Skip to main content

Advertisement

Log in

Optical image encryption based on 3D double-phase encoding algorithm in the gyrator transform domain

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, we propose an optical image encryption scheme based on modified 3D double-phase encoding algorithm (3D-DPEA) in the gyrator transform (GT) domain, in which a plaintext is encrypted into two sparse volumetric ciphertexts under the constraints of chaos-generated binary amplitude masks (BAMs). Then, the two volumetric ciphertexts are multiplexed into the corresponding 2D ciphertexts for convenient storage and transmission. First, due to the synergistic adjustment of the two sparse volumetric ciphertexts during the iterative process, the 3D-DPEA would achieve higher recovery quality of the decrypted image with fewer iterations. In addition, because the BAMs are generated by the logistic-tent (LT) chaotic map which is closely related to the rotation angles of GT, and the LT chaotic map has several advantages such as nonlinear, pseudorandom behavior, and high sensitivity of initial conditions, the sensitivity of the secret key could be significantly improved by several orders of magnitude, reaching up to 10−14. As a result, the 3D-DPEA scheme not only eliminates the explicit/linear relationship between the plaintext and the ciphertext but also substantially enhances security. For decryption, the corresponding decrypted image can be achieved by recording an intensity pattern when a coherent beam crosses two sparse volumetric ciphertexts sequentially. Furthermore, BAMs wouldn’t impose an additional burden on the storage and transmission of secret keys. A series of numerical simulations are performed to verify the effectiveness and security of the proposed encryption scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

Data availability

The data that support the findings of this study are openly available in CVG-UGR database at http://decsai.ugr.es/cvg/dbimagenes/, reference number [39].

Abbreviations

3D-DPEA:

3D double-phase encoding algorithm

GT:

Gyrator transform

BAMs:

Binary amplitude masks

LT:

Logistic-tent

DRPE:

Double random phase encoding

FT:

Fourier transform

FrT:

Fresnel transform

KPA:

Known-plaintext attack

CPA:

Chosen-plaintext attack

CCA:

Chosen-ciphertext attack

PTFT:

Phase truncated Fourier transform

APRA:

Amplitude-phase retrieval algorithm

DRPAE:

Double random phase-amplitude encoding

1D:

One-dimension

2D:

Two-dimension

3D:

Three-dimensional

3D-SPEA:

3D single-phase encoding algorithm

RPMs:

Random phase masks

LCT:

Linear canonical transform

SLMs:

Spatial light modulators

CC:

Correlation coefficient

NPCR:

Number of pixels change rate

UACI:

Unified average changing intensity

References

  1. Matoba O, Nomura T, Perez-Cabre E, Millan MS, Javidi B (2009) Optical techniques for information security. Proc IEEE 97:1128–1148. https://doi.org/10.1109/jproc.2009.2018367

    Article  Google Scholar 

  2. Refregier P, Javidi B (1995) Optical image encryption based on input plane and Fourier plane random encoding. Opt Lett 20:767–769. https://doi.org/10.1364/ol.20.000767

    Article  Google Scholar 

  3. Situ G, Zhang J (2004) Double random-phase encoding in the Fresnel domain. Opt Lett 29:1584–1586. https://doi.org/10.1364/ol.29.001584

    Article  Google Scholar 

  4. Su Y, Wang X, Wang Z, Liu C, Li J, Xu K et al (2022) Security-enhanced multiple-image encryption based on modified iterative phase retrieval algorithm with structured phase mask in Fresnel domain. Optik 254:168649. https://doi.org/10.1016/j.ijleo.2022.168649

    Article  Google Scholar 

  5. Lang J, Zhang Z (2014) Blind digital watermarking method in the fractional Fourier transform domain. Opt Lasers Eng 53:112–121. https://doi.org/10.1016/j.optlaseng.2013.08.021

    Article  Google Scholar 

  6. Li H, Wang Y (2008) Double-image encryption based on iterative gyrator transform. Opt Commun 281:5745–5749. https://doi.org/10.1016/j.optcom.2008.09.001

    Article  Google Scholar 

  7. Tobria A, Singh P (2024) A comparative analysis of phase retrieval algorithms in asymmetric double image cryptosystem in gyrator domain. Opt Quantum Electron 56:33. https://doi.org/10.1007/s11082-023-05524-y

    Article  Google Scholar 

  8. Lang J (2012) Image encryption based on the reality-preserving multiple-parameter fractional Fourier transform and chaos permutation. Opt Lasers Eng 50:929–937. https://doi.org/10.1016/j.optlaseng.2012.02.012

    Article  Google Scholar 

  9. Singh H (2016) Devil’s vortex Fresnel lens phase masks on an asymmetric cryptosystem based on phase-truncation in gyrator wavelet transform domain. Opt Lasers Eng 81:125–139. https://doi.org/10.1016/j.optlaseng.2016.01.014

    Article  Google Scholar 

  10. Lang J (2015) Color image encryption based on color blend and chaos permutation in the reality-preserving multiple-parameter fractional Fourier transform domain. Opt Commun 338:181–192. https://doi.org/10.1016/j.optcom.2014.10.049

    Article  Google Scholar 

  11. Peng X, Zhang P, Wei H, Yu B (2006) Known-plaintext attack on optical encryption based on double random phase keys. Opt Lett 31:1044–1046. https://doi.org/10.1364/ol.31.001044

    Article  Google Scholar 

  12. Peng X, Wei H, Zhang P (2006) Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain. Opt Lett 31:3261–3263. https://doi.org/10.1364/ol.31.003261

    Article  Google Scholar 

  13. Carnicer A, Montes-Usategui M, Arcos S, Juvells I (2005) Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. Opt Lett 30:1644–1646. https://doi.org/10.1364/ol.30.001644

    Article  Google Scholar 

  14. Qin W, Peng X (2010) Asymmetric cryptosystem based on phase-truncated Fourier transforms. Opt Lett 35:118–120. https://doi.org/10.1364/ol.35.000118

    Article  Google Scholar 

  15. Wang X, Zhao D, Chen Y (2014) Double-image encryption without information disclosure using phase-truncation Fourier transforms and a random amplitude mask. Appl Optics 53:5100–5108. https://doi.org/10.1364/ao.53.005100

    Article  Google Scholar 

  16. Wang X, Chen Y, Dai C, Zhao D (2014) Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform. Appl Optics 53:208–213. https://doi.org/10.1364/ao.53.000208

    Article  Google Scholar 

  17. Lang J, Zhang J (2015) Optical image cryptosystem using chaotic phase-amplitude masks encoding and least-data-driven decryption by compressive sensing. Opt Commun 338:45–53. https://doi.org/10.1016/j.optcom.2014.10.018

    Article  Google Scholar 

  18. He W, Peng X, Meng X (2012) A hybrid strategy for cryptanalysis of optical encryption based on double-random phase-amplitude encoding. Opt Laser Technol 44:1203–1206. https://doi.org/10.1016/j.optlastec.2012.01.021

    Article  Google Scholar 

  19. Wang S-Q, Meng X-F, Wang Y-R, Yin Y-K, Yang X-L (2019) Phase retrieval algorithm for optical information security*. Chin Phys B 28:084203. https://doi.org/10.1088/1674-1056/28/8/084203

    Article  Google Scholar 

  20. Wang RK, Watson IA, Chatwin C (1996) Random phase encoding for optical security. Opt Eng 35:2464–2469. https://doi.org/10.1117/1.600849

    Article  Google Scholar 

  21. Li Y, Kreske K, Rosen J (2000) Security and encryption optical systems based on a correlator with significant output images. Appl Optics 39:5295–5301. https://doi.org/10.1364/ao.39.005295

    Article  Google Scholar 

  22. Chang H, Lu W, Kuo C (2002) Multiple-phase retrieval for optical security systems by use of random-phase encoding. Appl Optics 41:4825–4834. https://doi.org/10.1364/ao.41.004825

    Article  Google Scholar 

  23. Situ G, Zhang J (2004) A lensless optical security system based on computer-generated phase only masks. Opt Commun 232:115–122. https://doi.org/10.1016/j.optcom.2004.01.002

    Article  Google Scholar 

  24. Sui L, Zhou B, Ning X, Tian A (2016) Optical multiple-image encryption based on the chaotic structured phase masks under the illumination of a vortex beam in the gyrator domain. Opt Express 24:499–515. https://doi.org/10.1364/oe.24.000499

    Article  Google Scholar 

  25. Shao Z, Shang Y, Tong Q, Ding H, Zhao X, Fu X (2018) Multiple color image encryption and authentication based on phase retrieval and partial decryption in quaternion gyrator domain. Multimed Tools Appl 77:25821–25840. https://doi.org/10.1007/s11042-018-5818-7

    Article  Google Scholar 

  26. Chen W, Chen X, Sheppard CJR (2012) Optical image encryption based on phase retrieval combined with three-dimensional particle-like distribution. J Opt 14:075402. https://doi.org/10.1088/2040-8978/14/7/075402

    Article  Google Scholar 

  27. Chen W, Chen X (2013) Optical image encryption based on multiple-region plaintext and phase retrieval in three-dimensional space. Opt Lasers Eng 51:128–133. https://doi.org/10.1016/j.optlaseng.2012.09.002

    Article  Google Scholar 

  28. Shan M, Liu L, Liu B, Zhong Z (2021) Security enhanced cascaded phase encoding based on a 3D phase retrieval algorithm. Opt Lasers Eng 145:106662. https://doi.org/10.1016/j.optlaseng.2021.106662

    Article  Google Scholar 

  29. Shan M, Guo J, Zhong Z, Liu B, Yu L, Liu L (2022) Security enhanced optical image cryptosystem based on phase encoding by generating a sparse volumetric ciphertext. Opt Commun 516:128270. https://doi.org/10.1016/j.optcom.2022.128270

    Article  Google Scholar 

  30. Su Y, Wang Z, Wang Y, Xue R, Wang B, Zhong W et al (2024) Multiple-image encryption based on authenticable phase and phase retrieval under structured light illumination. Opt Commun 564:130603. https://doi.org/10.1016/j.optcom.2024.130603

    Article  Google Scholar 

  31. Singh N, Sinha A (2008) Optical image encryption using fractional Fourier transform and chaos. Opt Lasers Eng 46:117–123. https://doi.org/10.1016/j.optlaseng.2007.09.001

    Article  Google Scholar 

  32. Wang X, Su Y, Liu C, Li J, Li S, Cai Z, Wan W (2022) Security enhancement of image encryption method based on Fresnel diffraction with chaotic phase. Opt Commun 506:127544. https://doi.org/10.1016/j.optcom.2021.127544

    Article  Google Scholar 

  33. Simon R, Wolf KB (2000) Structure of the set of paraxial optical systems. J Opt Soc Am A-Opt Image Sci Vis 17:342–55. https://doi.org/10.1364/josaa.17.000342

    Article  Google Scholar 

  34. Rodrigo JA, Alieva T, Calvo ML (2007) Experimental implementation of the gyrator transform. J Opt Soc Am A-Opt Image Sci Vis 24:3135–9. https://doi.org/10.1364/josaa.24.003135

    Article  Google Scholar 

  35. Liu Z, Chen D, Ma J, Wei S, Zhang Y, Dai J et al (2011) Fast algorithm of discrete gyrator transform based on convolution operation. Optik 122:864–867. https://doi.org/10.1016/j.ijleo.2010.06.010

    Article  Google Scholar 

  36. You L, Yang E, Wang G (2020) A novel parallel image encryption algorithm based on hybrid chaotic maps with OpenCL implementation. Soft Comput 24:12413–12427. https://doi.org/10.1007/s00500-020-04683-4

    Article  Google Scholar 

  37. Ullah A, Jamal SS, Shah T (2017) A novel construction of substitution box using a combination of chaotic maps with improved chaotic range. Nonlinear Dyn 88:2757–2769. https://doi.org/10.1007/s11071-017-3409-1

    Article  Google Scholar 

  38. Khan MF, Ahmed A, Saleem K, Shah T (2019) A novel design of cryptographic SP-Network based on gold sequences and chaotic logistic tent system. IEEE Access 7:84980–84991. https://doi.org/10.1109/access.2019.2925081

    Article  Google Scholar 

  39. CVG-UGR database: http://decsai.ugr.es/cvg/dbimagenes/

Download references

Acknowledgements

The authors would like to thank the anonymous reviewers for their great efforts and valuable comments that are greatly helpful to improve the clarity and quality of this manuscript. Special thanks are also due to the instrumental and data analysis from Analytical and Testing Center, Northeastern University. This work was supported by “985 Project” of Northeastern University (No. 985-3-DC-F24), National Natural Science Foundation of China (No. 61202446), and Fundamental Research Funds for the Central Universities (N150404004).

Funding

National Natural Science Foundation of China, 61202446, Jun Lang, Fundamental Research Funds for the Central Universities, N150404004, Jun Lang

Author information

Authors and Affiliations

Authors

Contributions

Jun Lang: Conceptualization, Methodology, Writing – review & editing. Fan Zhang: Software, Validation, Formal analysis, Writing – original draft.

Corresponding author

Correspondence to Jun Lang.

Ethics declarations

Competing interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lang, J., Zhang, F. Optical image encryption based on 3D double-phase encoding algorithm in the gyrator transform domain. Multimed Tools Appl 83, 85963–85985 (2024). https://doi.org/10.1007/s11042-024-20176-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-024-20176-0

Keywords