Skip to main content
Log in

Cryptosystem for Securing Image Encryption Using Structured Phase Masks in Fresnel Wavelet Transform Domain

  • 3DR Express
  • Published:
3D Research

Abstract

A cryptosystem for securing image encryption is considered by using double random phase encoding in Fresnel wavelet transform (FWT) domain. Random phase masks (RPMs) and structured phase masks (SPMs) based on devil’s vortex toroidal lens (DVTL) are used in spatial as well as in Fourier planes. The images to be encrypted are first Fresnel transformed and then single-level discrete wavelet transform (DWT) is apply to decompose \(LL,HL, LH\) and \(HH\) matrices. The resulting matrices from the DWT are multiplied by additional RPMs and the resultants are subjected to inverse DWT for the encrypted images. The scheme is more secure because of many parameters used in the construction of SPM. The original images are recovered by using the correct parameters of FWT and SPM. Phase mask SPM based on DVTL increases security that enlarges the key space for encryption and decryption. The proposed encryption scheme is a lens-less optical system and its digital implementation has been performed using MATLAB 7.6.0 (R2008a). The computed value of mean-squared-error between the retrieved and the input images shows the efficacy of scheme. The sensitivity to encryption parameters, robustness against occlusion, entropy and multiplicative Gaussian noise attacks have been analysed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Refregier, P., & Javidi, B. (1995). Optical image encryption based on input plane and Fourier plane random encoding. Optics Letters, 20, 767–769.

    Article  Google Scholar 

  2. Millan, M. S., & Perez-Cabre, E. (2011). Optical data encryption. In G. Cristobal, P. Schelkens, & H. Thienpont (Eds.), Optical data encryption: Optical and digital image processing: Fundamentals and applications (pp. 739–767). New York: Wiley.

    Chapter  Google Scholar 

  3. Javidi, B., et al. (2016). Roadmap on optical security. Journal of Optics, 18, 083001.

    Article  Google Scholar 

  4. Matoba, O., Nomura, T., Perez-Cabre, E., Millan, M. S., & Javidi, B. (2009). Optical techniques for information security. Proceedings of IEEE, 97, 1128–1148.

    Article  Google Scholar 

  5. Kumar, P., Joseph, J., & Singh, K. (2016). Double random phase encoding based optical encryption systems using some linear canonical transforms: Weaknesses and countermeasures. In J. J. Healy, M. A. Kutay, H. M. Ozaktas, & J. T. Sheridan (Eds.), Linear canonical transforms (pp. 198, 367–396). New York: Springer.

  6. Chen, W., Wang, X., & Chen, X. (2015). Security-enhanced phase encryption assisted by nonlinear optical correlation via sparse phase. Journal of Optics, 17, 1–12.

    Google Scholar 

  7. Alfalou, A., Brosseau, C., Abdallah, N., & Jridi, M. (2013). Assessing the performance of a method of simultaneous compression and encryption of multiple images and its resistance against various attacks. Optics Express, 21, 8025–8043.

    Article  Google Scholar 

  8. Markman, A., Javidi, B., & Tehranipoor, M. (2014). Photon-counting security tagging and verification using optically encoded QR codes. IEEE Photonics Journal, 6, 6800609.

    Article  Google Scholar 

  9. Yadav, A. K., Vashisth, S., Singh, H., Singh, K. (2015). Optical cryptography and watermarking using some Fractional canonical transforms, and structured masks. In Advances in Optical Science and Engineering: Proceedings of the IEM Optronix 2014 (pp. 25–36). New York: Springer.

  10. Vashisth, S., Yadav, A. K., Singh, H., & Singh, K. (2015). Watermarking in gyrator domain using an asymmetric cryptosystem. In Proceedings of the SPIE, 9654, 96542E−1/8.

  11. Unnikrishnan, G., Joseph, J., & Singh, K. (2000). Optical encryption by double-random phase encoding in the fractional Fourier domain. Optics Letters, 25, 887–889.

    Article  Google Scholar 

  12. Hennelly, B. M., & Sheridan, J. T. (2003). Image encryption and the fractional Fourier transform. Optik, 114, 251–265.

    Article  Google Scholar 

  13. Dahiya, M., Sukhija, S., Singh, H. (2014). Image encryption using quad masks in fractional Fourier domain and case study. In IEEE International Advance Computing Conference (IACC) (pp. 1048–1053).

  14. Matoba, O., & Javidi, B. (1999). Encrypted optical memory system using three-dimensional keys in the Fresnel domain. Optics Letters, 24, 762–764.

    Article  Google Scholar 

  15. Situ, G., & Zhang, J. (2004). Double random-phase encoding in the Fresnel domain. Optics Letters, 29, 1584–1586.

    Article  Google Scholar 

  16. Rodrigo, J. A., Alieva, T., & Calvo, M. L. (2007). Gyrator transform: Properties and applications. Optics Express, 15, 2190–2203.

    Article  Google Scholar 

  17. Singh, H., Yadav, A. K., Vashisth, S., & Singh, K. (2014). Fully-phase image encryption using double random-structured phase masks in gyrator domain. Applied Optics, 53, 6472–6481.

    Article  Google Scholar 

  18. Singh, H., Yadav, A. K., Vashisth, S., & Singh, K. (2015). Double phase-image encryption using gyrator transforms, and structured phase mask in the frequency plane. Optics and Lasers Engineering, 67, 145–156.

    Article  Google Scholar 

  19. Chen, L., & Zhao, D. (2005). Optical image encryption based on fractional wavelet transform. Optics Communication, 254, 361–367.

    Article  Google Scholar 

  20. Mehra, I., & Nishchal, N. K. (2015). Wavelet-based image fusion for multiple images through asymmetric keys. Optics Communication, 335, 153–160.

    Article  Google Scholar 

  21. Singh, H. (2016). Optical cryptosystem of color images using random phase masks in the fractional wavelet transform domain. In AIP Conference Proceedings, 1728, 020063-1/4.

  22. Vashisth, S., Singh, H., Yadav, A. K., & Singh, K. (2014). Image encryption using fractional Mellin transform, structured phase filters and phase retrieval. Optik, 125, 5309–5315.

    Article  Google Scholar 

  23. Barrera, J. F., Henao, R., & Torroba, R. (2005). Optical encryption method using toroidal zone plates. Optics Communication, 248, 35–40.

    Article  Google Scholar 

  24. Singh, H., Yadav, A. K., Vashisth, S., & Singh, K. (2015). Optical image encryption using devil’s vortex toroidal lens in the Fresnel transform domain. International Journal of Optics.

  25. Sui, L., Zhou, B., Ning, X., & Tian, A. (2016). Optical multiple-image encryption based on the chaotic structured phase masks under the illumination of a vortex beam in the gyrator domain. Optics Express, 24, 499–515.

    Article  Google Scholar 

  26. Abuturab, M. R. (2012). Color image security system using double random-structured phase encoding in gyrator domain. Applied Optics, 51, 3006–3016.

    Article  Google Scholar 

  27. Mehra, I., Rajput, S. K., & Nishchal, N. K. (2013). Collision in Fresnel domain asymmetric cryptosystem using phase truncation and authentication verification. Optical Engineering, 52, 028202-1/6.

    Google Scholar 

  28. Goodman, J. W. (1996). Introduction to Fourier optics (2nd ed.). New York: McGraw-Hill.

    Google Scholar 

  29. Voelz, D. G. (2011). Computational Fourier optics (A MATLAB (R) Tutorial). Bellingham, WA: SPIE Press.

    Book  Google Scholar 

  30. Mendlovic, D., & Konforti, N. (1993). Optical realization of the wavelet transform for two-dimensional objects. Applied Optics, 32, 6542–6546.

    Article  Google Scholar 

  31. Mendlovic, D., Zalevsky, Z., Mas, D., Gercia, J., & Ferreira, C. (1997). Fractional wavelet transform. Applied Optics, 36, 4801–4806.

    Article  Google Scholar 

  32. Vilardy, J. M., Useche, J., Torres, C. O., & Mattos, L. (2011). Image encryption using the fractional wavelet transform. Journal of Physics: Conference Series (IOP), 274, 012047.

    Google Scholar 

  33. Monsoriu, J. A., Furlan, W. D., Saavedra, G., & Gimenez, F. (2007). Devil’s lenses. Optics Express, 15, 13858–13864.

    Article  Google Scholar 

  34. Furlan, W. D., Gimenez, F., Calatayud, A., & Monsoriu, J. A. (2009). Devil’s vortex-lenses. Optics Express, 17, 21891–21896.

    Article  Google Scholar 

  35. Barrera, J. F., Tebaldi, M., Ammaya, D., Furlan, W. D., Monsoriu, J. A., Bolognini, N., et al. (2012). Multiplexing of encrypted data using fractal masks. Optics Letters, 37, 2895–2897.

    Article  Google Scholar 

  36. Mitry, M., Doughty, D. C., Chaloupka, J. L., & Anderson, M. E. (2012). Experimental realization of the devil’s vortex Fresnel lens with a programmable spatial light modulator. Applied Optics, 51, 4103–4108.

    Article  Google Scholar 

  37. Calabuig, A., Sanchez-Ruiz, S., Martinez-Leon, L., Tajahuerce, E., Fernandez-Alonso, M., Furlan, W. D., et al. (2013). Generation of programmable 3D optical vortex structures through devil’s vortex-lens arrays. Applied Optics, 52, 5822–5829.

    Article  Google Scholar 

  38. Vashisth, S., Singh, H., Yadav, A. K., & Singh, K. (2014). Devil’s vortex phase structure as frequency plane mask for image encryption using the fractional Mellin transform. International Journal of Optics

  39. Yadav, A. K., Vashisth, S., Singh, H., & Singh, K. (2015). A phase-image watermarking scheme in gyrator domain using devil’s vortex Fresnel lens as a phase mask. Optics Communication, 344, 172–180.

    Article  Google Scholar 

  40. Pu, J., & Jones, P. H. (2015). Devil’s lens optical tweezers. Optics Express, 23, 8190–8199.

    Article  Google Scholar 

  41. Singh, H. (2016). Devil’s vortex Fresnel lens phase masks on an asymmetric cryptosystem based on phase-truncation in gyrator wavelet transform. Optics and Lasers Engineering, 81, 125–139.

    Article  Google Scholar 

  42. Zhou, N.-R., Wang, Y., & Gong, L. (2011). Novel optical image encryption scheme based on fractional Mellin transform. Optics Communication, 284, 3234–3242.

    Article  Google Scholar 

  43. Sui, L., Xin, M., Tian, A., & Jin, H. (2013). Single-channel color image encryption using phase retrieve algorithm in fractional Fourier domain. Optics and Lasers Engineering, 51, 1297–1309.

    Article  Google Scholar 

  44. Tong, X., Liu, Y., Zhang, M., Xu, H., & Wang, Z. (2015). An image encryption scheme based on hyperchaotic rabinovich and exponential chaos maps. Entropy, 17, 181–196.

    Article  Google Scholar 

  45. Liang, Y., Liu, G., Zhou, N. R., & Wu, J. (2015). Image encryption combining multiple generating sequences controlled fractional DCT with dependent scrambling and diffusion. Journal of Morden Optics, 62, 251–264.

    Article  Google Scholar 

Download references

Acknowledgement

The author wishes to thank the management of The NorthCap University for their encouragement and inspiration that lent support during the course of this work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hukum Singh.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Singh, H. Cryptosystem for Securing Image Encryption Using Structured Phase Masks in Fresnel Wavelet Transform Domain. 3D Res 7, 34 (2016). https://doi.org/10.1007/s13319-016-0110-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s13319-016-0110-y

Keywords

Navigation