A Spiral-Phase Rear Mounted Triple Masking for Secure Optical Image Encryption Based on Gyrator Transform

Author(s): Mehak Khurana*, Hukum Singh.

Journal Name: Recent Patents on Computer Science

Volume 12 , Issue 2 , 2019

Become EABM
Become Reviewer

Graphical Abstract:


Abstract:

Background: A spiral phase rear mounted masked scheme is proposed based on Gyrator Transform (GT) to enhance the security contribution of second lens of the existing Double Random Phase Encoding (DRPE) system by modulating the phase of the output obtained in output plane. An additional third layer of Spiral Phase Mask (SPM) is included in the output plane in the same 4f system.

Objective: To develop a symmetric cryptosystems to enhance the security potential of the second lens and to prevent the comfortable realization of the cipher-image in the transform domain.

Methods: The original image is first scrambled using Arnold transform with frequency and then is convoluted with a secret random phase mask, RPM in GT and then obtained result is convoluted with another secret RPM in inverse GT. The obtained result is then finally convoluted with SPM.

Results: It verifies the sensitivity and achieves better performance in terms of recovering a high quality image. Results show the security, performance and quality analysis on the basis of correlation coefficient, occlusion attack, key sensitivity and noise attack, entropy and histogram.

Conclusion: It enhances the security potential of second lens in DRPE and introduces diffusion in the system. The system is simulated for binary and greyscale image and achieves better performance as compared to existing DRPE variants. Key sensitivity is more secure and cannot recover original image without knowing all the parameters. Correlation coefficient are also weakly correlated and does not reveals relevant information. Simulation result demonstrates the feasibility and robustness of cryptosystem.

Keywords: Arnold transform, gyrator transform, spiral phase mask, triple phase encoding, occlusion attack, cryptosystem.

[1]
O. Matoba, T. Nomura, E. Perez-Cabre, M.S. Millan, and B. Javidi, "Optical techniques for information security", Proc. IEEE, vol. 97, pp. 1128-1148, 2009.
[2]
A. Alfalou, and C. Brosseau, "Optical image compression and encryption methods", Adv. Opt. Photon, vol. 1, pp. 589-536, 2009.
[3]
M. S. Millan, and E. Perez-Cabre, "Optical Data Encryption, Optical and Digital Image Processing: Fundamentals and Applications", G. Cristobal P. Schelkens and H. Thienpont Eds (Wiley) 2011, pp. 739-767.
[4]
P. Refregier, and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding", Opt. Lett., vol. 20, pp. 767-769, 1995.
[5]
G. Unnikrishnan, J. Joseph, and K. Singh, "Optical encryption by double random phase encoding in the Fractional Fourier domain", Opt. Lett., vol. 25, pp. 887-889, 2000.
[6]
X. Liu, W. Mei, and H. Du, "Optical image encryption based on compressive sensing and chaos in the Fractional Fourier domain", J. Mod. Opt., vol. 61, no. (19), pp. 1570-1577, 2014.
[7]
N. Zhou, T. Dong, and J. Wu, "Novel image encryption algorithm based on multiple-parameter discrete fractional random transform", Opt. Commun., vol. 283, no. (15), pp. 3037-3042, 2010.
[8]
H. Singh, Optical cryptosystem of color images using random phase masks in the fractional wavelet transform domainAIP Conference Proceedings, 1728 020063-1/4, 2016.
[9]
O. Matoba, and B. Javidi, "Encrypted optical memory system using three-dimensional keys in the Fresnel Domain", Opt. Lett., vol. 24, pp. 762-764, 1999.
[10]
G. Situ, and J. Zhang, "Double random-phase encoding in the Fresnel domain", Opt. Lett., vol. 29, pp. 1584-1586, 2004.
[11]
H. Singh, A.K. Yadav, S. Vashisth, and K. Singh, "Optical image encryption using Devil’s vortex Toroidal lens in the Fresnel transform domain", Int. J.of Opt., vol. 926135, pp. 1-13, 2015.
[12]
M.R. Abuturab, "Color information security system using Arnold transform and double structured phase encoding in gyrator transform domain", Opt. Laser Technol., vol. 45, pp. 524-532, 2013.
[13]
J. Wu, L. Zhang, and N. Zhou, "Image encryption based on the multiple-order discrete fractional cosine transform", Opt. Commun., vol. 283, pp. 1720-1725, 2010.
[14]
N. Zhon, Y. Wang, and L. Gong, "Novel optical image encryption scheme based on fractional Mellin transform", Opt. Commun., vol. 284, pp. 3234-3242, 2011.
[15]
S. Vashisth, H. Singh, A.K. Yadav, and K. Singh, "Devil’s vortex phase structure as frequency plane mask for image encryption using the fractional Mellin transform", Int. J. Opt., vol. 728056, pp. 1-9, 2014.
[16]
N. Zhou, H. Li, D. Wang, S. Pan, and Z. Zhou, "Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform", Opt. Commun., vol. 343, pp. 10-21, 2015.
[17]
G. Situ, and J. Zhang, "Multiple-image encryption by wavelength multiplexing", Opt. Lett., vol. 30, pp. 1306-1308, 2005.
[18]
L. Chen, and D. Zhao, "Optical color image encryption by wavelength multiplexing and lensless Fresnel transform holograms", Opt. Express, vol. 14, pp. 8552-8560, 2006.
[19]
U. Gopinathan, T.J. Naughton, and J.T. Sheridan, "Polarization encoding and multiplexing of two-dimensional signals: Application to image encryption", Appl. Opt., vol. 45, pp. 5693-5700, 2006.
[20]
H. Li, "Image encryption based on gyrator transform and two step phase shifting interferometry", Opt. Lasers Eng., vol. 47, pp. 45-50, 2009.
[21]
J. Masajada, and B. Dubik, "Optical vortex generation by three plane wave interference", Opt. Commun., vol. 198, pp. 21-27, 2001.
[22]
S. Vyas, and P. Senthilkumaran, "Interferometric optical vortex array generator", Appl. Opt., vol. 46, pp. 2893-2898, 2007.
[23]
L. Sui, B. Zhou, Z. Wang, and Q. Sun, "Amplitude-phase retrieval attack free image encryption based on two random masks and interference", Opt. Lasers Eng., vol. 86, pp. 1-10, 2016.
[24]
A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, "Vulnerability to chosen–ciphertext attacks of optical encryption schemes based on double random phase keys", Opt. Lett., vol. 30, pp. 1644-1646, 2005.
[25]
X. Peng, P. Zhang, H. Wei, and B. Yu, "Known-plaintext attack on optical encryption based on double random phase keys", Opt. Lett., vol. 31, pp. 1044-1046, 2006.
[26]
W. Chen, C. Quan, and C. Tay, "Optical color image encryption based on Arnold transform and interference method", Opt. Commun., vol. 282, no. (18), pp. 3680-3685, 2009.
[27]
L. Chen, D. Zhao, and F. Ge, "Image encryption based on singular value decomposition and Arnold transform in fractional domain", Opt. Commun., vol. 291, pp. 98-103, 2013.
[28]
L. Sui, and B. Gao, "Color image encryption based on gyrator transform and Arnold transform", Opt. Laser Technol., vol. 48, pp. 530-538, 2013.
[29]
P. L. Yadav, and H. Singh, "Optical double image hiding in the fractional Hartley transform using structured phase filter and Arnold transform", 3D Res., vol. 9, no. (20), pp. 1-20. 2018
[30]
J.A. Rodrigo, T. Alieva, and M.L. Calvo, "Gyrator transform: properties and applications", Opt. Express, vol. 15, pp. 2190-2203, 2007.
[31]
J.A. Rodrigo, T. Alieva, and M.L. Calvo, "Applications of gyrator transform for image processing", Opt. Commun., vol. 278, pp. 279-284, 2007.
[32]
S-C. Pei, and J-J. Ding, Properties, digital implementation, applications, and self-image phenomena of the gyrator transformIn Signal Processing Conference, 2009 17th European, Glasgow, Scotland, 2009, pp. 441-445.
[33]
M.R. Abuturab, "Color image security system using double random-structured phase encoding in gyrator domain", Appl. Opt., vol. 51, pp. 3006-3016, 2012.
[34]
H. Singh, A.K. Yadav, S. Vashisth, and K. Singh, "Fully-Phase image encryption using double random-structured phase masks in gyrator domain", Appl. Opt., vol. 53, pp. 6472-6481, 2014.
[35]
H. Singh, A.K. Yadav, S. Vashisth, and K. Singh, "Double phase-image encryption using gyrator transforms, and structured phase mask in the frequency plane", Opt. Lasers Eng., vol. 67, pp. 145-156, 2015.
[36]
L. Sui, B. Liu, Q. Wang, Y. Li, and J. Liang, "Color-image encryption by using Yang-Gu mixture amplitude-phase retrieval algorithm in gyrator transform domain and two-dimensional sine logistic modulation map", Opt. Lasers Eng., vol. 75, pp. 17-26, 2015.
[37]
J-X. Chen, Z-L. Zhu, C. Fu, L-B. Zhang, and H. Yu, "Analysis and improvement of double image encryption scheme using pixel scrambling technique in gyrator domains", Opt. Lasers Eng., vol. 66, pp. 1-9, 2015.
[38]
S. Vashisth, A. K. Yadav, H. Singh, and K. Singh, "Watermarking in gyrator domain using an asymmetric cryptosystem", Proc SPIE. 9654 96542E–1/8, 2015.
[39]
M.R. Abuturab, "An asymmetric single-channel color image encryption based on Hartley transform and gyrator transform", Opt. Lasers Eng., vol. 69, pp. 49-57, 2015.
[40]
I. Mehra, and N.K. Nishchal, "Optical asymmetric image encryption using gyrator wavelet transform", Opt. Commun., vol. 354, pp. 344-352, 2015.
[41]
J. Chen, Y. Zhang, J. Li, and L-B. Zhang, "Security enhancement of double random phase encoding using rear-mounted phase masking", Opt. Lasers Eng., vol. 101, pp. 51-59, 2018.
[42]
J.A. Davis, D.E. McNamara, D.M. Cottrell, and J. Campos, "Image processing with the radial Hilbert transform: Theory and experiments", Opt. Lett., vol. 25, pp. 99-101, 2000.
[43]
M. Joshi, C. Shakher, and K. Singh, "Image encryption and decryption using fractional Fourier transform and radial Hilbert transform", Opt. Lasers Eng., vol. 46, pp. 522-526, 2008.
[44]
J.F. Barrera, R. Henao, and R. Torroba, "Optical encryption method using toroidal zone plates", Opt. Commun., vol. 248, pp. 35-40, 2005.
[45]
J.F. Barrera, R. Henao, and R. Torroba, "Fault tolerances using toroidal zone plate encryption", Opt. Commun., vol. 256, pp. 489-494, 2005.
[46]
M. Khurana, and H. Singh, "Optical image encryption using Fresnel zone plate mask based on fast walsh hadamard transform International Conference on Condensed Matter and Applied Physics", AIP Conf. Proceeding, vol. 1953, no. 1, pp. 140043-1/4, 2017.
[47]
M. Khurana, and H. Singh, "Spiral-phase masked optical image health care encryption system for medical images based on fast walsh-hadamard transform for security enhancement", Inter. J. Healthcare Infor. Sys. Informatics., vol. 13, no. (4), pp. 98-117, 2018.
[48]
A.K. Yadav, S. Vashisth, H. Singh, and K. Singh, "A phase-image watermarking scheme in gyrator domain using devil’s vortex Fresnel lens as a phase mask", Opt. Commun., vol. 344, pp. 172-180, 2015.
[49]
H. Singh, "Nonlinear optical double image encryption using random-vortex in fractional Hartley transform domain", Optica Applicata., vol. 47, no. (4), pp. 557-578, 2017.
[50]
W. Zamrani, E. Ahouzi, A. Lizana, J. Campos, and M. Yzuel, "Optical image encryption technique based on deterministic phase masks", Opt. Eng., vol. 55, no. (10), pp. 103108-, 1-9, 2016.
[51]
R. Girija, and H. Singh, "A cryptosystem based on deterministic phase masks and fractional Fourier transform deploying singular value decomposition", Opt. Quantum Electron., vol. 50, no. (210), pp. 1-24, 2018.
[52]
M. Khurana, and H. Singh, "An asymmetric image encryption based on phase truncated hybrid transform", 3D Res., vol. 8, no. 28, pp. 17-28. 2017
[53]
M. Khurana, and H. Singh, "Data Computation and Secure Encryption Based on Gyrator Transform using Singular Value Decomposition and Randomization, International Conference on Computational Intelligence and Data Science (ICCIDS)", Procedia Computer Science., vol. 132, pp. 1636-1645, 2018.
[54]
M. Khurana, and H. Singh, "Asymmetric optical image encryption using random Hilbert mask based on fast Walsh Hadamard transform", International Conference on Computing and Communication Technologies for Smart Nation IEEE, 2017pp. 374-377
[55]
M. Khurana, and H. Singh, "“Asymmetric optical image triple masking encryption based on gyrator and Fresnel transforms to remove silhouette problem”, 3D Res", Express, vol. 9, no. (38), pp. 1-17, 2018.


Rights & PermissionsPrintExport Cite as

Article Details

VOLUME: 12
ISSUE: 2
Year: 2019
Page: [80 - 94]
Pages: 15
DOI: 10.2174/2213275911666181030111102
Price: $58

Article Metrics

PDF: 24
HTML: 2
EPUB: 1
PRC: 1