Image encryption is important for secure engineering and science applications1. In contrast to digital image encryption, optical image encryption has evident advantages including parallel processing through harness of properties of light2,3,4. Optical image encryption was started through the pioneer single image encryption work of double random phase encoding developed by Refregier and Javidi5, which is further extended by other work mostly including single image encryption algorithms and architectures6,7,8,9,10,11,12,13. Other single image optical encryption methods include Fresnel transform7, gyrator transform8, fractional Fourier transform9, ghost imaging10, diffractive imaging11, digital holography12 and optical scanning holography13 have also been proposed. The primary limitation of the single image optical encryption is due to its limited encryption efficiency thus compromising its practical uses.

Multiple-image encryption technology can encrypt multiple images simultaneously thus is more efficient2,14,15,16,17,18,19,20,21. A number of methods exist to achieve multiple-image optical encryption and decryption. Among them, Situ et al. 14,15 used wavelength and position multiplexing methods to achieve multiple-image encryption. Deepan et al.16 implemented a multiple-image encryption method using spatial multiplexing and compressive sensing in conjunction with double random phase encoding. Other methods include phase-only mask multiplexing17 and cascaded fractional Fourier transforms18, which are known able to reduce the cross-talk noise. The deep learning based multiple-image encryption has been developed, while effective, the encryption methods are still vulnerable to brute-force attacks and lack of strong security performance19,20. These schemes are effective, however, most of these algorithms have small key spaces making them weak against brute-force attacks and has shortcomings in security performance.

Orbital angular momentum characterized by the vortex phase structure has been extensively studied owing to its unique properties, which has attracted attention in the field of optical encryption22. Sui et al. proposed an optical multiple-image encryption method based on the chaotic structured phase masks under the illumination of a vortex beam in the gyrator domain23. Further discussion on multiple-image encryption based on optical vortex using fractional Hartley transform24, linear canonical transform25 and Gyrator transform26,27 has been stated by Singh et. al., which can enhance the security of cryptographic system. Yan et al. used the spiral phase key to replace the random phase key in the optical holography encryption system28. Compared with the random phase plate, the spiral phase plate has stronger resistance to ciphertext attack. The significant drawback of the current approach using vortex beam encryption is mostly due to its limited efficiency due to the single image encryption scheme, the target images are encoded by only one orbital angular momentum mode, which limits the encoded information security. The improvement of the vortex structure or combining the additional parameters have attracted attention29,30,31,32, such as phase jump gradient factors-based OAM multiplexing holography33, Coherent Multimode OAM Superposition34 and multiple-dimensional OAM holography35. So it is interesting and meaningful to develop a novel structured light carried multiple topological charges and apply it into the area of multiple-image encryption.

This paper presents a novel approach to multiple-image encryption by spatial multiplexing with a multi-petals structured light. The proposed structured light is generated by the coherent superposition of vortex beams with different topological charges. The proposed scheme has several advantages, including increased the capacity and strength of the encryption system, and convenience in optical execution. Specifically, multiple encryption parameters including the Fresnel diffraction distances, the wavelength of light, and the optical parameters of the vortex beams such as topological charge number are all used to expand the key space. The use of complex structured light with multi-petals intensity distribution in the Fresnel domain with spatial multiplexing has not been explored before. The proposed multiple-image encryption method has been verified with simulation and experiments. The novel coherent superposition method exhibits high effectiveness and strong robustness applicable to multiple different applications.

Principles and methods

Generation of multi-petals structured light

The overall vortex beam optical beam structure is shown in Fig. 1, which is calculated based on Eqs. (1) and (2) using the software Matlab (R2022b). The Laguerre-Gaussian (LG) vortex beam contains orbital angular momentum with a helical distribution of phase structure and a phase singularity at zero light intensity at the center of the beam. For the LG beam in the spatial domain, the light field is expressed as Ref.22:

$$E(x,y,z)=\sqrt{\frac{1}{{\omega (z)}^{2}}}\sqrt{\frac{2p!}{\pi (p+\left|l\right|)!}}exp\left[-\frac{{r}^{2}}{{\omega (z)}^{2}}\right]{\left[\frac{2{r}^{2}}{{\omega (z)}^{2}}\right]}^{\left|\frac{l}{2}\right|}exp(il\varphi )exp(ikz),$$
(1)

where \(p\) is the radial index, \(l\) is the topological charge, \(\omega (z)\) is the spot size at a distance \(z\), \(\varphi\) is the azimuth angle, \(k=\frac{2\pi }{\lambda }\) is the wave number, \({\omega }_{0}\) is the waist width of Gaussian amplitude. Taking optical vortex array as the target beam, we consider the coherent superposition of multiple vortex beams loaded with discrete topological charge l, where centers are co-axis, and each sub-beam has the same radial index p = 0. The coherent superposition of vortex beams can generate multi-petals structured light, which can be expressed as

$$E\left(x,y,z\right)=\sum_{n=1}^{N}A\left(r\right)B\left(r,{l}_{n}\right)\text{exp}\left(i{l}_{n}\varphi \right),$$
(2)

where N denotes the number of OAM modes and the value of topological charge l is arithmetic sequence, \(A(r)=\frac{\sqrt{2/\pi }}{w(z)}exp(-\frac{{r}^{2}}{{w(z)}^{2}})\), \(B(r,{l}_{n})=\sqrt{1/|{l}_{n}|!}{(r\sqrt{2}/w(z))}^{|{l}_{n}|}\).

Figure 1
figure 1

Generation of the multi-petals structured light. (a1a2) 3D, (b1b2) 2D and (c1c2) phase maps of the multi-petals structured light generated by the vortex beams with \({l}_{n}= {l}_{1}+\Delta l, {l}_{1}=1,\Delta l = 3 \text{and} 4\). The multi-petals structured light can be generated by illuminating a spatial light modulator which loads specific phase function as is shown in Fig. 1c1 and c2.

Figure 1 shows the example of the multi-petals structured light with sub-beams N = 3 and N = 4, \({l}_{n}= {l}_{1}+\Delta l.\) Fig. 1a1–c1 show the 3D, 2D maps and the phase diagram of the multi-petals structured light, which consists of three sub-beams, where \({l}_{1}=1,\Delta l\) = 3. These sub-beams can be used to encode the plain images. The number of \(\Delta l\) determines the number of sub-beams, which can be denoted as an additional key in the proposed method. Figure 1a2–c2 show the 3D, 2D maps and the phase diagram of the multi-petals structured light, which consists of four sub-beams, where \({l}_{1}=1,\Delta l\)= 4. The multi-petals structured light can be generated in experiment by illuminating a spatial light modulator which loads specific phase function as is shown in Fig. 1c1 and c2. It is evident that the beams are featured with intensity pattern of bright and dark spots, which is called as multi-petals structured light and formed due to the destructive interference of the co-axially superimposed vortex beams at equal intensities. As shown in Fig. 1b2, the four sub-beams of the multi-petals structured light will be used to encrypt four plain images. The number of \(\Delta l\) are able to be increased thus leading to the increased number of images to be encrypted indicating the scalability of the methods.

Encryption process

The process of multiple-image encryption is shown in Fig. 2. The proposed encryption process can be divided into three specific steps. First, the spatially separated optical vortex array is generated by coherent superposition of multiple vortex beams with different topological charge. It is followed by position multiplexing and Fresnel diffraction propagation to encode the multiple images. The images to be encrypted are put behind each sub-beams of the multi-petals structured light at different distances z1, z2, z3, z4. Finally, the Fibonacci Lucas transform is used to encrypt the Fresnel diffraction patterns to obtain the final ciphertext at the position z6.

Figure 2
figure 2

The multi-image encryption scheme. It shows the process of encryption of the multiple images using multi-petals structured light. Each image is encrypted with a sub-beam profile of the multi-petals structured light. The encrypted images are subsequently encrypted with Fibonacci Lucas transform. Multi-petals Structured Light (MSL); Fibonacci Lucas transform (FLT).

After obtaining multiple images diffraction patterns, which shows the ability to encode 3D information and also work as space distance encryption keys, the Fibonacci Lucas transform is applied for another encryption36. The Fibonacci Lucas transform is used to mapped \({FL}_{n}\): \({T}^{2}\to {T}^{2}\), for example:

$$\left[\begin{array}{c}{x}{\prime}\\ {y}{\prime}\end{array}\right]=\left[\begin{array}{cc}{F}_{i}& {F}_{i+1}\\ {L}_{i}& {L}_{i+1}\end{array}\right]\left[\begin{array}{c}x\\ y\end{array}\right]mod\text{ M}.$$
(3)

where(x,y), (x,y) ϵ (0,1,2…M-1), M is the size of the digital image, Fi is the ith Fibonacci number of the Fibonacci series, and Li is the ith Lucas number of the Lucas series. In our simulation and experiment, the Fibonacci number is set up as 30 and the output image is gained as encryption result. The encryption result is presented in Fig. 3, which evidently, is immune to the unauthorized access.

Figure 3
figure 3

The ciphertext image at the position z6.

Decryption process

As a symmetric encryption algorithm framework, multiple original images can be recovered from the ciphertext image by utilizing the exact key stream and the corresponding inverse operations. The decryption process is shown in Fig. 4. Firstly, the ciphertext image was processed by Fibonacci Lucas inverse transform. Secondly, the Fresnel inverse diffraction is performed on the newly generated image and four sectional images are deduced at z1, z2, z3 and z4, which will yield the original images of “S”, “H”, “N” and “U” by the correlation operation.

Figure 4
figure 4

The multiple image decryption process. It shows that the cipertext is subject to Fibonacci Lucas inverse transform, which is further followed by Fresnel diffraction at different diffraction distance to yield the original images.

Experiments

Experiment setup

Optical experiments have been carried out to further validate the execution of the proposed multiple-image encryption scheme shown in Fig. 5. The light source used in our experiment is a semiconductor Laser with wavelength of 514.5nm and the spot size of Gaussian beam is approximately 1.5mm. The spatial light modulator (SLM1) is used to generate the proposed multi-petals structured light. An expand system with two lens (L1 and L2) and a pinhole located in the focal plane of L1 and L2 is used to estimate the high frequency noise and expand the multi-petals structured light. It is followed by the four images arranged along different distances in the space to be encoded by the multi-petals structured light with certain diffraction. The second spatial light modulator (SLM2) is used for the encryption of the multi-petals structured light by Fibonacci Lucas transform and the ciphertext images are imaged by a charge-coupled device (CCD). Both of the spatial light modulators (PLUTO, NIR144) used in this experiment have a pixel pitch of 7.0 μm and a resolution of 1920 × 1080 pixels.

Figure 5
figure 5

Optoelectronic setup for the proposed encryption scheme, BE1 and BE2: Beam expanders; St1, St2 and St3: Shutters; P1 and P2: Polarizers; L1, L2 and L3: Lenses; M1, M2 and M3: Reflective mirrors; SLM1 and SLM2: Spatial light modulator; CCD: Charged-coupled device; Ph: Pinhole; PC: Personal computer.

It is important to have precise phase distribution being loading on the SLMs to start the experiment. The phase generation methods are discussed in below. For this, we focus on the generation of the multi-petals structured light through the phase-only SLM1. The first step is to generate the holograms. We derive the amplitude and phase of the electric field of multi-petals structured light in Eq. (2). The desired computer-generated hologram loaded on the phase-only SLM1 is expressed as

$${\Phi }_{SLM}={F}_{OVA}sin\left[Arg[E(x,y,z)]+2\pi {f}_{x}x\right].$$
(4)

where FOVA can be obtained by numerical inversion of J1(FOVA) = Abs[\(E(x,y,z)\)], which is the first-order Bessel function37. The hologram used in the experiment is shown in the sub-image in the upper left corner of Fig. 5. Grating is involved in the computer-generated hologram on the SLM1. The grating with the phase shift of \(2\uppi {f}_{x}x\) is a blazed grating, where \({f}_{x}\) is the grating frequency that determines the diffraction angle of the light reflected from the SLM1 in the x direction. The hologram contains the amplitude and phase modulations. The depth of the grating and spatial phase delay controls the intensity and wave-front of incident light, respectively.

For encryption of the image, the phase distributions loaded on SLM2 can be carried out by the gradient descent method38. Specifically, the physical process that encrypt the multi-petals structured light by SLM2 can be written as:

$${E}_{out}=F\left\{{E}_{in}\cdot {e}^{iM\varphi }\right\},$$
(5)

where \({E}_{in}\) is the incident light field carried plaintext images, \({E}_{out}\) is the encrypted light field, and \({e}^{iM\varphi }\) is the phase distribution loaded on the SLM to optically realized the Fibonacci Lucas transform. According to the gradient descent method, the phase distribution is provided at each iteration as follows:

$${\theta }_{uv}{\prime}={\theta }_{uv}-{\gamma }_{t}\frac{\partial L}{\partial {\theta }_{uv}},$$
(6)

where u and v represent the coordinates of the light field, \({\theta }_{uv}\) is the phase function, \({\gamma }_{t}\) is the step length coefficient for iteration, t is the iteration number, and L is the loss function used in the optimization, which is defined by the MSE factor:

$$L=\frac{1}{UV}\sum_{u}^{U}\sum_{ v}^{V}{\left({E}_{out}{\prime}-{E}_{out}\right)}^{2}.$$
(7)

where \({E}_{out}{\prime}\) is the simulation light field obtained by Fibonacci Lucas transform, U and V are the numbers of rows and columns of the light field. With these two-phase distributions produced and loaded perfectly, the proposed multi-petals structured light can be generated successfully and encrypted by Fibonacci Lucas transform in optical experiment.

Experiment results

The experimental results are shown in Fig. 6. Specifically, Fig. 6a is the intensity distribution of the multi-petals structured light output from the SLM at z0. Figure 6b to e are the Fresnel diffraction patterns at the position of \({z}_{1}\), \({z}_{2}\), \({z}_{3}\), and \({z}_{4}\), respectively. It is evident that based on Fig. 6b to e, the Fresnel diffraction pattern at the position z4 carries the information of four plaintext images. The unclear phase images with the increase of the Fresnel diffraction distance, shows that the distance of Fresnel diffraction is also useful for enhancing information security. Figure 6f shows the ciphertext image at \({z}_{6}\). It is evident that the proposed cryptosystem effectively encodes the input of multiple-images into ciphertext image having pixel distribution identical to stationary white noise, which cannot be recovered with wrong keys evident by the security analysis. Through the decryption process, the inverse transformation of the Fibonacci Lucas transform was used, and then performed the inverse transformation of Fresnel diffraction at different diffraction distances to obtain the decrypted images at the corresponding positions, as shown in Fig. 7.

Figure 6
figure 6

The results of Fresnel diffraction and ciphertext image. It shows the Fresnel diffraction and at (a) The multi-petals structured light at z0; The Fresnel diffraction patterns at (b) \({z}_{1}\), (c) \({z}_{2}\), (d) \({z}_{3}\), and (e) \({z}_{4}\); and (f) ciphertext image at \({z}_{6}\).

Figure 7
figure 7

The results of the decrypted images. It shows the decrypted images at the position of (a) \({z}_{1}\), (b) \({z}_{2}\), (c) \({z}_{3}\), and (d) \({z}_{4}\).

System security analysis

Mean square error and peak signal-to-noise ratio analysis

To quantitatively analyze the ciphertext image and the decrypted image, the mean square error (MSE) and the peak signal-to-noise ratio (PSNR) are adopted. The mean square error is a common loss function,

$$\text{MSE}=\frac{1}{{N}^{2}}\sum_{i=1}^{N}\sum_{j=1}^{N}{\left[O(i,j)-C(i,j)\right]}^{2},$$
(8)

where N2 is the size of test images, O(i, j) is the pixel value of the original image at position (i, j). C(i, j) denotes either a ciphertext or decrypted image derived from MSE39,40:

$$\text{PSNR}=10lg\left(\frac{{255}^{2}}{MSE}\right).$$
(9)

PSNR1 and MSE1 are calculated between the original image and the ciphertext image. PSNR2 and MSE2 are calculated between the original and the decrypted images. Higher MSE value indicates the greater the difference between the original image and ciphertext image. As shown in Table 1, it is evident that the value of MSE1 is higher than MSE2 thus showing the weak correlation between the original image and the ciphertext image. Correspondingly, the PSNR2 value increases along with the improved quality of the decrypted images.

Table 1 MSE and PSNR values between the original image and ciphertext images.

Noise attack analysis

The performance of the encryption systems to withstand noise attacks is analyzed through the Salt & Pepper noise and the Gaussian noise analysis. The correlation coefficient (CC) is used to evaluate the quality of decryption and the CC value of the original image and the decrypted image is calculated mathematically as shown in the Eq. (10). Among them, A1(x, y) represents the pixel value of the original image with M × N pixels, A2(x, y) represents the pixel value in the decrypted image. \(\overline{{A_{1} (x,y)}}\) and \(\overline{{A_{2} (x,y)}}\) means taking the average of the gray values of all pixels. If the CC value between two images is closer to 1, the correlation between two images is larger, if the absolute value is closer to 0, the correlation between two images is weaker.

$${\text{CC}} = \frac{{\sum\limits_{x = 1}^{M} {\sum\limits_{y = 1}^{N} {[A_{1} (x,y) - \overline{{A_{1} (x,y)}} ][A_{2} (x,y) - \overline{{A_{2} (x,y)}} ]} } }}{{\sqrt {\sum\limits_{x = 1}^{M} {\sum\limits_{y = 1}^{N} {[A_{1} (x,y) - \overline{{A_{1} (x,y)}} ]^{2} } } \sum\limits_{x = 1}^{M} {\sum\limits_{y = 1}^{N} {[A_{2} (x,y) - \overline{{A_{2} (x,y)}} ]^{2} } } } }}$$
(10)

Figure 8 shows the decrypted images with different intensity of 0.01, 0.05 and 0.1 Salt & Pepper noises. The PSNR and the correlation coefficients between the original images and decrypted images are listed in Table 2 to evaluate the quality of the decrypted images. From Fig. 8 and Table 2, we can see that the ciphertext is immune to Salt & Pepper noise pollution. The decrypted images have a correlation with the original images given the presence of severe noises, where the original images are evident in the decrypted images. The impacts of Gaussian noise with intensities 0.2, 0.5 and 0.9 are also studied shown in Fig. 9 and Table 3. Figure 9a1–a4 are the decrypted images given the Gaussian noise intensity variance of 0.2, where the correlation coefficients are 0.7411, 0.8185, 0.6924, 0.7784. Figure 9b1–b4 show the decrypted images when the Gaussian noise intensities with variance of 0.5, where the correlation coefficients are 0.6130, 0.6958, 0.6658, 0.7080. Figure 9(c1—c4) are the decrypted images when the Gaussian noise intensities with variance of 0.9, where the correlation coefficients are 0.3173, 0.3699, 0.3702, 0.3736. It is proved that the proposed encryption system has strong anti-Gaussian noise pollution capability.

Figure 8
figure 8

Salt & Pepper noise attack analysis: (a1a4) decrypted images “S”,“H”, “N” and “U”with noise intensity 0.01, (b1b4) decrypted results with noise intensity 0.05, (c1c4) decrypted results with noise intensity 0.1.

Table 2 PSNR and CC values under Salt & Pepper noise with different intensities.
Figure 9
figure 9

Gaussian attack analysis: (a1–a4) decrypted images “S”,“H”, “N” and “U”with noise intensity 0.2, (b1b4) decrypted results with noise intensity 0.5, (c1c4) decrypted results with noise intensity 0.9.

Table 3 PSNR and CC values under Gaussian noise with different intensities.

Occlusion attacks analysis

The system occlusion attacks are also evaluated. Figure 10 shows the ciphertext images with different degrees of occlusion and their corresponding reconstructed images. Four sub-blocks of various sizes are cropped in the ciphertext images resulting in the loss 1/5, 2/5, 3/5 and 4/5 of data. It is evident that given the decrypted images still clear even though the ciphertext is subjected to a various degrees of information loss due to occlusion. Similarly, the PSNR and CC values to measure the quality of decryption image are tabulated in Table 4. The primary properties of the original images have been dispersed across the entire ciphertext image, so even if the decryption images are blurred, the essential characteristics are still accessible under data loss. When the ciphertext is subjected to a partial clopping, the decryption image still has a certain correlation with the original image, indicating that the proposed encryption system has a good ability to resist occlusion attack.

Figure 10
figure 10

Ciphertext subjected to different degrees of occlusion: (a1) 1/5 occlusion, (a2) 2/5 occlusion, (a3) 3/5 occlusion and (a4) 4/5 occlusion, respectively; (b1,c1,d1,e1) decryption images of (a1); (b2,c2,d2,e2) decryption images of (a2); (b3,c3,d3,e3) decryption images of (a3); (b4,c4,d4,e4) decryption images of (a4).

Table 4 PSNR and CC values under ciphertext subjected to different degrees of occlusion.

Adjacent pixel correlation analysis

To prevent the attackers to obtain useful information about images by analyzing the correlation among adjacent points of the decrypted images, the correlation coefficient of neighboring pixels including the correlation between pixels in the horizontal, diagonal, and vertical directions are analyzed. First, 2000 pairs of two adjacent (in horizontally, vertical, and diagonal direction) pixels from an image were randomly selected. A strong encryption of an image is able to reduce the correlation between adjacent pixels of an image. Figure 11a–d show the correlation distributions of the original images and their corresponding ciphertext images Fig. 11e in the horizontal, vertical and diagonal directions. It can be seen that the ciphertext image with the suggested multi-image encryption system display a low level correlation distribution, while the correlation distributions in the three directions of the original images show strong correlation.

Figure 11
figure 11

Correlation of the original images (ad) and ciphertext images (e) in the horizontal, vertical and diagonal direction. It shows that the correlation values decreased for the ciphertext images.

Specific attack analysis

For an information encryption system, it could be described as robust and secure if only it were able to resist four basic attacks, such as cipher-text only attacks (COA), known plain text attacks (KPA), chosen plain text attacks (CPA), chosen cipher-text attacks (CCA). Among them, cipher-text only attack is the most powerful attack for the proposed multiple-image encryption scheme using spatial multiplexing under the illumination of a multi-petals structured light. The generation of the multi-petals structured light is related to the vortex parameters. So the proposed scheme is highly sensitive to the phase parameter. COA assumes that the attacker is familiar with the proposed encryption system and knows the ciphertext image but does not know the decryption keys. In this paper, we use the hybrid input–output (HIO) algorithm, a phase retrieval algorithm to perform the cipher-only attack41. Assuming the attacker intercepts the ciphertext image, as shown in Fig. 12a. With HIO algorithm, we can retrieve the decrypted image after 400 iterations, as shown in Fig. 12b. It is obvious that the relevant plaintext information cannot be attacked successfully. So, the proposed encryption system is secure enough to resist cipher-text only attacks.

Figure 12
figure 12

The result of COA. (a) Intercepted ciphertext, (b) the decrypted image.

Performance comparison

The comparison of the performance of the proposed scheme with some of the previous image encryption schemes has been done and is shown in Table 5. It can be seen from Table 5 that multi-petals structured light based encryption scheme expands the key space and improves the security of the cryptosystem.

Table 5 Comparison table between the proposed scheme and other image encryption schemes based on various parameters.

Conclusions

Through the research, a novel multiple-image encryption scheme based on the coherent superposition of multiple vortex beams with different topological charges and Fresnel diffraction is proposed. Simulations and experimental results demonstrated that the proposed method is able to encrypt and decrypt the information of multiple-images effectively. The system benefits from multiple encryption parameters characteristic of the multi-petals structured light including Fresnel diffraction distance, the topological charges and spatially position to be considered to enhance system security. The security analyses show that the proposed method possesses the advantage of strong noise resistance and high robustness to noise and cropping attacks. The proposed method will be useful for highly efficient for real-world multiple-image encryption applications.