Abstract
In this paper, an asymmetric scheme based on double image using phase retrieval algorithms in gyrator domain is reported. The double images are encrypted using QZ synthesis method based on QZ algorithm. The synthesized image is bonded with a random phase mask and undergoes a gyrator transform. The resultant image act as an input for the phase retrieval algorithm. We have tested the scheme with five different phase retrieval algorithms, namely the Gerchberg-Saxton algorithm, modified Gerchberg-Saxton algorithm, input–output algorithm, Yang-Gu mixture amplitude-phase retrieval algorithm, and improved amplitude-phase retrieval algorithm. Simulations are executed to show the performance, feasibility, and robustness of the scheme. The gyrator parameter and private keys are highly sensitive to a small change to their original value. Performance of different phase retrieval algorithms on the scheme is evaluated using multi-attribute decision-making tool: TOPSIS method. Results suggest that the Yang-Gu mixture amplitude-phase retrieval algorithm performs better among phase retrieval algorithms and has ranked 1 in TOPSIS analysis. This has been validated by the figures reported in the paper.
Similar content being viewed by others
Avoid common mistakes on your manuscript.
1 Introduction
With the advancement of the internet and technology, multimedia communication has gradually become ubiquitous in people’s lives. It has become an important part of people’s daily life for sharing data in terms of text, images, and videos over social media. An unauthorised leakage of data can be harmful to individuals, businesses, and sometimes even to the entire nation. Therefore, the security of data is utmost important and it cannot be ignored. Encryption technique play a vital role in protection of data from illegal users. However, traditional digital encryption algorithms such as advanced encryption standard (AES) and data encryption standard (DES) are not appropriate for image encryption. Although they have complex computation, unpredictability, and non-repeatability traits but digital image encryption techniques are slow with advancement in computations, and they are vulnerable. In 1995, an optical encryption scheme was proposed by Refregier and Javidi famously referred as double random phase encoding (DRPE) in Refregier and Javidi (1995) in the literature. The DRPE attains a lot of attention of the researchers because of its optical characteristics such as high speed, parallelism, multi-dimensional key space. In DRPE scheme, two random phase masks are used, one of them in spatial domain and other in frequency domain. Many optical encryption techniques based on DRPE scheme were proposed in various transform domain like gyrator transform (Abuturab 2012; Kumar et al. 2019), fractional Fourier transform (Unnikrishnan et al. 2000), Fresnel transform (Situ and Zhang 2004; Huang 2012), fractional Hartley transform (Singh et al. 2017, 2019) and so on (Zhou et al. 2013; Vashisth et al. 2014; Abuturab 2015; Liu et al. 2013; He et al. 2012). The DRPE scheme has same encryption and decryption keys that leads to its symmetric architecture and therefore there are issues of key distribution. Due to its linearity and symmetry nature DRPE found vulnerable to basic attacks such as known-plaintext attacks (KPA), ciphertext only attack (COA), chosen-plaintext attack (CPA), and chosen-ciphertext attack (CCA) (Frauel et al. 2007; Gopinathan et al. 2006; Liu et al. 2015; Carnicer et al. 2005; Peng et al. 2006). Researchers are wondering for those cryptosystems that are immune to these basic attacks.
This necessity of security enables researchers to look beyond symmetric cryptosystem and to develop asymmetric cryptosystems. First asymmetric cryptosystem in optical sense is reported by Qin and Peng based on phase truncation Fourier transform (PTFT) in 2010 (Qin and Peng 2010). The PTFT cryptosystem involves two random phase masks which act as public key, whereas private key obtained from phase reservation operation. The encrypted image is real valued that obtained from phase truncation operation. Later, it is found that PTFT cryptosystem unable to resist the specific attack based on phase retrieval algorithms (Wang and Zhao 2012; Wang et al. 2014a, 2014b; Wang et al. 2015), and attacker gets the plaintext without using decryption keys. Moreover, several decompositions techniques are also used to develop asymmetric cryptosystem, like equal modulus decomposition (EMD) (Cai et al. 2015; Deng 2015), random modulus decomposition (RMD) (Xu et al. 2018; Rakheja et al. 2019; Chen et al. 2020), unequal modulus decomposition (UMD) (Chen et al. 2016; Archana 2021a, 2021b), singular value decomposition (SVD) (Kumar et al. 2019; Singh 2018), polar decomposition (Kumar and Quan 2019), lower–upper decomposition (LUD) (Su et al. 2018; Xiong and Quan 2019) and so on. Recently, Shen et al. proposed an encryption scheme based on QZ synthesis method, which is able to resist basic attack as KPA and CPA (Shen et al. 2022; Gaur et al. 2022).
In recent years, phase retrieval algorithms also attain a lot of attention in security purposes for its nonlinear architecture. The profoundly used phase retrieval algorithm (PRA) was proposed by Gerchberg and Saxton in 1972, and famous as Gerchberg-Saxton (GS) algorithm (Gerchberg and Saxton 1972). The GS algorithm exhibits a rapid decrease in error initially, but eventually, error stagnate for several iterations. In addition, GS algorithm gives inconsistency in output because the algorithm is initialized with random phases. Thereafter, a modified version of GS algorithm was proposed, termed as modified Gerchberg-Saxton (MGS) algorithm (Deng and Zhao 2011; Mehra and Nishchal 2023) which take care of stagnation issue. Fienup proposed a class of input–output algorithm, to get rid of stagnation problem in GS algorithm (Fienup 1982, 2013; Fienup Jul. 1978; Nishchal 2019). Many cryptosystems based on phase retrieval algorithm were proposed by researchers (Wei and Wang 2021; Rajput and Nishchal 2017). Recently, security enhanced cryptosystem was proposed by Liu et al. based on Yang-Gu mixture amplitude-phase retrieval (Yang-Gu) algorithm in a more complicated way. The encryption process of Yang-Gu algorithm needs two iterative loop and generate private keys using binary phase modulation (Liu et al. 2013a, 2013b; He et al. 2013). Afterwards, several encryption schemes are proposed by researchers based on Yang-Gu algorithm (Sui et al. 2015a, 2015b; Abuturab 2019; Rakheja et al. 2022). An improved amplitude phase retrieval algorithm (improved APR algorithm) was proposed by Wang et al. (Wang et al. 2016), which require less time consumption and number of iterations as compared to Yang-Gu algorithm.
Motivated from above, in this paper we proposed a cryptosystem based on QZ synthesis method and phase retrieval algorithms. The QZ synthesis prevents the algorithm from basic attacks such as KPA, CPA whereas phase retrieval algorithm improves the security against specific phase retrieval attack. Further, we review above discussed phase retrieval algorithms with QZ synthesis method for double images. The texture of the rest paper is organized as follows. The working of QZ synthesis method and various types of phase retrieval algorithms such as GS algorithm, MGS algorithm, input–output algorithm, Yang-Gu algorithm, improved APR algorithm and encryption, decryption process of proposed cryptosystem are described in Sect. 2. The numerical simulations and security analysis presented in Sect. 3. The final remarks of the paper are concluded in Sect. 4.
2 Overview
2.1 QZ algorithm
In QZ algorithm, two square matrices \(A\) and \(B\) (\(A, B\in {R}^{n\times n}\)) are considered as input and it produces four matrices as output: \(AA\), \(BB\) and two unitary matrices \(Q\) and \(Z\). The mathematically it can be expressed as:
where \(QZ(.)\) denotes the QZ algorithm. \(AA=Q.A.Z\) and \(BB=Q.B.Z\). From here, \(A\) and \(B\) can be obtained as \(A={Q}^{-1}.AA.{Z}^{-1}\) and \(B={Q}^{-1}.BB.{Z}^{-1}\) respectively, where \(\left( \cdot \right)^{ - 1}\) denotes inverse of a square matrix.
In QZ synthesis (QZS) method, initially take two matrices \({I}_{1}\) and \({I}_{2}\) in QZ algorithm.
The upper triangular matrix \({I}_{22}\) convert into lower triangular matrix by taking its transpose \({I}^{\prime}_{22}\) and diagonal elements of matrix \({I}^{\prime}_{22}\), can be extracted as \(Dig\).
where ‘diag’ is an operator which extract the diagonal elements of a matrix.
The upper triangular matrix \({I}_{11}\) added to the lower triangular matrix \({I}^{\prime}_{22}\) without its diagonal elements to achieve the synthesized matrix \({I}_{12}\).
The Eqs. (1–3), summarized the whole process of QZS as \(\left( {I_{12} , P} \right) = QZS(I_{1} ,I_{2} )\), where \(P(Q,Z, Dig)\) denotes the private keys containing unitary matrices and diagonal elements. A schematic flowchart of QZS process shown in Fig. 1.
The reverse process of QZS is termed as QZ decomposition (QZD). Take the upper triangular matrix of \({I}_{12}\) and save it as \({D}_{11}\).
where operator ‘triu’ extract the upper triangular matrix from matrix \({I}_{12}\).
The matrix \({D}_{22}\) can be obtained through the synthesized matrix \({I}_{12}\) without \({D}_{11}\) and \(Dig\) added to it. Mathematically, it is given as Eq. (5)
The matrix \({I}_{1}\) and \({I}_{2}\) can be obtained through \({D}_{11}\), \({D}_{22}\) and the inverse of unitary matrices \(Q\) and \(Z\), as mentioned below
The whole process of QZD is presented through eqs. (4–7) and schematic flowchart in Fig. 2. In QZS and QZD process, ‘flip’ operator reflects transposing a matrix. It uses two grayscale images of Peppers and Cameraman of size \(256\times 256\) pixels. A noisy image \({I}_{12}\) is obtained as a result of QZS.
2.2 Gyrator transform
Gyrator transform (GT) is a type of linear canonical transform (Rodrigo et al. Mar. 2007; Liu et al. 2011). Mathematically, definition of GT for two-dimensional image \(f(x,y)\) with angle of rotation \(\alpha\) can be given as
where \(\alpha\) lies in the interval \([\mathrm{0,2}\pi ]\), which provides the extra key for encryption techniques. Also, GT has properties of additive and periodic with respect to angle of rotation \(\alpha\). The effect of GT is shown in Fig. 3b and c with the angle of rotation \(\alpha =2.14\) and \(\alpha =0.5\pi\) on an input image of a girl of \(256\times 256\) pixels is displayed in Fig. 3a. The corresponding recovered image shown in Fig. 3d.
2.3 Yang-Gu mixture amplitude-phase retrieval algorithm
In 2013, Liu et al. (2013a) proposed a cryptosystem based on Yang-Gu mixture amplitude-phase retrieval algorithm (Yang-Gu algorithm). Let \(r(x,y)\) and \(R(u,v)\) be input image and public key respectively. The iterative process involves computing the unknown function \({e}_{k1}(u,v)\) and phase function \(\varnothing (x,y)\) using the convergent criteria. The complete process of Yang-Gu algorithm is shown in Fig. 4.
Initially, iterative process starts with random function \({e}_{1}(u,v)\) which assumes the values between interval \([0, 1]\). During the k1th iteration of algorithm, \({e}_{k1}(u,v)\) is bonded with public key \(R(u,v)\) is subjected inverse gyrator transform with angle of rotation as shown in below expression \({F}_{k1}(x,y)\):
The amplitude and phase part of \({F}_{k1}(x,y)\) are given as \({h}_{k1}\left(x,y\right)=abs({F}_{k1}(x,y))\) and \({\varnothing }_{k1}(x,y)=\mathrm{arg}({F}_{k1}(x,y))\), respectively.
For the next iteration, update the \({e}_{k1}^{\prime}\left(u,v\right)\) using the following relation:
where ‘Re’ represents the real part operation and ‘*’ denotes the conjugate operator.
The convergence criteria to decide the termination of the iterative process is the value of normalised mean squared error (NMSE). The iteration process will stop when value of NMSE reached to its threshold value. The value of NMSE between input image \(r(x,y)\) and iterated image \({h}_{k1}(x,y)\) is computed by using the following relation:
The resulting image may contain both positive and negative elements. Therefore, a one-way binary phase modulation function \(\mathrm{exp}(i\pi b(u,v))\) is introduced, so that the elements become positive. The function \(b(u,v)\) act as a private key. The relation of \(b(u,v)\) is given as:
Thus, the encrypted image is obtained by relation:
The key \(R(u,v)\) is bonded with phase modulation \(exp(i\pi b(u,v))\), to obtain the decryption key \(D(u, v)\):
2.4 Improved amplitude-phase retrieval algorithm
In 2015, Wang et al. (Wang et al. 2016) proposed an improved amplitude-phase retrieval algorithm (improved APR algorithm), which contains only one iteration loop. The flowchart of the improved amplitude-phase retrieval algorithm is shown in Fig. 5. During iteration process, an input image \(r(x,y)\) and two public keys \(RPM1=\mathrm{exp}(2i\pi \psi (u,v))\) and \(RPM2=\mathrm{exp}(2i\pi \psi (x,y))\) are used as inputs.
The iterative process starts with an arbitrary function \({e}_{1}(x,y)\) for an unknown amplitude. On the k2th iteration, amplitude \({e}_{k2}(x,y)\) is bonded with public key RPM2 and resulting image undergo gyrator transform with angle \(\alpha\), and stored its amplitude and phase part:
where \(PR\) and \(PT\) represents the phase reserved and phase truncation part, respectively. The phase truncated part \({f}_{k2}^{\prime}(u,v)\) is multiplied with another public key \(RPM1(u,v)\) and phase modulator \(\mathrm{exp}(i\pi {\gamma }_{1,k2-1})\). The resulting image is again subjected to gyrator transform with angle \(\beta\); Mathematically
The image \(r\left(x,y\right)\) which is an input image is bonded with phase \({\varnothing }_{k2}(x,y)\) and undergoes inverse gyrator transform with angle \(-\beta\):
The complex conjugate of \(RPM1\) (\({RPM1}^{*}\)) is multiplied with spectrum \({G}_{k2}(u,v)\):
where ‘Re’ represents the real part operation. The image \({H}_{{k2}_{1}}\left(u,v\right)\) contains positive as well as negative elements. Thus, to obtain the positive elements, \({H}_{{k2}_{1}}(u,v)\) is combined with one-way binary phase modulator \(\mathrm{exp}(i\pi {\gamma }_{1,k2}(u,v))\). The binary phase modulator \({\gamma }_{1,k2}(u,v)\), is generated by using the Eq. (24)
The phase \({\varnothing }_{k2}^{\prime}(u,v)\) obtained from Eq. (18) is bonded with \({H}_{k2}^{\prime}(u,v)\) and undergoes inverse gyrator transform with angle \(-\alpha\):
where \({H}_{k2}^{\prime}\left(u,v\right)={H}_{{k2}_{1}}(u,v)\mathrm{exp}(i\pi {\gamma }_{1,k2}(u,v))\).
In the next step, \({I}_{k2}(x,y)\) is multiplied by complex conjugate of \(RPM2\) \(({RPM2}^{*})\) and stored the real part of obtained result as \({H}_{{k2}_{2}}(x,y)\):
The image \({H}_{{k2}_{2}}(x,y)\) is also contain negative points. Therefore, it is bonded with another binary phase modulator \({\gamma }_{2}(x,y)\). The encrypted image \({e}_{k2}(x,y)\) is given by Eq. (27)
where \({\gamma }_{2}(x,y)\) is given as:
The iterative loop from Eq. (16–28) may be terminated if correlation coefficients \((CC)\) between \({g}_{k2}^{\prime}(x,y)\) and \(r(x,y)\) greater than a prescribed threshold value. The \(CC\) value can be calculated by the Eq. (29)
here \(M\), \(N\) are dimension of input image, \('||'\) is modulus operator and \('-'\) is average operator.
Here, two binary phase modulators \({\gamma }_{1}(u,v)\) and \({\gamma }_{2}(x,y)\) form two private keys \({P}_{1}(u,v)\) and \({P}_{2}(x,y)\) respectively as
During decryption process, here two decryption keys \({D}_{1}\) and \({D}_{2}\) are used, which are obtained using the public (\(RPM1\) and \(RPM2\)) and private keys (\({P}_{1}\) and \({P}_{2}\)). Mathematically, decryption keys are
2.5 Proposed cryptosystem
In this subsection, the encryption and decryption process of the proposed cryptosystem is discussed in detail. The schematic flowchart of encryption process is shown in Fig. 6.
Step 1 Initially, take two grayscale images of Peppers and Cameraman say \({I}_{1}\) and \({I}_{2}\), respectively.
Step 2 These two images are synthesised by QZS as described in SubSect. 2.1 by using Eqs. (1–3) to get the fused image \({I}_{12}\). Mathematically, it can be expressed as
where \({P}_{3}({Q}_{1}, {Z}_{1}, {Dig}_{1})\) act as private key.
Step 3 Fused image \({I}_{12}\) is bonded with random phase mask \(RPM3=\mathrm{exp}(2\pi i{\varphi }_{1}(x,y))\) and subjected to gyrator transform of an angle \(\alpha\) as:
Step 4 Apply the phase truncation (PT) and phase reservation (PR) operation on Eq. (35). The phase reserved part is stored as \(key1=PR(C)\).
Step 5 The phase truncated part obtained in Step 4 is considered as an input image of phase retrieval algorithms (PRA’s) such as GS, MGS, input-output, Yang-Gu and improved APR algorithms. A ciphertext and private keys are obtained after applying PRA.
The schematic flowchart of decryption process for the proposed scheme is shown in Fig. 7. The decryption process consists the following steps as:
Step 1 The ciphertext is bonded with private key of PRA according to the phase retrieval algorithm and obtained result stored as:
Step 2 The image \({D}_{11}\) is multiplied with \(key1\) and subjected with inverse of gyrator transform with \(-\alpha\) angle as:
Step 3 Bond complex conjugate of \(RPM3\) i.e., \({RPM3}^{*}\) with \({D}^{\prime}_{11}\), to get \({D}_{22}\)
Step 4 \({D}_{22}\) is decomposed through QZD with private key \({P}_{3}\), and the retrieved images \({D}_{1}\) and \({D}_{2}\) as
In the proposed cryptosystem QZ synthesis method is used with phase retrieval algorithms. The QZ synthesis process contains two steps named as QZS and QZD. The key \({P}_{3}\) act as private key. In the flowchart PRA stand for the phase retrieval algorithm. For demonstration GS algorithm is used as PRA in Figs. 6 and 7.
The QZS method can also be used to encrypt the multiple images or color images. Figure 6 also shows the flowchart of encryption process of multiple images. In Fig. 6, \({I}_{1}\), \({I}_{2}\), and \({I}_{3}\) represent the input images that are encrypted using QZS method. First two input images \({I}_{1}\) and \({I}_{2}\) can also be encrypted using QZS method, to obtain the fused image \({I}_{12}\). Further, fused image \({I}_{12}\) and input image \({I}_{3}\) can be encrypted by QZS, to get the fused image \({I}_{123}\) as shown in Fig. 6.
3 Results and discussion
In this section, the performance of various phase retrieval algorithms (GS algorithm, MGS algorithm, input–output algorithm, Yang-Gu algorithm and improved APR algorithm) in the proposed cryptosystem has been investigated. Simulations of the cryptosystem has been carried on different grayscale images. However, results corresponding to two grayscale images Peppers (\({I}_{1}\)) and Cameraman (\({I}_{2}\)) shown in Fig. 8a–b of size \(256\times 256\) pixels are presented in this paper. The threshold value of \(CC\) when GS, MGS are used is taken as \(0.99\), whereas for input–output algorithm is \(0.88\). The threshold value of \(NMSE\) for Yang-Gu algorithm is taken as \(0.0003\), whereas threshold value of \(CC\) for improved APR algorithm is \(0.98\). The angle of gyrator transform is taken as \(0.5\pi\). The time taken by GS algorithm, MGS algorithm, input–output algorithm, Yang-Gu algorithm and improved APR algorithm are \(33.70s\), \(23.72s\), \(20.94s\), 45.17 s, and 47.81 s, respectively.
The cryptosystem’s validation results are shown in Fig. 9. The encrypted images for the GS algorithm, MGS algorithm, input–output algorithm, Yang-Gu algorithm and improved APR algorithm are displayed in Fig. 9a–e, respectively. The corresponding recovered images of Peppers are shown in Fig. 9f–j whereas retrieved image of Cameraman for each phase retrieval algorithms are presented in Fig. 9k–o. It is observed from Fig. 9 that all PRA’s in proposed scheme account for successful retrieval of input images. However, quality may matter as noisy images are recovered through them. For the sake of brevity, results of Yang-Gu algorithm are shown in Fig. 10 for color image Peppers. The red, green and blue components of the color image Peppers Fig. 10a are taken as the input images for the proposed scheme. The encrypted image is for Yang-Gu algorithm shown in Fig. 10b, whereas corresponding combined recovered image shown in Fig. 10c
The quality of input and recovered images are measured through statistical metrics such as correlation coefficient \((CC)\) and peak signal-to-noise ratio (\((PSNR)\)Wang et al. 2004).
The expression for evaluating the \(PSNR\) is given by
where \('MSE'\) denotes mean squared error.
The values of \(CC\) and \(PSNR\) for the proposed cryptosystem shown in Table 1. The value of correlation coefficient between input image Peppers and its corresponding recovered image is given by \(CC1\), whereas \(CC2\) represent the value of correlation coefficients for grayscale image Cameraman and its corresponding recovered image. Similarly, notations are used for peak signal-to-noise ratio.
3.1 Statistical attack analysis
In this section, the performance of PRA’s in the proposed scheme is analysed and investigated for statistical attack such as histogram plots, 3-D plots, correlation distribution plots and information entropy.
3.1.1 The histogram analysis
Histogram of an image shows the frequency of each gray level. Through the frequency level we can gather the information about an image. For a good cryptosystem, the histogram of input and encrypted image should be completely different for preventing any attack by unauthorized person. Therefore, the histograms are evaluated for the proposed cryptosystem. Figure 11 displays the histogram plots for the proposed cryptosystem. Figure 11a–b display the histogram plots of input images of Peppers and Cameraman, whereas the histogram plots of encrypted images shown in Fig. 11c–g for GS algorithm, MGS algorithm, input–output algorithm, Yang-Gu algorithm and improved APR algorithm, respectively. It is clear form Fig. 11c–g that the histograms of encrypted images are completely different from histogram of the original images. Also, the histogram of encrypted images corresponding to different PRA’s are different. Histogram corresponding to Fig. 11c is gaussian, (d) is skew-gaussian, (e) is uniform, (f) is decreases, and (g) is non-uniform. Therefore, role of PRA’s need to be investigated for better understanding.
3.1.2 3-D plot analysis
Another statistical attack in terms of 3-D plots is also analysed for the proposed scheme. For a good encryption scheme, 3-D plot of input and ciphertext image should be completely different and 3-D plot of ciphertext should be uniformly distributed. Figure 12 displays the 3-D plots of proposed cryptosystem. The 3-D plots of input image Peppers and Cameraman displayed in Fig. 12a–b display, whereas Fig. 12c–g show the 3-D plots of encrypted images corresponding to GS algorithm, MGS algorithm, input–output algorithm, Yang-Gu algorithm and improved APR algorithm, respectively. It is clearly visible form Fig. 12 that the pixels of encrypted images are uniformly distributed which demonstrate the efficacy and strength of the proposed scheme. It should be noted that histogram shows the pixels frequency whereas 3-D plots show their value as well as the position.
3.1.3 Correlation distribution plots
The efficacy of the proposed scheme is also analysed in terms of correlation distribution plots of adjacent pixels in input images and their ciphertext. Here, we randomly selected \(5000\) pixels from the input image in diagonal direction. Figure 13 illustrates the correlation distribution plots for the proposed scheme ciphertext and input images in diagonal direction. Figure 13a–b shows the correlation distribution plot for the input images Peppers and Cameraman whereas Fig. 13c–g displays the correlation distribution plots of encrypted images when GS algorithm, MGS algorithm, input–output algorithm, Yang-Gu algorithm and improved APR algorithm are used, respectively. It is clearly visible form Fig. 13 that the correlation of input images is highly correlated whereas no correlation is noticed from the encrypted image plots in diagonal direction. Similar results are obtained with horizontal and vertical direction. This also establish the efficacy of the proposed scheme.
3.1.4 Entropy analysis
The uncertainty and degree of randomness present in an image can be measured through entropy. Thus, the value of entropy is calculated for input images and ciphertext in the proposed scheme. For \(8\)-bit image, the value of entropy lies between \(0\) and \(8\). The value of entropy approaching \(8\) signifies that the pixels distribution is highly random. In the proposed cryptosystem, value of entropy for input images: Peppers and Cameraman are \(7.7517\) and \(7.0097\), respectively. The values of entropy for encrypted images corresponding to GS algorithm, MGS algorithm, input–output algorithm, Yang-Gu algorithm and improved APR algorithm are \(7.8450\), \(7.9903\), \(7.9932\), \(7.9301\), and \(7.1069\), respectively. The value of entropies for the encrypted images for some PRA’s are high (close to \(8\)), however for GS algorithm and improved APR it is relatively low.
3.2 Occlusion attack
The performance of the proposed scheme is analysed against the occlusion attack. During transit scenarios, information of an image may be lost partially due to network congestions. The proposed scheme is also analysed for such scenarios. Figure 14 display results of the occlusion attack when encrypted images have \(12.5\%\) and \(25\%\) data lost in the proposed scheme corresponding to GS algorithm. The encrypted image with occlusion \(12.5\%\) illustrated in Fig. 14a whereas corresponding retrieved image Peppers and Cameraman are shown in Fig. 14b, c with \(CC\) values, respectively. The ciphertext with occlusion 25% is shown in Fig. 14d and its corresponding retrieved images with \(CC\) values shown in Fig. 14e, f respectively. Similarly, results of occlusion attack of other PRA’s are displayed in Figs. 15, 16, 17 and 18, respectively. It is observed from Figs. 14, 15, 16, 17 and 18 that Yang-Gu algorithm perform better against occlusion attack as compared to other phase retrieval algorithms. We have also plotted \(CC\) curve against the percentage of occlusion. In Fig. 19 x-axis represents occluded area in percentage whereas \(CC\) value given on y-axis. It should be noted from Fig. 19 that for GS, MGS, input–output algorithm, the \(CC\) values depend on the image used whereas the Yang-Gu and improved APR is same for the both images.
3.3 Nosie attack
During transmission, an image may be corrupted with noise present in the channel and as a result, recovered image may not recognizable. Therefore, the proposed scheme is also tested for such kind of attack. The proposed scheme is explored to additive noise attack wherein normal random noise (\(N\)) with zero mean and unity standard deviation is added to ciphertext. The mathematical relation between ciphertext \((C)\) and noise affected ciphertext \(({C}^{\prime})\) is shown as
where \(k\) represents the noise strength. The recovered image Peppers when ciphertext is polluted with noise strength \(k=0.2, 0.4, 0.6\) is presented in Fig. 20a, c, e, whereas recovered image of Cameraman is shown in Fig. 20b, d, f with noise strength \(k=0.2, 0.4, 0.6\) respectively, when GS algorithm is taken as PRA in the encryption process. It is observed from Fig. 20 that images are recognizable even when images are polluted with noise. The value of \(CC\) of recovered images Peppers and Cameraman for noise strength \(k=0.6\) is \(0.6922\) and \(0.6701\) respectively. Similar results were obtained for other PRA’s. Figure 21, 22, 23, and 24 illustrates the decrypted images when MGS algorithm, input–output algorithm, Yang-Gu algorithm, and improved APR algorithm, with \(CC\) value, respectively. It can be notified form Fig. 20, 21, 22, 23, and 24 that the recovered images are recognizable even in the presence of noise. Further, for the proposed cryptosystem Yang-Gu algorithm gives better results against noise attack as compared to other PRA’s.
3.4 Key sensitivity analysis
Security of any cryptosystem is based on strength of keys and parameters that are used in the cryptosystem. The performance of the proposed cryptosystem against key sensitivity is also analysed. Figure 25 display the key sensitivity plots for the gyrator parameter \(\alpha\) versus \(CC\) values. The \(CC\) plot when GS algorithm is used as PRA in encryption process is shown in Fig. 25a whereas corresponding result for MGS algorithm is shown in Fig. 25b. For input–output and Yang-Gu algorithm phase retrieval algorithm \(CC\) plots have been shown in Fig. 25c–d respectively whereas corresponding plots for improved APR algorithm shown in Fig. 25e. It is observed from Fig. 25 that the value of \(CC\) approaches to one only at correct position of angle \(\alpha\). The proposed scheme is highly sensitive to slight change in value of \(\alpha\) irrespective of PRA used in the encryption process. During the encryption process, key \({P}_{3}\) act as private key. Figure 26 illustrate the recovered images for the proposed cryptosystem when \({P}_{3}\) is taken as random matrix. In Fig. 26, images (a-e) display the recovered image of Peppers for the proposed cryptosystem whereas recovered image of Cameraman shown in Fig. 26f–j for each of the phase retrieval algorithm, respectively. It is demonstrated from, Figs. 25 and 26 that the proposed scheme is highly sensitive to the gyrator parameter and private keys.
3.5 TOPSIS analysis
To determine which PRA is best fit in the proposed scheme, an analytical tool TOPSIS (technique for order preference by similarity to an ideal solution) is used (Chen and Hwang 1992; Jahanshahloo et al. 2006; Tzeng and Huang 2011). The TOPSIS method is used to find the rank of phase retrieval algorithms in the proposed cryptosystem. The TOPSIS analysis consist the following steps.
Let there are \(m\) proportionate (here phase retrieval algorithms) and \(n\) attributes (here different \(CC\) values) corresponding to different PRA. Make a matrix of order \(m\times n\) using \(m\) proportion and \(n\) attributes and name it as decision matrix, given by \(X={a}_{ij}\) of size \(m\times n\). In the next step, normalize the column wise data of decision matrix to obtain the normalized decision matrix \({p}_{ij}\) using following equation:
The value of information entropy is evaluated using equation as:
where \(K={(\mathrm{ln}(m))}^{-1}\) gives the value entropy constant. The degree of divergence computed as \({d}_{j}=1-{h}_{j}\), \(j=1, 2, 3,\dots ,n\), and the degree of importance can be calculated by using the equation
The comprehensive weight is expressed as
where \({b}_{j}\) represents the value of weight, and for the proposed scheme value of weight is considered as unity. Now, construct the weighted normalize matrix \({V}_{ij}\) of size \(m\times n\) by using equation:
Now, find the positive and negative ideal solution from \({V}_{ij}\) matrix.
In the next step, find the distance between each phase retrieval schemes from positive and negative ideal solution as:
Now, calculate the closeness coefficient \(({R}_{j})\) between phase retrieval algorithm and ideal solution. The closeness coefficients give the preference order of phase retrieval algorithm and expressed as
In this paper, we have five different phase retrieval algorithms used in the encryption process. The decision matrix, normalized decision matrix, weighted normalized decision matrix, positive and negative ideal solution matrix of both images for the proposed scheme are depicted in Appendix . The results of TOPSIS method of images Peppers and Cameraman for the proposed cryptosystem are displayed in Table 2. According to TOPSIS method, Yang-Gu algorithm perform better result as compared to other phase retrieval algorithms.
4 Conclusion
In this paper, a double image encryption cryptosystem using phase retrieval algorithms in gyrator transform is proposed. The input images are modulated with QZS method, which provide the extra security to our cryptosystem as QZS able to resist basic attacks such as KPA and CPA. Simulation are performed in MATLAB (2023a), to check performance, robustness and feasibility of proposed scheme. The statistical metrics such as \(correlation-coefficients\) \(CC\) and \(PSNR\) are computed. Statistical attacks like histogram plots, 3-D plots, correlation distribution plots and information entropy are analysed for the cryptosystem. The histogram plots analysis indicate that uniform frequency is obtained when input–output algorithm is used as PRA in the encryption process. The value of information entropy is approaches to \(8\) when MSG, input–output, and Yang-Gu algorithms are used. The proposed scheme also shows robustness against occlusion attack and noise attack and Yang-Gu algorithm perform better as compared to other PRA’s for these attacks. The key sensitivity results display that only correct value of gyrator parameter and private keys successfully decrypt the input images. The TOPSIS is a tool that is used for order preferences by comparing similarity to an ideal solution. The rank of phase retrieval algorithms in terms of order preference has been calculated by using TOPSIS method. The Yang-Gu algorithm attains first preference by the TOPSIS method. The cryptosystem can be used for multiple grayscale images as well as color images.
References
Abuturab, M.R.: Color image security system using double random-structured phase encoding in gyrator transform domain. Appl. Opt. 51(15), 3006–3016 (2012). https://doi.org/10.1364/AO.51.003006
Abuturab, M.R.: Group multiple-image encoding and watermarking using coupled logistic maps and gyrator wavelet transform. J. Opt. Soc. Am. 32(10), 1811 (2015). https://doi.org/10.1364/JOSAA.32.001811
Abuturab, M.R.: Securing multiple information using wavelet transform and Yang-Gu mixture amplitude-phase retrieval algorithm. Opt. Lasers Eng. 118, 42–51 (2019). https://doi.org/10.1016/j.optlaseng.2019.01.015
Cai, J., Shen, X., Lei, M., Lin, C., Dou, S.: Asymmetric optical cryptosystem based on coherent superposition and equal modulus decomposition. Opt. Lett. 40(4), 475 (2015). https://doi.org/10.1364/OL.40.000475
Carnicer, A., Montes-Usategui, M., Arcos, S., Juvells, I.: Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. Opt. Lett. 30(13), 1644–1646 (2005). https://doi.org/10.1364/OL.30.001644
Chen, S.-J., Hwang, C.-L.: Fuzzy multiple attribute decision making methods, in fuzzy multiple attribute decision making: methods and applications. In: Chen, S.-J., Hwang, C.-L. (eds.) Lecture Notes in Economics and Mathematical Systems, pp. 289–486. Springer, Berlin, Heidelberg (1992). https://doi.org/10.1007/978-3-642-46768-4_5
Chen, L., Gao, X., Chen, X., He, B., Liu, J., Li, D.: A new optical image cryptosystem based on two-beam coherent superposition and unequal modulus decomposition. Opt. Laser Technol. 78, 167–174 (2016). https://doi.org/10.1016/j.optlastec.2015.11.009
Chen, H., Zhu, L., Liu, Z., Tanougast, C., Liu, F., Blondel, W.: Optical single-channel color image asymmetric cryptosystem based on hyperchaotic system and random modulus decomposition in Gyrator domains. Opt. Lasers Eng. 124, 105809 (2020). https://doi.org/10.1016/j.optlaseng.2019.105809
Deng, X.: Asymmetric optical cryptosystem based on coherent superposition and equal modulus decomposition: comment. Opt. Lett. 40(16), 3913–3913 (2015). https://doi.org/10.1364/OL.40.003913
Deng, X., Zhao, D.: Single-channel color image encryption using a modified Gerchberg–Saxton algorithm and mutual encoding in the Fresnel domain. Appl. Opt. 50(31), 6019–6025 (2011). https://doi.org/10.1364/AO.50.006019
Fienup, J.R.: Reconstruction of an object from the modulus of its Fourier transform. Opt. Lett. 3(1), 27 (1978). https://doi.org/10.1364/OL.3.000027
Fienup, J.R.: Phase retrieval algorithms: a comparison. Appl. Opt. 21(15), 2758 (1982). https://doi.org/10.1364/AO.21.002758
Fienup, J.R.: Phase retrieval algorithms: a personal tour [Invited]. Appl. Opt. 52(1), 45 (2013). https://doi.org/10.1364/AO.52.000045
Frauel, Y., Castro, A., Naughton, T.J., Javidi, B.: Resistance of the double random phase encryption against various attacks. Opt. Express 15(16), 10253–10265 (2007). https://doi.org/10.1364/OE.15.010253
Gaur, K.S., Singh, H., Thakran, S.: Asymmetric cryptosystem using QZ modulation with SPM in Fresnel domain. J. Opt. (2022). https://doi.org/10.1007/s12596-022-00990-1
Gerchberg, R.W., Saxton, W.O.: A practical algorithm for the determination of phase from image and diffraction plane pictures. Optik 35(2), 237–246 (1972)
Gopinathan, U., Monaghan, D.S., Naughton, T.J., Sheridan, J.T.: A known-plaintext heuristic attack on the fourier plane encryption algorithm. Opt. Express 14(8), 3181–3186 (2006). https://doi.org/10.1364/OE.14.003181
He, Y., Cao, Y., Lu, X.: Color image encryption based on orthogonal composite grating and double random phase encoding technique. Optik 123(17), 1592–1596 (2012). https://doi.org/10.1016/j.ijleo.2011.08.033
He, W., Meng, X., Peng, X.: Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang-Gu algorithm: comment. Opt. Lett. 38(20), 4044 (2013). https://doi.org/10.1364/OL.38.004044
Huang, J.-J.: Optical multiple-image encryption based on phase encoding algorithm in the Fresnel transform domain. Opt. Laser Technol. 44, 2238–2244 (2012). https://doi.org/10.1016/j.optlastec.2012.02.032
Jahanshahloo, G.R., Lotfi, F.H., Izadikhah, M.: An algorithmic method to extend TOPSIS for decision-making problems with interval data. Appl. Math. Comput. 175(2), 1375–1384 (2006). https://doi.org/10.1016/j.amc.2005.08.048
Kumar, R., Quan, C.: Asymmetric multi-user optical cryptosystem based on polar decomposition and Shearlet transform. Opt. Lasers Eng. 120, 118–126 (2019). https://doi.org/10.1016/j.optlaseng.2019.03.024
Kumar, J., Singh, P., Yadav, A.K., Kumar, A.: Asymmetric image encryption using Gyrator transform with singular value decomposition. In: Ray, K., Sharan, S.N., Rawat, S., Jain, S.K., Srivastava, S., Bandyopadhyay, A. (eds.) Engineering Vibration, Communication and Information Processing, pp. 375–383. Springer, Singapore (2019). https://doi.org/10.1007/978-981-13-1642-5_34
Liu, Z., et al.: Fast algorithm of discrete gyrator transform based on convolution operation. Optik 122(10), 864–867 (2011). https://doi.org/10.1016/j.ijleo.2010.06.010
Liu, X., Cao, Y., Lu, P., Lu, X., Li, Y.: Optical image encryption technique based on compressed sensing and Arnold transformation. Optik 124(24), 6590–6593 (2013). https://doi.org/10.1016/j.ijleo.2013.05.092
Liu, W., Liu, Z., Liu, S.: Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang–Gu algorithm. Opt. Lett. 38(10), 1651–1653 (2013a). https://doi.org/10.1364/OL.38.001651
Liu, W., Liu, Z., Liu, S.: Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang-Gu algorithm: reply. Opt. Lett. 38(20), 4045 (2013b). https://doi.org/10.1364/OL.38.004045
Liu, X., Wu, J., He, W., Liao, M., Zhang, C., Peng, X.: Vulnerability to ciphertext-only attack of optical encryption scheme based on double random phase encoding. Opt. Express 23(15), 18955 (2015). https://doi.org/10.1364/OE.23.018955
Mehra, I., Nishchal, N.K.: Fingerprint image encryption using phase retrieval algorithm in gyrator wavelet transform domain using QR decomposition. Opt. Commun. 533, 129265 (2023). https://doi.org/10.1016/j.optcom.2023.129265
Nishchal, N.K.: Optical Cryptosystems. (IOP), Bristol, UK (2019). https://doi.org/10.1088/978-0-7503-2220-1
Peng, X., Wei, H., Zhang, P.: Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain. Opt. Lett. 31(22), 3261–3263 (2006). https://doi.org/10.1364/OL.31.003261
Qin, W., Peng, X.: Asymmetric cryptosystem based on phase-truncated fourier transforms. Opt. Lett. 35(2), 118 (2010). https://doi.org/10.1364/OL.35.000118
Rajput, S.K., Nishchal, N.K.: Optical asymmetric cryptosystem based on photon counting and phase-truncated Fresnel transforms. J. Mod. Opt. 64(8), 878–886 (2017). https://doi.org/10.1080/09500340.2016.1265677
Rakheja, P., Vig, R., Singh, P.: An asymmetric watermarking scheme based on random decomposition in hybrid multi-resolution wavelet domain using 3D Lorenz chaotic system. Optik 198, 163289 (2019). https://doi.org/10.1016/j.ijleo.2019.163289
Rakheja, P., Yadav, S., Tobria, A.: A novel image encryption mechanism based on umbrella map and Yang-Gu algorithm. Optik 271, 170152 (2022). https://doi.org/10.1016/j.ijleo.2022.170152
Refregier, P., Javidi, B.: Optical image encryption based on input plane and fourier plane random encoding. Opt. Lett. 20(7), 767–769 (1995). https://doi.org/10.1364/OL.20.000767
Rodrigo, J.A., Alieva, T., Calvo, M.L.: Gyrator transform: properties and applications. Opt. Express 15(5), 2190 (2007). https://doi.org/10.1364/OE.15.002190
Sachin, A., Singh, P.: Cascaded unequal modulus decomposition in Fresnel domain based cryptosystem to enhance the image security. Opt. Lasers Eng. 137, 106399–106411 (2021). https://doi.org/10.1016/j.optlaseng.2020.106399
Sachin, A., Singh, P.: Asymmetric watermarking scheme for color images using cascaded unequal modulus decomposition in fourier domain. J. Mod. Opt. 68(20), 1–14 (2021b). https://doi.org/10.1080/09500340.2021.1977404
Shen, Y., Tang, C., Xu, M., Lei, Z.: Optical asymmetric single-channel cryptosystem based on QZ synthesis for color images. Opt. Laser Technol. 153, 108254 (2022). https://doi.org/10.1016/j.optlastec.2022.108254
Singh, H.: Watermarking image encryption using deterministic phase mask and singular value decomposition in fractional Mellin transform domain. IET Image Proc. 12(11), 1994–2001 (2018). https://doi.org/10.1049/iet-ipr.2018.5399
Singh, P., Yadav, A.K., Singh, K.: Color image encryption using affine transform in fractional Hartley domain. Opt. Appl. XLVII, 421–433 (2017). https://doi.org/10.5277/oa170308
Singh, P., Yadav, A.K., Singh, K., Saini, I.: Asymmetric watermarking scheme in fractional Hartley domain using modified equal modulus decomposition. J. Optoelectron. Adv. Mater. 21(7–8), 848–491 (2019)
Situ, G., Zhang, J.: Double random-phase encoding in the Fresnel domain. Opt. Lett. 29(14), 1584–1586 (2004). https://doi.org/10.1364/OL.29.001584
Su, Q., Wang, G., Zhang, X., Lv, G., Chen, B.: A new algorithm of blind color image watermarking based on LU decomposition. Multidimens. Syst. Signal Process. 29(3), 1055–1074 (2018). https://doi.org/10.1007/s11045-017-0487-7
Sui, L., Liu, B., Wang, Q., Li, Y., Liang, J.: Double-image encryption based on Yang-Gu mixture amplitude-phase retrieval algorithm and high dimension chaotic system in gyrator domain. Optics Communications 354, 184–196 (2015a). https://doi.org/10.1016/j.optcom.2015.05.071
Sui, L., Liu, B., Wang, Q., Li, Y., Liang, J.: Color image encryption by using Yang-Gu mixture amplitude-phase retrieval algorithm in gyrator transform domain and two-dimensional Sine logistic modulation map. Opt. Lasers Eng. 75, 17–26 (2015b). https://doi.org/10.1016/j.optlaseng.2015.06.005
Tzeng, G.-H., Huang, J.-J.: Multiple attribute decision making: methods and applications. CRC Press, Boca Raton (2011)
Unnikrishnan, G., Joseph, J., Singh, K.: Optical encryption by double-random phase encoding in the fractional fourier domain. Opt. Lett. 25(12), 887–889 (2000). https://doi.org/10.1364/OL.25.000887
Vashisth, S., Singh, H., Yadav, A.K., Singh, K.: Devil’s vortex phase structure as frequency plane mask for image encryption using the fractional Mellin transform. Int. J. Opt. 2014, 1–9 (2014). https://doi.org/10.1155/2014/728056
Wang, X., Zhao, D.: A special attack on the asymmetric cryptosystem based on phase-truncated fourier transforms. Opt. Commun. 285(6), 1078–1081 (2012). https://doi.org/10.1016/j.optcom.2011.12.017
Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: From error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004). https://doi.org/10.1109/TIP.2003.819861
Wang, X., Chen, Y., Dai, C., Zhao, D.: Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated fourier transform. Appl. Opt. 53(2), 208–213 (2014a). https://doi.org/10.1364/AO.53.000208
Wang, X., Zhao, D., Chen, Y.: Double-image encryption without information disclosure using phase-truncation Fourier transforms and a random amplitude mask. Appl. Opt. 53(23), 5100 (2014b). https://doi.org/10.1364/AO.53.005100
Wang, Y., Quan, C., Tay, C.J.: Improved method of attack on an asymmetric cryptosystem based on phase-truncated fourier transform. Appl. Opt. 54(22), 6874–6881 (2015). https://doi.org/10.1364/AO.54.006874
Wang, Y., Quan, C., Tay, C.J.: Asymmetric optical image encryption based on an improved amplitude–phase retrieval algorithm. Opt. Lasers Eng. 78, 8–16 (2016). https://doi.org/10.1016/j.optlaseng.2015.09.008
Wei, H., Wang, X.: Optical multiple-image authentication and encryption based on phase retrieval and interference with sparsity constraints. Opt. Laser Technol. 142, 107257 (2021). https://doi.org/10.1016/j.optlastec.2021.107257
Xiong, Y., Quan, C.: Hybrid attack free optical cryptosystem based on two random masks and lower upper decomposition with partial pivoting. Opt. Laser Technol. 109, 456–464 (2019). https://doi.org/10.1016/j.optlastec.2018.08.033
Xu, H., Xu, W., Wang, S., Wu, S.: Phase-only asymmetric optical cryptosystem based on random modulus decomposition. J. Mod. Opt. 65(10), 1245–1252 (2018). https://doi.org/10.1080/09500340.2018.1431314
Zhou, N., Liu, X., Zhang, Y., Yang, Y.: Image encryption scheme based on fractional Mellin transform and phase retrieval technique in fractional fourier domain. Opt. Laser Technol. 47, 341–346 (2013). https://doi.org/10.1016/j.optlastec.2012.08.033
Funding
This work was supported by award reference number 1172(CSIR-UGC NET DEC.2018) from University Grants Commission, Ministry of Human Resource Development.
Author information
Authors and Affiliations
Contributions
Archana Tobria contributed to methodology, validation and writing original draft; Phool Singh contributed to formal analysis, writing-review and editing. The authors have read and approved the final manuscript.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflicts interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendix
Appendix
The decision matrix, normalized decision matrix, weighted normalized decision matrix, positive and negative ideal solution matrix of both images such as Peppers and Cameraman for the proposed scheme are depicted here. Herein, \(CC3\) and \(CC4\) represents the \(CC\) value of another set of grayscale images Airplane and Boat.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Tobria, A., Singh, P. A comparative analysis of phase retrieval algorithms in asymmetric double image cryptosystem in gyrator domain. Opt Quant Electron 56, 33 (2024). https://doi.org/10.1007/s11082-023-05524-y
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11082-023-05524-y