Abstract
We propose an optical asymmetric technique for multiple-images that uses the feature of arbitrary vector light. It involves structured phase masks that have been generated using Fourier transform of array of structured phases with different topological charges at different locations. The use of these phase masks enlarge the key space and hence provide high level of security. In the proposed scheme, plaintexts are transformed into log-polar coordinate to make them rotation- and scale-invariant. The information of two images is converted into a complex form followed by a suitable relation. Phase parts of the complex functions are stored as first decryption keys, while amplitude parts are encrypted using generated structured phase mask in fractional Fourier domain and phase truncation approach is followed. The phase value distributions of each encrypted images are calculated using modified Gerchberg-Saxton phase retrieval algorithm and encoded with arbitrary vector light fields. Stokes parameters S1 and S2 are recorded experimentally at different polarization angles. S1 holds the final encrypted image, while S2 is stored as decryption key. The proposed scheme has high resistance against specific attack.
Similar content being viewed by others
Avoid common mistakes on your manuscript.
1 Introduction
With the rapid advancement in science and technology, communication has become very easy and fast. Now-a-days lots of data/information are generated over Internet, multimedia, and other social media platforms. Different types of documents and identity cards such as credit card, debit card, driving license, etc. are in heavy demand. Due to the rapid increase in such types of data, information fraud is also increasing in every sector. In modern technology, cryptography is used as a countermeasure to protect any confidential information. In case of large amounts of data, digital cryptography requires high computational cost and takes longer time due to intrinsic one-dimensional and serial processing characteristics. Optical cryptosystems are being used for image security due to their ultra-fast speed and parallel processing [1,2,3]. Also, optical systems have inherent characteristics which provide extra degrees of freedom such as amplitude, phase, polarization, spatial frequency, wavelength, orbital angular momentum. In optical information processing, various approaches have been reported in past decades [3].
The double random phase encoding (DRPE) technique was reported by Refregier and Javidi, which opened new aspects in optical cryptography [1, 2]. The DRPE framework has been extended in various transform domains such as Fourier transform (FT), fractional Fourier transform (FRT), Fresnel transform, Gyrator transform, wavelet transform, etc. [3]. These transforms are used in image/data security because they provide extra parameters which enlarge the key space and hence enhance the level of security [2,3,4]. Therefore, under the basic DRPE framework, various encryption techniques have been developed such as optical image encryption using phase-shifting interferometry, chaotic phase mask, chaotic structured phase mask, polarized light, DNA encoding, fingerprint phase masks, Arnold transform etc. [3,4,5,6,7,8,9,10,11,12]. Since the DRPE technique requires conjugate phase mask of encryption key during decryption process and physically it is difficult to record the conjugate phase, therefore, joint transform correlator (JTC) based encryption schemes have been developed [13].
The DRPE schemes fall under the category of symmetric key cryptosystems which suffer from key distribution and management. Due to linearity in such cryptosystems, they have been proved vulnerable to attacks such as chosen-ciphertext attack and chosen-plaintext attack [3]. In 2010, optical asymmetric encryption based on phase-truncated FT was reported by Qin and Peng, which breaks the linearity in DRPE scheme [14, 15]. However, this technique is vulnerable to specific attacks [16]. They have been extended in combination with other schemes such as optical asymmetric encryption using gyrator wavelet transform, photon counting, and Fresnel domain encoding [3, 17]. Besides phase truncation approach, other asymmetric cryptosystems [18, 19] have been reported in literature such as equal modulus decomposition (EMD) based image encryption, RSA and elliptic curve cryptography-based image encryption, digital holography-based encryption, interference based encryption etc. [20,21,22,23,24,25,26,27,28,29,30].The EMD-based scheme was proposed to resist the specific attack. Authentication has been combined with image encryption, which does not require visual verification of retrieved image [31, 32]. Further, partially coherent sources have been used in image encryption to minimize the noise arising due to coherent sources and misalignment [33]. Several encryption schemes employing partially coherent illumination have been reported in literature such as, enhanced exclusive-OR and quick response (QR) code-based, multi key channel encryption etc. [34, 35].
In recent years, vector beams have gained much attention of researchers because of their inherent properties. Vector beam is a type of beam which shows different polarization state at different local position of detector plane. Optical fields with spatially inhomogeneous polarization distributions are referred to as arbitrary vector light. They can be realized through the superposition of two homogeneously polarized lights with orthogonal circular basis. Different types of approach have been applied to generate the vector beam, which include interferometry and non-interferometry methods [36, 37]. Kumar et al. proposed the idea of image encryption using vector light fields and arbitrary vector beam encoding [38, 39]. The use of vector light field in the encryption provides high level of security and requires comparatively less complicated optical set-up. Besides the vector beam, optical vortices have also gained much attention of researchers. These are created because of helical wavefront of light, which show phase singularity at the center and contain orbital angular momentum (OAM). Therefore, these are also called as OAM beams [40]. The light beams associated with OAM have more orthogonal modes than polarization. Because of this property, OAM beams are used for high-dimensional data encoding and processing such as controllable optical vortex array for image encoding, structured phase encoding for image encryption, etc. [41, 42].
In the proposed scheme, we present an idea of multi-image encryption in optical asymmetric cryptosystem architecture that uses arbitrary vector light field with compact optical set-up. The use of arbitrary vector light field for image encryption provides intensity-based measurement which can be done by recording the Stokes parameters. Use of FRT domain encoding introduces additional keys.
The rest of the paper is organized as follows; In Sect. 2 and its subsections theoretical analysis of encryption and decryption process of proposed scheme has been described. Experimental arrangement, experimental results and simulation results have been described in Sect. 3. Section 4 describes the attack analysis. Conclusion has been given in Sect. 5.
2 Theoretical analysis
In this scheme, grayscale intensity images are used as plaintexts. Let I1(x,y), I2(x,y), I3(x,y),……,In(x,y) denote the plaintexts, where x and y are the coordinates in the transverse plane. Each image is transformed into log-polar coordinate to make it rotation and scale invariant. Image In(x,y) can be transformed from Cartesian coordinates to log-polar coordinate g(ρ,θ) as,
where LPT stands for log-polar transform. It is defined as [43, 44],
Here, (x0,y0) and (x,y) denote the central and sampling pixels of image In(x,y).
2.1 Encryption
Pair of two-two images are made such as (I1,I2), (I3,I4),…, and each pair is converted into complex form z = reiϕ. Here, r and ϕ are calculated as,
Here, ϕi is phase encoded and stored as first decryption key k1. Now, two unclonable phase masks \(pm_{1} = \exp \left[ {i2\pi \arg \left\{ {\Im \left( {SP_{1} } \right)} \right\}} \right]\) and \(pm_{2} = \exp \left[ {i2\pi \arg \left\{ {\Im \left( {SP_{2} } \right)} \right\}} \right]\) are numerically generated using an array of structured phases, which are nothing but hybrid form of structured phase.\(\Im\) and arg represent the Fourier transform operation and its phase, respectively. SP1 and SP2 are the two arrays of structured phases, defined as,
where SPi (i = 1,2) represent the array of structure phase mask, which has been generated by phase Ω of Laguerre-Gaussian (LG) beam with different topological charges l. Now each ri is multiplied by first phase mask pm1. FRT of order α is carried out of this product function. The phase truncation (PT) and amplitude truncation (AT) operations are applied on the transformed image, which can be expressed as,
Ai is stored as second decryption key k2, while Pi is multiplied by second phase mask pm2 and inverse FRT of order β is carried out. PT and AT operations are again applied to the transformed image. They are expressed as,
Bi is stored as third decryption key k3 and phase value distribution (PVD) ωi for each Fi is calculated using modified Gerchberg-Saxton algorithm (MGSA). Their sum (ψ = ω1 + ω2 + ω3 + …) is phase-encoded as exp{i.ψ} and simultaneously decryption keys for each images are calculated as,
Here, Kdi is stored as fourth decryption key.
2.2 Encoding in vector light field
Phase-encoded information is displayed onto the liquid crystal spatial light modulator (SLM) and modulated into orthogonal polarization component of light using a quarter wave plate whose fast axis is at 450 with respect to the laboratory horizontal. This can be understood using Jones calculus as,
Intensity is recorded using linear polarizer whose transmission axis is at θ1 degree with laboratory horizontal. Recorded intensity can be expressed mathematically as,
Here,\(\left\langle {...} \right\rangle\) represents the time average of electric field. Stokes parameters S1 and S2 are calculated using the recorded intensities I(00), I(450), I(900), and I(1350), respectively, which are expressed as [38],
Stokes parameter S1holds encrypted data while parameter S2 is stored as fifth decryption key. Stokes parameters S0 and S3, remain 1 and 0, respectively.
2.3 Decryption
To retrieve the original image, reverse process of encryption is followed with correct decryption keys. The process is described mathematically as,
Using above Eq. (18), PVD is calculated and written as,
To retrieve the final images, the following process is followed.
Here, In-1(x,y) and In(x,y) are the final decrypted images. ‘Re’ and ‘Im’ stand for real and imaginary parts of the function.\(\left| {..} \right|\) represents the amplitude part of the function. ILPT denotes the inverse log-polar transform of the function (see Figs. 1, 2).
3 Experimental procedure and analysis
In the proposed scheme, six grayscale images (alphanumeric) each of size 128 × 128 pixels have been used. To verify the proposed scheme, both simulation and experimental studies have been carried out. For simulation, MATLAB 2022b platform has been used. In the Fig. 3, row (a) shows the plaintexts and row (b) shows their log-polar transformed images. Row (c) shows the paired images and corresponding decryption keys. Figure 4 shows the results of encryption using phase and amplitude truncation approach in FRT domain. In the first and second rows of Fig. 4, first images denote the encryption keys and rest are the decryption keys. Row (c) represents the encrypted images Fi of all paired images i.e. all ri. Calculated PVDs, ωi using MGSA corresponding encrypted images Fi have been shown in row (d) of Fig. 4. Figure 5a presents the phase-encoded form of sum of all PVDs i.e. exp{i.ψ} and decryption keys corresponding all PVDs have been shown in Fig. 5b–d, respectively.
To encode the information with arbitrary vector light, the schematic of the experimental arrangement has been shown in Fig. 6. In this set-up, a coherence light beam (wavelength 532 nm) is passed through the beam expander (BE), which passes through the SLM onto which the phase-encoded information is displayed. Light beam carries this information after transmitting from SLM (LC 2002 HOLOEYE, resolution 800 × 600 pixels with pixel pitch 32 μm). After SLM, a quarter wave plate is placed at 45° with respect to laboratory horizontal, which produces the two orthogonal components of circular basis of light beam. A polarizer is kept in the path of light beam to record the intensities at four different polarization angles (0°, 45°, 90°, and 135°). 4f imaging set-up is used for imaging purpose. Intensities are captured using a complimentary metal-oxide semiconductor (CMOS) camera (2,592 × 1,944 (5 MP) RGB32 @ 15 fps). Stokes parameters, S1 and S2 are calculated computationally using recorded intensities. Figure 7, row (a) shows experimentally recorded intensities and calculated Stokes parameters, respectively. The simulation results have been shown in row (b) of Fig. 7. Stokes parameter S1 holds final encrypted image while S2 is stored as decryption key. Figure 8 represents the retrieved images after using the all correct decryption keys and following the inverse of the encryption process. Figure 8, row (c) presents the case when any one of the decryption key is wrong then original information cannot be retrieved.
4 Attack analysis
As we know that a strong cryptosystem should be robust to all applicable attacks. Different types of attacks are applied on the encryption system to retrieve the original information, such as known plaintext attack (KPA), chosen-plaintext attack (CPA), chosen-ciphertext attack (CCA), ciphertext-only attack (COA), brute force attack, differential attack, and specific attack.
4.1 Occlusion attack
During the data transmission, if some information is lost, in this situation occlusion attack is studied to check the robustness of cryptosystem. In the proposed scheme, some area of the encrypted image has been cropped and then original image is retrieved using correct decryption keys and process. Obtained results prove the robustness of proposed scheme against occlusion attack. In the Fig. 9, first row represents the encrypted image with occluded area 12.5%, 25% and 50% respectively, while retrieved images are given in second row of Fig. 9 corresponding to first row’s images.
4.2 Noise attack
In the proposed scheme, the white Gaussian noise with zero mean and unit standard deviation is added with encrypted image as follows,
where c represents the noise strength, G(x,y) is white Gaussian noise and S1 represents the encrypted image. Figure 8 shows the retrieved images of noised encrypted images with different noise strength (1, 2, 5, 10, 12, 17 and 20). It can be clearly seen from Fig. 10 that original information can be successfully retrieved even with noised encrypted image.
4.3 Specific attack
Specific attack is formulated specifically for optical asymmetric cryptosystems. In the asymmetric scheme, encryption and decryption keys are different from each other. PTFT approach is a kind of asymmetric image encryption technique, which is vulnerable to specific attack. Specific attack has been applied to check the robustness of the proposed scheme and it has been found that it resists the specific attack. Figure 11 shows the retrieved image after applying the specific key. In the specific attack, an attacker tries to retrieve original information, say {I1(x,y)} with public keys and ciphertext because he knows only public keys and ciphertext.
Figure 11a presents the retrieved image after applying the specific attack with known public keys and Fig. 11b and c denote the plots between number of iteration (n) and correlation coefficient (CC) value and plot between number of iteration (n) and mean square error (MSE), respectively. Figure 11d presents the retrieved image, when attacker knows the public keys and one of the private keys. Figures 11e and f are the plots between n and CC value, plot between n and MSE value.
4.4 Statistical analysis
Now-a-days different types of statistical analysis methods are being utilized to study the statistical attacks. Among them, histogram analysis is done in the proposed scheme. For an effective encryption, it is necessary that histograms of different encrypted images should be same. Histograms of six images (used in this study) are shown in Fig. 12a–f, which are different. Figure 12g and h represent the histogram for the final encrypted image and final decryption key, which are indistinguishable. Therefore, histogram analysis suggests that it would be difficult for an attacker to retrieve the original information.
4.5 Key space analysis and comparison with existing work
In the proposed scheme, five decryption keys are required to retrieve the original information. Since gray scale images have been used in the proposed scheme, so decryption keys are also gray scale images. In each decryption key, each pixel can have 0–255 Gy values. Higher the size of the image, higher the number of pixels, therefore key space will be very high. Here, the use of structure phase masks and parameter S2 help enhance the key space. In comparison to reported studies, the proposed scheme provides higher security, which can be implemented using a low cast spatial light modulator within compact optical set-up [38, 39, 41].
5 Conclusion
The proposed scheme provides a novel method of optical asymmetric multiple-image encryption using vectorial light field. Each image is transformed into log-polar coordinate to make them rotation and scale invariant. Pair of two-two images is converted into complex form, in which phase part is stored as decryption key and amplitude part is encrypted using hybrid structured phase masks in FRT domain following phase truncation approach. Encrypted images are encoded into vector light fields, which contain arbitrary polarization states at different spatial locations. Stokes parameter S1 holds final encrypted data while S2 is stored as decryption key. To retrieve the original information, correct decryption keys and inverse of encryption process are used. The use of hybrid structured phase masks as well as vector light field during encryption process, offers much difficulty to attackers to generate the duplicate decryption keys. Its experimental implementation is simple. Attack analysis shows that the proposed scheme has high resistance against specific attack.
Data availability
Data presented in this paper is not publically available at this time. It can be obtained from author after reasonable request.
References
B. Javidi, J.L. Horner, Optical pattern recognition for validation and security verification. Opt. Eng. 33, 1752–1756 (1994)
P. Refregier, B. Javidi, Optical image encryption based on input plane and Fourier plane random encoding. Opt. Lett. 20, 767–769 (1995)
N.K. Nishchal, Optical cryptosystems (IOP Publs. Ltd., Bristol, 2019)
S. Liu, C. Guo, J.T. Sheridan, A review of optical image encryption techniques. Opt. Laser Technol. 57, 327–342 (2014)
X.F. Meng, X. Peng, L.Z. Cai, A.M. Li, Z. Gao, Y.R. Wang, Cryptosystem based on two-step phase-shifting interferometry and the RSA public-key encryption algorithm. J. Opt. A Pure Appl. Opt. 11, 085402 (2009)
N. Singh, A. Sinha, Gyrator transform-based optical image encryption using chaos. Opt. Laser Eng. 47, 539–546 (2009)
R. Girija, H. Singh, Symmetric cryptosystem based on chaos structured phase masks and equal modulus decomposition using fractional Fourier transform. 3D Res. 9, 42 (2018)
A. AlFalou, C. Brosseau, Dual encryption of images using polarized light. Opt. Lett. 35, 2185–2187 (2010)
S.K. Rajput, D. Kumar, N.K. Nishchal, Photon counting imaging and polarized light encoding for secure image verification and hologram watermarking. J. Opt. 16, 125406 (2014)
L. Sui, B. Gao, Color image encryption based on gyrator transform and Arnold transform. Opt. Laser Technol. 48, 530–538 (2013)
Y. Wei, A. Yan, J. Dong, Z. Hu, J. Zhang, Optical image encryption using QR code and multilevel fingerprints in gyrator transform domains. Opt. Commun. 403, 62–67 (2017)
Y. Wang, Q. Zhang, H. Zhang, T. Li, W. Xu, S. Liu, Y. Su, Optical single-channel color image encryption based on chaotic fingerprint phase mask and diffractive imaging. Appl. Opt. 62, 1009–1018 (2023)
Y. Liu, X. Shen, B. Zhou, J. Liu, J. Cai, X. Liu, Y. Cheng, Optical asymmetric JTC cryptosystem based on binary phase modulation and image superposition-subtraction operation. Appl. Opt. 61, 8711–8729 (2022)
W. Qin, X. Peng, Asymmetric cryptosystem based on phase-truncated Fourier transform. Opt. Lett. 35, 118–120 (2010)
W. Qin, X. Peng, X. Meng, B. Gao, Universal and special keys based on phase-truncated Fourier transform. Opt. Eng. 50, 080501 (2011)
B. Javidi et al., Roadmap on optical security. J. Opt. 18, 083001 (2016)
G. Luan, C. Quan, Optical double-image cryptosystem based on phase truncation in the Fresnel domain. Appl. Phys. B 129, 130 (2023)
X. Wang, Y. Chen, C. Dai, D. Zhao, Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform. Appl. Opt. 53(2), 208–213 (2014)
X. Wang, G. Zhou, C. Dai, J. Chen, Optical image encryption with divergent illumination and asymmetric keys. IEEE Photonics J. 9, 7801908 (2017)
A. Fatima, I. Mehra, N.K. Nishchal, Optical image encryption using equal modulus decomposition and multiple diffractive imaging. J. Opt. 16, 085701 (2016)
J. Wang, X. Chen, J. Zeng, Q. Wang, Y. Hu, Asymmetric cryptosystem using improved equal modulus decomposition in cylindrical diffraction domain. IEEE Access 7, 66234–66241 (2019)
H. Anshula, Singh, Ensuring security of cryptosystems with DVFM modified equal modulus decomposition in the domain of gyrator wavelet transform. Multimed. Tools Appl. 82, 5965–5985 (2023)
G. Luan, A. Li, Z. Chen, C. Huang, Asymmetric optical image encryption with silhouette removal using interference and equal modulus decomposition. IEEE Photon. J. 12, 6900508 (2020)
S.H. Jeon, S.K. Gil, Optical asymmetric cryptography modifying the RSA public-key protocol. Curr. Opt. Photon. 4, 103–114 (2020)
X. Chang, W. Li, A. Yan, P.W.M. Tsang, T.C. Poon, Asymmetric cryptosystem based on optical scanning cryptography and elliptic curve algorithm. Sci. Rep. 12, 7722 (2022)
W. Li, X. Chang, A. Yan, H. Zhang, Asymmetric multiple image elliptic curve cryptography. Opt. Laser Eng. 136, 106319 (2021)
W. Gan, L. Chen, Y. Liu, Research on optical encryption systems based on unequal modulus decomposition and polarized vortex optical holography. Opt. Commun. 482, 126609 (2021)
B. Zhu, H. Zhao, S. Liu, Image encryption based on pure intensity random coding and digital holography technique. Optik 114, 95–99 (2003)
B.L. Reddy, A. Nelleri, Single-pixel compressive digital holographic encryption system based on circular harmonic key and parallel phase shifting digital holography. Int. J. Opt. 7, 1–20 (2022)
S.K. Rajput, N.K. Nishchal, Image encryption based on interference that uses fractional Fourier domain asymmetric keys. Appl. Opt. 51, 1446–1452 (2012)
P. Sachin, K. Singh, Singh, Nonlinear image authentication algorithm based on double fractional Mellin domain. Nonlinear Dyn. 111, 13579–13600 (2023)
Y. Zhou, Y. Sun, M. Yang, J. Hou, Z. Xiao, A. Anand, L. Sui, An optical multiple-image authentication based on computational ghost imaging and total-variation minimization. Heliyon 9, e17682 (2023)
Y. Qin, Y. Wan, Q. Gong, M. Zhang, Deep-learning-based cross talk free high-security compressive encryption with spatially incoherent illumination. Opt. Express 31, 9800–9816 (2023)
P. Kumar, N.K. Nishchal, Enhanced exclusive-OR and quick response code-based image encryption through incoherent illumination. Appl. Opt. 58, 1408–1412 (2019)
Z. Ji, J. Chang, Y. Huang, Y. Wu, J.J. Cao, J. Zhang, H. Jiang, Multi-key optical encryption based on two-channel incoherent scattering imaging. Opt. Express 31, 21507–21519 (2023)
X. Wang, J. Ding, W. Ni, C. Guo, H. Wang, Generation of arbitrary vector beams with a spatial light modulator and a common path interferometric arrangement. Opt. Lett. 32, 3549–3551 (2017)
P. Kumar, S. Pal, N.K. Nishchal, P. Senthilkumaran, Non-interferometric technique to realize vector beams embedded with polarization singularities. J. Opt. Soc. Am. A 37, 1043–1052 (2020)
P. Kumar, N.K. Nishchal, A. AlFalou, Color image encryption using vectorial light field through a compact optical set-up. J. Opt. 24, 064017 (2022)
P. Kumar, A. Fatima, N.K. Nishchal, Arbitrary vector beam encoding using single modulation for information security applications. IEEE Photon. Technol. Lett. 33, 243–246 (2021)
M.V. Berry, Optical vortices evolving from helicoidal integer and fractional phase steps. J. Opt. A Pure Appl. Opt. 6, 259–268 (2004)
P. Kumar, N.K. Nishchal, A. AlFalou, Controllable optical vortex array for image encoding. IEEE Photon. Technol. Lett. 34, 521–524 (2022)
A. Shikder, P. Kumar, N.K. Nishchal, Image encryption by structured phase encoding and its effectiveness in turbulent medium. IEEE Photon. Technol. Lett. 35, 128–131 (2023)
A. Aran, N.K. Nishchal, V.K. Beri, A.K. Gupta, Log-polar transform-based wavelet-modified maximum average correlation height filter for distortion invariance in a hybrid digital-optical correlator. Appl. Opt. 46, 7970–7977 (2007)
L. Gong, X. Liu, F. Zheng, N. Zhou, Flexible multiple-image encryption algorithm based on log-polar transform and double random phase encoding technique. J. Mod. Opt. 60, 1074–1082 (2013)
Acknowledgements
The authors acknowledge the funding from the Scientific and Engineering Research Board, DST, Govt. of India, under Grant No. CRG/2021/001763.
Author information
Authors and Affiliations
Contributions
Sonu Rao wrote the main manuscript text. All authors reviewed the manuscript.
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Rao, S.K., Nishchal, N.K. Optical asymmetric cryptosystem for multiple image encryption through vector field encoding. Appl. Phys. B 129, 170 (2023). https://doi.org/10.1007/s00340-023-08121-9
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s00340-023-08121-9