Skip to main content
Log in

Multiple color image encryption and authentication based on phase retrieval and partial decryption in quaternion gyrator domain

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, a multiple color image encryption and authentication scheme by using phase retrieval in quaternion gyrator domain and partial decryption is introduced. The quaternion representation is firstly employed to combine three color channels into a single-channel architecture. Then each color image is respectively encoded into a phase-only function according to quaternion gyrator transform based double phase encoding through phase retrieval technique. Subsequently, all phase-only functions are modulated to obtain the final ciphertext. To remain the content of secret images under cover, only a small part of the encrypted data that is selected by multiplying the random binary amplitude mask is preserved for decryption, where nonlinear quaternion correlation is developed to further perform authentication. Since the proposed encryption algorithm is asymmetric, such interest can significantly enhance security of the cryptosystem. The numerical simulations have demonstrated the feasibility and validity of the proposed scheme as well as its better performance compared with other schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Abuturab MR (2012) Color image security system using double random-structured phase encoding in gyrator transform domain. Appl Opt 51:3006–3016

    Article  Google Scholar 

  2. Amaya D, Tebaldi M, Torroba R, Bolognini N (2008) Digital color encryption using a multi-wavelength approach and a joint transform correlator. J Opt A Pure Appl Opt 10:104031

    Article  Google Scholar 

  3. Amaya D, Tebaldi M, Torroba R, Bolognini N (2009) Wavelength multiplexing encryption using joint transform correlator architecture. Appl Opt 48:2099–2104

    Article  Google Scholar 

  4. Bhatnagar G, Wu QMJ, Raman B (2013) Discrete fractional wavelet transform and its application to multiple encryption. Inf Sci 223:297–316

    Article  MathSciNet  MATH  Google Scholar 

  5. Chen L, Zhao D (2006) Optical color image encryption by wavelength multiplexing and lensless Fresnel transform holograms. Opt Express 14:8552–8560

    Article  Google Scholar 

  6. Chen H, Du X, Liu Z, Yang C (2013) Color image encryption based on the affine transform and gyrator transform. Opt Lasers Eng 51:768–775

    Article  Google Scholar 

  7. Chen W, Chen X, Stern A, Javidi B (2013) Phase-modulated optical system with sparse representation for information encoding and authentication. IEEE Photon J 5:6900113

    Article  Google Scholar 

  8. Chen J, Zhu Z, Fu C, Yu H, Zhang L (2015) Gyrator transform based double random phase encoding with sparse representation for information authentication. Opt Laser Technol 70:50–58

    Article  Google Scholar 

  9. CVG-UGR database: http://decsai.ugr.es/cvg/dbimagenes/

  10. Gong Q, Liu X, Li G, Qin Y (2013) Multiple-image encryption and authentication with sparse representation by space multiplexing. Appl Opt 52:7486–7493

    Article  Google Scholar 

  11. Guo C, Liu S, Sheridan JT (2015) Iterative phase retrieval algorithms. I: optimization. Appl Opt 54:4698–4708

    Article  Google Scholar 

  12. Guo C, Wei C, Tan J, Chen K, Liu S, Wu Q, Liu Z (2017) A review of iterative phase retrieval for measurement and encryption. Opt Lasers Eng 89:2–12

    Article  Google Scholar 

  13. Hamilton WR (1866) Elements of quaternions. Longmans Green, London

    Google Scholar 

  14. Joshi M, Chandrashakher K (2007) Singh, color image encryption and decryption using fractional Fourier transform. Opt Commun 279:35–42

    Article  Google Scholar 

  15. Joshi M, Chandrashakher K (2008) Singh, Color image encryption and decryption for twin images in fractional Fourier domain. Opt Commun 281:5713–5720

    Article  Google Scholar 

  16. Kang X, Tao R, Zhang F (2016) Multiple-parameter discrete fractional transform and its applications. IEEE Trans Signal Process 64:3402–3417

    Article  MathSciNet  Google Scholar 

  17. Liu ZJ, Zhang Y, Li S, Liu W, Liu W, Wang Y, Liu S (2013) Double image encryption scheme by using random phase encoding and pixel exchanging in the gyrator transform domains. Opt Laser Technol 47:152–158

    Article  Google Scholar 

  18. Liu S, Guo C, Sheridan JT (2014) A review of optical image encryption techniques. Opt Laser Technol 57:327–342

    Article  Google Scholar 

  19. Moon I, Yi F, Han M, Lee J (2016) Efficient asymmetric image authentication schemes based on photon counting-double random phase encoding and RSA algorithms. Appl Opt 55:4328–4335

    Article  Google Scholar 

  20. Mosso F, Tebaldi M, Barrera JF, Bolognini N, Torroba R (2011) Pure optical dynamical color encryption. Opt Express 19:13779–13786

    Article  Google Scholar 

  21. Pei SC, Ding JJ, Chang JH (2001) Efficient Implementation of quaternion Fourier transform, convolution, and correlation by 2-D complex FFT. IEEE Trans Signal Process 49:2783–2797

    Article  MathSciNet  MATH  Google Scholar 

  22. Pérez-Cabré E, Cho M, Javidi B (2011) Information authentication using photon-counting double-random-phase encrypted images. Opt Lett 36:22–24

    Article  Google Scholar 

  23. Rajput SK, Nishchal NK (2017) Optical double image security using random phase fractional Fourier domain encoding and phase-retrieval algorithm. Opt Commun 388:38–46

    Article  Google Scholar 

  24. Rawat N, Hwang IC, Shi Y, Lee BG (2015) Optical image encryption via photon-counting imaging and compressive sensing based ptychography. J Opt 17:065704

    Article  Google Scholar 

  25. Refregier P, Javidi B (1995) Optical image encryption based on input plane and Fourier plane random encoding. Opt Lett 20:767–769

    Article  Google Scholar 

  26. Sang J, Zhao J, Xiang ZL, Cai B, Xiang H (2015) Security analysis of image encryption based on gyrator transform by searching the rotation angle with improved PSO algorithm. Sensors 15:19199–19211

    Article  Google Scholar 

  27. Sang J, Alam MS, Cai B (2016) On the security of gyrator transform-based image encryption by chosen-plaintext attack. Proc SPIE 9845:98450V

    Article  Google Scholar 

  28. Schaefer G, Stich M (2003) UCID: An uncompressed color image database. Proc SPIE Electron Imaging Storage Retr Methods Appl Multimed 5307:472–480

    Google Scholar 

  29. Shao ZH, Wu JS, Coatrieux JL, Coatrieux G, Shu HZ (2013) Quaternion gyrator transform and its application to color image encryption. Proc 20th IEEE international conference on image processing pp 4579–4582

  30. Shao ZH, Shu HZ, Wu JS, Dong ZF, Coatrieux G, Coatrieux JL (2014) Double color image encryption using iterative phase retrieval algorithm in quaternion gyrator domain. Opt Express 22:4932–4942

    Article  Google Scholar 

  31. Shao ZH, Duan YP, Coatrieux G, Wu JS, Meng JY, Shu HZ (2015) Combining double random phase encoding for color image watermarking in quaternion gyrator domain. Opt Commun 343:56–65

    Article  Google Scholar 

  32. Situ G, Zhang J (2005) Multiple-image encryption by wavelength multiplexing. Opt Lett 30:1306–1308

    Article  Google Scholar 

  33. Sui LS, Xin MT, Tian AL (2013) Multiple-image encryption based on phase mask multiplexing in fractional Fourier transform domain. Opt Lett 38:1996–1998

    Article  Google Scholar 

  34. Sui LS, Duan KK, Liang JL, Zhang ZQ, Meng HN (2014) Asymmetric multiple-image encryption based on coupled logistic maps in fractional Fourier transform domain. Opt Lasers Eng 62:139–152

    Article  Google Scholar 

  35. Tao R, Xin Y, Wang Y (2007) Double image encryption based on random phase encoding in the fractional Fourier domain. Opt Express 15:16067–16079

    Article  Google Scholar 

  36. Unnikrishnan G, Joseph J, Singh K (2000) Optical encryption by double-random phase encoding in the fractional Fourier domain. Opt Lett 25:887–889

    Article  Google Scholar 

  37. Wang XL, Zhai HC, Li ZL, Ge Q (2011) Double random-phase encryption based on discrete quaternion Fourier-transforms. Optik 122:1856–1859

    Article  Google Scholar 

  38. Wang Q, Guo Q, Lei L (2014) Multiple-image encryption system using cascaded phase mask encoding and a modified Gerchberg–Saxton in gyrator domain. Opt Commun 320:12–21

    Article  Google Scholar 

  39. Wang X, Chen W, Chen X (2015) Optical encryption and authentication based on phase retrieval and sparsity constraints. IEEE Photon J 7:7800310

    Google Scholar 

  40. Wang Y, Markman A, Quan C, Javidi B (2016) Double-random-phase encryption with photon counting for image authentication using only the amplitude of the encrypted image. J Opt Soc Am A 33:2158–2165

    Article  Google Scholar 

  41. Yao L, Yuan C, Qiang J, Feng S, Nie S (2017) An asymmetric color image encryption method by using deduced gyrator transform. Opt Lasers Eng 89:72–79

    Article  Google Scholar 

  42. Yuan L, Ran Q, Zhao T (2017) Image authentication based on double-image encryption and partial phase decryption in nonlinear fractional Fourier domain. Opt Laser Technol 88:111–120

    Article  Google Scholar 

  43. Zhang L, Zhang L, Mou XQ, Zhang D (2011) FSIM: a feature similarity index for image quality assessment. IEEE Trans Image Process 20:2378–2386

    Article  MathSciNet  MATH  Google Scholar 

  44. Zhong S, Li M, Tang X, He W, Wang X (2017) Information verification and encryption based on phase retrieval with sparsity constraints and optical inference. Opt Lasers Eng 88:214–220

    Article  Google Scholar 

  45. Zhou L, Chao H, Vasilakos AV (2011) Joint forensics-scheduling strategy for delay-sensitive multimedia applications over heterogeneous networks. IEEE J Sel Areas Commun 29:1358–1367

    Article  Google Scholar 

  46. Zhou NR, Wang YX, Gong LH, He H, Wu JH (2011) Novel single-channel color image encryption algorithm based on chaos and fractional Fourier transform. Opt Commun 284:2789–2796

    Article  Google Scholar 

  47. Zhou L, Wu D, Zheng BY, Guizani M (2014) Joint physical-application layer security for wireless multimedia delivery. IEEE Commun Mag 52:66–72

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by the National Natural Science Foundation of China (61601311, 51575140), Project of Beijing Excellent Talents (2016000020124G088), Beijing Municipal Education Research Plan Project (SQKM201810028018), Support Project of High-level Teachers in Beijing Municipal Universities in the Period of 13th Five-year Plan (CIT&TCD20170322) and Natural Science Foundation of Beijing (4162017). The authors would like to appreciate the anonymous reviewers for their constructive comments and suggestions, which have greatly helped us in improving the quality of the paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuanyuan Shang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shao, Z., Shang, Y., Tong, Q. et al. Multiple color image encryption and authentication based on phase retrieval and partial decryption in quaternion gyrator domain. Multimed Tools Appl 77, 25821–25840 (2018). https://doi.org/10.1007/s11042-018-5818-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-5818-7

Keywords

Navigation