Brought to you by:
Letter

Asymmetric image encryption based on optical interference using modified error-reduction phase retrieval algorithm

, , and

Published 3 February 2020 © 2020 Astro Ltd
, , Citation Lei Liu et al 2020 Laser Phys. Lett. 17 035204 DOI 10.1088/1612-202X/ab6856

1612-202X/17/3/035204

Abstract

In this paper, we propose an asymmetric interference based encryption (IBE) using a modified error-reduction phase retrieval algorithm (mERPRA) in a structure of optical interference. Unlike previously proposed IBE schemes, the ciphertext in our scheme has less pixels than the original image. What is more important, a plaintext-dependent private key can be retrieved by using mERPRA with a fixed amplitude constraint, which makes this IBE scheme asymmetric. As we know, except for equal modulus decomposition-based encryption schemes, this is the first time that asymmetric IBE is presented. Consequentially, our proposed IBE scheme gains enhanced security due to its asymmetry. Simulation results are demonstrated to prove the validity of this scheme.

Export citation and abstract BibTeX RIS

1. Introduction

In 1995 Refrégiér and Javidi proposed the double random phase encoding [1] technique, which shows that optical information processing has a high-speed multidimension data processing capability and a high degree of freedom to multiply parameters. From then on, optical image encryption [1, 2] has attracted more and more attention from many researchers due to its advantages. Many various optical structures and algorithms are introduced into the field of image encryption, such as various optical transforms (including fractional Fourier transform (FT) [3], multiple-parameter fractional FT [4], gyrator transform [5] and so on), polarized light [6], holography [7, 8], coherent diffraction [9, 10] and interference [11].

Especially in interference-based encryption (IBE) [11], proposed by Zhang, the intensity of the interference fringe between two coherent beams is the decrypted image, which can be recorded by an intensity detector directly. Although IBE has the easy optical decryption, it has a drastic drawback: the silhouette problem [1216]. Zhang [12] proposed to exchange the corresponding parts of two POMs to remove the silhouette. Wang [17] and Zhong [18] inserted an additional random phase mask (RPM) before the two POMs or in the third beam path. Recently some phase retrieval algorithm-based IBE schemes [1921] have been proposed. They not only have an additional diffraction distance, but they all also remove the silhouette. However, most of the aforementioned IBE schemes are symmetric with a small key space, which makes these schemes vulnerable to illegal attacks [16, 22, 23]. To break the linearity, Cai and et. presented an asymmetric IBE with the aid of equal modulus decomposition (EMD) [24]. However, the illegal intrusions can access easily the plaintext via an amplitude-phase retrieval algorithm (APRA) [25, 26].

Conventionally, the ciphertexts are the same size as the plaintext, so the efficiency of the storage and transmission needs enhancement. Although the image compression can be processed easily via critical sampling in the transformation domain, such as with a discrete cosine transform [27, 28], discrete wavelet transform [29] and FT [30], the digital post-processing makes the decryption process of those schemes complex.

In this work, we propose an asymmetric IBE scheme by using a modified error-reduction phase retrieval algorithm (mERPRA). Unlike the traditional IBE schemes, the image compression and asymmetric encryption can be simply realized by the mERPRA in the structure of optical interference. As a result, our method provides a low burden of transmission and storage, and high resistance against illegal attacks. In addition, compared to EMD-based IBE [2426], our method generates a plaintext-dependent key using mERPRA, thus resulting in larger key space and robustness against APRA. All of these significantly enhance the encryption performance and security of our method. Simulation results are presented to verify the effectiveness and robustness of our method.

2. Principle

The original image f (u,v) and one fixed RPM (denoted as P1) are set as two known constraints in the encryption process. A(x,y ) and P(x,y ) represent the amplitude and phase of the iteratively calculated diffraction pattern with a predefined smaller size. They are unknown and can be simultaneously figured out by using mERPRA. The flowchart of the encryption process is shown in figure 1.

Figure 1.

Figure 1. The flowchart of the encryption process.

Standard image High-resolution image

In the initialization of the encryption process, an RAM generated randomly in the interval [0, 1] is used as A0(x,y )  ×  P0(x,y ). P1(x, y ) is a fixed RPM and used as a public key. The kth iteration loop is depicted as:

Equation (1)

where FrT denotes a 2D Fresnel transform, (x,y ) and (u,v) denote the coordinates of the spatial domain and spectral domain. d1 denotes a distance between P1(x, y ) and the image plane, and d2 denotes a distance between A(x,y )  ×  P(x,y ) and the image plane, which can be different from d1.

Apply the amplitude constraint f (u,v) at the image plane to update the $T_{1}^{k}$ (u,v):

Equation (2)

where f (u,v) denotes a normalized original image.

Then remove the item of P1(x,y ) and propagate back to A(x,y )  ×  P(x,y ) plane.

Equation (3)

The updated Ak(x, y ) and Pk(x, y ) can be calculated as follows:

Equation (4)

Equation (5)

where abs[] and arg[] indicate the amplitude extraction and the phase extraction, respectively.

In every iteration, Ak(x, y ) and Pk(x, y ) should be updated as follows:

Equation (6)

where γ indicates a region of interest (ROI), for which the elements are inside the predefined shrinked area. It should be noted that the pixels outside the ROI of the ciphertext A, public key P1 and private key P are all zero and useless. It is unnecessary to store and transmit the data outside the ROI. A desired compression rate can be obtained by controlling the area of γ. As a result, the burden of the transmission and storage decreases.

The loop iteration would be repeated until the predefined precision or iteration number is achieved. When the encryption process is completed, a ciphertext A(x,y ) and a private key P(x,y ) can be obtained.

The optical schematics of the decryption process are shown in figure 2. The ciphertext A, public key P1 and private key P are displayed on spatial light modulators (SLMs). Two coherent collimated beams cross the SLMs and their diffraction wavefronts interfere with each other at the image plane, resulting in the decrypted image captured by the CCD camera. Note that the size of the captured image is larger than that of the ROI of the ciphertext A but similar to that of the original image.

Figure 2.

Figure 2. The optical schematics of the decryption process.

Standard image High-resolution image

The decrypted image can be expressed

Equation (7)

In this scheme, P1, the illuminating wavelength and the diffraction distances serve as the public keys. A(x,y ) can be stored and transmitted as the compressed and encrypted image, while P(x,y ) serves as a private key. The private key P(x,y ), which is highly plaintext-dependent, makes our proposed IBE scheme asymmetric.

3. Simulation results and discussion

Various numerical simulations are performed to demonstrate the feasibility and effectiveness of this proposed scheme. As previously described in the encryption process, the size of ROI is a constraint of encryption. A shrunken ROI with 160  ×  160 pixels (occupying 39.06% of the original size) is set for the numerical simulations. The illuminating wavelength is 632.8 nm, while the diffraction distance d1 is set as 50 mm and the diffraction distance d2 is set as 51 mm.

The original image with the size of 256  ×  256 pixels is shown in figure 3(a), the ROI of P1 used for encryption, as shown in figure 3(b). The ROI of the compressive ciphertext A(x,y ) is presented in figure 3(c), which has a smaller size of 160  ×  160 pixels and appears like useless information. The ROI of the private key P(x,y ) with a size of 160  ×  160 pixels, is shown in figure 3(d). The correct decrypted image is illustrated in figure 3(e). For clarity, only the areas containing efficient pixels are shown.

Figure 3.

Figure 3. (a) The original image; (b) P1; (c) the ciphertext A(x,y ); (d) the private key P(x,y ); (e) the decrypted image.

Standard image High-resolution image

In the simulation we can get the high-quality decrypted image with CC  =  0.9823 while a compression rate of 60.94% can be obtained compared with previous IBE schemes. Unlike the critical sampling used in [2730], the proposed method does not require extra image processing in encryption and decryption processes.

To demonstrate the relationship between the CC values and the iteration number, the plot is depicted in figure 4. It is apparent that this proposed scheme can achieve fast convergence and high-quality decryption.

Figure 4.

Figure 4. CC values versus the iteration number.

Standard image High-resolution image

The diffraction distances are important keys in this scheme. Figure 5 shows the CC value influenced by the diffraction distance d1, in which ▵d means the deviation of d1. Only the right distance is used, the CC value reaches the peak. Obviously, this scheme is very sensitive to the diffraction distance, which enhances the security of this scheme.

Figure 5.

Figure 5. CC values versus the deviation of d1.

Standard image High-resolution image

In the simulation, the wavelength is set at 633 nm. Figure 6(a) shows the decrypted image when 632 nm is used as the wavelength for decryption, while figure 6(b) shows the decrypted image when 634 nm is used as the wavelength for decryption. It is obvious that any little deviation of wavelength would result in decryption failure.

Figure 6.

Figure 6. The decrypted image using the wavelength of (a) 632 nm and (b) 634 nm.

Standard image High-resolution image

The silhouette-free capability is further analysed for only one or two of P1, A and P when the wavelength and distance are correct; some results are shown in figure 7. It is obvious that no information from the original image can be observed, and the silhouette problem of the IBE is removed. In other words, all of the ciphertext A, the public key P1 and the private key P are necessary for decryption.

Figure 7.

Figure 7. The decrypted image by only using (a) P1, (b) A  ×  P, (c) P1 and A, and (d) P1 and P.

Standard image High-resolution image

Compared with the previously published IBE schemes, our proposal retrieved a plaintext-dependent private key, which makes our proposal asymmetric and more secure. To test its resistance against the APRA, it is assumed that the public keys, such as P1, the wavelength, the diffraction distances and the size of ROI, the ciphertext and even the encryption algorithm are known to the attacker. Based on known conditions, the attacker is able to develop a modified APRA attack to retrieve an image. The modified APRA attack for this scheme can be described as follows.

In the kth (k  =  0, 1, 2, 3...) iteration, the decrypted image I(u,v) can be written as

Equation (8)

Because the image is real-valued, just extract the amplitude of $T_{k}^{1}$ (u, v)

Equation (9)

Remove P1 and backpropagate to A(x,y )  ×  P(x,y ) plane

Equation (10)

Then apply the size of ROI to the iteratively retrieved private key P'(x,y )

Equation (11)

Equation (12)

At the end of the kth iteration, the decrypted image can be calculated

Equation (13)

Furthermore, to demonstrate the resistance on the modified APRA attack, the CC values verses the iteration number is shown in figure 8.

Figure 8.

Figure 8. CC value versus iteration number by using APRA attack.

Standard image High-resolution image

Obviously, after 100 iterative calculation, the retrieved image still has a very low CC value. Therefore, the APRA attack cannot access any information from the original image in our proposed scheme.

4. Conclusion

In this paper, we propsed a mERPRA in the structure of optical interference to achieve image compression and asymmetric encryption simultaneously. Different to the previous IBE schemes, the ciphertext in our proposal has less pixels. In addition, a plaintext-dependent private key is retrieved in the encryption process, which makes this scheme asymmetric. Due to the asymmetry and the high sensitivity of keys, such as the wavelength and diffraction distances, this proposed IBE scheme obtains much higher security. Simulation results are presented to prove the validity of the proposed scheme.

Acknowledgments

This work was supported by National Natural Science Foundation of China (61775046); Heilongjiang Science Foundation of China (LC2018027); PhD Student Research and Innovation Fund of the Fundamental Research Funds for the Central Universities (HEUGIP201812).

Please wait… references are loading.