A Public-key-based Optical Image Cryptosystem with Data Embedding Techniques

In this paper, a public-key-based optical image cryptosystem is proposed for practical secure communications. Conventional encryption algorithms that use the same key in the transmitter and receiver, i.e., a symmetric algorithm, are limited in real applications. The proposed system is based on a hybrid architecture in which the symmetric double randomphase algorithm is used to cipher an image and an asymmetric algorithm is exploited for ciphering the session keys. In addition, the ciphered key is embedded into the quantized amplitude of the complex encrypted data and then transmitted to a receiver for resolving the problem of key delivery. To find a covert channel, we analyze the double random-phase algorithm and obtain two results: the efficacy of the phase mask in the frequency domain is more than the other one in the spatial domain and the amplitude part of the ciphered image is insensitive to little distortion. The experimental results show that the amplitude part in the frequency domain is more suitable than that in the spatial domain to convey secret messages and the reconstructed images with high visual quality can be obtained.

[1]  Bahram Javidi,et al.  Influence of a perturbation in a double phase-encoding system , 1998 .

[2]  K. J. Ray Liu,et al.  A data embedding scheme for H.263 compatible video coding , 1999, ISCAS'99. Proceedings of the 1999 IEEE International Symposium on Circuits and Systems VLSI (Cat. No.99CH36349).

[3]  Bahram Javidi,et al.  Fault tolerance properties of a double phase encoding encryption technique , 1997 .

[4]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[5]  Ja-Ling Wu,et al.  Hidden digital watermarks in images , 1999, IEEE Trans. Image Process..

[6]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[7]  Seung-Hyun Lee,et al.  Optical key bit stream generator , 1999 .

[8]  Bahram Javidi,et al.  Optical image encryption using input plane and Fourier plane random encoding , 1995, Optics & Photonics.

[9]  Joseph W. Goodman,et al.  Introduction to Fourier Optics; Second Edition , 1996 .

[10]  Eun-Soo Kim,et al.  Optical image encryption based on XOR operations , 1999 .

[11]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[12]  Guo-Shiang Lin,et al.  Robust image watermarking on the DCT domain , 2000, 2000 IEEE International Symposium on Circuits and Systems. Emerging Technologies for the 21st Century. Proceedings (IEEE Cat No.00CH36353).

[13]  Naokazu Yokoya,et al.  Data embedding into pictorial images with less distortion using discrete cosine transform , 1996, Proceedings of 13th International Conference on Pattern Recognition.

[14]  C. F. Osborne,et al.  A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.

[15]  Chin-Chen Chang,et al.  A virtual image cryptosystem based upon vector quantization , 1998, IEEE Trans. Image Process..

[16]  L E Brackenbury,et al.  Optical encryption of digital data. , 2000, Applied optics.

[17]  Bahram Javidi,et al.  Performance of double phase encoding encryption technique using binarized encrypted images , 1998 .