Optical Image Encryption Algorithm Based on Coherent Superposition and Equal Modulus Vector Decomposition
ZHANG Bo① LONG Hui① JIANG Feibo②③
①(Department of Information and Engineering, Changsha Normal University, Changsha 410100, China) ②(College of Geosciences and Info-Physics, Central South University, Changsha 410083, China) ③(College of Physics and Information Science, Hunan Normal University, Changsha 410081, China)
Abstract:In order to overcome the defects such as contour emerging induced by the cipher phase information mainly concentrated in the pure phase mask and difficult to resist the amplitude phase retrieval attack in current optical image encryption technology, the optical image encryption algorithm based on coherent superposition and equal modulus vector decomposition is proposed in this paper. Firstly, the optical image is normalized, and the initial value of Logistic map is generated using the pixel characteristics of plaintext, and the random phase mask is outputted by iterative the logistic map. Then the image is modulated by random phase function, and the modulated image is processed based on Fourier transform to output the Fourier spectrum. Then, the Fourier spectrum is decomposed equal module to obtain two masks. Each mask is transformed based on Fourier mechanism with different fractional order. Finally, a one-way coding scheme is designed based on phase - amplitude truncation coding technique to get the amplitude and phase information of each Fourier spectrum, which regards the phase part as coding cipher, and the amplitude information as the decryption key. The input plaintext is transformed into 4 different information of phases and amplitudes using the equal modulus vector decomposition technique to solve effectively the problem of contour representation. The experimental results show that the proposed algorithm has higher security for effectively solving the contour appearance problem compared with current image encryption schemes based on the interference theory.
LIU Xingbin, MEI Wenbo, and DU Huiqian. Optical image encryption based on compressive sensing and chaos in the fractional Fourier domain[J]. Journal of Modern Optics, 2014, 61(19): 1570-1577. doi: 10.1080/09500340.2014.946565.
LI Kaijia, YU Ruigang, and YUAN Linyun. Image encryption algorithm based on DNA-cellular automata and Hash function[J]. Computer Engineering and Design, 2017, 38(2): 470-477. doi: 10.16208/j.issn1000-7024.2017.02.036.
SHEN Xueju, LIU Xumin, and CAI Ning. Nonlinear JTC optical image encryption system and its characteristics of noise reduction and anti attack[J]. Chinese Journal of Laser, 2015, 42(7): 284-290. doi: 10.3788/CJL201542.0709003.
ZHU Wei, YANG Geng, and CHEN Lei. Improved double random phase coded image encryption algorithm based on chaos[J]. Journal of Photonics, 2014, 34(6): 58-68. doi: 10.3788/AOS201434.0607001.
[5]
DENG Xiaopeng. Optical multiple-image encryption based on fully phase encoding and interference[J]. Optik- International Journal for Light and Electron Optics, 2015, 126(21): 3210-3214. doi: 10.1016/j.ijleo.2015.07.148.
[6]
CHEN Linfei, LIU Jingyu, and WEN Jisen. A new optical image encryption method based on multi-beams interference and vector composition[J]. Optics & Laser Technology, 2015, 69(18): 70-86. doi: 10.1016/j.optlastec.2014.12.007.
ZENG Dakui, MA Hongli, and LIU Jian. Optical image encryption based on two step quadrature phase shifting interferometry[J]. Journal of Photonics, 2012, 41(1): 72-76. doi: 10.3788/gzxb20124101.0072.
[8]
ADELAÏDE Nicole Kengnou Telem. A simple and robust gray image encryption scheme using chaotic logistic map and artificial neural network[J]. Advances in Multimedia, 2014, 77(1): 1201-1213. doi: 10.1155/2014.602921.
[9]
ZHAO Tieyu, RAN Qiwen, and YUAN Lin. Securities of image encryption scheme based on multi-parameter fractional Fourier transform[J]. Optics Communications, 2016, 376(19): 47-51. doi: 10.1016/j.optcom.2016.05.016.
[10]
SUN Qiudong, ZUO Jiancun, and SHAO Yufeng. A dual image scrambling method based on discrete cosine transform [J]. Applied Mechanics and Materials, 2016, 556(110): 4722-4725. doi: 10.4028/www.scientific.net/AMM.556-562. 4722.
[11]
WAN Qin and XIANG Penng. Asymmetric cryptosystem based on phase-truncated Fourier transforms[J]. Optics Letters, 2010, 35(2): 118-125. doi: 10.1364/OL.35.000118.
[12]
WANG Qu, GUO Qing, and LEI Liang. Optical interference- based image encryption using circular harmonic expansion and spherical illumination in gyrator transform domain[J]. Optics Communications, 2015, 346(19): 124-132. doi: 10.1016 /j.optcom.2015.02.040.
WANG Shuai, SUN Wei, and GUO Yinan. Design and analysis of a fast image encryption algorithm based on chaos [J]. Computer Application Research, 2015, 32(2): 512-515. doi: 10.3969/j.issn.1001-3695.2015.02.042.
CHEN Linfei, HE Bingyu, and CHEN Xudong. Optical image encryption based on multi-beam interference and common vector decomposition[J]. Optics Communications, 2016, 361(15): 6-12. doi: 10.1016/j.optcom.2015.10.037.
REN Xiaoxia, LIAO Xiaofeng, and XIONG Yonghong. New algorithm of image encryption based on hyperchaos of cellular neural networks[J]. Computer Application Research, 2011, 31(6): 1528-1531. doi: 10.3724/SP.J.1087.2011.01528.
[18]
CARNICER A, MONTES-USATEGUI M, ARCOS S, et al. Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys[J]. Optical Letters, 2005, 30(13): 1644-1646. doi: 10.1364/OL.30. 001644.
[19]
LI Chengqing. Cracking a hierarchical chaotic image encryption algorithm based on permutation[J]. Signal Processing, 2016, 118(19): 203-211. doi: 10.1016/j.sigpro. 2015.07.008.
[20]
XIANG Peng, PAN Zhang, HUANG Wei, et al. Known- plaintext attack on optical encryption based on double random phase keys[J]. Optical Letters, 2006, 31(8): 1044-1046. doi: 10.1109/SOPO.2010.5504346.