Next Article in Journal
Antibacterial Activity and Iron Release of Organic-Inorganic Hybrid Biomaterials Synthesized via the Sol-Gel Route
Next Article in Special Issue
Keyword Detection Based on RetinaNet and Transfer Learning for Personal Information Protection in Document Images
Previous Article in Journal
Experimental Study on the Influence of TiN/AlTiN PVD Layer on the Surface Characteristics of Hot Work Tool Steel
Previous Article in Special Issue
DSCope: Development of Automatic Program for Detecting Fractures and Measuring Dip Angles
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Novel Multiple-Image Encryption Scheme Based on Coherent Beam Combining and Equal Modulus Decomposition

1
College of Mathematics and Science, Shanghai Normal University, Shanghai 200234, China
2
Department of Engineering Technology, Middle Tennessee State University, Murfreesboro, TN 37132, USA
*
Authors to whom correspondence should be addressed.
Appl. Sci. 2021, 11(19), 9310; https://doi.org/10.3390/app11199310
Submission received: 26 August 2021 / Revised: 30 September 2021 / Accepted: 1 October 2021 / Published: 7 October 2021
(This article belongs to the Special Issue Signal, Image and Video Processing)

Abstract

:
In our research, we propose a novel asymmetric multiple-image encryption method using a conjugate Dammann grating (CDG), which is based on the coherent beam combining (CBC) principle. The phase generated by the Dammann grating (DG) beam splitting system is processed and added to the image to be encrypted, and then, the ciphertexts and keys are generated by equal modulus decomposition (EMD). Decryption is to combine the beams through the CDG and collect the combined images in the far field. The proposed encryption scheme is flexible and thus extendable. CDG structure parameters, such as one period length of CDG, can be used as encryption key for the increase of the complexity. The Fresnel diffraction distance can also be used as an encryption key. The power of the combined beam is stronger than that of the single beam system, which is convenient for long-distance transmission and also easy to detect. Simulation results show that the proposed method is effective and efficient for asymmetric multiple-image encryption. Sensitivity analysis of CDG alignment has also been performed showing the robustness of the system. The influence of occlusion attack and noise attack on decryption are also discussed, which proves the stability of the system.

1. Introduction

Information security is significant in ensuring the integrity of the science and engineering applications [1,2,3]. In comparison with the digital encryption method, optical encryption is associated with more encryption parameters thus more secure [4,5,6]. Taking advantage of the parallel nature of light, the optical encryption system can operate in parallel, and its operation speed is much faster than that of the digital system. The early optical encryption model created by Refregier and Javidi simply consists of the 4f encryption system known having high encryption strength [7]. Due to the increase of cryptography attacks [8,9], more advanced optical encryption methods have been further developed, including fractional Fourier transform [10], gyrator transform [11], optical scanning holography [12], ghost imaging [13], phase truncation [14]. Among them, optical superposition either coherent superposition [15] or incoherent superposition [16,17,18] has been actively studied. Compared with incoherent superposition, coherent superposition needs more accurate alignment, which is thus able to ensure the sensitivity of the encryption system.
More specifically, Zhang proposed a simple optical image encryption scheme based on optical coherence superposition without iterative coding [19]. The encryption of this system is based on mathematical operations, and the decryption uses a beam splitter for interference. In contrast, Kim introduced a new scheme using interference-based two-dimensional binary phase mask and encrypting multiple images simultaneously [20]. Cai proposed an asymmetric coherent optical encryption system, which mainly uses equal modulus decomposition (EMD) to decompose an image into a ciphertext and a key [21]. More recently, Chen proposed an optical image cryptosystem based on two beam coherent superposition and unequal modulus decomposition [22]. Different from the EMD approach, the method uses common vector decomposition to complete the encryption process. Among them, the amplitude term is used as ciphertext and the phase term is used as private key. The system generates four different phases and amplitudes, which improves the security of the encryption system. Sui proposed a double image encryption method based on optical interference and logistic mapping [23]. These parameters, such as wavelength, wheelbase, and logistic mapping conditions are used as additional keys to improve the security of the system. Luan proposed an asymmetric scheme for silhouette-free multiple encryption using coherent superposition and the Fresnel transform [24]. Within this approach, the ciphertext and private key in the encryption process are obtained by random mask, and a function is constructed in the encryption process to improve the security. In addition, different images are decrypted using different private keys. Even if one or two of the correct phase masks are obtained, the information of any original image, including its contour, cannot be obtained. Abuturab proposed a multiple image encryption using Fresnel domain high-dimension chaotic phase coding [25]. In this photoelectric method, the color image is decomposed into R, G and B channels, each channel is individually phase-coded and modulated, and Fresnel transform is performed to generate the corresponding encrypted channel. It is therefore convenient to update, manage and transmit the decryption key. While these methods have proposed more secure encryption, the efficient use of beam power has not been well addressed. The applied beam is often weak thus adversely impacts the detection accuracy of an object through the decryption process, thus limiting its practical use.
In our research, a novel method for multiple-image encryption based on coherent beam combining (CBC) using a conjugate Dammann grating (CDG) is proposed. The novel method combines different numbers of beams by using different CDG, such as 3 × 3 CDG, 4 × 4 CDG, and 5 × 5 CDG, which solves the problem of weak beam energy mentioned above. Moreover, the coherent array beam parameter of CDG and Fresnel diffraction distance can also be used as the encryption key. In this scheme, eight QR codes are superimposed by bit plane, and each QR code stores an image. Random scrambling is carried out to hide the outline of the superimposed QR code. Then, the scrambled image is randomly divided into four pieces, each of which is multiplied by the corresponding Dammann phase (DP) complex conjugate. Finally, they are decomposed into ciphertexts and keys by EMD in turn. Compared with the other optical encryption system, our optical system has the following advantages. First, the one-period length of CDG can be used as one of the keys for encryption. Second, the coherent superposition is more superior to the incoherent superposition, introducing more encryption keys, such as Fresnel diffraction distance, thus more capable of resisting cryptosystem attacks. Third, the power of the combined beam is higher than the conventional methods, which is thus easy to detect. Fourth, the QR codes can ensure that the encrypted images are able to be decrypted without image quality loss. The organization of our paper is given as follows. In Section 2, theories involved in the research are introduced and described. The simulation results of our encryption system are given in Section 3. Relevant discussions are carried out in Section 4, followed by a conclusion of the research in Section 5.

2. Methods

2.1. Coherent Beam Combining

Dammann grating (DG) is a binary phase grating which can produce an equal space and intensity beam point array [26,27]. The transmission function of a DG is
T D G ( x , y ) = exp [ j m = n = Δ ϕ ( x m T x , y n T y ) ]
where T x and T y are the periods of DG in x and y directions, respectively, Δ ϕ ( x , y ) is the phase of DG in one period. When a Gaussian beam E ( x , y ) illuminates the DG, a Gaussian laser array with same intensity can be generated. The electric field E ( x , y ) of the Gaussian beam is given as
E ( x , y ) = exp x 2 + y 2 ω 0 2
where ω 0 is the waist radius. The optical field at the back focal plane of the lens L in Figure 1a can be expressed as
U ( f x , f y ) = E ˜ ( f x , f y ) T ˜ D G ( f x , f y )
where E ˜ ( f x , f y ) and T ˜ D G ( f x , f y ) are the Fourier transformation of E ( x , y ) and T D G ( x , y ) , respectively, and the symbol represents convolution. Suppose the DG can generate M × N equally bright diffraction orders and other high orders H ( f x , f y ) with little energy,
T ˜ D G ( f x , f y ) = m M n N δ ( f x m T x , f y n T y ) C m n e j ϕ m n + H ( f x , f y ) ,  
where δ ( x , y ) is Dirac function, C m n and ϕ m n (DP) are the amplitude and phase of the diffraction order ( m , n ) . By optimizing the parameters of the DG, H ( f x , f y ) can be very small or even close to 0, that is, the diffraction efficiency is close to 100%. Then, Equation (3) can be simplified as
U ( f x , f y ) = m M n N E ˜ ( f x m T x , f y n T y ) C m n e j ϕ m n
When using CDG to combine the beam as shown in Figure 1b, we assume that the array beam is a perfect coherent laser. At the same time, the phase plate (PP) used in the beam combining system is the complex conjugation of the phase ϕ m n in Equation (4), expressed by ϕ m n * . The phase distribution of the CDG is the complex conjugate of the DG, expressed by T D G * ( x , y ) . The laser array field distribution after the PP in Figure 1b is
E 1 f x , f y = e s f x , f y m M n N δ f x m T x δ f y n T y e j ϕ m n * .  
where e s ( f x , f y ) is a function of the incident laser. Because the relationship between the front focal plane and the back focal plane of the lens can be transformed into Fourier transform calculation, we simplify the optical field at the back focal plane of the lens L in Figure 1b as E ˜ 1 x , y E 1 f x , f y , where is the Fourier transformation. By combining Equations (5) and (6), E ˜ 1 x , y can be rewritten as
E ˜ 1 ( x , y ) e s f x , f y C m n T DG ( x , y )
Therefore, the expression of optical field behind the CDG is
E 2 ( x , y ) = E ˜ 1 ( x , y ) T D G * ( x , y ) e s f x , f y C m n .
From the results of Equation (8), it can be seen that the CDG can effectively eliminate the phase change during beam combination, so as to obtain a uniform optical field distribution, and a better single beam spot can be obtained in the far-field observation. In our work, we can generate 2 × 2 array beam by specially designing the structure of DG. The simulation of generating array beams is shown in Figure 2a,b. The simulation of the 2 × 2 CDG used for beam combining is shown in Figure 2c–e. In addition, the simulation shows that the square array beam can also be used for beam combination, and the final beam combination spot is still square, which provides convenience for our subsequent image encryption.
Next, we will introduce the theory of equal modulus decomposition (EMD) [21] in detail. Generally speaking, a complex number can be expressed as a position vector in the two-dimensional Cartesian coordinate system space. It consists of a horizontal real part (Re) component and a vertical imaginary part (Im) component, as shown in Figure 3. According to this, the EMD is produced through an asymmetric mathematical transformation. Here, we use the simplest one-dimensional symbol to describe the process. Assume that the intensity of the original image is O(x) and the phase added to the image is P, the new function is constructed as follows
I ( x ) = O ( x ) P
In addition, I ( x ) can be divided into two complex numbers M1(x) and M2(x) with equal modulus, as shown in Figure 3. The expression of θ ( x ) is
θ ( x ) = 2 π r a n d ( x ) ,
where rand(x) is a function that can generate random numbers in the range of [0, 1]. Moreover, the expressions of M1(x) and M2(x) are
M 1 ( x ) = A ( x ) / 2 cos [ φ ( x ) θ ( x ) ] exp [ i θ ( x ) ] ,  
M 2 ( x ) = A ( x ) / 2 cos [ φ ( x ) θ ( x ) ] exp { i [ 2 φ ( x ) θ ( x ) ] } ,  
where A ( x ) = I ( x ) and φ ( x ) = arg { I ( x ) } . Finally, an image information I(x) is successfully hidden into two complex numbers M1(x) and M2(x) by using the EMD principle. In this process, I(x) can only be obtained from M1(x) when M2(x) is known. Therefore, M2(x) can be regarded as the private key. M1(x) is the ciphertext, and θ ( x ) is the public key for image encryption.

2.2. Cryptosystem

Based on the above principles, we will describe the pure digital encryption process as shown in Figure 4a in detail. Firstly, eight QR codes (Qi, i = 1, 2, 3, 4, 5, 6, 7, 8) which record eight images are superimposed in bit plane mode as shown in Equation (13) to obtain a superimposed image Q. Secondly, the superimposed image Q is randomly scrambled by pixels into image D, and then randomly divided into four images (D1, D2, D3 and D4) similar to random decomposition of numbers (e.g., 255 = 80 + 66 + 57 + 52). Thirdly, each image (D1, D2, D3 and D4) is multiplied by the phase of the PP (P1, P2, P3, P4) in Figure 2d to obtain four complex values. Finally, according to EMD principle, each complex value is decomposed into two parts, one part is four ciphertexts (C1, C2, C3 and C4), and the other part is four keys (K1, K2, K3 and K4).
In the process of decryption, as shown in Figure 4b, first, the added ciphertexts and keys are loaded on the front focal plane of the lens L in Figure 4b by SLM, and it can be considered to load the ciphertexts and keys, respectively, with the help of 4f imaging system. Second, the square root of the intensity distribution obtained in the far field is normalized to [0, 255], which is image D. Third, the normalized image D is inversely scrambled to obtain image Q, and the Q is decomposed into eight QR codes in bit plane mode as shown in Equation (14). Finally, the corresponding original image can be obtained by scanning each QR code.
Q = 2 0 Q 1 + 2 1 Q 2 + 2 2 Q 3 + 2 3 Q 4 + 2 4 Q 5 + 2 5 Q 6 + 2 6 Q 7 + 2 7 Q 8 ,  
Q 8 = floor ( Q / 2 7 ) , Q 7 = floor [ ( Q 2 7 Q 8 ) / 2 6 ] , Q 6 = floor [ ( Q 2 7 Q 8 2 6 Q 7 ) / 2 5 ] , Q 5 = floor [ ( Q 2 7 Q 8 2 6 Q 7 2 5 Q 6 ) / 2 4 ] , Q 4 = floor [ ( Q 2 7 Q 8 2 6 Q 7 2 5 Q 6 2 4 Q 5 ) / 2 3 ] , Q 3 = floor [ ( Q 2 7 Q 8 2 6 Q 7 2 5 Q 6 2 4 Q 5 2 3 Q 4 ) / 2 2 ] , Q 2 = floor [ ( Q 2 7 Q 8 2 6 Q 7 2 5 Q 6 2 4 Q 5 2 3 Q 4 2 2 Q 3 ) / 2 1 ] , Q 1 = floor [ ( Q 2 7 Q 8 2 6 Q 7 2 5 Q 6 2 4 Q 5 2 3 Q 4 2 2 Q 3 2 1 Q 2 ) / 2 0 ]
where floor is rounded down to the closest integer.

3. Simulation

We have conducted simulations to demonstrate the feasibility and effectiveness of the proposed method. The pixel size of the original eight gray images is 256 × 256, and the pixel size of the eight QR codes thus converted is 58 × 58, in which the original images are selected from the public encrypted image set commonly used in the field of image encryption. The simulation diagram of encryption process is shown in Figure 5, and the simulation diagram of decryption process is shown in Figure 6. By using a QR code scanner to scan the decrypted eight QR codes, eight original images can be obtained. The errors and attacks of these simulation results will be discussed in the next section.

4. Discussion

4.1. Error Analysis

Structure similarity (SSIM) is used for evaluating the effect of encryption system. The equation of SSIM is shown as follows
SSIM = 2 μ x μ y + C 1 μ x 2 + μ y 2 + C 1 2 σ x σ y + C 2 σ x 2 + σ y 2 + C 2 σ x y + C 3 σ x σ y + C 3
where μ x and μ y are the mean of the original image and the decrypted image, respectively, σ x and σ y are the variance of the original image and the decrypted image, respectively, σ x y is the covariance between the original image and the decrypted image, C1, C2, C3 are small constants. According to Equation (7), when the array beam loaded with the images is transformed by the Fourier lens, the phase distribution is consistent with the amplitude transmittance function of the CDG on the focal plane behind the Fourier transform lens, and the beam field distribution can be regarded as a virtual grating. By multiplying the matched CDG, the two-phase cancellation can obtain the beam field with uniform distribution. However, because the phase distribution of the beam field on the back focal plane is not visible, the virtual grating and the CDG must be aligned strictly in order to effectively eliminate the phase fluctuation of the combined beam field. Therefore, it is necessary to calculate the encryption effect when the CDG is translated along the grating period direction. Figure 7a shows the SSIM between the decrypted image and the original image when the CDG is shifted x grating cycles along the horizontal direction. At the same time, the phase value of the PP will also affect the decryption effect. For this, we add random phase errors in the range of 0 to α π for the PP value in the simulation, where 0 < α < 0.5 . Figure 7b shows the SSIM between the decrypted image and the original image when the PP value is associated with errors. As shown in Figure 7b, with the increase of the PP value error, the quality of decrypted image becomes worse. It shows that when the PP value error is small, the lossless image decryption can be achieved.

4.2. Occlusion Attack Analysis

Generally speaking, hackers may attack the ciphertexts and cause partial loss of the ciphertexts [28]. Therefore, it is necessary to discuss the influence of the lost part of ciphertexts on the decryption in the process of transmission. At present, we have four ciphertexts. If we cut them by 5%, 10% and 15%, respectively, four ciphertexts and eight decrypted QR codes are shown in Figure 8. As can be seen from the figure, the original image can still be obtained, so our encryption system can well resist occlusion attack.

4.3. Noise Attack Analysis

In addition, a common noise attack in the field of image encryption needs to be discussed. Because there is noise in the process of ciphertexts transmission or hackers deliberately add noise to the ciphertexts to disturb the decrypted results, we add salt and pepper noise to the ciphertexts to test the anti-noise ability of the system. After adding salt and pepper noises with densities of 0.05, 0.1, and 0.2 to the four ciphertexts (which are proportional to the total number of pixels of the noise points), Figure 9 shows the four ciphertext images and the associated reconstructed images under different noise densities. The results show that even if significant salt and pepper noise is introduced, the original images can still be reconstructed from the decrypted QR codes, which shows that our system can effectively resist noise attacks.

4.4. Key Space and Exhaustive Search Attack Analysis

The proposed encryption scheme has high strength for resisting the exhaustive search attack. In this scheme, the secret key (58 by 58 matrix, each element with value of complex number) space of the encryption system is greater than 2100, therefore will take significant computational power for exhaustive search able to attack the proposed scheme. More specifically, the secret key is a complex matrix generated by EMD. In our research, the size of matrix is 58 × 58, which also can be expanded depending on the need. Furthermore, the value of the matrix is a complex number, which further increases the complexity for resisting the exhaustive search attack.

4.5. Known Plaintext Attack Analysis

In addition to the exhaustive search attack, a known plaintext attack is also a common attack type [29]. The purpose of this attack is to obtain the decryption secret key through the attack, so as to crack other ciphertexts. However, this attack is invalid for our system, because our decryption secret key depends on the original image. If the original image is different, the secret key will be different. In other words, even if the attacker obtains the secret key of the known plaintext through some means, the attacker can only decipher the current plaintext and cannot decipher other plaintext. Therefore, our proposed scheme is immune to this attack scheme.

4.6. Noise Cross-Talk Analysis

It is known that the conventional multiple-image encryption is vulnerable to noise cross-talk. In contrast to conventional image encryption, in the proposed scheme, multiple binary QR codes are mathematically superimposed with different coefficients during encryption. Because different coefficients are independent of each other, it ensures that each image is independent of each other without image noise cross-talk. In the image decryption phase, each image is separated through the inverse image scrambling process therefore to ensure that there is no noise cross-talk either. As such, the image cross-talk noise problem is avoided.

4.7. Main Advantages

It is worth noting that coherent superposition has been used by some previous methods [15,22,24], but these superposition methods have not used multiple light beams as used in this study, thus suffering low energy efficiency usages. Our method, in principle, can synthesize at least four beams simultaneously, furthermore, nine beams, sixteen beams, twenty-five beams are also feasible, especially with the VCSEL & SPAD technology, where multiple lasers can be made possible in a small footprint place. The laser combination technique used in this study greatly improved the power of optical decryption images and, thus, significantly improved the image reconstruction quality, especially for remote sensing applications. With regard to RGB image encryption, different from the previous method, where typically an image is decomposed to three-color channels and then encrypting them respectively [25]. In contrast to previous approach, in this study, the color image is converted to QR code before encryption and converted back to color image using QR code following decryption therefore to address the color image encryption problem with minimum amount of hardware investment. In terms of encryption and decryption time, the scheme is a hybrid optoelectronic system; thus, it can take advantages of utilizing existing digital encryption methods [30,31,32,33] but also optical encryption schemes as well [10,11,12,13,14]. Time efficient multiplication and addition are used in the digital encryption process. Meanwhile, the operation of optical encryption is a parallel operation process. Therefore, the encryption speed is more efficient than the pure digital image encryption schemes such as chaotic encryption and elliptic curve cryptography [18].

5. Conclusions

In conclusion, we have proposed a novel method for multiple-image encryption based on coherent beam combing using conjugate Dammann grating. In our research, our method has illustrated the coherent array beam combination working principle for achieving multiple-image encryption. The proposed system has the following advantages. First, our simulation uses 2 × 2 CDG, but it can be extended to higher order of CDG, such as 3 × 3 CDG and 5 × 5 CDG, or even higher-order CDG, as such multiple images can be encrypted at the same time. Second, other parameters of CDG can also be used as encryption parameters. For example, the structure of CDG, such as the length of a single period, can also be used as a key to provide higher security for the encryption system. Finally, due to the combination effect of CDG, the signal strength of beam after the array images is strong and thus easy to detect, which is the biggest advantage of our encryption system. In addition, we discuss the influence of CDG alignment and PP value errors on encryption. We also discuss the influence of occlusion attack and noise attack on decryption. Our research demonstrates a new scheme for high-power multiple image encryption, which can find rich engineering applications.

Author Contributions

Conceptualization and methodology, A.Y. and W.L.; writing—original draft preparation, W.L.; reviewing and editing, H.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Nature Science Foundation of China under grant no. 62075134.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Matoba, O.; Nomura, T.; Perez-Cabre, E.; Millan, M.; Javidi, B. Optical techniques for information security. Proc. IEEE. 2009, 97, 1128–1148. [Google Scholar] [CrossRef]
  2. Manzo, M. KGEARSRG: Kernel Graph Embedding on Attributed Relational SIFT-Based Regions Graph. Mach. Learn. Knowl. Extr. 2019, 1, 962–973. [Google Scholar] [CrossRef] [Green Version]
  3. Flores-Vergara, A.; Inzunza-González, E.; García-Guerrero, E.E.; López-Bonilla, O.R.; Rodríguez-Orozco, E.; Hernández-Ontiveros, J.M.; Cárdenas-Valdez, J.R.; Tlelo-Cuautle, E. Implementing a Chaotic Cryptosystem by Performing Parallel Computing on Embedded Systems with Multiprocessors. Entropy 2019, 21, 268. [Google Scholar] [CrossRef] [Green Version]
  4. Ghadirli, H.; Nodehi, A.; Enayatifar, R. An overview of encryption algorithms in color images. Signal. Process. 2019, 164, 163–185. [Google Scholar] [CrossRef]
  5. Kaur, M.; Kumar, V. A comprehensive review on image encryption techniques. Arch. Comput. Method. E. 2020, 27, 15–43. [Google Scholar] [CrossRef]
  6. Chen, W.; Javidi, B.; Chen, X. Advances in optical security systems. Adv. Opt. Photonics. 2014, 6, 120–155. [Google Scholar] [CrossRef]
  7. Refregier, P.; Javidi, B. Optical image encryption based on input plane and Fourier plane random encoding. Opt. Lett. 1995, 20, 767–769. [Google Scholar] [CrossRef] [PubMed]
  8. Chen, L.; Peng, B.; Gan, W.; Liu, Y. Plaintext attack on joint transform correlation encryption system by convolutional neural network. Opt. Exp. 2020, 28, 28154–28163. [Google Scholar] [CrossRef]
  9. Chang, X.; Yan, A.; Zhang, H. Ciphertext-only attack on optical scanning cryptography. Opt. Laser. Eng. 2020, 126, 105901. [Google Scholar] [CrossRef]
  10. Wang, X.; Su, Y. Color image encryption based on chaotic compressed sensing and two-dimensional fractional Fourier transform. Sci. Rep. 2020, 10, 18556. [Google Scholar] [CrossRef]
  11. Yan, A.; Dong, J.; Li, Y. A novel nonlinear double image encryption based on affine transform and gyrator transform. J. Opt. 2018, 20, 115702. [Google Scholar] [CrossRef]
  12. Yan, A.; Wei, Y.; Zhang, J. Security enhancement of optical encryption based on biometric array keys. Opt. Commun. 2018, 419, 134–140. [Google Scholar] [CrossRef]
  13. Zhang, L.; Zhang, Z.; Kang, Y.; Ye, H.; Xiong, R.; Yuan, X.; Wang, Z.; Wang, K.; Zhang, D. Research on double-layers optical information encryption based on ghost imaging. Opt. Commun. 2020, 455, 124585. [Google Scholar]
  14. Qin, W.; Peng, X. Asymmetric cryptosystem based on phase-truncated Fourier transforms. Opt. Lett. 2010, 35, 118–120. [Google Scholar] [CrossRef]
  15. Zhong, Z.; Qin, H.; Liu, L.; Zhang, Y.; Shan, M. Silhouette-free image encryption using interference in the multiple-parameter fractional Fourier transform domain. Opt. Exp. 2017, 25, 6974–6982. [Google Scholar] [CrossRef]
  16. Chen, L.; Chang, G.; He, B.; Mao, H.; Zhao, D. Optical image conversion and encryption by diffraction, phase retrieval algorithm and incoherent superposition. Opt. Laser. Eng. 2017, 88, 221–232. [Google Scholar] [CrossRef]
  17. Shi, Y.; Liu, Y.; Sheng, W.; Zhu, D.; Wang, J.; Wu, T. Multiple-image double-encryption via 2D rotations of a random phase mask with spatially incoherent illumination. Opt. Exp. 2019, 27, 26050–26059. [Google Scholar] [CrossRef]
  18. Li, W.; Chang, X.; Yan, A.; Zhang, H. Asymmetric multiple image elliptic curve cryptography. Opt. Laser. Eng. 2021, 136, 106319. [Google Scholar] [CrossRef]
  19. Zhang, Y.; Wang, B. Optical image encryption based on interference. Opt. Lett. 2008, 33, 2443–2445. [Google Scholar] [CrossRef] [PubMed]
  20. Kim, Y.; Song, J.; Moon, I.; Lee, Y. Interference-based multiple-image encryption using binary phase masks. Opt. Laser. Eng. 2018, 107, 281–287. [Google Scholar] [CrossRef]
  21. Cai, J.; Shen, X.; Lei, M.; Lin, C.; Dou, S. Asymmetric optical cryptosystem based on coherent superposition and equal modulus decomposition. Opt. Lett. 2015, 40, 475–478. [Google Scholar] [CrossRef]
  22. Chen, L.; Gao, X.; Chen, X.; He, B.; Liu, J.; Li, D. A new optical image cryptosystem based on two-beam coherent superposition and unequal modulus decomposition. Opt. Laser Technol. 2016, 78, 167–174. [Google Scholar] [CrossRef]
  23. Sui, L.; Du, C.; Zhang, X.; Tian, A.; Anand, A. Double-image encryption based on interference and logistic map under the framework of double random phase encoding. Opt. Laser. Eng. 2019, 122, 113–122. [Google Scholar]
  24. Luan, G.; Chen, Z.; Huang, C. Silhouette-free multiple image encryption using coherent superposition and Fresnel transform. Optik 2020, 224, 165498. [Google Scholar] [CrossRef]
  25. Abuturab, M.R. A superposition based multiple-image encryption using Fresnel-Domain high dimension chaotic phase encoding. Opt. Lasers Eng. 2020, 129, 106038. [Google Scholar] [CrossRef]
  26. Zhou, C.; Liu, L. Numerical study of Dammann array illuminators. Appl. Opt. 1995, 34, 5961–5969. [Google Scholar] [CrossRef] [PubMed]
  27. Li, S.; Lu, Y. Coherent beam combination using non-separable phase-controlled Dammann grating. Opt. Commun. 2018, 407, 321–326. [Google Scholar] [CrossRef]
  28. Murillo-Escobar, M.; Meranza-Castillon, M.; Lopez-Gutierrez, R.; Cruz-Hernandez, C. Suggested Integral Analysis for Chaos-Based Image Cryptosystems. Entropy 2019, 21, 815. [Google Scholar] [CrossRef] [Green Version]
  29. Alvarez, G. Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurcation. Chaos. 2006, 16, 2129–2151. [Google Scholar] [CrossRef] [Green Version]
  30. Flores-Vergara, A.; García-Guerrero, E.; Inzunza-González, E.; López-Bonilla, O.; Rodríguez-Orozco, E.; Cardenas-Valdez, J.; Tlelo-Cuautle, E. Implementing a chaotic cryptosystem in a 64-bit embedded system by using multiple-precision arithmetic. Nonlinear. Dyn. 2019, 96, 497–516. [Google Scholar] [CrossRef]
  31. De la Fraga, L.G.; Mancillas-Lopez, C.; Tlelo-Cuautle, E. Designing an authenticated Hash function with a 2D chaotic map. Nonlinear. Dyn. 2021, 104, 4569–4580. [Google Scholar] [CrossRef]
  32. González-Zapata, A.M.; Tlelo-Cuautle, E.; Cruz-Vega, I.; Leon-Salas, W.D. Synchronization of chaotic artificial neurons and its application to secure image transmission under MQTT for IoT protocol. Nonlinear. Dyn. 2021, 104, 4581–4600. [Google Scholar] [CrossRef]
  33. Liang, H.; Zhang, G.; Hou, W.; Huang, P.; Liu, B.; Li, S. A Novel Asymmetric Hyperchaotic Image Encryption Scheme Based on Elliptic Curve Cryptography. Appl. Sci. 2021, 11, 5691. [Google Scholar] [CrossRef]
Figure 1. (a,b) The beam splitting system diagram and beam combining system diagram of 2 × 2 DG, respectively. DG, Dammann grating; L, Fourier lens; PP, phase plate; CDG, conjugate Dammann grating.
Figure 1. (a,b) The beam splitting system diagram and beam combining system diagram of 2 × 2 DG, respectively. DG, Dammann grating; L, Fourier lens; PP, phase plate; CDG, conjugate Dammann grating.
Applsci 11 09310 g001
Figure 2. (a,b) Simulation diagram of the intensity and phase of the rear focal plane of the lens L in beam splitting respectively; (c,d) simulation diagram of the intensity and phase of the front focal plane of the lens L in beam combining, respectively; (e) the beam intensity distribution map of the far field in beam combining.
Figure 2. (a,b) Simulation diagram of the intensity and phase of the rear focal plane of the lens L in beam splitting respectively; (c,d) simulation diagram of the intensity and phase of the front focal plane of the lens L in beam combining, respectively; (e) the beam intensity distribution map of the far field in beam combining.
Applsci 11 09310 g002
Figure 3. The schematic diagram of EMD for illustration of the relationship between I(x), M1(x), and M2(x).
Figure 3. The schematic diagram of EMD for illustration of the relationship between I(x), M1(x), and M2(x).
Applsci 11 09310 g003
Figure 4. (a) A schematic diagram of the encryption process; (b) a schematic diagram of the decryption process. SLM, spatial light modulators; L, Fourier lens; CDG, conjugate Dammann grating; CCD, charge coupled device camera; PC, personal computer; Q1, Q2, Q3, Q4, Q5, Q6, Q7 and Q8, eight QR code images; Q, superimposed image; D, scrambled image; D1, D2, D3 and D4, four divided images; P1, P2, P3, P4, the PP phase, K, four keys K1, K2, K3 and K4; C, four ciphertexts C1, C2, C3 and C4; × , the mathematical multiplier.
Figure 4. (a) A schematic diagram of the encryption process; (b) a schematic diagram of the decryption process. SLM, spatial light modulators; L, Fourier lens; CDG, conjugate Dammann grating; CCD, charge coupled device camera; PC, personal computer; Q1, Q2, Q3, Q4, Q5, Q6, Q7 and Q8, eight QR code images; Q, superimposed image; D, scrambled image; D1, D2, D3 and D4, four divided images; P1, P2, P3, P4, the PP phase, K, four keys K1, K2, K3 and K4; C, four ciphertexts C1, C2, C3 and C4; × , the mathematical multiplier.
Applsci 11 09310 g004
Figure 5. (a,b) Superimposed image Q and scrambled image D; (cf) four divided images D1, D2, D3 and D4; (gj) four ciphertexts C1, C2, C3 and C4; (kn) four keys K1, K2, K3 and K4.
Figure 5. (a,b) Superimposed image Q and scrambled image D; (cf) four divided images D1, D2, D3 and D4; (gj) four ciphertexts C1, C2, C3 and C4; (kn) four keys K1, K2, K3 and K4.
Applsci 11 09310 g005aApplsci 11 09310 g005b
Figure 6. (a) Decrypted superimposed image Q; (bi) eight decrypted QR codes.
Figure 6. (a) Decrypted superimposed image Q; (bi) eight decrypted QR codes.
Applsci 11 09310 g006
Figure 7. (a) The SSIM between the decrypted image and the original image when the CDG moves horizontally for x cycles; (b) the SSIM between the decrypted image and the original image when the PP value is associated with errors in the range of 0 to α π .
Figure 7. (a) The SSIM between the decrypted image and the original image when the CDG moves horizontally for x cycles; (b) the SSIM between the decrypted image and the original image when the PP value is associated with errors in the range of 0 to α π .
Applsci 11 09310 g007
Figure 8. (a1d1) 5% occlusion ciphertext images; (e1l1) decrypted images corresponding to (a1d1); (a2d2) 10% occlusion ciphertext images; (e2l2) decrypted images corresponding to (a2,d2); (a3,d3) 15% occlusion ciphertext images; (e3l3) decrypted images corresponding to (a3,d3).
Figure 8. (a1d1) 5% occlusion ciphertext images; (e1l1) decrypted images corresponding to (a1d1); (a2d2) 10% occlusion ciphertext images; (e2l2) decrypted images corresponding to (a2,d2); (a3,d3) 15% occlusion ciphertext images; (e3l3) decrypted images corresponding to (a3,d3).
Applsci 11 09310 g008aApplsci 11 09310 g008b
Figure 9. (a1d1) Ciphertext images after adding salt and pepper noise of 0.05 density; (e1l1) decrypted images corresponding to (a1d1); (a2d2) ciphertext images after adding salt and pepper noise of 0.1 density; (e2l2) decrypted images corresponding to (a2,d2); (a3,d3) ciphertext images after adding salt and pepper noise of 0.2 density; (e3l3) decrypted images corresponding to (a3,d3).
Figure 9. (a1d1) Ciphertext images after adding salt and pepper noise of 0.05 density; (e1l1) decrypted images corresponding to (a1d1); (a2d2) ciphertext images after adding salt and pepper noise of 0.1 density; (e2l2) decrypted images corresponding to (a2,d2); (a3,d3) ciphertext images after adding salt and pepper noise of 0.2 density; (e3l3) decrypted images corresponding to (a3,d3).
Applsci 11 09310 g009aApplsci 11 09310 g009b
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Li, W.; Yan, A.; Zhang, H. Novel Multiple-Image Encryption Scheme Based on Coherent Beam Combining and Equal Modulus Decomposition. Appl. Sci. 2021, 11, 9310. https://doi.org/10.3390/app11199310

AMA Style

Li W, Yan A, Zhang H. Novel Multiple-Image Encryption Scheme Based on Coherent Beam Combining and Equal Modulus Decomposition. Applied Sciences. 2021; 11(19):9310. https://doi.org/10.3390/app11199310

Chicago/Turabian Style

Li, Wei, Aimin Yan, and Hongbo Zhang. 2021. "Novel Multiple-Image Encryption Scheme Based on Coherent Beam Combining and Equal Modulus Decomposition" Applied Sciences 11, no. 19: 9310. https://doi.org/10.3390/app11199310

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop