Multiple-image encryption based on Toeplitz matrix ghost imaging and elliptic curve cryptography

To improve the security of encryption systems, we propose a multiple-image encryption method via Toeplitz matrix ghost imaging and elliptic curve cryptography. Specifically, each unencrypted image is firstly compressed using wavelet transformation. Compressed images are merged into a single image via spatial multiplexing technology. Then, based on the ghost imaging, the phase mask matrix of the speckle sequence is modulated into a random Toeplitz matrix, through the logistic mapping sequence to achieve the encryption of the combined image. The detection data of all images is obtained through a bucket detector. Finally, the obtained detection data is encrypted twice using an elliptic curve asymmetric cryptographic algorithm to obtain the final ciphertext. In the decryption process, images are recovered using elliptic curve, compressive sensing technology and inverse wavelet transformation. This method provides strong security features for encryption systems. The basic principle of the encryption scheme is analyzed theoretically, and the security and robustness of the proposed method are verified by numerical simulation.

[1]  O. Katz,et al.  Compressive ghost imaging , 2009, 0905.0321.

[2]  Peng Zhang,et al.  Known-plaintext attack on optical encryption based on double random phase keys. , 2006, Optics letters.

[3]  Wenqi He,et al.  Multiple-image encryption via lifting wavelet transform and XOR operation based on compressive ghost imaging scheme , 2018 .

[4]  Naveen K Nishchal,et al.  Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform. , 2013, Applied optics.

[5]  Wen Chen,et al.  Optical information authentication using compressed double-random-phase-encoded images and quick-response codes. , 2015, Optics express.

[6]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[7]  Osamu Matoba,et al.  Optical Techniques for Information Security , 2009, Proceedings of the IEEE.

[8]  Naveed Ahmed Azam,et al.  A novel image encryption scheme based on an elliptic curve , 2019, Signal Process..

[9]  Li-Hua Gong,et al.  Novel optical image encryption scheme based on fractional Mellin transform , 2011 .

[10]  O. Katz,et al.  Ghost imaging with a single detector , 2008, 0812.2633.

[11]  Arturo Carnicer,et al.  Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. , 2005, Optics letters.

[12]  L Z Cai,et al.  Two-step phase-shifting interferometry and its application in image encryption. , 2006, Optics letters.

[13]  Jesús Lancis,et al.  Optical encryption based on computational ghost imaging. , 2010, Optics letters.

[14]  John T. Sheridan,et al.  A review of optical image encryption techniques , 2014 .

[15]  Xin Zhou,et al.  Optical image transformation and encryption by phase-retrieval-based double random-phase encoding and compressive ghost imaging , 2018 .

[16]  María J. Yzuel,et al.  Optical image encryption technique based on deterministic phase masks , 2016 .

[17]  Bahram Javidi,et al.  Optical encryption using photon-counting polarimetric imaging. , 2015, Optics express.

[18]  Isha Mehra,et al.  Image fusion using wavelet transform and its application to asymmetric cryptosystem and hiding. , 2014, Optics express.

[19]  Michael Elad,et al.  On Single Image Scale-Up Using Sparse-Representations , 2010, Curves and Surfaces.