Abstract
In this paper, we propose an optical image encryption scheme based on modified 3D double-phase encoding algorithm (3D-DPEA) in the gyrator transform (GT) domain, in which a plaintext is encrypted into two sparse volumetric ciphertexts under the constraints of chaos-generated binary amplitude masks (BAMs). Then, the two volumetric ciphertexts are multiplexed into the corresponding 2D ciphertexts for convenient storage and transmission. First, due to the synergistic adjustment of the two sparse volumetric ciphertexts during the iterative process, the 3D-DPEA would achieve higher recovery quality of the decrypted image with fewer iterations. In addition, because the BAMs are generated by the logistic-tent (LT) chaotic map which is closely related to the rotation angles of GT, and the LT chaotic map has several advantages such as nonlinear, pseudorandom behavior, and high sensitivity of initial conditions, the sensitivity of the secret key could be significantly improved by several orders of magnitude, reaching up to 10−14. As a result, the 3D-DPEA scheme not only eliminates the explicit/linear relationship between the plaintext and the ciphertext but also substantially enhances security. For decryption, the corresponding decrypted image can be achieved by recording an intensity pattern when a coherent beam crosses two sparse volumetric ciphertexts sequentially. Furthermore, BAMs wouldn’t impose an additional burden on the storage and transmission of secret keys. A series of numerical simulations are performed to verify the effectiveness and security of the proposed encryption scheme.















Similar content being viewed by others
Data availability
The data that support the findings of this study are openly available in CVG-UGR database at http://decsai.ugr.es/cvg/dbimagenes/, reference number [39].
Abbreviations
- 3D-DPEA:
-
3D double-phase encoding algorithm
- GT:
-
Gyrator transform
- BAMs:
-
Binary amplitude masks
- LT:
-
Logistic-tent
- DRPE:
-
Double random phase encoding
- FT:
-
Fourier transform
- FrT:
-
Fresnel transform
- KPA:
-
Known-plaintext attack
- CPA:
-
Chosen-plaintext attack
- CCA:
-
Chosen-ciphertext attack
- PTFT:
-
Phase truncated Fourier transform
- APRA:
-
Amplitude-phase retrieval algorithm
- DRPAE:
-
Double random phase-amplitude encoding
- 1D:
-
One-dimension
- 2D:
-
Two-dimension
- 3D:
-
Three-dimensional
- 3D-SPEA:
-
3D single-phase encoding algorithm
- RPMs:
-
Random phase masks
- LCT:
-
Linear canonical transform
- SLMs:
-
Spatial light modulators
- CC:
-
Correlation coefficient
- NPCR:
-
Number of pixels change rate
- UACI:
-
Unified average changing intensity
References
Matoba O, Nomura T, Perez-Cabre E, Millan MS, Javidi B (2009) Optical techniques for information security. Proc IEEE 97:1128–1148. https://doi.org/10.1109/jproc.2009.2018367
Refregier P, Javidi B (1995) Optical image encryption based on input plane and Fourier plane random encoding. Opt Lett 20:767–769. https://doi.org/10.1364/ol.20.000767
Situ G, Zhang J (2004) Double random-phase encoding in the Fresnel domain. Opt Lett 29:1584–1586. https://doi.org/10.1364/ol.29.001584
Su Y, Wang X, Wang Z, Liu C, Li J, Xu K et al (2022) Security-enhanced multiple-image encryption based on modified iterative phase retrieval algorithm with structured phase mask in Fresnel domain. Optik 254:168649. https://doi.org/10.1016/j.ijleo.2022.168649
Lang J, Zhang Z (2014) Blind digital watermarking method in the fractional Fourier transform domain. Opt Lasers Eng 53:112–121. https://doi.org/10.1016/j.optlaseng.2013.08.021
Li H, Wang Y (2008) Double-image encryption based on iterative gyrator transform. Opt Commun 281:5745–5749. https://doi.org/10.1016/j.optcom.2008.09.001
Tobria A, Singh P (2024) A comparative analysis of phase retrieval algorithms in asymmetric double image cryptosystem in gyrator domain. Opt Quantum Electron 56:33. https://doi.org/10.1007/s11082-023-05524-y
Lang J (2012) Image encryption based on the reality-preserving multiple-parameter fractional Fourier transform and chaos permutation. Opt Lasers Eng 50:929–937. https://doi.org/10.1016/j.optlaseng.2012.02.012
Singh H (2016) Devil’s vortex Fresnel lens phase masks on an asymmetric cryptosystem based on phase-truncation in gyrator wavelet transform domain. Opt Lasers Eng 81:125–139. https://doi.org/10.1016/j.optlaseng.2016.01.014
Lang J (2015) Color image encryption based on color blend and chaos permutation in the reality-preserving multiple-parameter fractional Fourier transform domain. Opt Commun 338:181–192. https://doi.org/10.1016/j.optcom.2014.10.049
Peng X, Zhang P, Wei H, Yu B (2006) Known-plaintext attack on optical encryption based on double random phase keys. Opt Lett 31:1044–1046. https://doi.org/10.1364/ol.31.001044
Peng X, Wei H, Zhang P (2006) Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain. Opt Lett 31:3261–3263. https://doi.org/10.1364/ol.31.003261
Carnicer A, Montes-Usategui M, Arcos S, Juvells I (2005) Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. Opt Lett 30:1644–1646. https://doi.org/10.1364/ol.30.001644
Qin W, Peng X (2010) Asymmetric cryptosystem based on phase-truncated Fourier transforms. Opt Lett 35:118–120. https://doi.org/10.1364/ol.35.000118
Wang X, Zhao D, Chen Y (2014) Double-image encryption without information disclosure using phase-truncation Fourier transforms and a random amplitude mask. Appl Optics 53:5100–5108. https://doi.org/10.1364/ao.53.005100
Wang X, Chen Y, Dai C, Zhao D (2014) Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform. Appl Optics 53:208–213. https://doi.org/10.1364/ao.53.000208
Lang J, Zhang J (2015) Optical image cryptosystem using chaotic phase-amplitude masks encoding and least-data-driven decryption by compressive sensing. Opt Commun 338:45–53. https://doi.org/10.1016/j.optcom.2014.10.018
He W, Peng X, Meng X (2012) A hybrid strategy for cryptanalysis of optical encryption based on double-random phase-amplitude encoding. Opt Laser Technol 44:1203–1206. https://doi.org/10.1016/j.optlastec.2012.01.021
Wang S-Q, Meng X-F, Wang Y-R, Yin Y-K, Yang X-L (2019) Phase retrieval algorithm for optical information security*. Chin Phys B 28:084203. https://doi.org/10.1088/1674-1056/28/8/084203
Wang RK, Watson IA, Chatwin C (1996) Random phase encoding for optical security. Opt Eng 35:2464–2469. https://doi.org/10.1117/1.600849
Li Y, Kreske K, Rosen J (2000) Security and encryption optical systems based on a correlator with significant output images. Appl Optics 39:5295–5301. https://doi.org/10.1364/ao.39.005295
Chang H, Lu W, Kuo C (2002) Multiple-phase retrieval for optical security systems by use of random-phase encoding. Appl Optics 41:4825–4834. https://doi.org/10.1364/ao.41.004825
Situ G, Zhang J (2004) A lensless optical security system based on computer-generated phase only masks. Opt Commun 232:115–122. https://doi.org/10.1016/j.optcom.2004.01.002
Sui L, Zhou B, Ning X, Tian A (2016) Optical multiple-image encryption based on the chaotic structured phase masks under the illumination of a vortex beam in the gyrator domain. Opt Express 24:499–515. https://doi.org/10.1364/oe.24.000499
Shao Z, Shang Y, Tong Q, Ding H, Zhao X, Fu X (2018) Multiple color image encryption and authentication based on phase retrieval and partial decryption in quaternion gyrator domain. Multimed Tools Appl 77:25821–25840. https://doi.org/10.1007/s11042-018-5818-7
Chen W, Chen X, Sheppard CJR (2012) Optical image encryption based on phase retrieval combined with three-dimensional particle-like distribution. J Opt 14:075402. https://doi.org/10.1088/2040-8978/14/7/075402
Chen W, Chen X (2013) Optical image encryption based on multiple-region plaintext and phase retrieval in three-dimensional space. Opt Lasers Eng 51:128–133. https://doi.org/10.1016/j.optlaseng.2012.09.002
Shan M, Liu L, Liu B, Zhong Z (2021) Security enhanced cascaded phase encoding based on a 3D phase retrieval algorithm. Opt Lasers Eng 145:106662. https://doi.org/10.1016/j.optlaseng.2021.106662
Shan M, Guo J, Zhong Z, Liu B, Yu L, Liu L (2022) Security enhanced optical image cryptosystem based on phase encoding by generating a sparse volumetric ciphertext. Opt Commun 516:128270. https://doi.org/10.1016/j.optcom.2022.128270
Su Y, Wang Z, Wang Y, Xue R, Wang B, Zhong W et al (2024) Multiple-image encryption based on authenticable phase and phase retrieval under structured light illumination. Opt Commun 564:130603. https://doi.org/10.1016/j.optcom.2024.130603
Singh N, Sinha A (2008) Optical image encryption using fractional Fourier transform and chaos. Opt Lasers Eng 46:117–123. https://doi.org/10.1016/j.optlaseng.2007.09.001
Wang X, Su Y, Liu C, Li J, Li S, Cai Z, Wan W (2022) Security enhancement of image encryption method based on Fresnel diffraction with chaotic phase. Opt Commun 506:127544. https://doi.org/10.1016/j.optcom.2021.127544
Simon R, Wolf KB (2000) Structure of the set of paraxial optical systems. J Opt Soc Am A-Opt Image Sci Vis 17:342–55. https://doi.org/10.1364/josaa.17.000342
Rodrigo JA, Alieva T, Calvo ML (2007) Experimental implementation of the gyrator transform. J Opt Soc Am A-Opt Image Sci Vis 24:3135–9. https://doi.org/10.1364/josaa.24.003135
Liu Z, Chen D, Ma J, Wei S, Zhang Y, Dai J et al (2011) Fast algorithm of discrete gyrator transform based on convolution operation. Optik 122:864–867. https://doi.org/10.1016/j.ijleo.2010.06.010
You L, Yang E, Wang G (2020) A novel parallel image encryption algorithm based on hybrid chaotic maps with OpenCL implementation. Soft Comput 24:12413–12427. https://doi.org/10.1007/s00500-020-04683-4
Ullah A, Jamal SS, Shah T (2017) A novel construction of substitution box using a combination of chaotic maps with improved chaotic range. Nonlinear Dyn 88:2757–2769. https://doi.org/10.1007/s11071-017-3409-1
Khan MF, Ahmed A, Saleem K, Shah T (2019) A novel design of cryptographic SP-Network based on gold sequences and chaotic logistic tent system. IEEE Access 7:84980–84991. https://doi.org/10.1109/access.2019.2925081
CVG-UGR database: http://decsai.ugr.es/cvg/dbimagenes/
Acknowledgements
The authors would like to thank the anonymous reviewers for their great efforts and valuable comments that are greatly helpful to improve the clarity and quality of this manuscript. Special thanks are also due to the instrumental and data analysis from Analytical and Testing Center, Northeastern University. This work was supported by “985 Project” of Northeastern University (No. 985-3-DC-F24), National Natural Science Foundation of China (No. 61202446), and Fundamental Research Funds for the Central Universities (N150404004).
Funding
National Natural Science Foundation of China, 61202446, Jun Lang, Fundamental Research Funds for the Central Universities, N150404004, Jun Lang
Author information
Authors and Affiliations
Contributions
Jun Lang: Conceptualization, Methodology, Writing – review & editing. Fan Zhang: Software, Validation, Formal analysis, Writing – original draft.
Corresponding author
Ethics declarations
Competing interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Lang, J., Zhang, F. Optical image encryption based on 3D double-phase encoding algorithm in the gyrator transform domain. Multimed Tools Appl 83, 85963–85985 (2024). https://doi.org/10.1007/s11042-024-20176-0
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-024-20176-0