Asymmetric multiple information cryptosystem based on chaotic spiral phase mask and random spectrum decomposition

Abstract A new asymmetric multiple information cryptosystem based on chaotic spiral phase mask (CSPM) and random spectrum decomposition is put forwarded. In the proposed system, each channel of secret color image is first modulated with a CSPM and then gyrator transformed. The gyrator spectrum is randomly divided into two complex-valued masks. The same procedure is applied to multiple secret images to get their corresponding first and second complex-valued masks. Finally, first and second masks of each channel are independently added to produce first and second complex ciphertexts, respectively. The main feature of the proposed method is the different secret images encrypted by different CSPMs using different parameters as the sensitive decryption/private keys which are completely unknown to unauthorized users. Consequently, the proposed system would be resistant to potential attacks. Moreover, the CSPMs are easier to position in the decoding process owing to their own centering mark on axis focal ring. The retrieved secret images are free from cross-talk noise effects. The decryption process can be implemented by optical experiment. Numerical simulation results demonstrate the viability and security of the proposed method.

[1]  Xiaogang Wang,et al.  A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms , 2012 .

[2]  Muhammad Rafiq Abuturab Color information cryptosystem based on optical superposition principle and phase-truncated gyrator transform. , 2012, Applied optics.

[3]  Zhengjun Liu,et al.  Double image encryption scheme by using random phase encoding and pixel exchanging in the gyrator transform domains , 2013 .

[4]  Ayman Alfalou,et al.  Optical image compression and encryption methods , 2009 .

[5]  Muhammad Rafiq Abuturab Group multiple-image encoding and watermarking using coupled logistic maps and gyrator wavelet transform. , 2015, Journal of the Optical Society of America. A, Optics, image science, and vision.

[6]  Tian Ailing,et al.  Optical multiple-image encryption based on the chaotic structured phase masks under the illumination of a vortex beam in the gyrator domain. , 2016, Optics express.

[7]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[8]  José A. Rodrigo,et al.  Applications of gyrator transform for image processing , 2007 .

[9]  Muhammad Rafiq Abuturab An asymmetric color image cryptosystem based on Schur decomposition in gyrator transform domain , 2014 .

[10]  Muhammad Rafiq Abuturab,et al.  Multiple color-image authentication system using HSI color space and QR decomposition in gyrator domains , 2016 .

[11]  G. Unnikrishnan,et al.  Optical encryption by double-random phase encoding in the fractional Fourier domain. , 2000, Optics letters.

[12]  A Alfalou,et al.  Simultaneous compression and encryption of closely resembling images: application to video sequences and polarimetric images. , 2014, Optics express.

[13]  Jingjuan Zhang,et al.  Multiple-image hiding in the Fresnel domain. , 2007, Optics letters.

[14]  A. Alfalou,et al.  Assessing the performance of a method of simultaneous compression and encryption of multiple images and its resistance against various attacks. , 2013, Optics express.

[15]  Zhengjun Liu,et al.  Cryptanalysis of an "asymmetric optical cryptosystem based on coherent superposition and equal modulus decomposition". , 2015, Applied optics.

[16]  Junli Liang,et al.  A secure double-image sharing scheme based on Shamir׳s three-pass protocol and 2D Sine Logistic modulation map in discrete multiple-parameter fractional angular transform domain , 2016 .

[17]  Muhammad Rafiq Abuturab Multiple information encryption by user-image-based gyrator transform hologram , 2017 .

[18]  John T. Sheridan,et al.  A review of optical image encryption techniques , 2014 .

[19]  Quanying Wu,et al.  Information encryption in phase space. , 2015, Optics letters.

[20]  Muhammad Rafiq Abuturab,et al.  Fully phase multiple information encoding based on superposition of two beams and Fresnel-transform domain , 2015 .

[21]  Ming Lei,et al.  Asymmetric optical cryptosystem based on coherent superposition and equal modulus decomposition. , 2015, Optics letters.

[22]  Xiaogang Wang,et al.  Security enhancement of a phase-truncation based image encryption algorithm. , 2011, Applied optics.

[23]  Linfei Chen,et al.  Pseudo color image encryption based on three-beams interference principle and common vector composition , 2015 .

[24]  Wen Chen,et al.  Grayscale object authentication based on ghost imaging using binary signals , 2015 .

[25]  Hone-Ene Hwang,et al.  Position multiplexing multiple-image encryption using cascaded phase-only masks in Fresnel transform domain , 2011 .

[26]  Wei-Na Li,et al.  Multiple-3D-object secure information system based on phase shifting method and single interference. , 2016, Applied optics.

[27]  Jingjuan Zhang,et al.  Multiple-image encryption by wavelength multiplexing. , 2005, Optics letters.

[28]  Sui Liansheng,et al.  Multiple-image encryption based on phase mask multiplexing in fractional Fourier transform domain. , 2013, Optics letters.

[29]  Yong Wang,et al.  New method of attack and security enhancement on an asymmetric cryptosystem based on equal modulus decomposition. , 2016, Applied optics.

[30]  Bahram Javidi,et al.  Resistance of the double random phase encryption against various attacks. , 2007, Optics express.

[31]  Zhengjun Liu,et al.  A Recovery Method of Double Random Phase Encoding System With a Parallel Phase Retrieval , 2016, IEEE Photonics Journal.

[32]  Ailing Tian,et al.  Optical noise-free image encryption based on quick response code and high dimension chaotic system in gyrator transform domain , 2017 .

[33]  A. Alfalou,et al.  Exploiting root-mean-square time-frequency structure for multiple-image optical compression and encryption. , 2010, Optics letters.

[34]  Sun Qindong,et al.  Amplitude-phase retrieval attack free image encryption based on two random masks and interference , 2016 .

[35]  Zhengjun Liu,et al.  Image hiding scheme by use of rotating squared sub-image in the gyrator transform domains , 2013 .

[36]  Dafne Amaya,et al.  Wavelength multiplexing encryption using joint transform correlator architecture. , 2009, Applied optics.

[37]  Muhammad Rafiq Abuturab,et al.  Color image security system using double random-structured phase encoding in gyrator transform domain. , 2012, Applied optics.

[38]  Ayman Alfalou,et al.  Security enhanced multiple-image authentication based on cascaded optical interference and sparse phase mixed encoding , 2016 .

[39]  Nam Kim,et al.  Multiple-image encryption based on triple interferences for flexibly decrypting high-quality images. , 2015, Applied optics.

[40]  Muhammad Rafiq Abuturab,et al.  Generalized Arnold map-based optical multiple color-image encoding in gyrator transform domain , 2015 .

[41]  Jingjuan Zhang,et al.  Double random-phase encoding in the Fresnel domain. , 2004, Optics letters.

[42]  Xiang Peng,et al.  Asymmetric cryptosystem based on phase-truncated Fourier transforms. , 2010, Optics letters.

[43]  Xiaopeng Deng,et al.  Asymmetric optical cryptosystem based on coherent superposition and equal modulus decomposition: comment. , 2015, Optics letters.

[44]  Zhengjun Liu,et al.  Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang-Gu algorithm. , 2013, Optics letters.