Abstract
This paper introduces a double image encryption scheme mainly based on symmetry of two-dimensional discrete Fourier transform (2D-DFT) and equal modulus decomposition (EMD). Firstly, the plural form is adopted to encode double image as a whole and the 2D-DFT is performed. To obtain matrices satisfying property of conjugate symmetry, the spectra are implemented addition and subtraction. Followed by truncation-superposition operations, another complex value matrix is attained and equal modulus decomposition is carried out to get two phase templates, which are further gyrator transformed to enhance security. With an orthogonal matrix, the real and imaginary parts are shared and spliced together to produce a real-valued cipherimage, which aims to make storage and transmission convenient. The initial states of 2D logistic map are closely related to the plaintext images and is employed to generate phase mask, rotation angles as well as the input of Gaussian matrix, which ensures the high level of security. Experimental results have demonstrated the feasibility and validity of the proposal in restituting plaintext images, security and resisting Gaussian noise attack.
Similar content being viewed by others
References
Bekkouche T, Bouguezel S (2018) Digital double random amplitude image encryption method based on the symmetry property of the parametric discrete Fourier transform. J Electron Imaging 27(2):023033
Ghoneim A, Muhammad G, Amin SU, Gupta B (2018) Medical image forgery detection for smart healthcare. IEEE Commun Mag 56(4):33–37
Goléa N, Melkemi K (2019) ROI-based fragile watermarking for medical image tamper detection. Int J High Perform Comput Netw 13(2):199–210
Guo C, Wei C, Tan J, Chen K, Liu S, Wu Q, Liu Z (2017) A review of iterative phase retrieval for measurement and encryption. Opt Lasers Eng 89:2–12
He C, Liu Z, Chen X, Wang J (2020) Double-image asymmetric cryptosystem using cylindrical diffraction and spectrum fusion and compression. IET Optoelectron 14(4):169–175
Huang ZJ, Cheng S, Gong LH, Zhou NR (2020) Nonlinear optical multi-image encryption scheme with two-dimensional linear canonical transform. Opt Lasers Eng 124:105821
Jiang H, Nie Z, Zhou N, Zhang W (2019) Compressive-sensing-based double-image encryption algorithm combining double random phase encoding with Josephus traversing operation. Opt Appl 49:445–459
Kang X, Tao R, Zhang F (2016) Multiple-parameter discrete fractional transform and its applications. IEEE Trans Signal Process 64(13):3402–3417
Kaur M, Kumar V (2020) A comprehensive review on image encryption techniques. Arch Comput Methods Eng 27:15–43
Kim C, Shin D, Leng L, Yang C (2018) Separable reversible data hiding in encrypted halftone image. Displays 55:71–79
Kim C, Yang C, Leng L (2020) High-capacity data hiding for ABTC-EQ based compressed image. Electronics 9:644
Kumar A (2019) Design of secure image fusion technique using cloud for privacy-preserving and copyright protection. Int J Cloud Appl Comput 9(3):22–36
Kumar R, Sheridan J, Bhaduri B (2018) Nonlinear double image encryption using 2D non-separable linear canonical transform and phase retrieval algorithm. Opt Lasers Technol 107:353–360
Larson E, Chandler D (2010) Most apparent distortion: full-reference image quality assessment and the role of strategy. J Electron Imag 19:011006. https://doi.org/10.1117/1.3267105
Leng L, Zhang JS, Khan MK, Chen X, Alghathbar K (2010) Dynamic weighted discrimination power analysis: a novel approach for face and palmprint recognition in DCT domain. Int J Phys Sci 5(17):2543–2554
Leng L, Li M, Kim C, Bi X (2017) Dual-source discrimination power analysis for multi-instance contactless palmprint recognition. Multimed Tools Appl 76(1):333–354
Liu Z, Chen D, Ma J, Wei S, Zhang Y, Dai J, Liu S (2011) Fast algorithm of discrete gyrator transform based on convolution operation. Optik 122:864–867
Liu Y, Jiang Z, Xu X, Zhang F, Xu J (2020) Optical image encryption algorithm based on hyper-chaos and public-key cryptography. Opt Laser Technol 127:106171
Luan G, Li A, Chen Z, Huang C (2020) Asymmetric optical image encryption with silhouette removal using interference and equal modulus decomposition. IEEE Photon J 12:6900508
Luo Y, Tang S, Qin X, Cao L, Jiang F, Liu J (2018) A double-image encryption scheme based on amplitude-phase encoding and discrete complex random transformation. IEEE Access 6:77740–77753
Murugan C, KarthigaiKumar P (2018) Survey on image encryption schemes, bio cryptography and efficient encryption algorithms. Mob Netw Appl. https://doi.org/10.1007/s11036-018-1058-3
Rodrigo J, Alieva T, Calvo M (2007) Gyrator transform: properties and applications. Opt Express 15:2190–2203
Sang J, Zhao J, Xiang Z, Cai B, Xiang H (2015) Security analysis of image encryption based on gyrator transform by searching the rotation angle with improved PSO algorithm. Sensors 15:19199–19211
Shao Z, Shang Y, Fu X, Yuan H, Shu H (2018) Double-image cryptosystem using chaotic map and mixture amplitude-phase retrieval in gyrator domain. Multimed Tools Appl 77:1285–1298
Sui L, Liu B, Wang Q, Li Y, Liang J (2015) Double-image encryption based on Yang-Gu mixture amplitude-phase retrieval algorithm and high dimension chaotic system in gyrator domain. Opt Commun 354:184–196
Sui L, Zhang X, Huang C, Tian A, Asundi AK (2019) Silhouette-free interference-based multiple-image encryption using cascaded fractional Fourier transforms. Opt Lasers Eng 113:29–37
Sui L, Du C, Zhang X, Tian A, Asundi A (2019) Double-image encryption based on interference and logistic map under the framework of double random phase encoding. Opt Lasers Eng 122:113–122
Sun W, Wang L, Wang J, Li H, Wu Q (2019) Optical hyperspectral data encryption by using gamma distributed phase masks in gyrator domain. Opt Rev 26:332–341
Tao S, Tang C, Shen Y, Lei Z (2020) Optical image encryption based on biometric keys and singular value decomposition. Appl Opt 59(8):2422–2430
Ye H, Zhou N, Gong L (2020) Multi-image compression-encryption scheme based on quaternion discrete fractional Hartley transform and improved pixel adaptive diffusion. Signal Process 175:107652
Yu C, Li J, Li X, Ren X, Gupta BB (2018) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77:4585–4608
Yu S, Zhou N, Gong L, Nie Z (2020) Optical image encryption algorithm based on phase-truncated short-time fractional Fourier transform and hyper-chaotic system. Opt Lasers Eng 124:105816
Zhang L, Wei D (2020) Image watermarking based on matrix decomposition and gyrator transform in invariant integer wavelet domain. Signal Process 169:107421
Zhang Q, Guo L, Wei X (2010) Image encryption using DNA addition combing with chaotic maps. Math Comput Model 52:2028–2035
Zhao S, Yu X, Wang L, Li W, Zheng B (2020) Secure optical encryption based on ghost imaging with fractional Fourier transform. Opt Commun 474:126086
Acknowledgements
This work was supported by the National Natural Science Foundation of China (61876112, 61601311), Support Project of High-level Teachers in Beijing Municipal Universities in the Period of 13th Five-year Plan (CIT&TCD20170322), Project of Beijing Excellent Talents (2016000020124G088), Beijing Municipal Education Research Plan Project (SQKM201810028018).
Author information
Authors and Affiliations
Contributions
All authors took part in the work described in this paper. Specifically, Zhuhong Shao proposed the framework of this paper and wrote the manuscript. Yadong Tang, Feng Wang and Yunfei Wang carried out the experiments. Mingxian Liang and Yuanyuan Shang revised the manuscript. All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare no conflict of interest.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Shao, Z., Tang, Y., Liang, M. et al. Double image encryption based on symmetry of 2D-DFT and equal modulus decomposition. Multimed Tools Appl 80, 8973–8998 (2021). https://doi.org/10.1007/s11042-020-09961-9
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-09961-9