Generic placeholder image

Recent Advances in Computer Science and Communications

Editor-in-Chief

ISSN (Print): 2666-2558
ISSN (Online): 2666-2566

Research Article

An Asymmetric Optical Cryptosystem of Double Image Encryption Based on Optical Vortex Phase Mask Using Gyrator Transform Domain

Author(s): Hukum Singh and Mehak Khurana*

Volume 13, Issue 4, 2020

Page: [672 - 685] Pages: 14

DOI: 10.2174/1385272823666190429155557

Price: $65

Abstract

Background: Optical Vortex (OV) has attracted attention amongst many researchers. Paper proposes a nonlinear scheme of image encryption based on Optical Vortex (OV) and Double Random Phase Encoding (DRPE) in the Gyrator Transform (GT) domain under phase truncation operations.

Objective: The amplitude and phase truncation operation in the image encryption generates two decryption keys and convert the method to nonlinear. It has also been proposed opto-electronically. Original image can only be decrypted with correct values of OV, GT rotation angles and Decryption Keys (DKs).

Methods: A novel asymmetric image encryption scheme, using optical vortex mask has been proposed in view of amplitude and phase truncation operation. The scheme becomes more strengthened by the parameters used in the Optical Vortex (OV) and by taking the (n)th power operation in the encryption path and (n)th root operation in the decryption path.

Results: It shows that for each of the encryption parameters, binary image has greater sensitivity as compared to the grayscale image. This scheme inflates the security by making use of OV-based Structured Phase Mask (SPM) as it expands the key space. The scheme has also been investigated for its robustness and its sensitivity against various attacks such as noise and occlusion attacks under number of iterations.

Conclusion: This scheme provides solution to the problem of key space with the use of GT rotational angles and OV phase mask thus enhances the security. The scheme has been verified based on various security parameters such as occlusion, noise attacks, CC, entropy etc.

Keywords: Gyrator transform, optical vortex, correlation coefficient, noise and occlusion attacks, structured phase mask, rotation angles.

Graphical Abstract

[1]
J. Leach, E. Yao, and M.J. Padgett, "Observation of the vortex structure of a non-integer vortex beam", New J. Phys., vol. 6, pp. 1-8, 2004.
[2]
M.V. Berry, "Optical vortices evolving from helicoidal integer and fractional phase steps", J. Opt. A, Pure Appl. Opt., vol. 6, pp. 259-268, 2004.
[3]
S. Vyas, R.K. Singh, and P. Senthilkumaran, "Fractional vortex lens", Opt. Laser Technol., vol. 42, pp. 878-882, 2010.
[4]
A.M. Amaral, E.L. Falcao-Filho, and C.B. De Araujo, "Shaping optical beams with topological charge", Opt. Lett., vol. 38, pp. 1579-1581, 2013.
[5]
L. Preda, "Generation of optical vortices by fractional derivative", Opt. Lasers Eng., vol. 54, pp. 42-48, 2014.
[6]
B. Javidi, “Optical and Digital Techniques for Information Security”, Springer-Verlag, 2005.,
[7]
O. Matoba, T. Nomura, E. Perez-Cabre, M.S. Millan, and B. Javidi, "Optical techniques for information security", Proc. IEEE, vol. 97, pp. 1128-1148, 2009.
[8]
"A. Alfalou and C. Brosseau, “Optical image compression and encryption methods”,", Adv. Opt. Photon..vol. 1, pp. 589-536, 2009,
[9]
M.S. Millan, and E. Perez-Cabre, “Optical data encryption”In Optical and Digital Image Processing: Fundamentals and Applications..G. Cristobal, P. Schelkens and H. Thienpont, eds (Wiley), pp. 739-767, 2011,
[10]
B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Pérez-Cabré, M.S. Millán, N.K. Nishchal, R. Torroba, J.F. Barrera, W. He, and X. Peng, "Roadmap on optical security", J. Opt., vol. 18, pp. 1-39, 2016.
[11]
A.K. Yadav, S. Vashisth, H. Singh, and K. Singh, Optical cryptography and watermarking using some Fractional canonical transforms, and structured masks.In Advances in Optical Science and Engineering., Springer: New Delhi, pp. 25-36. 2015
[12]
P. Kumar, J. Joseph, and K. Singh, “Double random phase encoding based optical encryption systems using some linear canonical transforms: Weaknesses and countermeasures”Eds. John J. Healy, M. A. Kutay, H. M. Ozaktas, J. T. Sheridan, Springer series in Optical Sciences, vol. 198, pp. 367-396, 2016,
[13]
G. Unnikrishnan, J. Joseph, and K. Singh, "Optical encryption by double-random phase encoding in the fractional Fourier domain", Opt. Lett., vol. 25, pp. 887-889, 2000.
[14]
M. Dahiya, S. Sukhija, and H. Singh, "Image encryption using quad masks in fractional fourier domain and case study", In IEEE International Advance Computing Conference (IACC), pp. 1048-1053 2014,
[15]
O. Matoba, and B. Javidi, "Encrypted optical memory system using three-dimensional keys in the Fresnel domain", Opt. Lett., vol. 24, pp. 762-764, 1999.
[16]
G. Situ, and J. Zhang, "Double random-phase encoding in the Fresnel domain", Opt. Lett., vol. 49, pp. 1584-1586, 2004.
[17]
H. Singh, A.K. Yadav, S. Vashisth, and K. Singh, "Optical image encryption using devil’s vortex toroidal lens in the fresnel transform domain", Int. J. Opt., vol. 2015, pp. 1-13, 2015.
[18]
H. Singh, "Devil’s vortex Fresnel lens phase masks on an asymmetric cryptosystem based on phase-truncated in gyrator wavelet transform", Opt. Lasers Eng., vol. 81, pp. 125-139, 2016.
[19]
N.R. Zhou, Y. Wang, and L. Gong, "Novel optical image encryption scheme based on fractional Mellin transform", Opt. Commun., vol. 284, pp. 3234-3242, 2011.
[20]
S. Vashisth, H. Singh, A.K. Yadav, and K. Singh, "“Devil’s vortex phase structure as frequency plane mask for image encryption using the fractional Mellin transform”, ", Int. J. Opt..2014, pp. 1-9, 2014,
[21]
H. Singh, "“Cryptosystem for securing image encryption using structured phase masks in Fresnel wavelet transform domain”", 3D Res.vol. 7, p. 34, 2016,
[22]
J.A. Rodrigo, T. Alieva, and M.L. Calvo, "Gyrator transform: Properties and applications", Opt. Express, vol. 15, pp. 2190-2203, 2007.
[23]
J.A. Rodrigo, T. Alieva, and M.L. Calvo, "Applications of gyrator transform for image processing", Opt. Commun., vol. 278, pp. 279-284, 2007.
[24]
S.C. Pei, and J.J. Ding, “Properties, digital implementation, applications, and self-image phenomena of the gyrator transform”, In 17th European Signal Processing Conferenece (EURASIP, 2009), Glasgow, Scotland, pp. 441-445, 2009.
[25]
M.R. Abuturab, "Securing color image using discrete cosine transform in gyrator transform domain structured-phase encoding", Opt. Lasers Eng., vol. 50, pp. 1383-1390, 2012.
[26]
M.R. Abuturab, "Color information security system using Arnold transform and double structured phase encoding in gyrator transform domain", Opt. Laser Technol., vol. 45, pp. 525-532, 2013.
[27]
Q. Wang, Q. Guo, and L. Lei, "Double image encryption based on phase-amplitude mixed encoding and multistage phase encoding in gyrator transform domains", Opt. Laser Technol., vol. 48, pp. 267-279, 2013.
[28]
M.R. Abuturab, "An asymmetric color image cryptosystem based on Schur decomposition in gyrator domain", Opt. Lasers Eng., vol. 58, pp. 39-47, 2014.
[29]
W. Qu, Q. Guo, and L. Lei, "Multiple-image encryption system using cascaded phase mask encoding and a modified Gerchberg-Saxton algorithm in gyrator domain", Opt. Commun., vol. 320, pp. 12-21, 2014.
[30]
H. Singh, A.K. Yadav, S. Vashisth, and K. Singh, "Fully-phase image encryption using double random-structured phase masks in gyrator domain", Appl. Opt., vol. 53, pp. 6472-6481, 2014.
[31]
H. Singh, A.K. Yadav, S. Vashisth, and K. Singh, "Double phase-image encryption using gyrator transforms, and structured phase mask in the frequency plane", Opt. Lasers Eng., vol. 67, pp. 145-156, 2015.
[32]
J.M. Vilardy, M.S. Millan, and E. Perez-Cabre, "Nonlinear image encryption using a fully phase nonzero-order joint transform correlator in the Gyrator domain", Opt. Lasers Eng., vol. 89, pp. 88-94, 2016.
[33]
H. Chen, C. Tanougast, Z. Liu, and L. Sieler, "Asymmetric optical cryptosystem for color images based on equal modulus decomposition in gyrator domains", Opt. Lasers Eng., vol. 93, pp. 1-8, 2017.
[34]
L. Sui, M. Xu, and A. Tian, "Optical noise-free image encryption based on quick response code and high dimension chaotic system in gyrator transform domain", Opt. Lasers Eng., vol. 92, pp. 106-114, 2017.
[35]
M.R. Abuturab, "Multiple information encryption by user-image-based gyrator transform hologram", Opt. Lasers Eng., vol. 92, pp. 76-84, 2017.
[36]
Z. Shao, Y. Shang, X. Fu, H. Yuan, and H. Shu, "Double image cryptosystem using chaotic map and mixture amplitude-phase retrieval in gyrator domain", Multimedia Tools Appl., 2017.
[37]
R. Perez, J. M. Vilardy and C. J. Jimenez, “Nonlinear image encryption system using the Gyrator transform and truncation operations”, In Journal of Physics: Conference Series, vol. 792, p. 012046, 2017,
[38]
W. Qin, and X. Peng, "Asymmetric cryptosystem based on phase-truncated fourier transform", Opt. Lett., vol. 35, pp. 118-120, 2010.
[39]
W. Qin, X. Peng, X. Meng, and B. Gao, "“Universal and special keys based on phase-truncated fourier transform”", Opt. Eng..vol. 50, p. 080501, 2011.,
[40]
X. Wang, and D. Zhao, "Double-image self-encoding and hiding based on phase-truncated fourier transform and phase retrieval", Opt. Commun., vol. 284, pp. 4441-4445, 2011.
[41]
X. Wang, and D. Zhao, "Double images encrypted method with resistance against the specific attack based on an asymmetric algorithm", Opt. Express, vol. 20, pp. 11994-12003, 2012.
[42]
S.K. Rajput, and N.K. Nishchal, "Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask", Appl. Opt., vol. 51, pp. 5377-5786, 2012.
[43]
W. Liu, Z. Liu, J. Wu, and S. Liu, "Asymmetric cryptosystem by using modular arithmetic operation based on double random phase encoding", Opt. Commun., vol. 301-302, pp. 56-60, 2013.
[44]
Q. Wang, Q. Guo, and J. Zhou, "Color image hiding based on phase-truncation and phase retrieval technique in fractional fourier domain", Optik, vol. 124, pp. 1224-1229, 2013.
[45]
S. Vashisth, A.K. Yadav, H. Singh, and K. Singh, "“Watermarking image encryption using deterministic phase mask and singular value decomposition in fractional Mellin transform domain”", IET Image Process vol. 12, no. 11, pp. 1994- 2001, 2018,
[46]
H. Singh, "Watermarking image encryption using deterministic phase mask and singular value decomposition in fractional Mellin transform domain", IET Image Process., vol. 12, no. 11, pp. 1994-2001, 2018.
[47]
H. Singh, "Hybrid structured phase mask in frequency plane for optical double image encryption in gyrator transform domain", J. Mod. Opt., vol. 65, no. 18, pp. 2065-2078, 2018.
[48]
M. Khurana, and H. Singh, “Asymmetric optical image triple masking encryption based on gyrator and fresnel transforms to remove silhouette problem”, 3D Res., vol. 9, no. 38, 2018.
[49]
S. Aloka, "Nonlinear optical cryptosystem resistant to standard and hybrid attacks", Opt. Lasers Eng., vol. 81, pp. 79-86, 2016.
[50]
A.K. Yadav, S. Vashisth, H. Singh, and K. Singh, "A phase-image watermarking scheme in gyrator domain using devil’s vortex Fresnel lens as a phase mask", Opt. Commun., vol. 344, pp. 172-180, 2015.
[51]
"“Optical cryptosystem of color images using random phase masks in the fractional wavelet transform domain” In", In: Conference Proceedings of AIP.vol. 1728, p. 020063-1/4, 2016,
[52]
P. Singh, A.K. Yadav, and K. Singh, "Phase image encryption in the fractional Hartley domain using Arnold transform and singular value decomposition", Opt. Lasers Eng., vol. 91, pp. 187-195, 2017.
[53]
H. Singh, "Optical cryptosystem of color images based on fractional-, wavelet transform domains using random phase masks", Indian J. Sci. Technol., vol. 9, no. 1, pp. 1-15, 2016. [S. Vashisth, H. Singh, A. K. Yadav and K. Singh, “Image encryption using fractional Mellin transform, structured phase].

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy