A Multi-Image Encryption Based on Sinusoidal Coding Frequency Multiplexing and Deep Learning
Abstract
:1. Introduction
- A multi-image encryption method based on sinusoidal coding frequency multiplexing and deep learning is proposed.
- The proposed encryption method can realize the encryption of a greater number of images, which makes it more widely used.
- In the process of decryption, deep learning is used to improve the quality of the decrypted image and the decryption speed.
2. The Theoretical Analysis
2.1. The Encryption Process
- All the n × m plaintext images are divided into n groups; the plaintext images in each group and the sinusoidal code corresponding to each group of the plaintext images are successively sent to a spatial light modulator (SLM1) for display.
- The L2 and L3 lenses form the 4F system, and the hole P is located on the spectral plane of the 4F system, which is used to extract the zero-order frequency after SLM1 and reduce the influence of errors caused by other orders. The random matrix corresponding to each plaintext image is uploaded to SLM2 for coding.
- The superimposed light intensity recorded by the CCD is the time integral of the light field reaching the target surface within a certain period of time. Therefore, we make the exposure time of the CCD equal to the sum of the encoding time of all images in the SLM. In addition, their starting time should be synchronized, and the encoding time of each image should also be the same, which can be expressed as follows:
- According to the number of pixels with superimposed light intensity, an integer random sequence without repeating elements is generated. Secondly, replace the light intensity value on each pixel of the superimposed light intensity according to the value of the random sequence, so as to realize the scrambling operation. Scramble (S) [25] to get the final ciphertext.
2.2. The Decryption Process
2.2.1. Downsampling in Fourier Frequency Domain
2.2.2. The Network Structure
3. Experiment Results
- The pixel location of the ciphertext is rearranged by the correct index keys to get the superimposed images;
- Fourier transform is applied to the superimposed ciphertext image and appropriate down-sampling is carried out according to the specific spectrum distribution of each group;
- Its surroundings are padded with zeros to keep the original pixel resolution;
- Inverse Fourier transform is carried out and it is fed into the trained U-Net network.
4. Algorithm Analysis
4.1. Key Security Analysis
4.2. Anti-Noise Attack Analysis
4.3. Resistance to Occlusion Attacks
4.4. Correlation Analysis
4.5. Histogram Analysis
4.6. Analysis of the Number of Encrypted Images
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Alfalou, A.; Brosseau, C. Optical image compression and encryption methods. Adv. Opt. Photon. 2009, 1, 589–636. [Google Scholar] [CrossRef]
- Liu, S.; Guo, C.; Sheridan, J.T. A review of optical image encryption techniques. Opt. Las. Technol. 2014, 57, 327–342. [Google Scholar] [CrossRef]
- Refregier, P.; Javidi, B. Optical image encryption based on input plane and Fourier plane random encoding. Opt. Lett. 1995, 20, 767–769. [Google Scholar] [CrossRef] [PubMed]
- Ben Farah, M.A.; Guesmi, R.; Kachouri, A.; Samet, M. A novel chaos based optical image encryption using fractional fourier transform and DNA sequence operation. Opt. Las. Tech. 2020, 121, 105777. [Google Scholar] [CrossRef]
- Kong, D.; Shen, X. Multiple-image encryption based on optical wavelet transform and multichannel fractional Fourier transform. Opt. Las. Technol. 2014, 57, 343–349. [Google Scholar] [CrossRef]
- Wang, M.; Pousset, Y.; Carré, P.; Perrine, C.; Zhou, N.R.; Wu, J. Optical image encryption scheme based on apertured fractional Mellin transform. Opt. Las. Technol. 2020, 124, 106001. [Google Scholar] [CrossRef]
- Luan, G.; Li, A.; Chen, Z.; Huang, C. Asymmetric Optical Image Encryption with Silhouette Removal Using Interference and Equal Modulus Decomposition. IEEE Photon. J. 2020, 12, 1–8. [Google Scholar] [CrossRef]
- Clemente, P.; Durán, V.; Torres-Company, V.; Tajahuerce, E.; Lancis, J. Optical encryption based on computational ghost imaging. Opt. Lett. 2009, 35, 2391–2393. [Google Scholar] [CrossRef]
- Jiao, S.; Feng, J.; Gao, Y.; Lei, T.; Yuan, X. Visual cryptography in single-pixel imaging. Opt. Express. 2020, 28, 7301–7313. [Google Scholar] [CrossRef]
- Chen, W.; Javidi, B.; Chen, X. Advances in optical security systems. Adv. Opt. Photon. 2014, 6, 120–155. [Google Scholar] [CrossRef]
- Xie, Y.; Li, J.; Kong, Z.; Zhang, Y.; Liao, X.; Liu, Y. Exploiting Optics Chaos for Image Encryption-Then-Transmission. J. Lightwave Technol. 2016, 34, 5101–5109. [Google Scholar] [CrossRef]
- Su, Y.; Tang, C.; Li, B.; Chen, X.; Xu, W.; Cai, Y. Single-lens Fourier-transform-based optical color image encryption using dual two-dimensional chaotic maps and the Fresnel transform. Appl. Opt. 2017, 56, 498–505. [Google Scholar] [CrossRef] [PubMed]
- Deng, X.; Zhao, D. Single-channel color image encryption using a modified Gerchberg–Saxton algorithm and mutual encoding in the Fresnel domain. Appl. Opt. 2011, 50, 6019–6025. [Google Scholar] [CrossRef]
- Zhang, L.; Pan, Z.; Zhou, G. Study on the key technology of optical encryption based on adaptive compressive ghost imaging for a large-sized object. J. Opt. Soc. Korea 2017, 84, 471–476. [Google Scholar] [CrossRef]
- Qin, Y.; Wang, Z.; Gong, Q. Diffractive-imaging-based optical image encryption with simplified decryption from single diffraction pattern. Appl. Opt. 2014, 53, 4094–4099. [Google Scholar] [CrossRef] [PubMed]
- Situ, G.; Zhang, J. Multiple-image encryption by wavelength multiplexing. Opt. Lett. 2005, 30, 1306–1309. [Google Scholar] [CrossRef]
- Situ, G.; Zhang, J. Position multiplexing for multiple-image encryption. J. Opt. A 2006, 8, 391–397. [Google Scholar] [CrossRef]
- Wang, Q.; Guo, Q.; Lei, L.; Zhou, J. Multiple-image encryption based on interference principle and phase only mask multiplexing in Fresnel transform domain. Appl. Opt. 2013, 52, 6849–6857. [Google Scholar] [CrossRef]
- Barrera, J.F.; Henao, R.; Tebaldi, M.; Torroba, R.; Bolognini, N. Multiplexing encryption–decryption via lateral shifting of a random phase mask. Opt. Commun. 2006, 259, 532–536. [Google Scholar] [CrossRef]
- Alfalou, A.; Brosseau, C. Exploiting root-mean-square time-frequency structure for multiple-image optical compression and encryption. Opt. Lett. 2010, 35, 1914–1916. [Google Scholar] [CrossRef]
- Lee, I.H.; Cho, M. Double random phase encryption using orthogonal encoding for multipleimage transmission. J. Opt. Soc. Korea 2014, 18, 201–206. [Google Scholar] [CrossRef] [Green Version]
- Li, X.; Meng, X.; Yang, X.; Yin, Y.; Wang, Y.; Peng, X.; He, W.; Dong, G.; Chen, H. Multiple-image encryption based on compressive ghost imaging and coordinate sampling. IEEE Photon. J. 2017, 8, 1–11. [Google Scholar] [CrossRef]
- Wu, J.; Xie, Z.; Liu, Z.; Liu, W.; Zhang, Y.; Liu, S. Multiple-image encryption based on computational ghost imaging. Opt. Commun. 2016, 359, 38–43. [Google Scholar] [CrossRef]
- Zhang, L.; Yuan, X.; Zhang, D.; Chen, J. Research on Multiple-image Encryption Scheme Based on Fourier Transform and Ghost Imaging Algorithm. Curr. Opt. Photon. 2018, 2, 315–323. [Google Scholar]
- Yang, X.; Wu, H.; Yin, Y.; Meng, X.; Peng, X. Multiple-image encryption base on compressed coded aperture imaging. Opt. Lasers Eng. 2020, 127, 105976. [Google Scholar] [CrossRef]
- Bian, L.; Suo, J.; Hu, X.; Chen, F.; Dai, Q. Efficient single pixel imaging in Fourier space. J. Opt. 2016, 18, 085704. [Google Scholar] [CrossRef] [Green Version]
- Chakrabarti, A.; Zickler, T. Statistics of real-world hyperspectral images. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Colorado, CO, USA, 20–25 June 2011; pp. 193–200. [Google Scholar]
- Deng, C.; Zhang, Y.; Mao, Y.; Fan, J.; Suo, J.; Zhang, Z.; Dai, Q. Sinusoidal Sampling Enhanced Compressive Camera for High Speed Imaging. IEEE Trans. Pattern Anal. 2019, 43, 1380–1393. [Google Scholar] [CrossRef] [PubMed]
- Cai, B.; Xu, X.; Jia, K.; Qing, C.; Tao, D. DehazeNet: An End-to-End System for Single Image Haze Removal. IEEE Trans. Image Process 2016, 25, 5187–5198. [Google Scholar] [CrossRef] [Green Version]
- Long, J.; Shelhamer, E.; Darrell, T. Fully Convolutional Networks for Semantic Segmentation. IEEE Trans. Patter. Recog. Mach. Intellig. 2017, 39, 640–651. [Google Scholar]
- Kulkarni, K.; Lohit, S.; Turaga, P.; Kerviche, R.; Ashok, A. ReconNet: Non-Iterative Reconstruction of Images from Compressively Sensed Measurements. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Las Vegas, NV, USA, 27–30 June 2016; pp. 449–458. [Google Scholar]
- Lyu, M.; Wang, W.; Wang, H.; Wang, H.; Li, G.; Chen, N.; Situ, G. Deep-learning-based ghost imaging. Sci. Rep. 2017, 7, 17865. [Google Scholar] [CrossRef]
- Sinha, A.; Lee, J.; Li, S.; Barbastathis, G. Lensless computational imaging through deep learning. Optica 2017, 4, 1117–1125. [Google Scholar] [CrossRef] [Green Version]
- Hai, H.; Pan, S.; Lia, M.; Lu, D.; He, W.; Peng, X. Cryptanalysis of random-phase-encoding based optical cryptosystem via deep learning. Opt. Express 2019, 27, 21204–21213. [Google Scholar] [CrossRef] [PubMed]
- Ronneberger, O.; Fischer, P.; Brox, T. U-net: Convolutional networks for biomedical image segmentation. In Proceedings of the International Conference on Medical Image Computing and Computer-Assisted Intervention, Munich, Germany, 5–9 October 2015; pp. 234–241. [Google Scholar]
- Kingma, D.P.; Ba, J. Adam: A Method for Stochastic Optimization. In Proceedings of the International Conference on Learning Representations (ICLR), San Diego, CA, USA, 7–9 May 2015. [Google Scholar]
- FEI Face Database, Image Processing Laboratory, Department of Electrical Engineering, Centro Universitario da FEI, São Bernardo do Campo, São Paulo, Brazil. Available online: https://fei.edu.br/~cet/facedatabase.html (accessed on 18 August 2021).
- Msood, F.; Driss, M.; Boulila, W.; Ahmad, J.; Rehman, S.U.; Jan, S.U.; Qayyum, A.; Buchanan, W.J. A Lightweight Chaos-Based Medical Image Encryption Scheme Using Random Shuffling and XOR Operations. Wirel. Pers. Commun. 2021. [Google Scholar] [CrossRef]
Test Image | Horizontal | Vertical | Diagonal |
---|---|---|---|
Img1 | 0.9831 | 0.9749 | 0.9779 |
Img2 | 0.9689 | 0.9594 | 0.9638 |
Img3 | 0.9337 | 0.9220 | 0.9321 |
Img4 | 0.9605 | 0.9487 | 0.9548 |
Ciphertext | −0.0115 | −0.0063 | 0.0038 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Li, Q.; Meng, X.; Yin, Y.; Wu, H. A Multi-Image Encryption Based on Sinusoidal Coding Frequency Multiplexing and Deep Learning. Sensors 2021, 21, 6178. https://doi.org/10.3390/s21186178
Li Q, Meng X, Yin Y, Wu H. A Multi-Image Encryption Based on Sinusoidal Coding Frequency Multiplexing and Deep Learning. Sensors. 2021; 21(18):6178. https://doi.org/10.3390/s21186178
Chicago/Turabian StyleLi, Qi, Xiangfeng Meng, Yongkai Yin, and Huazheng Wu. 2021. "A Multi-Image Encryption Based on Sinusoidal Coding Frequency Multiplexing and Deep Learning" Sensors 21, no. 18: 6178. https://doi.org/10.3390/s21186178
APA StyleLi, Q., Meng, X., Yin, Y., & Wu, H. (2021). A Multi-Image Encryption Based on Sinusoidal Coding Frequency Multiplexing and Deep Learning. Sensors, 21(18), 6178. https://doi.org/10.3390/s21186178