Keywords

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

1 Introduction

Recent advances in image encryption techniques are capable of protecting the digital images which are being communicated over various transmission media from leakage. Images related to medical or military applications, corporate video conference, etc. need reliable and secure transmission, which can be achieved by encryption. With the help of efficient optical encryption and decryption technique, one can fulfill the requirements of security needs of digital images. Multiple image encryption systems based on optical means have been proposed by various research groups’ earlier [110]. For real time applications, optics and optoelectronics techniques are very useful as these are accurate, fast computing and support parallelism. These methods provide parameter such as wavelength, phase, polarization, etc. which can be used to hide information more securely in various types of images [11]. Li et al. proposed propose a new method for color image encryption by wavelength multiplexing on the basis of two-dimensional (2-D) generalization of fractional Hartley transform [12]. Nishchal et al. proposed and implemented a phase-encrypted memory system they utilized the cascaded extended fractional Fourier transform (FRT) [13]. Madan Singh et al. proposed an encryption method based on double random phase encoding and decoding system for two-dimensional gray scale image [14, 15]. Li et al. proposed a double-image encryption algorithm. This algorithm can encrypt two input images into a single encrypted output image. The method exploits the amplitude of gyrator transform with two different groups of angles to decrypt the images [16, 17]. Narendra Singh and Aloka Sinha proposed a novel method for image encryption, utilizing gyrator transform and chaos theory [18].

Here we propose an efficient optical image encryption Technique Using Radon Transforms and Chaos function. The proposed technique uses Radon Transform and Chaotic Random Phase Mask (CRPM). The technique is highly robust and has great immunity to unauthorized decryption. The original and decrypted image are highly correlated. It is possible to implement this encryption using optical imaging technique which makes it more relevant for radio over fiber communication systems.

1.1 Radon Transform

The radon transform is represented by integral of a function over straight lines. It is utilized predominantly in the field of Medical Imaging, Ground Penetrating Radar (GPR), electron microscopy, hyperbolic partial differential equation etc.

The mathematical model of radon transform in for a two dimensional function can be represented as follows.

Considering f as a mathematical function bound by a large disc in Eucildian plane R 2.

Then it’s radon transform can be defined as function Rf, which is defined on the space of lines L in R 2 as given in (1).

$$Rf(L) = \int\limits_{L} {f(x)d\sigma (x)}$$
(1)

the integration is done w.r.t. the arc length measure dσ on L. L can be parameterized as follows;

$$L(x(t),y(t)) = (t\sin \alpha, + s\cos \alpha ) + ( - t\cos \alpha + \sin \alpha )$$

here the distance between L and origin is denoted by s and α signifies the angle it makes with the x axis. Thus (α, s) represents coordinates on the space of all lines in R 2, and in terms of these coordinates Radon transform can be expressed as

$$Rf(\alpha ,s) = \int\limits_{ - \alpha }^{\alpha } {f(x)(t),y(t)dt} = \int\limits_{ - \infty }^{\infty } {f(t(\sin \alpha , - \cos \alpha ) + s(\cos \alpha ,\sin \alpha ))dt}$$
(3)

1.2 Chaotic Phase Mask

Chaotic functions describe the behavior of certain dynamic systems i.e., systems whose state evolves with time and which may exhibit dynamics that are highly sensitive to initial conditions. Due to this sensitivity, behavior of chaotic systems appears to be random. For certain chaotic systems if the initial conditions are known, their future dynamics can be completely predicted. This is defined as deterministic chaos. In our encryption technique a random phase mask has been generated using logistic map as chaotic map. It is a discrete 1-D function as mentioned in the equation

$${\text{x}}_{{{\text{n}} + 1}} = {\text{rx}}_{\text{n}} ( 1- {\text{x}}_{\text{n}} )$$
(2)

here xn is a positive number between 0 and 1 which represents the population at year n and r represents the rate of growth i.e.; combined rate of reproduction and starvation in the population.

1.3 Cryptographic Enhancement

For an m × n image two sequence of random number of length m and n corresponding to each row and column of the image are generated. At first each pixel of the image is replaced by the r’th pixel from the right of the original pixel, where r is the random number corresponding to that particular row. Same action is performed with respect to column. During decryption same action is performed in the reverse direction yielding the correct image. The procedure is explained in Fig. 1. The sequence of random number acts as a set of key, and this whole operation adds additional security feature to the encryption.

Fig. 1
figure 1

Cryptographic enhancement

2 Proposed Technique

The proposed technique utilizes radon transforms and double chaotic random phase mask. Let f(x, y) denotes the original image to be encrypted. The block diagram in Fig. 2a gives an overview of the encryption process.

Fig. 2
figure 2

a Block diagram for encryption, b block diagram for decryption

2.1 Encryption Process

A gray scaled image of size 256 × 256 is used as input. Radon transform is applied on the input image. The transformation generates an intensity image of different size (367 × 451) with respect to the input image. The number of rows of the transformed image depends on the number of intensity level present in the image while the number of column depends on the total number of angle for which RT is taken, which acts as a security feature. The transformed image is multiplied with the random phase mask represented by exp(ipiC(x)) here C(x) is the logistic map function. The row column shift operation is performed on this output to generate the encrypted image. The encryption procedure is shown in Fig. 2a.

2.2 Decryption Process

For decryption the pixels are shifted to their original coordinates by applying row column shift operation in the reverse direction, and then this image is multiplied with the conjugate of the random phase mask. Now inverse radon transform applied for the same set angle as of radon transform yields the original input image. Figure 2b illustrates the decryption process.

3 Result and Analysis

The above figure shows the results obtained by the proposed method. To find the robustness of the proposed system MSE error analysis, histogram analysis, correlation of pixel distribution among input, output and un-authenticated decryption image were performed. The original and decrypted image were found to have high correlation coefficient and the method is highly immune to un-authorized decryption.

As shown in Table 1, different value of chaotic mask seed were applied to an image encrypted with the seed value 3.8. It is clearly evident from the graph and table that the MSE value for correct key is negligible. 48.5199, however for wrong key such as 3.7999 the MSE value is extremely high (264224.9905) implying failed decryption as shown in Fig. 3h.

Table 1 MSE w.r.t variation in rate of the logistic function
Fig. 3
figure 3figure 3

a Input image, b radon transform of image, c random phase mask, d radon transformed image multiplied with phase mask, e encrypted image after row column shift, f decrypted image with correct procedure, g image decrypted without shifting the row-column back, h image decrypted with wrong conjugate mask

The proposed technique results into a correlation co-efficient of 0.9932 between the input and output and decrypted image (Fig. 4).

Fig. 4
figure 4

MSE w.r.t variation in rate of the logistic function

4 Conclusions

A highly efficient image encryption and decryption Technique Using Radon Transforms and Chaos function has been proposed. The technique is highly robust and has great immunity to unauthorized decryption. The original and decrypted image are highly correlated.