h) with αG changed by 1×1014,(i)-(l) with αB changed by 1×1014,and (m)-(p) with αR=αG=αB changed by 1×1014.

Download Full Size | PDF

. It can be observed that only noise-like images are obtained. The transformation angles αR, αG, and αB of multiplexed image are together varied by 1×1014. The extracted individual images of set I are, respectively, depicted in Figs. 8(m)–8(p). The corresponding CC values of R,G, and Bchannels are (0.0406, 0.1672, 0.0317), (0.0190, 0.1637,0.0816), (0.0475, 0.0551,0.0330), and (0.0069, 0.0643, 0.0208). The CC values of R,G, and Bchannels indicate that decrypted images will imperceptible. Figures 9(a)-9(c)
 figure: Fig. 9

Fig. 9 Decrypted images with all correct keys: (a) Fused color images of Set I, (b) fused color images of Set II, and (c) fused color images of Set III, (d)-(g) individual images of set I, (h)-(k) individual images of set II, and (l)-(o) individual images of set III. [Figures (a)-(c) are of size 512×512×3 pixels, and Figs. (d)-(o) are of size 256×256×3 pixels].

Download Full Size | PDF

show the decrypted fused color images of Set I, Set II, and Set III with all correct keys, respectively. The individual images Set I, Set II, and Set III are depicted in Figs. 9(d)-9(g), 9(h)-9(k), and 9(l)-9(o), respectively. The corresponding CC values are greater than 0.988, which is close to one. So, input images are decoded correctly with slight distortion.

Second, the sensitivity analysis of security keys of fused color image of Set I of the proposed scheme has been tested. The CC values between the decrypted images and original images of R,G, and B channels of fused color image of Set I are computed against the variation of initial valuex0, bifurcation parameterp, and transformation angle α and plotted in Fig. 10(a)-10(c)

 figure: Fig. 10

Fig. 10 (a) Correlation Coefficient versus variation in decryption keys (a)x0 of set I, (b) p of set I, (c) α of set I.

Download Full Size | PDF

, respectively. The curves of R,G, and B channels clearly show that the CC values of corresponding channels attain one when the security keys are correct during decryption process whereas the curves of R,G, and B channels decrease rapidly for slight change in CC values of corresponding channels. The parameters x0, p, and α provide sensitive keys and thus enhance the security the proposed method.

Finally, the attack analysis of the proposed scheme has been examined. In the proposed security system, different ciphertext of fused image has different decryption keys (/asymmetric keys) which mean that the chosen ciphertext attack [14], and chosen plaintext attack [15] will not work here. Moreover, the combined compressed channel is treated as a part of the input information; unauthorized users do not have enough constraints to set up the iterative amplitude-phase retrieval [15] even if they have obtained the correct transformation angle of corresponding channel as shown in Fig. 11

 figure: Fig. 11

Fig. 11 Fused color images of Set I by using specific attack. (a) Decrypted image, and (b) the relation between MSE values and iteration number.

Download Full Size | PDF

.

5. Conclusion

A new nonlinear multiple image security method based on wavelet transform and compressive gyrator transform is put forwarded. The proposed technique has benefits of individual decryption keys, chaotic parameters as very sensitive decryption keys and common decryption keys, which enhance the nonlinear characteristics of the scheme. The phase of encrypted image is embedded into corresponding host image to obtain watermarked image so that imperceptibility and robustness can be maintained. The proposed algorithm not only reduces data volume but also simplify keys, which improve the efficiency of transmitting data and distributing keys. Thus, the proposed method is of great practical importance as the image fusion, compression, encryption, and watermarking are accomplished simultaneously. The security and viability are proved by the numerical simulation results.

Acknowledgments

The author is indebted to Abdul Aziz RA and Muhammad Sulayman RA for their inspiring supports.

References

1. A. Alfalou and C. Brosseau, “Optical image compression and encryption methods,” Adv. Opt. Photonics 1(3), 589–636 (2009). [CrossRef]  

2. S. Liu, C. Guo, and J. T. Sheridan, “A review of optical image encryption techniques,” Opt. Laser Technol. 57, 327–342 (2014). [CrossRef]  

3. P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20(7), 767–769 (1995). [CrossRef]   [PubMed]  

4. G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25(12), 887–889 (2000). [CrossRef]   [PubMed]  

5. G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29(14), 1584–1586 (2004). [CrossRef]   [PubMed]  

6. J. A. Rodrigo, T. Alieva, and M. L. Calvo, “Experimental implementation of the gyrator transform,” J. Opt. Soc. Am. A 24(10), 3135–3139 (2007). [CrossRef]   [PubMed]  

7. Z. Liu, M. A. Ahmad, and S. Liu, “Image sharing scheme based on combination theory,” Opt. Commun. 281(21), 5322–5325 (2008). [CrossRef]  

8. M. R. Abuturab, “Color image security system using double random-structured phase encoding in gyrator transform domain,” Appl. Opt. 51(15), 3006–3016 (2012). [CrossRef]   [PubMed]  

9. J. F. Barrera, A. Mira, and R. Torroba, “Optical encryption and QR codes: secure and noise-free information retrieval,” Opt. Express 21(5), 5373–5378 (2013). [CrossRef]   [PubMed]  

10. W. Liu, Z. Liu, and S. Liu, “Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang-Gu algorithm,” Opt. Lett. 38(10), 1651–1653 (2013). [CrossRef]   [PubMed]  

11. W. Chen and X. Chen, “Object authentication in computational ghost imaging with the realizations less than 5% of Nyquist limit,” Opt. Lett. 38(4), 546–548 (2013). [CrossRef]   [PubMed]  

12. M. Aldossari, A. Alfalou, and C. Brosseau, “Simultaneous compression and encryption of closely resembling images: application to video sequences and polarimetric images,” Opt. Express 22(19), 22349–22368 (2014). [CrossRef]   [PubMed]  

13. Z. Liu, C. Shen, J. Tan, and S. Liu, “A recovery method of double random phase encoding system with a parallel phase retrieval,” IEEE Photonics J. 8(1), 7801807 (2016). [CrossRef]  

14. Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15(16), 10253–10265 (2007). [CrossRef]   [PubMed]  

15. W. Qin and X. Peng, “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35(2), 118–120 (2010). [CrossRef]   [PubMed]  

16. X. Wang and D. Zhao, “A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Commun. 285(6), 1078–1081 (2012). [CrossRef]  

17. X. Wang and D. Zhao, “Security enhancement of a phase-truncation based image encryption algorithm,” Appl. Opt. 50(36), 6645–6651 (2011). [CrossRef]   [PubMed]  

18. M. R. Abuturab, “Color information cryptosystem based on optical superposition principle and phase-truncated gyrator transform,” Appl. Opt. 51(33), 7994–8002 (2012). [CrossRef]   [PubMed]  

19. M. R. Abuturab, “Security enhancement of color image cryptosystem by optical interference principle and spiral phase encoding,” Appl. Opt. 52(8), 1555–1563 (2013). [CrossRef]   [PubMed]  

20. G. Situ and J. Zhang, “Multiple-image encryption by wavelength multiplexing,” Opt. Lett. 30(11), 1306–1308 (2005). [CrossRef]   [PubMed]  

21. Y. Shi, G. Situ, and J. Zhang, “Multiple-image hiding in the Fresnel domain,” Opt. Lett. 32(13), 1914–1916 (2007). [CrossRef]   [PubMed]  

22. D. Amaya, M. Tebaldi, R. Torroba, and N. Bolognini, “Wavelength multiplexing encryption using joint transform correlator architecture,” Appl. Opt. 48(11), 2099–2104 (2009). [CrossRef]   [PubMed]  

23. A. Alfalou and C. Brosseau, “Exploiting root-mean-square time-frequency structure for multiple-image optical compression and encryption,” Opt. Lett. 35(11), 1914–1916 (2010). [CrossRef]   [PubMed]  

24. H. T. Chang, H.-E. Hwang, C.-L. Lee, and M. T. Lee, “Wavelength multiplexing multiple-image encryption using cascaded phase-only masks in the Fresnel transform domain,” Appl. Opt. 50(5), 710–716 (2011). [CrossRef]   [PubMed]  

25. A. Alfalou, C. Brosseau, N. Abdallah, and M. Jridi, “Assessing the performance of a method of simultaneous compression and encryption of multiple images and its resistance against various attacks,” Opt. Express 21(7), 8025–8043 (2013). [CrossRef]   [PubMed]  

26. S. Liansheng, X. Meiting, and T. Ailing, “Multiple-image encryption based on phase mask multiplexing in fractional Fourier transform domain,” Opt. Lett. 38(11), 1996–1998 (2013). [CrossRef]   [PubMed]  

27. M. R. Abuturab, “Generalized Arnold map-based optical multiple color-image encoding in gyrator transform domain,” Opt. Commun. 343, 157–171 (2015). [CrossRef]  

28. M. R. Abuturab, “Fully phase multiple information encoding based on superposition of two beams and Fresnel-transform domain,” Opt. Commun. 356, 306–324 (2015). [CrossRef]  

29. S. Liansheng, Z. Bei, N. Xiaojuan, and T. Ailing, “Optical multiple-image encryption based on the chaotic structured phase masks under the illumination of a vortex beam in the gyrator domain,” Opt. Express 24(1), 499–515 (2016). [CrossRef]   [PubMed]  

30. Q. Wang, A. Alfalou, and C. Brosseau, “Security enhanced multiple-image authentication based on cascaded optical interference and sparse phase mixed encoding,” Opt. Commun. 372, 144–154 (2016). [CrossRef]  

31. M. R. Abuturab, “Multiple color-image authentication system using HSI color space and QR decomposition in gyrator domains,” J. Mod. Opt. 63(11), 1035–1050 (2016). [CrossRef]  

32. Z. Liu, L. Xu, Q. Guo, C. Lin, and S. Liu, “Image watermarking by using phase retrieval algorithm in gyrator transform domain,” Opt. Commun. 283(24), 4923–4927 (2010). [CrossRef]  

33. N. Singh and A. Sinha, “Digital image watermarking using gyrator transform and chaotic maps,” Optik (Stuttg.) 121(15), 1427–1437 (2010). [CrossRef]  

34. Z. Shao, Y. Duan, G. Coatrieux, J. Wu, J. Meng, and H. Shu, “Combining double random phase encoding for color image watermarking in quaternion gyrator domain,” Opt. Commun. 343, 56–65 (2015). [CrossRef]  

35. A. K. Yadav, S. Vashisth, H. Singh, and K. Singh, “A phase-image watermarking scheme in gyrator domain using devil’s vortex Fresnel lens as a phase mask,” Opt. Commun. 344, 172–180 (2015). [CrossRef]  

36. M. R. Abuturab, “Group multiple-image encoding and watermarking using coupled logistic maps and gyrator wavelet transform,” J. Opt. Soc. Am. A 32(10), 1811–1820 (2015). [CrossRef]   [PubMed]  

37. M. R. Abuturab, “Multiple color-image fusion and watermarking based on optical interference and wavelet transform,” Opt. Lasers Eng. 89, 47–58 (2017). [CrossRef]  

38. D. L. Donoho, “Compressed sensing,” IEEE Trans. Inf. Theory 52(4), 1289–1306 (2006). [CrossRef]  

39. N. Zhou, A. Zhang, F. Zheng, and L. Gong, “Novel image compression-encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing,” Opt. Laser Technol. 62, 152–160 (2014). [CrossRef]  

40. B. Deepan, C. Quan, Y. Wang, and C. J. Tay, “Multiple-image encryption by space multiplexing based on compressive sensing and the double-random phase-encoding technique,” Appl. Opt. 53(20), 4539–4547 (2014). [CrossRef]   [PubMed]  

41. J. Yi and G. Tan, “Optical compression and encryption system combining multiple measurement matrices with fractional Fourier transform,” Appl. Opt. 54(36), 10650–10658 (2015). [CrossRef]   [PubMed]  

42. N. Zhou, J. Yang, C. Tan, S. Pan, and Z. Zhou, “Double-image encryption scheme combining DWT-based compressive sensing with discrete fractional random transform,” Opt. Commun. 354, 112–121 (2015). [CrossRef]  

43. X. Liu, W. Mei, and H. Du, “Simultaneous image compression, fusion and encryption algorithm based on compressive sensing and chaos,” Opt. Commun. 366, 22–32 (2016). [CrossRef]  

44. J. Yi and G. Tan, “Binary-tree encryption strategy for optical multiple-image encryption,” Appl. Opt. 55(20), 5280–5291 (2016). [CrossRef]   [PubMed]  

45. L. Sui, B. Zhou, Z. Wang, and A. Tian, “An optical color image watermarking scheme by using compressive sensing with human visual characteristics in gyrator domain,” Opt. Lasers Eng. 92, 85–93 (2017). [CrossRef]  

46. H. Mohimani, M. Babaie-Zadeh, and C. Jutten, “A fast approach for over complete sparse decomposition based on smoothed l0 norm,” IEEE Trans. Signal Process. 57(1), 289–301 (2009). [CrossRef]  

Cited By

Optica participates in Crossref's Cited-By Linking service. Citing articles from Optica Publishing Group journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (11)

Fig. 1
Fig. 1 Block diagram of proposed encryption system, part a.
Fig. 2
Fig. 2 Block diagram of proposed decryption system, part b.
Fig. 3
Fig. 3 (a) Optoelectronic setup for proposed encryption system; (b) optoelectronic setup for proposed decryption system.
Fig. 4
Fig. 4 Set I [(a) Babu, (b) Ali, (c) Mahdi, (d) Barbara], Set II [(e) Olive fruits, (f) Honey, (g) Date tree, (h) Pomegranate tree], Set III [(i) Butterfly, (j) Goat, (k) Horse, (l) Camel], (m) Fused color images of Set I, (n) fused color images of Set II, and (o) fused color images of Set III [(a)-(o) are of size 512×512×3 pixels].
Fig. 5
Fig. 5 (a) Phase mask for set I, (b) phase mask for set II, (c) phase mask for set III, (d) individual decryption phase key for set I, (e) individual decryption phase key for set II, (f) individual decryption phase key for set III, (g) amplitude of encrypted image, (h) phase of encrypted image, and (i) watermarked host image [Figures (a)-(i) are of size 204×512×3 pixels].
Fig. 6
Fig. 6 Decrypted individual images of set I: (a)-(d) without individual decryption keys, (e)-(h) without common decryption keys, (i)-(l) without conjugate phase masks.
Fig. 7
Fig. 7 Retrieved individual images of set I: (a)-(d) with x 0R 1 = x 0G 1 = x 0B 1 changed by 1× 10 16 ,and (e)-(h) with p R 1 = p G 1 = p B 1 changed by 1× 10 15 .
Fig. 8
Fig. 8 Recovered individual images of set I: (a)-(d) with α R changed by 1× 10 14 , (e)-(h) with α G changed by 1× 10 14 ,(i)-(l) with α B changed by 1× 10 14 ,and (m)-(p) with α R = α G = α B changed by 1× 10 14 .
Fig. 9
Fig. 9 Decrypted images with all correct keys: (a) Fused color images of Set I, (b) fused color images of Set II, and (c) fused color images of Set III, (d)-(g) individual images of set I, (h)-(k) individual images of set II, and (l)-(o) individual images of set III. [Figures (a)-(c) are of size 512×512×3 pixels, and Figs. (d)-(o) are of size 256×256×3 pixels].
Fig. 10
Fig. 10 (a) Correlation Coefficient versus variation in decryption keys (a) x 0 of set I, (b) p of set I, (c) α of set I.
Fig. 11
Fig. 11 Fused color images of Set I by using specific attack. (a) Decrypted image, and (b) the relation between MSE values and iteration number.

Equations (29)

Equations on this page are rendered with MathJax. Learn more.

That is, f=Ψθ with θ 0 =S<<N
g=Φf=ΦΨθ with M<N
That is, ( 1 δ S ) f 2 2 Φf 2 2 ( 1+ δ S ) f 2 2
θ ^ =arg min θ θ 0 subject to g=ΦΨθ
x n+1 =p x n ( 1 x n )
Φ( i, 1 )=λΦ( i1, N ) Φ( i, 2:N )=Φ( i1, 1:N1 )
f o ( x o , y o )= G α [ f i ( x i , y i ) ]( x o , y o ) = 1 | sinα | f i ( x i , y i )exp( i2π ( x o y o + x i y i )cosα( x i y o + x o y i ) sinα )d x i d y i
[ W LL , W HL , W LH , W HH ]=DWT[ f( x i , y i ) ]
[ W L L n1 , W H L n1 , W L H n1 , W H H n1 ]=DWT[ f n1 ( x i , y i ) ]
[ W L L n2 , W H L n2 , W L H n2 , W H H n2 ]=DWT[ f n2 ( x i , y i ) ]
[ W L L n3 , W H L n3 , W L H n3 , W H H n3 ]=DWT[ f n3 ( x i , y i ) ]
[ W L L n4 , W H L n4 , W L H n4 , W H H n4 ]=DWT[ f n4 ( x i , y i ) ]
F n ( x,y )=[ W L L n1 , W L L n2 ; W L L n3 W L L n4 ]
C R n ( x,y )= Φ R n F R n ( x,y ) M R n ( x,y ) C G n ( x,y )= Φ G n F G n ( x,y ) M G n ( x,y ) C B n ( x,y )= Φ B n F B n ( x,y ) M B n ( x,y ) }
C R ( x,y )= n=1 N C R n ( x,y ) C G ( x,y )= n=1 N C G n ( x,y ) C B ( x,y )= n=1 N C B n ( x,y ) }
E R ( x o , y o )= G α R [ C R ( x,y ) ] E G ( x o , y o )= G α G [ C G ( x,y ) ] E B ( x o , y o )= G α B [ C B ( x,y ) ] }
P R ( x o , y o )=arg[ E R ( x o , y o ) ] P G ( x o , y o )=arg[ E G ( x o , y o ) ] P B ( x o , y o )=arg[ E B ( x o , y o ) ] }
A R ( x o , y o )=| E R ( x o , y o ) | A G ( x o , y o )=| E G ( x o , y o ) | A B ( x o , y o )=| E B ( x o , y o ) | }
W R ( x o , y o )= H R ( x o , y o )+γ.[ P R ( x o , y o ) ] W G ( x o , y o )= H G ( x o , y o )+γ.[ P G ( x o , y o ) ] W B ( x o , y o )= H B ( x o , y o )+γ.[ P B ( x o , y o ) ] }
W( x o , y o )=[ W R ( x o , y o ), W G ( x o , y o ), W B ( x o , y o ) ]
K R m ( x,y )= 1 n=1 nm N C R n ( x,y )
K G m ( x,y )= 1 n=1 nm N C G n ( x,y )
K B m ( x,y )= 1 n=1 nm N C B n ( x,y )
P R ( x o , y o )=[ W R ( x o , y o ) H R ( x o , y o ) ]/γ P G ( x o , y o )=[ W G ( x o , y o ) H G ( x o , y o ) ]/γ P B ( x o , y o )=[ W B ( x o , y o ) H B ( x o , y o ) ]/γ }
D R ( x,y )= G α R [ exp[ i P R ( x o , y o ) ] A R ( x o , y o ) ] D G ( x,y )= G α G [ exp[ i P G ( x o , y o ) ] A G ( x o , y o ) ] D B ( x,y )= G α B [ exp[ i P B ( x o , y o ) ] A B ( x o , y o ) ] }
D R m ( x i , y i )= D R ( x,y ) { exp[ i2π Φ R n ( x,y ) ] } K R m ( x,y ) D G m ( x i , y i )= D G ( x,y ) { exp[ i2π Φ G n ( x,y ) ] } K G m ( x,y ) D B m ( x i , y i )= D B ( x,y ) { exp[ i2π Φ B n ( x,y ) ] } K B m ( x,y ) }
F R m ( x i , y i )=S L 0 [ D R m ( x,y ) ] F G m ( x i , y i )=S L 0 [ D G m ( x,y ) ] F B m ( x i , y i )=S L 0 [ D B m ( x,y ) ] }
F m ( x i , y i )=[ F R m ( x i , y i ), F G m ( x i , y i ), F B m ( x i , y i ) ]
ρ= E{ [ I i E[ I i ] ] }{ [ I o E[ I o ] ] } E{ [ I i E[ I i ] ] 2 } E{ [ I o E[ I o ] ] 2 }
Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.