Double image encryption using gyrator wavelet transform

In this paper, we implement a novel optical information processing tool termed as gyrator wavelet transform for the application of double image encryption using amplitude- and phase-truncation approach. This approach enhances the key space in an asymmetric cryptosystem by adding supplementary security layers, i.e., family of mother wavelet and the gyrator transform order. Double input images bonded with random phase masks are independently gyrator transformed. Amplitude truncation of obtained spectrum generates individual and universal keys while phase truncation generates two real-valued functions. Each of the retrieved amplitude function is discrete wavelet transformed, which results into four different frequency bands. We have fused the obtained wavelet spectrum of an individual image by again gyrator transforming them following amplitude- and phase truncation. The obtained real-valued functions corresponding to each image are bonded to form the encrypted image. After using the correct universal key, individual asymmetric key, type of wavelet, and correct gyrator transform order, the original images are retrieved successfully. Numerical simulation results prove that the proposed scheme is more flexible and effective than existing wavelet fusion schemes.

[1]  Wen Chen,et al.  Optical asymmetric cryptography using a three-dimensional space-based model Optical asymmetric crypt , 2011 .

[2]  Xiang Peng,et al.  Universal and special keys based on phase-truncated Fourier transform. , 2011, Optical engineering.

[3]  Isha Mehra,et al.  Wavelet-based image fusion for securing multiple images through asymmetric keys , 2015 .

[4]  José A. Rodrigo,et al.  Applications of gyrator transform for image processing , 2007 .

[5]  Peng Zhang,et al.  Asymmetric cryptography based on wavefront sensing. , 2006, Optics letters.

[6]  Naveen K Nishchal,et al.  Image encryption based on interference that uses fractional Fourier domain asymmetric keys. , 2012, Applied optics.

[7]  Xiang Peng,et al.  Asymmetric cryptosystem based on phase-truncated Fourier transforms. , 2010, Optics letters.

[8]  Daomu Zhao,et al.  Double images encryption method with resistance against the specific attack based on an asymmetric algorithm. , 2012, Optics express.

[9]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[10]  Isha Mehra,et al.  Image fusion using wavelet transform and its application to asymmetric cryptosystem and hiding. , 2014, Optics express.

[11]  Daomu Zhao,et al.  Single-channel color image encryption based on asymmetric cryptosystem , 2012 .

[12]  John T. Sheridan,et al.  A review of optical image encryption techniques , 2014 .

[13]  Xiaogang Wang,et al.  A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms , 2012 .

[14]  Naveen K. Nishchal,et al.  Known-plaintext attack on encryption domain independent optical asymmetric cryptosystem , 2013 .

[15]  Isha Mehra,et al.  Asymmetric cryptosystem for securing multiple images using two beam interference phenomenon , 2014 .

[16]  Yicong Zhou,et al.  Image encryption in the wavelet domain , 2013, Defense, Security, and Sensing.

[17]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[18]  Xiangling Ding,et al.  Security improvement for asymmetric cryptosystem based on spherical wave illumination. , 2013, Applied optics.

[19]  Xiaogang Wang,et al.  Multiple-image encryption based on nonlinear amplitude-truncation and phase-truncation in Fourier domain , 2011 .

[20]  Xiaogang Wang,et al.  Security enhancement of a phase-truncation based image encryption algorithm. , 2011, Applied optics.

[21]  Kuldeep Singh,et al.  Encrypting digital hologram of three-dimensional object using diffractive imaging , 2015 .

[22]  Isha Mehra,et al.  Optical asymmetric watermarking using modified wavelet fusion and diffractive imaging , 2015 .

[23]  Naveen K Nishchal,et al.  An optical encryption and authentication scheme using asymmetric keys. , 2014, Journal of the Optical Society of America. A, Optics, image science, and vision.

[24]  Naveen K Nishchal,et al.  Image encryption using polarized light encoding and amplitude and phase truncation in the Fresnel domain. , 2013, Applied optics.

[25]  Cuong Manh Do,et al.  Multi-Spectral Holographic Three-Dimensional Image Fusion Using Discrete Wavelet Transform , 2006, Journal of Display Technology.

[26]  Linfei Chen,et al.  Optical image encryption based on fractional wavelet transform , 2005 .

[27]  Dhirendra Kumar,et al.  Photon counting imaging and polarized light encoding for secure image verification and hologam watermarking , 2014 .

[28]  Naveen K Nishchal,et al.  Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask. , 2012, Applied optics.

[29]  Xiaogang Wang,et al.  Double-image self-encoding and hiding based on phase-truncated Fourier transforms and phase retrieval , 2011 .

[30]  Pramod Kumar,et al.  Holographic encryption system in the Fresnel domain with convergent random illumination , 2010 .

[31]  Wen Chen,et al.  Optical color image encryption based on an asymmetric cryptosystem in the Fresnel domain , 2011 .

[32]  Din-Chang Tseng,et al.  Wavelet-based multispectral image fusion , 2001, IGARSS 2001. Scanning the Present and Resolving the Future. Proceedings. IEEE 2001 International Geoscience and Remote Sensing Symposium (Cat. No.01CH37217).

[33]  J García,et al.  Fractional wavelet transform. , 1997, Applied optics.

[34]  Ayman Alfalou,et al.  Optical image compression and encryption methods , 2009 .

[35]  Isha Mehra,et al.  Collision in Fresnel domain asymmetric cryptosystem using phase truncation and authentication verification , 2013 .

[36]  Kehar Singh,et al.  Double phase-image encryption using gyrator transforms, and structured phase mask in the frequency plane , 2015 .