Image Cryptosystem in Optical Gyrator Transform Domain Using Audio Keys
Abstract
:1. Introduction
1.1. Optical Image Encryption
Status of Gyrator Transform Domain Optical Encryption
2. Optical Image Encryption Security Analysis
2.1. Basic Concepts of Information Security
2.2. Common Evaluation Functions for Image Restoration
2.3. Cryptographic Analysis
3. Optical Gyrator Transform Domain-Based Audio Key Encryption Algorithm
3.1. Development of the Gyrator Transform Domain
3.2. Gyrator Definition
3.2.1. Optical Implementation of Gyrator [26]
3.2.2. Numerical Implementation of Gyrator
3.3. Selecting Sound Encryption
3.3.1. Encryption Process
- Method I
- Method II
3.3.2. Decryption Process
4. Implementation and Experimental Validation
4.1. Experimental Setting
4.2. Simulation Results
4.3. Performance and Evaluation Tests of the Gyrator Transform
4.3.1. Noise Attack Test
4.3.2. Known Plaintext Attack Test
4.3.3. Chosen Plaintext Attack Test
4.3.4. Shear Attack Test
4.4. Method II Robust Analysis
4.5. Optical Image Encryption Testing System V1.0
4.5.1. Software Module Design
- (1)
- Data pre-processing module: The red box area can be based on the characteristics of a remote sensing image with multiple bands, and three bands can be selected to synthesize the pseudo-color image after importing the data to obtain the visual information of the image initially. If you want to encrypt a grayscale image, it can directly make the same number in three bands. After the initial image is obtained, the image is encrypted and decrypted directly in order to obtain the encryption and decryption effect more intuitively.
- (2)
- Load data module: The blue box area is selected for a certain mp3 audio sequence, pending encryption and decryption operation.
- (3)
- Information Display Module: The white box area is the result of image processing. It is divided into three parts. When the corresponding button is clicked, the wave fusion image, the encrypted result and the corresponding decryption map are displayed respectively.
- (4)
- Attack module: The yellow box area is the attack window and provides multiple attack algorithms and checks the robustness of the algorithm. There are four attack algorithms, namely noise attack, known plaintext attack, selected plaintext attack, and shear attack.
4.5.2. Simulation Experiments
5. Conclusions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
References
- Kumar, P.; Joseph, J.; Singh, K. Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator. Appl. Opt. 2011, 50, 1805–1811. [Google Scholar] [CrossRef]
- Refregier, P.; Javidi, B. Optical image encryption based on input plane and Fourier plane random encoding. Opt. Lett. 1995, 20, 767–769. [Google Scholar] [CrossRef]
- Xu, X.; Chang, J.; Wu, C.; Song, D. Local hybrid optical encryption system based on double random phase encoding. Acta Phys. Sin. 2020, 69. [Google Scholar] [CrossRef]
- Peng, K.; Shen, X.; Huang, F. DRPE encryption system based on random Radon transform. Semicond. Optoelectron. 2020, 41, 123–127. [Google Scholar]
- Ji, G.; Tian, H.; Zhang, L.; Deng, X. Multi-image encryption technology based on phase recovery algorithm. J. Huaihua Coll. 2018, 37, 52–55. [Google Scholar]
- Duan, C.F.; Zhou, J.; Gong, L.H.; Wu, J.Y.; Zhou, N.R. New color image encryption scheme based on multi-parameter fractional discrete Tchebyshev moments and nonlinear fractal permutation method. Opt. Lasers Eng. 2022, 150, 106881. [Google Scholar] [CrossRef]
- Refregier, P.; Javidi, B. Optical image encryption using input plane and Fourier plane random encoding. SPIE’s 1995 International Symposium on Optical Science, Engineering, and Instrumentation. Int. Soc. Opt. Photonics 1995, 62–68. [Google Scholar] [CrossRef]
- Zhang, P.K.; Li, Y.; Liu, J.; Liu, J.; Qiao, X. Encryption and decryption of optical images by phase array with chaotic sequences. J. Photonics 1998, 27, 979–982. [Google Scholar]
- Wang, R.K.; Watson, I.A.; Chatwin, C.R. Random phase encoding for optical security. Opt. Eng. 1996, 35, 2464–2469. [Google Scholar] [CrossRef]
- Rajput, S.K.; Nishchal, N.K. Multiple Image Encryption based on Known-plaintext Attack and Modified G-S Phase Retrieval Algorithm. In Proceedings of the International Conference on Optics in Precision Engineering and Nanotechnology (icOPEN2013), Singapore, 9–11 April 2013. [Google Scholar]
- Guo, Y.; Xu, X.; Jing, S.; Jin, T.; Jin, M. Optical image encryption based on spiral phase transform and generalized Fibonacci chaos. J. Electron. Inf. 2020, 42, 988–996. [Google Scholar]
- Zhu, S.; Zhu, C. Security analysis and improvement of an image encryption cryptosystem based on bit plane extraction and multi chaos. Entropy 2021, 23, 505. [Google Scholar] [CrossRef]
- Pang, B. Research on the Attack and Defense of Optical Encryption System. Ph.D. Thesis, Hangzhou University of Electronic Science and Technology, Hangzhou, China, 2022. [Google Scholar]
- Huang, Z.W.; Zhou, N.R. Image encryption scheme based on discrete cosine Stockwell transform and DNA-level modulus diffusion. Opt. Laser Technol. 2022, 149, 107879. [Google Scholar] [CrossRef]
- Mehra, I.; Nishchal, N.K. Fingerprint image encryption using phase retrieval algorithm in gyrator wavelet transform domain using QR decomposition. Opt. Commun. 2023, 533, 129265. [Google Scholar] [CrossRef]
- Yang, Z.; Cao, Y.; Liu, S.; Tanougast, C.; Blondel, W.; Liu, Z.; Chen, H. A Novel Signature and Authentication Cryptosystem for Hyperspectral Image by Using Triangular Association Encryption Algorithm in Gyrator Domains. Appl. Sci. 2022, 12, 7649. [Google Scholar] [CrossRef]
- Lohmann, A.W. Image rotation, Wigner rotation, and the fractional Fourier transform. JOSA A 1993, 10, 2181–2186. [Google Scholar] [CrossRef]
- Yao, L.; Yuan, C.; Qiang, J.; Feng, S.; Nie, S. Asymmetric image encryption method based on gyrator transform and vector operation. Acta Phys. Sin. 2016, 65, 214203. [Google Scholar]
- Shen, C.N. Image encryption based on Fourier transform and Gyrator transform. Opt. Instrum. 2015, 75–78. [Google Scholar] [CrossRef]
- Liu, Z.; Chen, H.; Liu, T.; Li, P.; Xu, L.; Dai, J.; Liu, S. Image encryption by using gyrator transform and Arnold transform. J. Electron. Imaging 2011, 20, 013020. [Google Scholar] [CrossRef]
- Zhu, C. A novel image encryption scheme based on improved hyperchaotic sequences. Opt. Commun. 2012, 285, 29–37. [Google Scholar] [CrossRef]
- Yang, Z.; Cao, Y.; Ji, Y.; Liu, Z.; Chen, H. Securing color image by using bit-level modified integer nonlinear coupled chaos model in Fresnel diffraction domains. Opt. Lasers Eng. 2022, 152, 106969. [Google Scholar] [CrossRef]
- Liu, Z.; Chen, D.; Ma, J.; Wei, S.; Zhang, Y.; Dai, J.; Liu, S. Fast algorithm of discrete gyrator transform based on convolution operation. Optik 2011, 122, 864–867. [Google Scholar] [CrossRef]
- Liu, Z.; Chen, H.; Blondel, W.; Shen, Z.; Liu, S. Image security based on iterative random phase encoding in expanded fractional Fourier transform domains. Opt. Lasers Eng. 2018, 105, 1–5. [Google Scholar] [CrossRef]
- Meng, X.F. Research on Optical Information Security Techniques Based on Iterative Phase Recovery Algorithm and Phase Shift Interferometry. Ph.D. Thesis, Shandong University, Jinan, China, 2008. [Google Scholar]
- Chen, H.; Tanougast, C.; Liu, Z.; Hao, B. Securing color image by using hyperchaotic system in gyrator transform domains. Opt. Quantum Electron. 2016, 48, 1–13. [Google Scholar] [CrossRef]
- Chen, H.; Zhu, L.; Liu, Z.; Tanougast, C.; Liu, F.; Blondel, W. Optical single-channel color image asymmetric cryptosystem based on hyperchaotic system and random modulus decomposition in Gyrator domains. Opt. Lasers Eng. 2020, 124, 105809. [Google Scholar] [CrossRef]
- Sachin, S.; Kumar, R.; Singh, P. Unequal modulus decomposition and modified Gerchberg Saxton algorithm based asymmetric cryptosystem in Chirp-Z transform domain. Opt. Quantum Electron. 2021, 53, 254. [Google Scholar] [CrossRef]
- Rakheja, P.; Vig, R.; Singh, P. An asymmetric hybrid cryptosystem using hyperchaotic system and random decomposition in hybrid multi resolution wavelet domain. Multimed. Tools Appl. 2019, 78, 20809–20834. [Google Scholar] [CrossRef]
- Peng, Z.; Wang, C.; Lin, Y.; Luo, X. A novel four-dimensional multi-wing hyper-chaotic attractor and its application in image encryption. Acta Phys. Sin. 2014, 63, 240506. [Google Scholar] [CrossRef]
- Liu, H.; Kadir, A.; Liu, J. Color pathological image encryption algorithm using arithmetic over Galois field and coupled hyper chaotic system. Opt. Lasers Eng. 2019, 122, 123–133. [Google Scholar] [CrossRef]
- Singh, N.; Sinha, A. Gyrator transform-based optical image encryption, using chaos. Opt. Lasers Eng. 2009, 47, 539–546. [Google Scholar] [CrossRef]
- Zhou, N.R.; Tong, L.J.; Zou, W.P. Multi-image encryption scheme with quaternion discrete fractional Tchebyshev moment transform and cross-coupling operation. Signal Process. 2023, 211, 109107. [Google Scholar] [CrossRef]
Transformation | Correlation between Adjacent Pixels | Anti-Noise Attack | Correlation between Adjacent Pixels and Resistance to Shear Attacks | Optical Device Realization |
---|---|---|---|---|
Fourier Transformation (FT) | × | × | × | √ |
Fast Fourier Transform (FFT) | √ | √ | √ | × |
Fourier Series Transform (FST) | √ | × | × | √ |
Gyrator Transformation (GT) | √ | √ | √ | √ |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Tian, M.; Sun, G.; Song, W.; Liu, Z.; Chen, H. Image Cryptosystem in Optical Gyrator Transform Domain Using Audio Keys. Electronics 2023, 12, 2816. https://doi.org/10.3390/electronics12132816
Tian M, Sun G, Song W, Liu Z, Chen H. Image Cryptosystem in Optical Gyrator Transform Domain Using Audio Keys. Electronics. 2023; 12(13):2816. https://doi.org/10.3390/electronics12132816
Chicago/Turabian StyleTian, Miao, Gege Sun, Wenbo Song, Zhengjun Liu, and Hang Chen. 2023. "Image Cryptosystem in Optical Gyrator Transform Domain Using Audio Keys" Electronics 12, no. 13: 2816. https://doi.org/10.3390/electronics12132816
APA StyleTian, M., Sun, G., Song, W., Liu, Z., & Chen, H. (2023). Image Cryptosystem in Optical Gyrator Transform Domain Using Audio Keys. Electronics, 12(13), 2816. https://doi.org/10.3390/electronics12132816