Abstract
In this paper, a novel optical image encryption system combining compressed sensing with phase-shifting interference in fractional wavelet domain is proposed. To improve the encryption efficiency, the volume data of original image are decreased by compressed sensing. Then the compacted image is encoded through double random phase encoding in asymmetric fractional wavelet domain. In the encryption system, three pseudo-random sequences, generated by three-dimensional chaos map, are used as the measurement matrix of compressed sensing and two random-phase masks in the asymmetric fractional wavelet transform. It not only simplifies the keys to storage and transmission, but also enhances our cryptosystem nonlinearity to resist some common attacks. Further, holograms make our cryptosystem be immune to noises and occlusion attacks, which are obtained by two-step-only quadrature phase-shifting interference. And the compression and encryption can be achieved in the final result simultaneously. Numerical experiments have verified the security and validity of the proposed algorithm.
Similar content being viewed by others
Avoid common mistakes on your manuscript.
1 Introduction
In recent years, the optical image encryption has received more and more attentions. Refrainer and Javidi proposed the double-random-phase encoding (DRPE) method, involving two random phases mask keys in the input and Fourier domains in 1995 [1,2,3]. The optical implementation of this encryption scheme makes it widely applicable in the image encryption due to parallel processing and high speed. Unfortunately, the DRPE-based technique was found vulnerable to resist several kinds of attacks [4]. Subsequently, a novel multiple images encryption methods in the fractional Fourier transform (FRFT) [5] were introduced, which increases key numbers. However, the key space of fractional order is not big enough. Thus, fractional wavelet transform (FWT) [6, 7] was proposed to replace the FRFT in DRPE, which achieves double encryption in the fractional domain and wavelet domain. The fractional order and scale factors of FWT can be selected as the additional keys to expand the key space and improve the security of the cryptosystem.
In order to transmit data in the channel effectively, it is far more important to reduce data of cryptosystem. Compressed sensing (CS) [8] is a fast emerging field in information security, which unifies compression and encryption in a simple linear measurement step. Therefore, some CS-based image compression–encryption algorithms (CEA) were proposed to improve the efficiency and security of the cryptosystem [9, 10]. The digital image encryption methods based on CS and DRPE technique were proposed to keep information secret more effectively [11]. To enhance security further, the image encryption scheme combined CS with Arnold transform was proposed [12]. However, in most CS-based CEA, regardless of whether the measurement matrix is a key, this whole matrix needs to be transmitted. In some image encryption combined CS with DRPE [13, 14] or its derivative algorithms such as FRFT [15] and fractional random transform [16], low-dimensional chaos was adopted to reduce their transmission bandwidth. Although one-dimensional (1D) chaotic map was employed to resist some common attacks in CEA [17], 1D chaotic algorithm has its limitations. The cycle of 1D chaotic sequence may degenerate because of the computers’ finite precision, and its key space is relatively small, so the cipher-text has been widely analyzed or even been deciphered [18]. Thus, some CS-based cryptosystems using high-dimensional (HD) chaos like Lorenz system, hyper-chaos, and chaotic standard map were proposed [19,20,21], which can achieve the large parametric space and high security. Although the encryption efficiency and security have been improved in the previous approaches, there are still some space to improve in the robustness and security because of the growing demands for informational security.
In this paper, a robust image CEA based on two-step phase-shifting digital holography and FWT is proposed. Firstly, the cryptosystem has a good flexibility of optical realization and software implementation, which greatly reduces the complexity of achieving the encryption system. Besides, three pseudo-random sequences, which are generated by the 3D chaos, are used to be the measurement matrix of CS and two random-phase masks (RPM) in the FWT. It not only enhances the algorithms nonlinearity, but also enlarges the key numbers and space greatly. Lastly, in order to enhance the robustness of resisting noises and occlusion attacks, digital holograms are obtained by two-step-only quadrature phase-shifting interference (PSI). Numerical experiments have verified the security and validity of the proposed algorithm.
2 Fundamental knowledge
Here some basic knowledge related to our proposed scheme is introduced.
2.1 Fractional wavelet transform
Mendlovic and Zalevsky [22] defined the fractional wavelet transform (FWT), and the two-dimensional (2D) FWT [23] of 2D signal f (x, y) can be expressed as
where p 1 and p 2 are the fractional orders. The f (x, y) is the input function. The U p1 (x, x ʹ) and U p2 (y, y ʹ) are the kernel functions, the “*” means the complex conjugate, and H *(x ʹ, y ʹ) is the wavelet function of mother wavelet function. And FWT in the fractional domains it can be expressed as
where a mn = (a m , a n ) is the discrete scaling vector, b = (b x ʹ, b y ʹ) is the shift vector, and a 1x , a 1y, a 2x , a 2y is fractional order. It is an asymmetric system with fractional order on the x and y directions. The FrFT is expressed as the fractional Fourier transform.
However, its back-reconstructing formula in the fractional wavelet domains is
where IFWT is the inverse fractional wavelet transform, FFT{} denotes the Fourier transform, and C is a constant.
3 The process of encryption and decryption
Duarte et al. proposed a single-pixel imaging via compressed sampling and achieved optical implementation of CS in recent years [24]. Thus, the proposed encryption system is flexibility, which can be either optical realization or software implementation. The possible optical realization of image encryption scheme is shown in Fig. 1. The multi-reference matched filter (MRMF) is wavelet matched filter, and RPM1 and RPM2 are two random-phase masks (RPM), which are generated by three-dimensional chaotic systems. First of all, the laser is divided into two beams of light by the beam splitter (BS): a beam of light is used as a reference light, and the other is passed through an object as the object wave. The reference wave is controlled to generate different phase reference waves by a PZT by an optical phase shifter. And the corresponding combined object wave is reflected off by a digital micro-mirror device (DMD) which consists of an array of tiny mirrors. Each mirror in DMD independently oriented either towards the optical path of the encryption by FWT or away from it, and the optical implementation devices of FWT consist of three lenses, a pair of RPM, and a MRMF closing to the RPM2. Thus, after encoded by the encrypted optical path of the fractional wavelet, the reflected light is interfered with the reference light through BS and then collected through the L1 and focused onto a single-pixel detector (SPD). Finally, the random samples can be recorded. And two holograms are obtained and saved in PC. The optical image decryption is the inverse applications of the optical encryption. In this process, the wavelet matched filter, two pieces of RPM, and fractional order can be used as a key, so the key space is enlarged greatly. Thus, the proposed encryption system can make the intruder attacks futile and reduce the bandwidth needed for data transmission.
Our method is based on CS and phase-shifting digital holography in FWT domain. The process of encryption and decryption are symmetrical as shown in Fig. 2. And main operations of encryption processes are introduced as follows.
Firstly, we construct three chaotic matrixes by 3D chaotic systems in PC. As chaotic system has good pseudo-randomness, in the proposed scheme, 3D chaotic system, namely Chen’s chaotic system [25], is employed in key generation, which is described by
where a 1, b 1, and c 1 are parameters. When a 1 = 35, b 1 = 3, and c 1 ∈ [20, 28.4], the system is chaotic. Thus, it can make our proposed cryptosystem nonlinear. The initial value x 0, y 0, z 0 and the controls parameter a 1, b 1, c 1 are acted as the secret keys.
We take the decimal part of all chaotic time series to limit its elements to the interval [0, 1] using the following operation:
where the operation abs is used to obtain the absolute value, floor is used to obtain an integer outcome, x″, y″, and z″ is three random sequences, the sequence z″ is to generate the measurement matrix Φ of CS, and others sequences x″ and y″ are generated by two complex RPM in FWT.
Then the original image is compacted by DMD, and it mainly has two steps in the process:
- Step 1::
-
An original image α needs to be transformed to its sparse representation by wavelet basis ψ, and thus the N × N sparse image X is formed by
- Step 2::
-
Use the chaotic matrix Φ to measure the sparse image; the measurement matrix is M × N (M < < N), and the compressed image Y of M × N matrix is calculated by
To recover the sparse signal X from the measurements Φ although M < < N correctly, Φ should satisfy the restricted isometry property (RIP) [26]. Here the definition of RIP in k order is as follows:
where δ k ∈ [0, 1] is an isometry constant.
Next all reflected (or transmissive) light from DMD is through optical encoding device to achieve the FWT based on DPRE; here φ 1 and φ 2 are loaded to the RPM, which are generated by chaotic system. In proposed method, the DPRE in FWT domains can be implemented in Fig. 1, and a multi-reference matched filter (MRMF) is placed in the Fourier plane of the wavelet transform. After a one-level DWT with selected wavelet family, the information is decomposed into four parts.
The complex-amplitude distribution F after FWT can be represented by
where H *(x ʹ, y ʹ) is the wavelet function of mother wavelet function. a mn = (a m , a n ) is the discrete scaling vector, b = (b xʹ , b yʹ ) is the shift vector, and a 1x , a 1y , a 2x , a 2y are fractional orders; they is an asymmetric system with fractional order on the x and y directions. FrFT represents the fractional Fourier transform, and MRMF (u, v) can be calculated by
where the parameters a m , a n are a series of scale factor, and H * is a certain mother wavelet function.
Finally, two-step-only quadrature PSI holography is used to record the encoding image in Fig. 1. Two phases are 0 and π/2 degree, and were introduced as two reference lights by PZT; the complex amplitudes of two holograms are I 0 and I π/2, respectively, which can be expressed as
where F and R denote the amplitude of the object wave and reference wave, respectively. |F|2 + |R|2 is the zero-order light wave.
Decryption is the inverse encryption process in Fig. 2. I h is generated with no zero-order term and conjugate term by
The amplitude of the object wave can be calculated as follows:
Because there is no record of the intensity of object wave, |F|2 + |R|2 should be calculated from two orthogonal phase-shift holograms. When the value of R reaches a certain value 2R ≥ max (|F|) + min (|F|), which can be determined according to Eq. (11) and Eq. (12), |F|2 + |R|2 can be calculated by
The light field of encryption image is obtained in Eq. (14). The inverse FWT algorithm in Eq. (16) is applied in a 4f optical inverse processor, which requires the complex conjugate Fourier phase (φ 1 * and φ 2 *) to restore the encryption image:
where IFWT is the inverse fractional wavelet transform, FFT{} denotes the Fourier transform, and C is a constant.
Thus, the measurement image Φ is obtained by 3D chaotic systems. To improve the quality of decrypted image, the BP reconstruction algorithm is adopted to recover the wavelet coefficient matrix. The original image can be reconstructed through the inverse wavelet transform. The reconstructed image α ʹ is denoted as follows:
Here, CS−1 is reconstructed process of CS, namely basis pursuit (BP) algorithm [26].
4 Simulation experiments and analysis
To check the performance of our proposed scheme, several numerical simulations have been performed. The gray image “Lena” is shown in Fig. 3a. It has 256 × 256 pixels size and acts as the plain image in the experiment. In the proposed encryption system, the important parameters are (1) M = 192, N = 256, and a sampling rate of 75%, and the formula is expressed by
where S f is the sampling rate, and it is the reciprocal of the comparison ratio r. The size of original image is N × N, and the size of compressed image is M × N; (2) x 0 = 0.258, y 0 = 0.368, z 0 = 0.568, and a 1 = 35, b 1 = 3, c 1 = 28 from the 3D chaos; (3) fractional orders a 1 = (a 1x , a 1y ) = (1.5, 1.2), a 2 = (a 2x , a 2y ) = (1.4, 1.6), and scale factor s = 1, b = “haar” mother wavelet from fractional wavelet transform. One of two encrypted holograms and decrypted image are displayed in Fig. 3b, c, respectively.
How pixels in an image are distributed by plotting the number of pixels at grayscale is illustrated with an image histogram. Specifically, it should hide the redundancy of plain-text and not leak any information about the plain-text or the relationship between plain-text and cipher-text.
The histograms of “Lena” and “House” are shown in Fig. 4e, f. Their ciphered images produced by the proposed scheme, and their histograms of ciphered images are shown in Fig. 4g, h, respectively. It is clear that the histograms of cipher images are significantly different from those of the plain images. Hence, it does not provide any clue to employ statistical attack.
The correlation coefficient of adjacent pixels is an important statistical feature of images. The correlation between two adjacent pixels in an original image is usually close to 1 in Fig. 5a, b. And an efficient image cryptosystem should produce the encrypted image with low correlation sufficiently. The correlation coefficients for adjacent pixels of their corresponding encrypted images are given in Fig. 5c, d, from which it is seen that the proposed scheme generally provides a satisfactory correlation performance.
In our proposed scheme, there are 12 keys in total, namely six initial values x 0, y 0, z 0 and a 1, b 1, c 1 from the 3D chaos, four fractional orders a 1x , a 1y , a 2x , a 2y , the wavelet base type b, and the wavelet decomposition progression s in fractional wavelet domain.
We give the mean square error (MSE) curves in relation to increments Δ i and d i , which are added to x 0, y 0, z 0, a 1, b 1, c 1 and a 1x , a 1y , a 2x , a 2y , s, respectively. The MSE changes versus each deviation are drawn in Fig. 6a–k, and it is clear that the proposed system is sensitive to keys, which means a tiny change of keys can result in a great visual distortion in recovered images. Usually, the MSE and peak signal-to-noise ratio (PSNR) is used to evaluate the quality of recovered images. Their formula is described as follows:
where Y (i, j) and X (i, j) denote pixel values of recovered image and original image at location (i, j), respectively, and M, N denote the height and width of these images, respectively.
To provide high security of the encryption system, the key space should be large enough to make any brute-force attack ineffective. In our approach, the number of keys and their spaces are both expanded greatly. The total key space includes two processes of confusion and diffusion.
Since x 0, y 0, z 0, and a 1, b 1, c 1 are from the 3D chaos, their key spaces could be computed by the help of MSE curve, when Δ1, Δ2, Δ 3 , Δ4, Δ5, or Δ6 in initial values x 0 + Δ1, y 0 + Δ2, z 0 + Δ3 and a 1 + Δ4, b 1 + Δ5, c 1 + Δ6 drops down to 1 × 10−16. The effective ranges of Δ i (i = 1, 2, 3) are all real number, and according to the IEEE floating-point standard [27], their computational precision of 64-bit double-precision number is about more than 264, while the scope of Δ i (i = 4, 5, 6) is only a few set of values. So we can calculate that the key space from x 0, y 0, z 0 and a 1, b 1, c 1 is about 1016×3 × 1014×3 × 264 × 3 = 5.534 × 10109.
As for the fractional orders a 1x , a 1y , a 2x , and a 2y , their key space could be analyzed as follows. In Fig. 6g–i, we know the maximum value of Δd i (i = 1, 2, 3, 4, 5, 6) (the distances between the two cross-points on the red lines) is about 0.02 when the MSE is equal to 5 × 103. Since the effective range of d i is [–2], the number of possible intervals of d i is 4/0.02 = 200. So the key space from four fractional orders is 2004 = 4 × 108. Besides, the wavelet base type b and the wavelet decomposition progression s for fractional wavelet transform, the key space is more than 264. Thus, the key space S of the entire encryption system is
which indicates heavy work for the opponents to decrypt the image by exhausting the keys.
To evaluate the performance of the encryption system, two other methods are used to compare with our proposed method. Thus, the encryption method [15] based on the CS and FRFT by multiple 1D chaotic map is called CS-FRFT. And the encryption method based on the CS and FWT by 3D chaotic map is called CS-FWT, which is a part of the proposed method without adopting holographic technology. In addition, all recovered images are rebuilt by the basis pursuit (BP) algorithm in three encryption methods. In Table 1, it is shown that the key space of our proposed method is greater than that of other methods, and thus it has a stronger ability to resist brute-force attacks for the proposed methods without reducing the quality of decrypted image.
The robustness of our proposed encryption system was checked against the attack using the noise and the occlusion. In the image transmission and processing, it is inevitable that the cipher-text will be affected by noise. Therefore, we need to test the ability of resisting noise attack, and different intensity random noises adjusted by parameter k are added into the cipher-text I as follows:
where I ʹ is the noise-affected encrypted amplitude images, k is a coefficient that represents the noise strength, and G is a noise type, which is random noise. Accordingly, their restored images of the proposed methods, CS-FWT and CS-FRFT, are illuminated in Table 2, from which it can be shown that the restored images of the proposed method have a higher image quality under the same intensity of noise. Therefore, compared with two other methods, the proposed method has a better robustness of anti-noise attacks.
As a digital evaluation to measure the performance of resisting occlusion attack, peak signal-to-noise ratio (PSNR) is mathematically used to evaluate the quality of image. Compression has much effect on the reconstruction of original image. In generally, it cannot effectively resist occlusion attack well. In three encryption methods of the proposed, CS-FWT and CS-FRFT, the basic information of recovered images can all be identified in Table 3, and their PSNR values of the proposed methods are higher than those of two others, indicating that the proposed encryption system has a better robustness against occlusion attack with the aid of the holography.
An image encryption system can adopt the CS technique to save and process the compressed versions of encrypted images in order to decrease volume in transmission and storage. To evaluate the compression performance of the proposed encryption system, “Lena” was chosen as the original image, and Fig. 7 is the decrypted image PSNR values in different sampling rates through the different reconstruction algorithms of CS. In basis pursuit (BP) [26] reconstruction algorithms of CS, when the sampling rate is about 40%, the PSNR value is 25.04 dB. At this time, we can see subjectively that the decrypted image is basically not distorted, and all the information of the original image is almost recognized, while the information is seriously lost when the PSNR value is 21.54 dB at a sampling rate of 30%. Besides, in orthogonal matching pursuit (OMP) [28] reconstruction algorithms of CS, the change curve can also be clearly seen. And when the PSNR of recovered image exceeds 25 dB (blue green line in Fig. 7), the recovered image has a good quality. Therefore, it can be seen that the quality of recovered image is acceptable when the sampling rate is lower than or equal to 50%. Even when the sampling rate reaches 40%, the PSNR is still not bad.
5 Conclusions
In this paper, an efficient and secure image cryptosystem, based on CS and PSI in asymmetric fractional wavelet domain by 3D Chen’s chaos map, is proposed. It not only can overcome problems of the small key space and low security in resisting nonlinear attacks, but also decreases a large number of encrypted data greatly. In order to simplify the transmission and storage, the keys generated by 3D chaos map replace the enormous RPM and measurement matrix. With the help of digital holography, the proposed method has a good robustness against occlusion and noise attacks. And the higher security of our cryptosystem is demonstrated by evaluating key space analysis. In addition, for efficiency analysis, the compression performance analysis shows that the PSNR is high enough to recognize the information of original image when the sampling rate is lower than or equal to 50%, and it is acceptable even at 40%. Thus, the proposed encryption system may be a reference for data security transmission and effective storage in encryption.
References
Refregier, P., Javidi., B.: Optical image encryption based on input plane and Fourier plane random encoding. Opt. Lett. 20, 767–769 (1995)
Nakano, K., Takeda, M., Suzuki, H., et al.: Encrypted imaging based on algebraic implementation of double random phase encoding. Appl. Opt. 53, 2956–2963 (2014)
Wang, X., Chen, W., Chen, X.: Optical information authentication using compressed double random phase encoded images and quick-response codes. Opt. Express. 23, 6239–6253 (2015)
Zhao, T., Ran, Q., Yuan, L., et al.: Manipulative attack using the phase retrieval algorithm for double random phase encoding. Appl. Opt. 54, 7115–7119 (2015)
Rajput, S.K., Nishchal, N.K.: Optical double image security using random phase fractional Fourier domain encoding and phase-retrieval algorithm. Opt. Commun. 388, 38–46 (2017)
Dinç, E., Ragno, G., Baleanu, D., et al.: Fractional wavelet transform-continous wavelet transform for the quantification of melatonin and its photo degradation product. Spectrosc. Lett. 45, 337–343 (2012)
Singh, H.: Optical cryptosystem of color images using random phase masks in the fractional wavelet transform domain. Am. Inst. Phys. Conf. Ser. 12, 767–769 (2016)
Orsdemir, A., Altun, H.O., Sharma, G., Bocko, M.F.: On the security and robustness of encryption via compressed sensing. IEEE Milit. Commun. Conf. 1–7 (2008)
Gong, Q., Wang, Z., Lv, X., et al.: Interference-based image encryption with silhouette removal by aid of compressive sensing. Opt. Commun. 359, 290–296 (2016)
Cambareri, V., Mangia, M., Pareschi, F., et al.: Low-complexity multiclass encryption by compressed sensing. IEEE Trans. Signal Process. 63, 2183–2195 (2015)
Deepan, B., Quan, C., Wang, Y., et al.: Multiple-image encryption by space multiplexing based on compressive sensing and the double-random phase-encoding technique. Appl. Opt. 53, 4539–4547 (2014)
Rawat, N., Kim, B., Kumar, R.: Fast digital image encryption based on compressive sensing using structurally random matrices and Arnold transform technique. Opt. Int. J. Light Electron Opt. 127, 2282–2286 (2016)
Lang, J., Zhang., J.: Optical image cryptosystem using chaotic phase-amplitude masks encoding and least-data-driven decryption by compressive sensing. Opt. Commun. 338, 45–53 (2015)
Liu, H., Xiao, D., Liu, Y., et al.: Securely compressive sensing using double random phase encoding. Opt. Int. J. Light Electron Opt. 126, 2663–2670 (2015)
Liu, X., Mei, W., Du, H.: Optical image encryption based on compressive sensing and chaos in the fractional Fourier domain. J. Mod. Opt. 61, 1–8 (2014)
Deng, J., Zhao, S., Wang, Y., et al.: Image compression-encryption scheme combining 2D compressive sensing with discrete fractional random transform. Multimed. Tools Appl. 86, 1–21 (2016)
Liu, X., Mei, W., Du, H.: Simultaneous image compression, fusion and encryption algorithm based on compressive sensing and chaos. Opt. Commun. 366, 22–32 (2016)
Tong, X.J., Wang, Z., Zhang, M., et al.: An image encryption algorithm based on the perturbed high-dimensional chaotic map. Nonlinear Dyn. 80, 1–16 (2015)
Zhou, N., Pan, S., Cheng, S., et al.: Image compression-encryption scheme based on hyper-chaotic system and 2D compressive sensing. Opt. Laser Technol. 82, 121–133 (2016)
George, S.N., Pattathil., D.P.: A novel approach for secure compressive sensing of images using multiple chaotic maps. J. Opt. 43, 1–17 (2014)
Fridrich., A.: A novel 1D hybrid chaotic map-based image compression and encryption using compressed sensing and Fibonacci–Lucas transform. Math. Probl. Eng. 3, 1–15 (2016)
Mendlovic, D., Zalevsky, Z., Mas, D.: Fractional wavelet transform. Appl. Opt. 20, 4801–4806 (1997)
Kong, D., Shen, X., Lin, C., et al.: Optical image encryption based on fractional wavelet transform with double random phases. Opt. Instrum. 35, 17–21 (2013)
Duarte, M., Davenport, M., Takbar, D., Laska, J., Sun, T., Kelly, K., Baraniuk, R..: Single-pixel imaging via compressive sampling. IEEE Signal Process. Mag. 25, 83–91 (2008)
Guan, Z.H., Huang, F.J., Guan, W.J.: Chaos-based image encryption algorithm. Phys. Lett. A. 346, 153–157 (2005)
Chen, S., Donoho, D.L., Saunders, M.A.: Atomic decomposition by basis pursuit. Siam J. Sci. Comput. 20, 33–61 (1998)
IEEE: IEEE standard for binary floating-point arithmetic. Lecture Notes on the Status of IEEE, pp. 86–118 (1985)
Liu, E., Temlyakov, V.N.: The orthogonal super greedy algorithm and applications in compressed sensing. Inf. Theory IEEE Trans. 58, 2040–2047 (2012)
Acknowledgements
The work is supported by the National Science Foundation of China (NSFC) (61405130 and 61320106015).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Liu, Q., Wang, Y., Wang, J. et al. Optical image encryption using chaos-based compressed sensing and phase-shifting interference in fractional wavelet domain. Opt Rev 25, 46–55 (2018). https://doi.org/10.1007/s10043-017-0390-3
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10043-017-0390-3