Skip to main content
Log in

A novel four image encryption approach in sparse domain based on biometric keys

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, a novel four-image encryption method using biometric keys based on a compressive phase retrieval algorithm is proposed. In the encryption procedure, each input image to be encrypted is initially encoded in sparse data by using a phase retrieval algorithm, which is further combined with a distinct biometric phase mask key. This approach increases the non-linearity of the encryption process and also offers an additional layer of system security against unauthorized attacks. In the system, multiple phase keys from a single biometric hologram by changing the reconstruction parameters during the numerical reconstruction process are generated. The digital nature of the key generation process makes it available at encryption and decryption stages. In addition, the advantage associated with the proposed scheme is related to achieve in reducing space for data storage and transmission over a communication channel. The algorithms to implement the proposed scheme are discussed, and the results of the numerical simulations have presented the effectiveness of the proposed four-image encryption scheme that exhibits better performance in comparison to the reported methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

References

  1. Alfalou A, Brosseau C (2009) Optical image compression and encryption methods. Adv Opt Photon 1:589–636

    Google Scholar 

  2. Alfalou A, Mansour A (2009) Double random phase encryption scheme to multiplex and simultaneous encode multiple images. Appl Opt 48:5933–5947

    Google Scholar 

  3. Chen W, Chen X (2014) Double random phase encoding using phase reservation and compression. J Opt 16:025402

    Google Scholar 

  4. Chen W, Chen X, Stern A, Javidi B (2013) Phase-modulated optical system with sparse representation for information encoding and authentication. IEEE Photon J 5:6900113

  5. Chen JX, Zhu ZL, Fu C, Yu H, Zhang LB (2015) Gyrator transform based double random phase encoding with sparse representation for information authentication. Opt Laser Technol 70:50–58

    Google Scholar 

  6. Chen J, Zhu ZL, Fu C, Zhang LB, Zhang Y (2017) Information authentication using sparse representation of double random phase encoding in fractional Fourier transform domain. Opt. 136:1–7

    Google Scholar 

  7. Chhabra P, Garg N, Kumar M (2018) Content-based image retrieval system using ORB and SIFT features. Neural Comput Applic 32:2725–2733

    Google Scholar 

  8. Di H, Kang Y, Liu Y, Zhang X (2016) Multiple image encryption by phase retrieval. Opt Eng 55:073103

    Google Scholar 

  9. Diab SL (2011) Developing an algorithm for compression, multiplexing and enhancement of multiple images. Opt Laser Technol 43:838–847

    Google Scholar 

  10. Ferdush J, Begum M, Shorif Uddin M (2021) Chaotic lightweight cryptosystem for image encryption. Adv Multimed. 1–16

  11. Garg D, Garg NK, Kumar M (2018) Underwater image enhancement using blending of CLAHE and percentile methodologies. Multimed Tools Appl 77:26545–26561

    Google Scholar 

  12. Gong Q, Liu X, Li G, Qin Y (2013) Multiple-image encryption and authentication with sparse representation by space multiplexing. Appl Opt 31:7486–7493

    Google Scholar 

  13. Gupta S, Kumar M, Garg A (2019) Improved object recognition results using SIFT and ORB feature detector. Multimed Tools Appl 78:34157–341714

    Google Scholar 

  14. Gupta S, Thakur K, Kumar M (2021) 2D-human face recognition using SIFT and SURF descriptors of face's feature regions. Vis Comput 37:447–456

    Google Scholar 

  15. Hazer A, Yıldırım R (2021) A review of single and multiple optical image encryption techniques. J Opt 23:13501

    Google Scholar 

  16. Hwang HE, Chang HT, Lie WN (2009) Multiple-image encryption and multiplexing using a modifified gerchberg saxton algorithm and phase modulation in Fresnel-transform domain. Opt Lett 34:3917–3919

    Google Scholar 

  17. Javidi B, Takanori N (2000) Securing information by use of digital holography. Opt Lett 25:28–30

    Google Scholar 

  18. Kumar M, Chhabra P, Garg NK (2018) An efficient content based image retrieval system using BayesNet and K-NN. Multimed Tools Appl 77:21557–21570

    Google Scholar 

  19. Kumar M, Singh N, Kumar R, Goel S, Kumar K (2021) Gait recognition based on vision systems: a systematic survey. J Vis Commun Image Represent 75:103052

    Google Scholar 

  20. Liu Z, Liu S (2007) Double image encryption based on iterative fractional Fourier transform. Opti Commun 275:324–329

    Google Scholar 

  21. Liu H, Zhao B, Zou J, Huang L, Liu Y (2020) A lightweight image encryption algorithm based on message passing and chaotic map. Secur Commun Netw. 1–12

  22. Nishchal NK, Joseph J, Singh K (2004) Securing information using fractional Fourier transform in digital holography. Opt Commun 235:253–259

    Google Scholar 

  23. Nomura T, Javidi B (2000) Optical encryption using a joint transform correlator architecture. Opt Eng 39:2031–2035

    Google Scholar 

  24. Peng X, Zhang P, Wei H, Yu B (2006) Known-plaintext attack on optical encryption based on double random phase keys. Opt Lett 31:1044–1046

    Google Scholar 

  25. Peng X, Wei H, Zhang P (2006) Chosen-plaintext attack on lens less double-random phase encoding in the Fresnel domain. Opt Lett 31:3261–3263

    Google Scholar 

  26. Pérez-Cabré E, Cho M, Javidi B (2011) Information authentication using photon-counting double-random-phase encrypted images. Opt Lett 36:22–24

    Google Scholar 

  27. Perez-Cabre E, Abril H, Millán M, Javidi B (2012) Photon counting double-random-phase encoding for secure image verification and retrieval. J Opt 14:094001

  28. Qin W, Peng X (2010) Asymmetric cryptosystem based on phase-truncated Fourier transforms. Opt Lett 35:118–120

    Google Scholar 

  29. Rajput SK, Kumar D, Nishchal NK (2015) Photon counting imaging and phase mask multiplexing for multiple images authentication and digital hologram security. Appl Opt 54:1657–1666

    Google Scholar 

  30. Rawat N, Muniraj I, Kim B, Situ G, Lee BG (2015) Compressive sensing based robust multispectral double image encryption. Appl Opt 54:1782–1793

    Google Scholar 

  31. Refregier P, Javidi B (1995) Optical image encryption based on input plane encoding and Fourier plane random encoding. Opt Lett 20:767–769

    Google Scholar 

  32. Saini N, Sinha A (2013) Biometrics based key management of double random phase encoding scheme using error control codes. Opt Lasers Eng 5:1014–1022

    Google Scholar 

  33. Schnars U (1994) Direct phase determination in hologram interferometry with use of digitally recorded holograms. J Opt Soc Am A 11:2011–2015

    Google Scholar 

  34. Singh N, Sinha A (2008) Optical image encryption using fractional Fourier transform and chaos. Opt Lasers Eng 46:117–123

    Google Scholar 

  35. Situ G, Zhang J (2004) Double random-phase encoding in the Fresnel domain. Opt Lett 29:1584–1586

    Google Scholar 

  36. Situ G, Zhang J (2004) A lens less optical security system based on computer-generated phase only masks. Opt Commun 232:115–122

    Google Scholar 

  37. Situ G, Zhang J (2005) Multiple image encryption by wavelength multiplexing. Opt Lett 30:1306–1305

    Google Scholar 

  38. Suzuki H, Yamaya T, Obi T, Yamaguchi M, Ohyama N (2004) Fingerprint verification for smart card holders identification based on optical image encryption. J Opt 33:37–44

    Google Scholar 

  39. Suzuki H, Yamaguchi M, Yachida M, Ohyama N, Tashima H, Obi T (2006) Experimental evaluation of fingerprint verification system based on double random phase encoding. Opt Express 14:1755–1766

    Google Scholar 

  40. Unnikrishnan G, Joseph J, Singh K (2000) Optical encryption by double-random phase encoding in the fractional Fourier domain. Opt Lett 25:887–889

    Google Scholar 

  41. Verma G, Sinha A (2016) Securing information using optically generated biometric keys. J Opt 18:115701

  42. Verma G, Liao M, Lu D, He W, Peng X, Sinha A (2019) An optical asymmetric encryption scheme with biometric keys. Opt Lasers Eng 116:32–40

    Google Scholar 

  43. Verma G, Liao M, Lu D, He W, Peng X (2019) A novel optical two-factor face authentication scheme. Opt Lasers Eng 123:28–36

    Google Scholar 

  44. Verma G, He W, Lu D, Lao M, Peng X, Healy J, Sheridan J (2021) Securing multiple information using bio-chaotic keys. IEEE Photon J 13:1–17

    Google Scholar 

  45. Wang Q, Guo Q, Lei L, Zhou JY (2013) Multiple-image encryption based on interference principle and phase only mask multiplexing in Fresnel transform domain. Appl Opt 52:6849–6857

    Google Scholar 

  46. Wang X, Chen W, Chen X (2015) Optical encryption and authentication based on phase retrieval and sparsity constraints. IEEE Photon J. 7:7800310

  47. Wu J, Luo X, Zhou N (2013) Four-image encryption method based on spectrum truncation, chaos and the MODFrFT. Opt Laser Technol 45:571–577

    Google Scholar 

  48. Yang G, Shuming J, Juncheng F, Ting L, Zhenwei X, Xiaocong Y (2020) Multiple-image encryption and hiding with an optical diffractive neural network. Opt Commun 463:125476

    Google Scholar 

  49. Yu C, Li J, Li X, Ren X, Gupta BB (2018) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77:4585–4608

    Google Scholar 

  50. Zhang Y, Wang B (2008) Optical image encryption based on interference. Opt Lett 33:2443–2445

    Google Scholar 

  51. Zhang X, Zhang L (2022) Multiple-image encryption algorithm based on chaos and gene fusion. Multimed Tools Appl:1–22

  52. Zhang X, Seo SH, Wang C (2018) A lightweight encryption method for privacy protection in surveillance videos. IEEE Access 6:18074–18087

    Google Scholar 

  53. Zhang X, Meng X, Yin Y, Yang X, Wang Y, Li X, Peng X, He W, Dong G, Chen H (2018) Two-level image authentication by two-step phase-shifting interferometry and compressive sensing. Opt Lasers Eng 100:118–123

    Google Scholar 

  54. Zhang J, Yang D, Ma R, Shi Y (2021) Multi-image and color image encryption via multi-slice ptychographic encoding. Opt Commun 485:126762

  55. Zhao T, Ran Q, Yuan L, Chi Y, Ma J (2015) Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography. Opt Lasers Eng 72:12–17

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gaurav Verma.

Ethics declarations

Conflicts of interest/competing interests

The authors declare that they have no relevant conflicts of financial or non-financial interests regarding the manuscript.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Verma, G., He, W. & Peng, X. A novel four image encryption approach in sparse domain based on biometric keys. Multimed Tools Appl 82, 22889–22904 (2023). https://doi.org/10.1007/s11042-023-14801-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-14801-7

Keywords

Navigation