Skip to main content
Log in

Utilization of the double random phase encoding algorithm for secure image communication

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

With the advancements in multimedia communications, it has become apparent that there is a bad need to perform image communication with a confidence guarantee. We need to have a guarantee of image integrity at the receiver. Towards this objective, a proposed framework is presented in this paper. This framework comprises self-signature embedding in the transmitted images. The signatures are extracted from image blocks in the Discrete Cosine Transform (DCT) domain and embedded in other blocks in the same domain with a certain weight to avoid deteriorating the resulting image quality. A verification process is performed at the receiver to check whether the content has been modified or not. In addition, image watermarking is also used with DCT and Discrete Wavelet Transform (DWT) algorithms for authentication or verification. Moreover, Double Random Phase Encoding (DRPE) algorithm is used to secure the content of transmitted images. Then, to get a higher level of security for transmitted images, a hybrid technique depending on DCT-based signature embedding and the DRPE algorithm is presented.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

Data availability

All data are available upon request from the corresponding author.

References

  1. Abdelwahab AA, Hassaan LA (2008) A discrete wavelet transform based technique for image data hiding. In 2008 National Radio Science Conference (pp 1-9). IEEE.

  2. AbdelWahab OF et al (2019) Hiding data in images using steganography techniques with compression algorithms. TELKOMNIKA (Telecommunication Computing Electronics and Control) 17.3:1168–1175

    Article  Google Scholar 

  3. Carnicer A, Montes-Usategui M, Arcos S, Juvells I (2005) Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. Opt Lett 30(13):1644–1646

    Article  Google Scholar 

  4. Chen J, Zhang Y, Li J, Zhang LB (2018) Security enhancement of double random phase encoding using rear-mounted phase masking. Opt Lasers Eng 101:51–59

    Article  Google Scholar 

  5. Elshamy AM, Rashed AN, Mohamed AENA, Faragalla OS, Mu Y, Alshebeili SA, Abd El-Samie FE (2013) Optical image encryption based on chaotic baker map and double random phase encoding. J Lightwave Technol 31(15):2533–2539

    Article  Google Scholar 

  6. Frauel Y, Castro A, Naughton TJ, Javidi B (2007) Resistance of the double random phase encryption against various attacks. Opt Express 15(16):10253–10265

    Article  Google Scholar 

  7. Hsu CS, Tu SF (2019) Digital watermarking scheme for copyright protection and tampering detection. Int J Inform Technol Sec 11(1)

  8. Hsu CT, Wu JL (1999) Hidden digital watermarks in images. IEEE Trans Image Process 8(1):58–68

    Article  Google Scholar 

  9. Kaur M, Kumar V (2020) A comprehensive review on image encryption techniques. Arch Comput Methods Eng 27(1):15–43

    Article  MathSciNet  Google Scholar 

  10. Kaur B, Kaur A, Singh J (2011) Steganographic approach for hiding image in DCT domain. Int J Advan Eng Technol 1(3):72

    Google Scholar 

  11. Kesavan KK, Kumar MR (2011) Optical color image encryption based on Hartley transform and double random phase encoding system. In 2011 3rd international congress on ultra modern telecommunications and control systems and workshops (ICUMT) (pp 1-3). IEEE

  12. Li Q, Wang X, Wang X, Ma B, Wang C, Shi Y (2021) An encrypted coverless information hiding method based on generative models. Inf Sci 553:19–30

    Article  MathSciNet  Google Scholar 

  13. Liao X, Qin Z, Ding L (2017) Data embedding in digital images using critical functions. Signal Process Image Commun 58:146–156

    Article  Google Scholar 

  14. Liao X, Guo S, Yin J, Wang H, Li X, Sangaiah AK (2018) New cubic reference table based image steganography. Multimed Tools Appl 77(8):10033–10050

    Article  Google Scholar 

  15. Liu S, Yao H, Gao W (2004) Steganalysis of data hiding techniques in wavelet domain. In international conference on information technology: coding and computing, 2004. Proceedings. ITCC 2004. (Vol. 1, pp 751-754). IEEE.

  16. Morkel T, Eloff JH, Olivier MS (2005) An overview of image steganography. ISSA. 1(2)

  17. Naman H, Hussien N, Al-dabag M, Alrikabi H (2021) Encryption System for Hiding Information Based on Internet of Things. iJIM 15(02). https://doi.org/10.3991/ijim.v15i02.19869

  18. Nassar SS, Ayad NM, Kelash HM, El-Sayed HS, El-Bendary MA, El-Samie A, Faragallah OS (2016) Efficient audio integrity verification algorithm using discrete cosine transform. Int J Speech Technol 19(1):1–8

    Article  Google Scholar 

  19. Nassar SS, Ayad NM, Kelash HM, El-Sayed HS, El-Bendary MA, Abd El-Samie FE, Faragallah OS (2016) Secure wireless image communication using LSB steganography and chaotic baker ciphering. Wirel Pers Commun 91(3):1023–1049

    Article  Google Scholar 

  20. Peng X, Zhang P, Wei H, Yu B (2006) Known-plaintext attack on optical encryption based on double random phase keys. Optics Lett 31(8):1044–1046

    Article  Google Scholar 

  21. Priya S, Santhi B (2019) A novel visual medical image encryption for secure transmission of authenticated watermarked medical images. Mobile networks and applications, 1–8.

  22. Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. IEEE Sec Privacy 1(3):32–44

    Article  Google Scholar 

  23. Qi X, Wong K (2005) An adaptive DCT-based mod-4 steganographic method. IEEE international conference on image processing 2005 (Vol. 2, pp II-297). IEEE.

  24. Raval K, Bhoomarker R (2013) Unified approach to secure and robust digital watermarking scheme for image communication. Int J Recent Technol Eng (IJRTE) 2(1)

  25. Refregier P, Javidi B (1995) Optical image encryption based on input plane and Fourier plane random encoding. Opt Lett 20(7):767–769

    Article  Google Scholar 

  26. Shaabany A, Jamshidi F (2011) Wavelet domain quantization based video watermarking. Int J Multidiscip Sci Eng 2(4):7–12

    Google Scholar 

  27. Shanthakumari R, Malliga S (2020) Dual layer security of data using LSB inversion image steganography with elliptic curve cryptography encryption algorithm. Multimed Tools Appl 79(5):3975–3991

    Article  Google Scholar 

  28. Situ G, Zhang J (2004) Double random-phase encoding in the Fresnel domain. Opt Lett 29(14):1584–1586

    Article  Google Scholar 

  29. Sravanthi J, Prasad DMK (2011) Robust and secure digital signature for image authentication over wireless channels. Int J Comput Trends Technol 1(3):245–250

    Google Scholar 

  30. Swanson MD, Kobayashi M, Tewfik AH (1998) Multimedia data-embedding and watermarking technologies. Proc IEEE 86(6):1064–1087

    Article  Google Scholar 

  31. Thakur S, Singh AK, Ghrera SP, Elhoseny M (2019) Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimed Tools Appl 78(3):3457–3470

    Article  Google Scholar 

  32. Unnikrishnan G, Singh K (2000) Double random fractional Fourier domain encoding for optical security. Opt Eng 39(11):2853–2859

    Article  Google Scholar 

  33. Unnikrishnan G, Joseph J, Singh K (2000) Optical encryption by double-random phase encoding in the fractional Fourier domain. Opt Lett 25(12):887–889

    Article  Google Scholar 

  34. Wang X, Zhang M (2021) An image encryption algorithm based on new chaos and diffusion values of a truth table. Inf Sci 579:128–149

    Article  MathSciNet  Google Scholar 

  35. Wang FH, Pan JS, Jain LC (2009) Digital watermarking techniques, In innovations in digital watermarking techniques (pp 11–26). Springer, Berlin, Heidelberg

  36. Wang X, Feng L, Zhao H (2019) Fast image encryption algorithm based on parallel computing system. Inf Sci 486:340–358

    Article  Google Scholar 

  37. Yang XP, Zhai HC (2005) Optimization of kinoform in double-random-phase encryption. Acta Phys Sin 54(4):1578–1582

    Article  Google Scholar 

Download references

Acknowledgements

The authors extend their appreciation to the Deputyship for Research & Innovation, Ministry of Education in Saudi Arabia for funding this research work through the project number ISP23-56.

Funding

The authors extend their appreciation to the Deputyship for Research & Innovation, Ministry of Education in Saudi Arabia for funding this research work through the project number ISP23-56.

Author information

Authors and Affiliations

Authors

Contributions

All authors equally contributed.

Corresponding author

Correspondence to Hayam A. Abd El-Hameed.

Ethics declarations

Ethics approval

All authors contributed and accepted to submit the current work.

Consent for Participate

All authors contributed and accepted to submit the current work.

Consent for publication

All authors accept to submit and publish the submitted work.

Conflict of interest

The authors have neither relevant financial nor non-financial interests to disclose.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Abd El-Hameed, H.A., El-Shafai, W., Hassan, E.S. et al. Utilization of the double random phase encoding algorithm for secure image communication. Multimed Tools Appl 83, 60319–60342 (2024). https://doi.org/10.1007/s11042-023-15036-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-15036-2

Keywords

Navigation