Abstract
In this paper, we have proposed asymmetric image encryption cum authentication cryptosystem based on double random modulus decomposition using computational ghost imaging in the Fourier domain. The literature demonstrates that image encryption algorithms relying on double random modulus decomposition are susceptible to iterative cryptographic attacks. Computational ghost imaging is used to enhance the security of double random modulus decomposition-based cryptosystem and resistant to iterative cryptographic attack. The encrypted image is quite random and appear noisy and can be used for encryption as well as authentication purpose. The proposed cryptosystem is validated for binary, grayscale and medical images. Various statistical metrics, such as mean squared error, information entropy, and correlation coefficient, are applied to analyse the strength of the cryptosystem. Statistical attacks in terms of correlation distribution plots, 3-D plots are performed on the cryptosystem. The results indicate that the cryptosystem is robust against statistical attacks. All decryption keys are essential for faithful recovery of the original image as well as in the authentication cryptosystem. However, in the authentication cryptosystem, we have shown that if more than 6% of any individual key data are lost, cryptosystem fail to recognise the image. Therefore, the proposed encryption cum authentication cryptosystem is safe and secure.
Similar content being viewed by others
References
Ajili S, Hajjaji MA, Bouallegue B, Mtibaa A (2014) Joint watermarking\encryption image for safe transmission: application on medical imaging. In: 2014 Global Summit on Computer & Information Technology (GSCIT), pp 1–6. https://doi.org/10.1109/GSCIT.2014.6970110
Ajili S, Hajjaji MA, Mtibaa A (2015) Hybrid SVD-DWT watermarking technique using AES algorithm for medical image safe transfer. In: 2015 16th International Conference on Sciences and Techniques of Automatic Control and Computer Engineering (STA), pp 69–74. https://doi.org/10.1109/STA.2015.7505164
Ajili S, Hajjaji MA, Mtibaa A (2016) Combining watermarking and encryption algorithm for medical image safe transfer: method based on DCT. Int J Signal Imaging Syst Eng 9(4–5):242–251. https://doi.org/10.1504/IJSISE.2016.078269
Ajili S, Hajjaji MA, Mtibaa A (2021) Crypto-watermarking algorithm using Weber’s law and AES: a view to transfer safe medical image. Sci Program 2021:e5559191. https://doi.org/10.1155/2021/5559191
Anjana S, Yadav AK, Singh P, Singh H (2022) Audio and image encryption scheme based on QR decomposition and random modulus decomposition in Fresnel domain. Opt Appl 52(3):359–374. https://doi.org/10.37190/oa220303
Archana, Sachin, Singh P (2021) Cascaded unequal modulus decomposition in Fresnel domain based cryptosystem to enhance the image security. Opt Lasers Eng 137:106399–106411. https://doi.org/10.1016/j.optlaseng.2020.106399
Aβmann M, Bayer M (2013) Compressive adaptive computational ghost imaging. Sci Rep 3(1):1545–1549. https://doi.org/10.1038/srep01545
Bai B et al (2017) Imaging around corners with single-pixel detector by computational ghost imaging. Optik 147:136–142. https://doi.org/10.1016/j.ijleo.2017.08.057
Cai J, Shen X, Lei M, Lin C, Dou S (2015) Asymmetric optical cryptosystem based on coherent superposition and equal modulus decomposition. Opt Lett 40(4):475–478. https://doi.org/10.1364/OL.40.000475
Chen W, Chen X (2013) Object authentication in computational ghost imaging with the realizations less than 5% of Nyquist limit. Opt Lett 38:546–548. https://doi.org/10.1364/OL.38.000546
Chen L, Zhao D (2006) Optical image encryption with Hartley transforms. Opt Lett 31(23):3438–3440. https://doi.org/10.1364/OL.31.003438
Chen H, Zhu L, Liu Z, Tanougast C, Liu F, Blondel W (2020) Optical single-channel color image asymmetric cryptosystem based on hyperchaotic system and random modulus decomposition in Gyrator domains. Opt Lasers Eng 124:105809–105818. https://doi.org/10.1016/j.optlaseng.2019.105809
Clemente P, Durán V, Torres-Company V, Tajahuerce E, Lancis J (2010) Optical encryption based on computational ghost imaging. Opt Lett 35:2391–2393. https://doi.org/10.1364/OL.35.002391
Coppersmith D (1994) The data encryption standard (DES) and its strength against attacks. IBM J Res Dev 38(3):243–250. https://doi.org/10.1147/rd.383.0243
Gafsi M, Ajili S, Hajjaji MA, Malek J, Mtibaa A (2020) High securing cryptography system for digital image transmission. In: Bouhlel MS, Rovetta S (eds) Proceedings of the 8th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT’18), Vol. 1, Smart Innovation, Systems and Technologies. Springer International Publishing, Cham, pp 311–322. https://doi.org/10.1007/978-3-030-21005-2_30
Ghanbari-Ghalehjoughi H, Ahmadi-Kandjani S, Eslami M (2015) High quality computational ghost imaging using multi-fluorescent screen. J Opt Soc Am A 32(2):323–328. https://doi.org/10.1364/JOSAA.32.000323
Hajjaji MA, Gafsi M, Mtibaa A (2019) Discrete cosine transform space for hiding patient information in the medical images. In: 2019 IEEE International Conference on Design & Test of Integrated Micro & Nano-Systems (DTS), pp 1–6. https://doi.org/10.1109/DTSS.2019.8914880
Huang J et al (2020) Spectral encoded computational ghost imaging. Opt Commun 474:126105–126113. https://doi.org/10.1016/j.optcom.2020.126105
Kumar J, Singh P, Yadav AK, Kumar A (2018) Asymmetric cryptosystem for phase images in fractional Fourier domain using LU-decomposition and Arnold transform. Procedia Comput Sci 132:1570–1577 https://doi.org/10.1016/j.procs.2018.05.121
Kumar R, Zhong F, Quan C (2019) Optical voice information hiding using enhanced iterative algorithm and computational ghost imaging. J Opt 21(6):065704. https://doi.org/10.1088/2040-8986/ab1e32
Li G, Yang W, Li D, Situ G (2017) Ciphertext-only attack on the double random-phase encryption: experimental demonstration. Opt Express 25(8):8690–8697. https://doi.org/10.1364/OE.25.008690
Liansheng S, Yin C, Ailing T, Asundi AK (2018) An optical watermarking scheme with two-layer framework based on computational ghost imaging. Opt Lasers Eng 107:38–45. https://doi.org/10.1016/j.optlaseng.2018.03.005
Liansheng S, Yin C, Bing L, Ailing T, Asundi AK (2018) Optical image encryption via high-quality computational ghost imaging using iterative phase retrieval. Laser Phys Lett 15(7):075204–075213. https://doi.org/10.1088/1612-202X/aac002
Liu J-T et al (2023) Robust binarized data analysis with computational ghost imaging. Optik 272:170378. https://doi.org/10.1016/j.ijleo.2022.170378
Peng X, Wei H, Zhang P (2006) Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain. Opt Lett 31(22):3261–3263. https://doi.org/10.1364/OL.31.003261
Qin W, Peng X (2010) Asymmetric cryptosystem based on phase-truncated Fourier transforms. Opt Lett 35(2):118–120. https://doi.org/10.1364/OL.35.000118
Qin W, Peng S, Meng X, He W (2010) Improved known-plaintext attack on optical encryption based on double random phase encoding. In: 2010 Symposium on Photonics and Optoelectronics, pp 1–4. https://doi.org/10.1109/SOPO.2010.5504346
Rakheja P, Vig R, Singh P (2019) An asymmetric watermarking scheme based on random decomposition in hybrid multi-resolution wavelet domain using 3D Lorenz chaotic system. Optik 198:163289–163304. https://doi.org/10.1016/j.ijleo.2019.163289
Rakheja P, Vig R, Singh P (2019) An asymmetric hybrid cryptosystem using equal modulus and random decomposition in hybrid transform domain. Opt Quantum Electron 51(2):54–70. https://doi.org/10.1007/s11082-019-1769-0
Refregier P, Javidi B (1995) Optical image encryption based on input plane and Fourier plane random encoding. Opt Lett 20(7):767–769. https://doi.org/10.1364/OL.20.000767
Sachin, Kumar R, Singh P (2022) Multiuser optical image authentication platform based on sparse constraint and polar decomposition in Fresnel domain. Phys Scr 97(11):115101–115116. https://doi.org/10.1088/1402-4896/ac925d
Sachin, Singh P (2022) A novel chaotic Umbrella map and its application to image encryption. Opt Quantum Electron. 54(5):266. https://doi.org/10.1007/s11082-022-03646-3
Sachin, Singh P (2023) Asymmetric cryptosystem based on biological mutation operation in chirp-z domain. Multimed Tools Appl 82:1–25. https://doi.org/10.1007/s11042-023-15190-7
Shao Z, Duan Y, Coatrieux G, Wu J, Meng J, Shu H (2015) Combining double random phase encoding for color image watermarking in quaternion Gyrator domain. Opt Commun 343:56–65. https://doi.org/10.1016/j.optcom.2015.01.002
Shapiro J (2008) Computational ghost imaging. Phys Rev A 78:06180–06184. https://doi.org/10.1103/PhysRevA.78.061802
Shimobaba T et al (2018) Computational ghost imaging using deep learning. Opt Commun 413:147–151. https://doi.org/10.1016/j.optcom.2017.12.041
Singh H, Yadav AK, Vashisth S, Singh K (2015) Optical image encryption using devil’s vortex toroidal lens in the Fresnel transform domain. Int J Opt 2015:1–13. https://doi.org/10.1155/2015/926135
Singh P, Yadav AK, Singh K (2017) Phase image encryption in the fractional Hartley domain using Arnold transform and singular value decomposition. Opt Lasers Eng 91:187–195. https://doi.org/10.1016/j.optlaseng.2016.11.022
Tanha M, Kheradmand R, Ahmadi-Kandjani S (2012) Gray-scale and color optical encryption based on computational ghost imaging. Appl Phys Lett 101:100–110. https://doi.org/10.1063/1.4748875
Tanha M, Ahmadi-Kandjani S, Kheradmand R, Ghanbari H (2013) Computational fluorescence ghost imaging. Eur Phys J D 67(2):44–47. https://doi.org/10.1140/epjd/e2012-30341-8
Tao Y, Yang X, Meng X, Wang Y, Yin Y, Dong G (2020) Plaintext-related multiple-image encryption based on computational ghost imaging. J Mod Opt 67:394–404. https://doi.org/10.1080/09500340.2020.1733690
Wang X, Zhao D (2012) A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms. Opt Commun 285(6):1078–1081. https://doi.org/10.1016/j.optcom.2011.12.017
Wang X, Chen Y, Dai C, Zhao D (2014) Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform. Appl Opt 53:208–213. https://doi.org/10.1364/AO.53.000208
Wang Y, Quan C, Tay CJ (2016) New method of attack and security enhancement on an asymmetric cryptosystem based on equal modulus decomposition. Appl Opt 55:679–686. https://doi.org/10.1364/AO.55.000679
Wang L, Zhao S, Cheng W, Gong L, Chen H (2016) Optical image hiding based on computational ghost imaging. Opt Commun 366:314–320. https://doi.org/10.1016/j.optcom.2016.01.026
Wu J, Xie Z, Liu Z, Liu W, Zhang Y, Liu S (2016) Multiple-image encryption based on computational ghost imaging. Opt Commun 359:38–43. https://doi.org/10.1016/j.optcom.2015.09.039
Wu H et al (2020) Computational ghost imaging system with 4-connected-region-optimized Hadamard pattern sequence. Opt Lasers Eng 132:106105–106113. https://doi.org/10.1016/j.optlaseng.2020.106105
Xu H, Xu W, Wang S, Wu S (2018) Phase-only asymmetric optical cryptosystem based on random modulus decomposition. J Mod Opt 65(10):1245–1252. https://doi.org/10.1080/09500340.2018.1431314
Yadav AK, Singh P, Saini I, Singh K (2019) Asymmetric encryption algorithm for colour images based on fractional Hartley transform. J Mod Opt 66(6):629–642. https://doi.org/10.1080/09500340.2018.1559951
Yuan S, Yao J, Liu X, Zhou X, Li Z (2016) Cryptanalysis and security enhancement of optical cryptography based on computational ghost imaging. Opt Commun 365:180–185. https://doi.org/10.1016/j.optcom.2015.12.013
Yuan S, Yang Y, Liu X, Zhou X, Wei Z (2018) Optical image transformation and encryption by phase-retrieval-based double random-phase encoding and compressive ghost imaging. Opt Lasers Eng 100:105–110. https://doi.org/10.1016/j.optlaseng.2017.07.015
Yuan S et al (2021) A blind watermarking scheme based on computational ghost imaging in wavelet domain. Opt Commun 482:126568–128583. https://doi.org/10.1016/j.optcom.2020.126568
Yuan S, Han Y, Liu X, Li Z, Bing P, Zhou X (2023) Optical encryption for multi-user based on computational ghost imaging with Hadamard modulation. Optik 273:170500. https://doi.org/10.1016/j.ijleo.2022.170500
Zafari M, Kheradmand R, Ahmadi-Kandjani S (2014) Optical encryption with selective computational ghost imaging. J Opt 16(10):105405–105410. https://doi.org/10.1088/2040-8978/16/10/105405
Zeng H, Xing Y, Kim S-T, Li X (2022) Designing real-time 3D image security with CA-based random mode decomposition. Signal Process 197:108554. https://doi.org/10.1016/j.sigpro.2022.108554
Zhang Q, Ding Q (2015) Digital image encryption based on advanced encryption standard (AES). In: 2015 Fifth Int. Conf. Instrum. Meas. Comput. Commun. Control IMCCC, pp. 1218–1221, https://doi.org/10.1109/IMCCC.2015.261
Zhang L et al (2016) Study on the algorithm of computational ghost imaging based on discrete Fourier transform measurement matrix. Opt Spectrosc 121(1):143–151. https://doi.org/10.1134/S0030400X16070250
Zhao S, Wang L, Liang W, Cheng W, Gong L (2015) High performance optical encryption based on computational ghost imaging with QR code and compressive sensing technique. Opt Commun 353:90–95. https://doi.org/10.1016/j.optcom.2015.04.063
Zhao M, Zhang X, Zhang R (2023) High-quality computational ghost imaging with a conditional GAN. Photonics 10(4):353. https://doi.org/10.3390/photonics10040353
Zhou N, Wang Y, Gong L (2011) Novel optical image encryption scheme based on fractional Mellin transform. Opt Commun 284(13):3234–3242. https://doi.org/10.1016/j.optcom.2011.02.065
Zhou D et al (2023) Temporally and spatially variant-resolution illumination patterns in computational ghost imaging. Opt Commun 527:128982. https://doi.org/10.1016/j.optcom.2022.128982
Zhu J et al (2018) Computational ghost imaging encryption based on fingerprint phase mask. Opt Commun 420:34–39. https://doi.org/10.1016/j.optcom.2018.03.014
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest concerning the publication of this manuscript.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Yadav, R., Singh, P. Asymmetric image authentication algorithm using double random modulus decomposition and CGI. Comp. Appl. Math. 42, 305 (2023). https://doi.org/10.1007/s40314-023-02443-2
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s40314-023-02443-2
Keywords
- Fourier transform
- Random modulus decomposition
- Computational ghost imaging
- Asymmetric image encryption
- Authentication