In this paper we extend double random phase encryption (DRPE) using orthogonal encoding from single-image transmission to multiple-image transmission. The orthogonal encoding for multiple images employs a larger Hadamard matrix than that for a single image, which can improve security. We provide a scheme for DRPE with an orthogonal codec, and a method for orthogonal encoding/decoding for multiple-image transmission. Finally, simulation results verify that the DRPE using orthogonal encoding for multiple images is more secure than both the conventional DRPE and the DRPE using orthogonal encoding for a single image.
I. INTRODUCTION
A significant issue in transmitting private or confidential information is information security. Encryption techniques for secure data transmission have been well developed
[1
-
26]
, and lots of research has focused on optical encryption
[3
-
26]
. One widely used optical technique is double random phase encryption (DRPE)
[3]
. It provides high encryption speed, but requires updating of the key phase masks
[4]
. To improve the security of DRPE, fractional Fourier transform has been adopted in DRPE systems
[25]
, but it requires much more information in the keys for encryption and decryption. An increase in the key information can make the DRPE systems more complicated, so DRPE using orthogonal encoding has been proposed for single-image transmission
[26]
. The orthogonal encoding technique for single-image transmission employs only simple, linear operations based on the Hadamard matrix of order 2 with the orthogonality property
[27]
. Thus, the use of orthogonal encoding can enhance the security of DRPE at the cost of a little complexity.
In this paper we extend DRPE using orthogonal encoding from single-image to multiple-image transmission. The orthogonal encoding for multiple images uses a larger Hadamard matrix than that for a single image, and hence is more secure. We provide a scheme for DRPE with an orthogonal codec for multiple-image transmission. Furthermore, we show simulation results verifying that the multiple images encrypted by DRPE using orthogonal encoding are not correctly decrypted even when the key information used in DRPE is known.
The paper is organized as follows. Section II presents the basic concept of DRPE. Then, DRPE using orthogonal encoding for multiple-image transmission is described in Section III. To verify this optical encryption method, simulation results produced by DRPE using orthogonal encoding are provided in Section IV. Finally, we conclude with a summary.
II. DOUBLE RANDOM PHASE ENCRYPTION TECHNIQUE
DRPE, an optical encryption technique, can provide high encryption and decryption speed. In addition, it can be implemented simply. It uses two random phase noises (i.e., random phase masks) for the encryption process. Then, noise like encrypted data can be obtained. For decryption, the key random phase mask is convolved with the encrypted data. To understand the DRPE concept, we consider only one-dimensional data. Let us assume that the primary data is
s
(
x
) and the two random phase noise signals for encryption, ns(x) in the spatial domain and
nf
(
μ
) in the spatial frequency domain, are uniformly distributed over [0, 1].
Figure 1(a)
illustrates an experimental optical setup for DRPE. Two imaging lenses with focal length
f
are used for the Fourier transform and inverse Fourier transform, respectively. For encryption, first the original data is multiplied by random noise, exp[
i2πns
(
x
)], in the spatial domain. Through the first imaging lens ℑ{
s
(
x
)exp[
i2πns(x)
]} can be obtained, where ℑ indicates the Fourier transform. Then this is multiplied by random noise, exp[
i2πnf
(
μ
)] (the Fourier transform of
h
(
x
)), in the spatial frequency domain. After passing through the second imaging lens, the data encrypted (as a complexvalued function) by DRPE,
se
(
x
), can be generated as the following
[11]
:
where ℑ
-1
indicates the inverse Fourier transform. This encrypted data can be separated into amplitude and phase, i.e.
se
(
x
)=|
se
(
x
)|exp[
i φ e
(
x
)] because of the characteristics of a complex-valued function.
For decryption, the complex conjugate of the key information (i.e. the Fourier transform of
h
(
x
)) is multiplied by the encrypted data as shown in
Fig. 1(b)
. Therefore, the decrypted data can be obtained from the following equation
[11]
:
Schematic setup of (a) encryption and (b) decryption for DRPE.
III. DOUBLE RANDOM PHASE ENCRYPTION USING ORTHOGONAL ENCODING
- 3.1. Procedure for DRPE using Orthogonal Encoding
In this paper we assume that
K
primary images are transmitted.
Figures 2(a)
and
2(b)
depict the schemes for DRPE using orthogonal encoding for encryption and decryption, respectively. As shown in
Fig. 2(a)
, the primary images
s
1
(
x
),
s
2
(
x
), …,
s
K
(
x
) are sequentially encrypted by DRPE with the same key information (i.e. the same phase masks). Then the encrypted data
se
,1
(
x
),
s
e,2
(
x
), …,
se,K
(
x
) are obtained from the
K
primary images. Note that the encrypted data are complex-valued functions. By a serialto-parallel converter, the encrypted data are converted from serial format to parallel format. Then each encrypted datum is separated into real and imaginary parts. The 2
K
values
r
re,1
(
x
),
r
im,1
(
x
), … ,
rre,K
(
x
),
rim,K
(
x
) are encoded together with the orthogonal encoding technique, which will be introduced in Section 3.2. The reason why the real and imaginary parts are encoded is that these parts are independent from each other. Finally, the complex encoded data
q
1
(
x
),
q
2
(
x
), … ,
qM/2
(
x
) are produced from the encoded real values
c
1
(
x
),
c
2
(
x
), … ,
cM
(
x
) and successively transmitted after the parallel-to-serial converter, where
and
indicates the ceiling operation.
As shown in
Fig. 2(b)
, to correctly decrypt the orthogonally encoded data, first the encoded data are converted from serial format to parallel format and decomposed into real and imaginary components. Then the real encoded data are decoded with the orthogonal matrix used in the encoder. From the real decoded data
(
x
),
(
x
), … ,
(
x
),
(
x
) the complex decoded data
(
x
),
(
x
), … ,
(
x
) are found, and then sequentially decrypted with the DRPE decryption technique after the parallel-to-serial converter. Finally, the
K
decrypted data
(
x
),
(
x
), … ,
(
x
) are obtained.
Scheme for DRPE using orthogonal encoding: (a) encryption and (b) decryption.
- 3.2. Orthogonal Encoding and Decoding Technique
For orthogonal encoding and decoding of multiple images, we use the Hadamard matrix of order 2
n
, denoted by
2n×L
, with the following orthogonality property
[27]
:
where
n
and
L
are positive integers, 2
n
≥
L
,
L×L
represents the
L×L
identity matrix, and
T
is the transpose of
. The square Hadamard matrix of order 2
n
is generated as follows:
where
2
=[1 1; 1 -1]. On the other hand, when 2
n-1
<
L
<2
n
, the non-square Hadamard matrix is obtained by choosing any
L
columns of the square Hadamard matrix of order 2
n
,
2n×2n
By using the Hadamard matrix in the orthogonal encoder, the real and imaginary components of the encrypted data for
K
images are encoded as follows:
where
,
cm
(
x
) is the
m
th encoded datum, and
(
x
) and
(
x
) are the real and imaginary parts of the encrypted data for the
k
th image, respectively. 1/
M
is a normalization factor.
In the orthogonal decoder, the real and imaginary com- ponents of the encoded data
c
1
(
x
),
c
2
(
x
), … ,
c
M
(
x
) are decoded by using the Hadamard matrix of the encoder as follows:
where
(
x
) and
(
x
) are the decoded data for the
k
th image. By inserting Eq. (5) into Eq. (6), we obtain
(
x
) =
rre,k
(
x
) and
(
x
) =
rim,k
(
x
).
The orthogonal encoder and decoder consist of only simple linear operations, as described in Eqs. (4)-(6). Hence, the addition of the orthogonal encoder and decoder to the DRPE system does not require any high cost or effort.
IV. SIMULATION RESULTS
For performance evaluation of DRPE using orthogonal encoding, we use four primary images with 500 (H)×500 (V) pixels as shown in
Fig. 3
. We consider transmissions of two, three, and four images. For two-, three-, and fourimage transmissions the primary images in
Figs. 3(a)
and
3(b)
,
Figs. 3(a)
-
3(c)
, and
Figs. 3(a)
-
3(d)
are used respectively, and the following Hadamard matrices are used respectively.
The four primary images.
Simulation results for encryption by DRPE using orthogonal encoding for two images: (a) the first and (b) the second encrypted images, and (c) the first and (d) the second encoded images.
Figures 4
-
6
show the encrypted and encoded images for two-, three-, and four-image transmissions respectively. These figures indicate that the images encrypted by DRPE and encoded by orthogonal encoding are perfectly encrypted, and thus look like noise. It is noted that for three-image transmission, four encoded images are generated because the order of Hadamard matrix is eight.
Figures 7
-
9
show
Simulation results for encryption by DRPE using orthogonal encoding for three images: (a) the first, (b) the second, and (c) the third encrypted images, and (d) the first, (e) the second, (f) the third, and (g) the fourth encoded images.
Simulation results for encryption by DRPE using orthogonal encoding for four images: (a) the first, (b) the second, (c) the third, and (d) the fourth encrypted images, and (e) the first, (f) the second, (g) the third, and (h) the fourth encoded images.
Simulation results for decryption by DRPE using orthogonal encoding for two images: (a) the first and (b) the second decrypted images without decoding, and (c) the first and (d) the second decrypted images with decoding.
Simulation results for decryption by DRPE using orthogonal encoding for three images: (a) the first, (b) the second, and (c) the third decrypted images without decoding, and (d) the first, (e) the second, and (f) the third decrypted images with decoding.
Simulation results for decryption by DRPE using orthogonal encoding for four images: (a) the first, (b) the second, (c) the third, and (d) the fourth decrypted images without decoding, and (e) the first, (f) the second, (g) the third, and (h) the fourth decrypted images with decoding.
Simulation results for decryption by DRPE using orthogonal encoding when decoding for the single-image transmission is used: (a) the first and (b) the second decrypted images for two-image transmission, (c) the first, (d) the second, and (e) the third decrypted images for three-image transmission, and (f) the first, (g) the second, (h) the third, and (i) the fourth decrypted images for four-image transmission.
the decrypted images, with and without decoding, for two-, three-, and four-image transmissions respectively, when the key information of DRPE is perfectly known for decryption. In the case of no decoding, the complex encoded data are not decoded with the orthogonal decoder, but directly decrypted. Thus,
(
x
), =
qk
(
x
) for
k
=1,2,…,
K
. From these figures, it is seen that the decrypted images without decoding resemble the encrypted images, even though perfect key information was applied for decryption. On the other hand, when the decryption is done with orthogonal decoding and perfect key information, the decrypted images in
Fig. 3
match the primary images perfectly.
Figures 10(a)
-
10(i)
show the decrypted images for two-, three-, and four-image transmissions respectively, when perfect key information of DRPE is used for decryption but the wrong decoding is employed. For the wrong decoding method we use the Hadamard matrix of order 2 that was adopted for decryption of the single-image transmission
[26]
. For encoding of two-, three-, and four-image transmissions, we use the Hadamard matrices of order 4, 8, and 8, res- pectively. Thus the Hadamard matrices used for encoding and decoding do not match. As seen in these figures, the decrypted images somewhat include the primary images, but overlapped, and image recognition becomes worse as the number of transmitted images increases, i.e. the size of the Hadamard matrix increases.
MSE results of DRPE using orthogonal encoding when incorrect decoding is used
MSE results of DRPE using orthogonal encoding when incorrect decoding is used
To quantify the difference between the primary images in
Figs. 3(a)
-
3(d)
and the decrypted images with incorrect decoding in
Figs. 10(a)
-
10(i)
respectively, the mean square error (MSE) is evaluated. MSE between the
k
th primary and decrypted images is calculated as follows:
where
X
=500×500, and
sk
(
x
) and
denote the
k
th primary and decrypted data respectively, as shown in
Fig. 2
. Assuming that the image pixel value’s integer range is from 0 to 255, the MSE results are obtained as shown in
Table 1
. From the MSE results it is observed that the MSE increases with the number of transmitted images. Therefore, we can expect a significant improvement in information security by encoding many more images together.
V. CONCLUSIONS
We present a DRPE technique using orthogonal encoding for multiple-image transmission. Particularly we provide a scheme for DRPE using orthogonal encoding for encryption and decryption as well as the method for orthogonal encoding and decoding with the Hadamard matrix. From simulation results we verify that DRPE using orthogonal encoding for multiple-image transmission is more powerful than that for the single-image transmission, in terms of security. Furthermore, since the orthogonal encoder and decoder consist of only simple linear operations, the DRPE system using orthogonal encoding for multiple-image transmission can be implemented with low cost and effort.
Color versions of one or more of the figures in this paper are available online.
Acknowledgements
This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (NRF-2013R 1A1A2057549).
Tsuji S.
,
Itoh T.
1989
“An ID-based cryptosystem based on the discrete logarithm problem,”
IEEE Journal on Selected Areas in Communication
http://dx.doi.org/10.1109/49.17709
7
467 -
473
Menezes A.
,
Okamoto T.
,
Vanstone S.
1993
“Reducing elliptic curve logarithms to logarithms in a finite field,”
IEEE Tran. on Info. Th.
http://dx.doi.org/10.1109/18.259647
39
1639 -
1646
Refregier P.
,
Javidi B.
1995
“Optical-image encryption based on input plane and Fourier plane random encoding,”
Opt. Lett.
http://dx.doi.org/10.1364/OL.20.000767
20
767 -
769
Frauel Y.
,
Castro A.
,
Naughton T.
,
Javidi B.
2007
“Resistance of the double random phase encryption against various attacks,”
Opt. Express
http://dx.doi.org/10.1364/OE.15.010253
15
10253 -
10265
Matoba O.
,
Javidi B.
1999
“Encrypted optical storage with angular multiplexing,”
Appl. Opt.
http://dx.doi.org/10.1364/AO.38.007288
38
7288 -
7293
Nomura T.
,
Javidi B.
2000
“Optical encryption system with a binary key code,”
Appl. Opt.
http://dx.doi.org/10.1364/AO.39.004783
39
4783 -
4787
Monaghan D. S.
,
Gopinathan U.
,
Naughton T. J.
,
Sheridan J. T.
2007
“Key-space analysis of double random phase encryption technique,”
Appl. Opt.
http://dx.doi.org/10.1364/AO.46.006641
46
6641 -
6647
M. Singh
,
A. Kumar
,
K. Singh
2008
“Secure optical system that uses fully phase-based encryption and lithium niobate crystal as phase contrast filter for decryption,”
Opt. Laser Technol.
http://dx.doi.org/10.1016/j.optlastec.2007.09.007
40
619 -
624
Joshi M.
,
Shakher C.
,
Singh K.
2010
“Fractional Fourier transform based image multiplexing and encryption technique for four-color images using input images as keys,”
Opt. Commun.
http://dx.doi.org/10.1016/j.optcom.2010.02.024
283
2496 -
2505
Liu Z.
,
Xu S. L.
,
Lin C.
,
Dai J.
,
Liu S.
2011
“Image encryption scheme by using iterative random phase encoding in gyrator transform domains,”
Opt. Lasers Eng.
http://dx.doi.org/10.1016/j.optlaseng.2010.12.005
49
542 -
546
Perez-Cabre E.
,
Cho M.
,
Javidi B.
2011
“Information authentication using photon-counting double-random-phase encrypted images,”
Opt. Lett.
http://dx.doi.org/10.1364/OL.36.000022
36
22 -
24
Liu Z.
,
Li S.
,
Yang M.
,
Liu W.
,
Liu S.
2012
“Image encryption based on the random rotation operation in the fractional Fourier transform domains,”
Opt. Lasers Eng.
http://dx.doi.org/10.1016/j.optlaseng.2012.05.021
50
1352 -
1358
Sarkadi T.
,
Koppa P.
2012
“Quantitative security evaluation of optical encryption using hybrid phase- and amplitudemodulated keys,”
Appl. Opt.
http://dx.doi.org/10.1364/AO.51.000745
51
745 -
750
Koppa P.
2007
“Phase-to-amplitude data page conversion for holographic storage and optical encryption,”
Appl. Opt.
http://dx.doi.org/10.1364/AO.46.003561
46
3561 -
3571
Towghi N.
,
Javidi B.
,
Luo Z.
1999
“Fully phase encrypted image processor,”
J. Opt. Soc. Am. A
16
1915 -
1927
Tajahuerce E.
,
Javidi B.
2000
“Encrypting three-dimensional information with digital holography,”
Appl. Opt.
http://dx.doi.org/10.1364/AO.39.006595
39
6595 -
6601
Tashima H.
,
Takeda M.
,
Suzuki H.
,
Obi T.
,
Yamaguchi M.
,
Ohyama N.
2010
“Known plaintext attack on double random phase encoding using fingerprint as key and a method for avoiding the attack,”
Opt. Express
http://dx.doi.org/10.1364/OE.18.013772
18
13772 -
13781
Tan X.
,
Matoba O.
,
Okada-Shudo Y.
,
Ide M.
,
Shimura T.
,
Kuroda K.
2001
“Secure optical memory system with polarization encryption,”
Appl. Opt.
http://dx.doi.org/10.1364/AO.40.002310
40
2310 -
2315
Barrera J. F.
,
Henao R.
,
Tebaldi M.
,
Torroba R.
,
Bolognini N.
2006
“Multiplexing encryption-decryption via lateral shifting of a random phase mask,”
Opt. Commun.
http://dx.doi.org/10.1016/j.optcom.2005.09.027
259
532 -
536
Clemente P.
,
Durán V.
,
Torres-Company V.
,
Tajahuerce E.
,
Lancis J.
2010
“Optical encryption based on computational ghost imaging,”
Opt. Lett.
http://dx.doi.org/10.1364/OL.35.002391
35
2391 -
2393
Chen W.
,
Chen X.
2010
“Space-based optical image encryption,”
Opt. Express
http://dx.doi.org/10.1364/OE.18.027095
18
27095 -
27104
Unnikrishnan G.
,
Joseph J.
,
Singh K.
2000
“Optical encryption by double-random phase encoding in the fractional Fourier domain,”
Opt. Lett.
http://dx.doi.org/10.1364/OL.25.000887
25
887 -
889
Tu H.-Y.
,
Chiang J.-S.
,
Chou J.-W.
,
Cheng C.-J.
2008
“Full phase encoding for digital holographic encryption using liquid crystal spatial light modulators,”
Jpn. J. Appl. Phys.
http://dx.doi.org/10.1143/JJAP.47.8838
47
8838 -
8843
Cho M.
,
Javidi B.
2013
“Three-dimensional photon counting double-random-phase encryption,”
Opt. Lett.
http://dx.doi.org/10.1364/OL.38.003198
38
3198 -
3201
Chandrashakher M. Joshi
,
Singh K.
2007
“Color image encryption and decryption using fractional Fourier transform,”
Opt. Commun.
http://dx.doi.org/10.1016/j.optcom.2007.07.012
279
35 -
42
Lee I.-H.
,
Cho M.
2014
“Double random phase encryption based orthogonal encoding technique for color images,”
J. Opt. Soc. Korea
http://dx.doi.org/10.3807/JOSK.2014.18.2.129
18
129 -
133
Sylvester J. J.
1867
“Thoughts on orthogonal matrices, simultaneous sign successions, and tessellated pavements in two or more colors, with applications to Newton’s rule, ornamental tilework, and the theory of numbers,”
Phil. Mag.
34
461 -
475