Skip to main content
Log in

Double-image cryptosystem using chaotic map and mixture amplitude-phase retrieval in gyrator domain

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The majority of encryption schemes based on double random phase encoding usually encrypt one or more plaintext images into a complex-valued ciphertext, which may cause inconvenience of the management, storage and transmission of the encrypted information. This paper aims to develop a real-valued image cryptosystem based on chaotic map and mixture amplitude-phase retrieval in gyrator domain. It can realize encryption for double grayscale images. Firstly, the double plaintext images are perturbed by chaotic maps and then combined into a single-channel architecture through complex representation. Subsequently, an iterative amplitude and phase retrieval process is performed in gyrator domain to determine the real-valued ciphertext and double phase masks. Experimental results have demonstrated the feasibility and security of the proposed scheme. Moreover, the proposed encryption scheme shows better robustness against Gaussian noise and data loss attacks compared with one random phase modulation based scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

We’re sorry, something doesn't seem to be working properly.

Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

References

  1. Abuturab MR (2012) Color image security system using double random-structured phase encoding in gyrator transform domain. Appl Opt 51(15):3006–3016

    Article  Google Scholar 

  2. Chai XL (2015) An image encryption algorithm based on bit level Brownian motion and new chaotic systems. Multimed Tools Appl. doi:10.1007/s11042-015-3088-1

    Google Scholar 

  3. Ghebleh M, Kanso A, Noura H (2014) An image encryption scheme based on irregularly decimated chaotic maps. Signal Process Image Commun 29(5):618–627

    Article  Google Scholar 

  4. Guo CL, Liu S, Sheridan JT (2015a) Iterative phase retrieval algorithms. I: optimization. Appl Opt 54(15):4698–4708

    Article  Google Scholar 

  5. Guo CL, Liu S, Sheridan JT (2015b) Iterative phase retrieval algorithms. Part II: attacking optical encryption systems. Appl Opt 54(15):4709–4719

    Article  Google Scholar 

  6. Hennelly B, Sheridan JT (2003) Fractional Fourier transform-based image encryption: phase retrieval algorithm. Opt Commun 226:61–80

    Article  Google Scholar 

  7. Liang YR, Liu GP, Zhou NR, Wu JH (2015) Color image encryption combining a reality-preserving fractional DCT with chaotic mapping in HSI space. Multimed Tools Appl. doi:10.1007/s11042-015-2592-7

    Google Scholar 

  8. Liu HJ, Kadir A (2015) Asymmetric color image encryption scheme using 2D discrete-time map. Signal Process 113:104–112

    Article  Google Scholar 

  9. Liu ZJ, Guo Q, Xu L, Ahmad MA, Liu ST (2010) Double image encryption by using iterative random binary encoding in gyrator domains. Opt Express 18(11):12033–12043

    Article  Google Scholar 

  10. Liu ZJ, Chen DZ, Ma JP, Wei SY, Zhang YL, Dai JM, Liu ST (2011) Fast algorithm of discrete gyrator transform based on convolution operation. Optik 122(10):864–867

    Article  Google Scholar 

  11. Liu W, Liu ZJ, Liu ST (2013) Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang-Gu algorithm. Opt Lett 38(10):1651–1653

    Article  Google Scholar 

  12. Liu S, Guo CL, Sheridan JT (2014) A review of optical image encryption techniques. Opt Laser Technol 57:327–342

    Article  Google Scholar 

  13. Mirzaei O, Yaghoobi M, Irani H (2011) A new image encryption method: parallel sub-image encryption with hyper chaos. Nonlinera Dynam 67:557–566

    Article  MathSciNet  Google Scholar 

  14. Pei SC, Huang SG, Ding JJ (2015) Discrete gyrator transforms: computational algorithms and applications. IEEE Trans Signal Process 63(16):4207–4222

    Article  MathSciNet  Google Scholar 

  15. Refregier P, Javidi B (1995) Optical image encryption based on input plane and Fourier plane random encoding. Opt Lett 20(7):767–769

    Article  Google Scholar 

  16. Rodrigo JA, Alieva T, Calvo ML (2007a) Applications of gyrator transform for image processing. Opt Commun 278(2):279–284

    Article  Google Scholar 

  17. Rodrigo JA, Alieva T, Calvo ML (2007b) Gyrator transform: properties and applications. Opt Express 15(5):2190–2203

    Article  Google Scholar 

  18. Shao ZH, Shang YY, Zhang Y, Liu XL (2016) Robust watermarking using orthogonal Fourier-Mellin moments and chaotic map for double images. Signal Process 120:522–531

    Article  Google Scholar 

  19. Sui LS, Liu BQ, Wang Q, Li Y, Liang JL (2015) Double-image encryption based on Yang-Gu mixture amplitude-phase retrieval algorithm and high dimension chaotic system in gyrator domain. Opt Commun 354:184–196

    Article  Google Scholar 

  20. Tao R, Xin Y, Wang Y (2007) Double image encryption based on random phase encoding in the fractional Fourier domain. Opt Express 15(24):16067–16079

    Article  Google Scholar 

  21. Tao R, Meng XY, Wang Y (2010) Image encryption with multiorders of fractional Fourier transforms. IEEE Trans Inf Forensic Secur 5(4):734–738

    Article  Google Scholar 

  22. Wang Y, Quan C, Tay CJ (2016) Asymmetric optical image encryption based on an improved amplitude-phase trtrieval algorithm. Opt Lasers Eng 78:8–16

    Article  Google Scholar 

  23. Zhang SQ, Karim MA (1999) Color image encryption using double random phase encoding. Microw Opt Technol Lett 21(5):318–323

    Article  Google Scholar 

  24. Zhou NR, Yang JP, Tan CF, Pan SM, Zhou ZH (2015) Double-image encryption scheme combining DWT-based compressive sensing with discrete fractional random transform. Opt Commun 354:112–121

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by the National Natural Science Foundation of China under Grants 61201344 and 11301074, the Young Core Personal Project of Beijing Outstanding Talent Training Project (No. 2016000020124G088) and by Youth Innovative Research Team of Capital Normal University. The authors would like to thank the anonymous reviewers for their constructive comments and suggestions that have significantly improved the quality of this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuanyuan Shang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shao, Z., Shang, Y., Fu, X. et al. Double-image cryptosystem using chaotic map and mixture amplitude-phase retrieval in gyrator domain. Multimed Tools Appl 77, 1285–1298 (2018). https://doi.org/10.1007/s11042-016-4279-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-4279-0

Keywords

Navigation