Skip to main content
Log in

Double image encryption based on symmetry of 2D-DFT and equal modulus decomposition

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper introduces a double image encryption scheme mainly based on symmetry of two-dimensional discrete Fourier transform (2D-DFT) and equal modulus decomposition (EMD). Firstly, the plural form is adopted to encode double image as a whole and the 2D-DFT is performed. To obtain matrices satisfying property of conjugate symmetry, the spectra are implemented addition and subtraction. Followed by truncation-superposition operations, another complex value matrix is attained and equal modulus decomposition is carried out to get two phase templates, which are further gyrator transformed to enhance security. With an orthogonal matrix, the real and imaginary parts are shared and spliced together to produce a real-valued cipherimage, which aims to make storage and transmission convenient. The initial states of 2D logistic map are closely related to the plaintext images and is employed to generate phase mask, rotation angles as well as the input of Gaussian matrix, which ensures the high level of security. Experimental results have demonstrated the feasibility and validity of the proposal in restituting plaintext images, security and resisting Gaussian noise attack.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Bekkouche T, Bouguezel S (2018) Digital double random amplitude image encryption method based on the symmetry property of the parametric discrete Fourier transform. J Electron Imaging 27(2):023033

    Google Scholar 

  2. Ghoneim A, Muhammad G, Amin SU, Gupta B (2018) Medical image forgery detection for smart healthcare. IEEE Commun Mag 56(4):33–37

    Article  Google Scholar 

  3. Goléa N, Melkemi K (2019) ROI-based fragile watermarking for medical image tamper detection. Int J High Perform Comput Netw 13(2):199–210

    Article  Google Scholar 

  4. Guo C, Wei C, Tan J, Chen K, Liu S, Wu Q, Liu Z (2017) A review of iterative phase retrieval for measurement and encryption. Opt Lasers Eng 89:2–12

    Article  Google Scholar 

  5. He C, Liu Z, Chen X, Wang J (2020) Double-image asymmetric cryptosystem using cylindrical diffraction and spectrum fusion and compression. IET Optoelectron 14(4):169–175

    Article  Google Scholar 

  6. Huang ZJ, Cheng S, Gong LH, Zhou NR (2020) Nonlinear optical multi-image encryption scheme with two-dimensional linear canonical transform. Opt Lasers Eng 124:105821

    Article  Google Scholar 

  7. Jiang H, Nie Z, Zhou N, Zhang W (2019) Compressive-sensing-based double-image encryption algorithm combining double random phase encoding with Josephus traversing operation. Opt Appl 49:445–459

    Google Scholar 

  8. Kang X, Tao R, Zhang F (2016) Multiple-parameter discrete fractional transform and its applications. IEEE Trans Signal Process 64(13):3402–3417

    Article  MathSciNet  Google Scholar 

  9. Kaur M, Kumar V (2020) A comprehensive review on image encryption techniques. Arch Comput Methods Eng 27:15–43

    Article  MathSciNet  Google Scholar 

  10. Kim C, Shin D, Leng L, Yang C (2018) Separable reversible data hiding in encrypted halftone image. Displays 55:71–79

    Article  Google Scholar 

  11. Kim C, Yang C, Leng L (2020) High-capacity data hiding for ABTC-EQ based compressed image. Electronics 9:644

    Article  Google Scholar 

  12. Kumar A (2019) Design of secure image fusion technique using cloud for privacy-preserving and copyright protection. Int J Cloud Appl Comput 9(3):22–36

    Google Scholar 

  13. Kumar R, Sheridan J, Bhaduri B (2018) Nonlinear double image encryption using 2D non-separable linear canonical transform and phase retrieval algorithm. Opt Lasers Technol 107:353–360

    Article  Google Scholar 

  14. Larson E, Chandler D (2010) Most apparent distortion: full-reference image quality assessment and the role of strategy. J Electron Imag 19:011006. https://doi.org/10.1117/1.3267105

    Article  Google Scholar 

  15. Leng L, Zhang JS, Khan MK, Chen X, Alghathbar K (2010) Dynamic weighted discrimination power analysis: a novel approach for face and palmprint recognition in DCT domain. Int J Phys Sci 5(17):2543–2554

    Google Scholar 

  16. Leng L, Li M, Kim C, Bi X (2017) Dual-source discrimination power analysis for multi-instance contactless palmprint recognition. Multimed Tools Appl 76(1):333–354

    Article  Google Scholar 

  17. Liu Z, Chen D, Ma J, Wei S, Zhang Y, Dai J, Liu S (2011) Fast algorithm of discrete gyrator transform based on convolution operation. Optik 122:864–867

    Article  Google Scholar 

  18. Liu Y, Jiang Z, Xu X, Zhang F, Xu J (2020) Optical image encryption algorithm based on hyper-chaos and public-key cryptography. Opt Laser Technol 127:106171

    Article  Google Scholar 

  19. Luan G, Li A, Chen Z, Huang C (2020) Asymmetric optical image encryption with silhouette removal using interference and equal modulus decomposition. IEEE Photon J 12:6900508

    Google Scholar 

  20. Luo Y, Tang S, Qin X, Cao L, Jiang F, Liu J (2018) A double-image encryption scheme based on amplitude-phase encoding and discrete complex random transformation. IEEE Access 6:77740–77753

    Article  Google Scholar 

  21. Murugan C, KarthigaiKumar P (2018) Survey on image encryption schemes, bio cryptography and efficient encryption algorithms. Mob Netw Appl. https://doi.org/10.1007/s11036-018-1058-3

  22. Rodrigo J, Alieva T, Calvo M (2007) Gyrator transform: properties and applications. Opt Express 15:2190–2203

    Article  Google Scholar 

  23. Sang J, Zhao J, Xiang Z, Cai B, Xiang H (2015) Security analysis of image encryption based on gyrator transform by searching the rotation angle with improved PSO algorithm. Sensors 15:19199–19211

    Article  Google Scholar 

  24. Shao Z, Shang Y, Fu X, Yuan H, Shu H (2018) Double-image cryptosystem using chaotic map and mixture amplitude-phase retrieval in gyrator domain. Multimed Tools Appl 77:1285–1298

    Article  Google Scholar 

  25. Sui L, Liu B, Wang Q, Li Y, Liang J (2015) Double-image encryption based on Yang-Gu mixture amplitude-phase retrieval algorithm and high dimension chaotic system in gyrator domain. Opt Commun 354:184–196

    Article  Google Scholar 

  26. Sui L, Zhang X, Huang C, Tian A, Asundi AK (2019) Silhouette-free interference-based multiple-image encryption using cascaded fractional Fourier transforms. Opt Lasers Eng 113:29–37

    Article  Google Scholar 

  27. Sui L, Du C, Zhang X, Tian A, Asundi A (2019) Double-image encryption based on interference and logistic map under the framework of double random phase encoding. Opt Lasers Eng 122:113–122

    Article  Google Scholar 

  28. Sun W, Wang L, Wang J, Li H, Wu Q (2019) Optical hyperspectral data encryption by using gamma distributed phase masks in gyrator domain. Opt Rev 26:332–341

    Article  Google Scholar 

  29. Tao S, Tang C, Shen Y, Lei Z (2020) Optical image encryption based on biometric keys and singular value decomposition. Appl Opt 59(8):2422–2430

    Article  Google Scholar 

  30. Ye H, Zhou N, Gong L (2020) Multi-image compression-encryption scheme based on quaternion discrete fractional Hartley transform and improved pixel adaptive diffusion. Signal Process 175:107652

    Article  Google Scholar 

  31. Yu C, Li J, Li X, Ren X, Gupta BB (2018) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77:4585–4608

    Article  Google Scholar 

  32. Yu S, Zhou N, Gong L, Nie Z (2020) Optical image encryption algorithm based on phase-truncated short-time fractional Fourier transform and hyper-chaotic system. Opt Lasers Eng 124:105816

    Article  Google Scholar 

  33. Zhang L, Wei D (2020) Image watermarking based on matrix decomposition and gyrator transform in invariant integer wavelet domain. Signal Process 169:107421

    Article  Google Scholar 

  34. Zhang Q, Guo L, Wei X (2010) Image encryption using DNA addition combing with chaotic maps. Math Comput Model 52:2028–2035

    Article  Google Scholar 

  35. Zhao S, Yu X, Wang L, Li W, Zheng B (2020) Secure optical encryption based on ghost imaging with fractional Fourier transform. Opt Commun 474:126086

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by the National Natural Science Foundation of China (61876112, 61601311), Support Project of High-level Teachers in Beijing Municipal Universities in the Period of 13th Five-year Plan (CIT&TCD20170322), Project of Beijing Excellent Talents (2016000020124G088), Beijing Municipal Education Research Plan Project (SQKM201810028018).

Author information

Authors and Affiliations

Authors

Contributions

All authors took part in the work described in this paper. Specifically, Zhuhong Shao proposed the framework of this paper and wrote the manuscript. Yadong Tang, Feng Wang and Yunfei Wang carried out the experiments. Mingxian Liang and Yuanyuan Shang revised the manuscript. All authors read and approved the final manuscript.

Corresponding author

Correspondence to Zhuhong Shao.

Ethics declarations

Conflict of interest

The authors declare no conflict of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shao, Z., Tang, Y., Liang, M. et al. Double image encryption based on symmetry of 2D-DFT and equal modulus decomposition. Multimed Tools Appl 80, 8973–8998 (2021). https://doi.org/10.1007/s11042-020-09961-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-09961-9

Keywords

Navigation