Hybrid Color and Grayscale Images Encryption Scheme Based on Quaternion Hartley Transform and Logistic Map in Gyrator Domain

- Journal title : Journal of the Optical Society of Korea
- Volume 20, Issue 1, 2016, pp.42-54
- Publisher : Optical Society of Korea
- DOI : 10.3807/JOSK.2016.20.1.042

Title & Authors

Hybrid Color and Grayscale Images Encryption Scheme Based on Quaternion Hartley Transform and Logistic Map in Gyrator Domain

Li, Jianzhong;

Li, Jianzhong;

Abstract

A hybrid color and grayscale images encryption scheme based on the quaternion Hartley transform (QHT), the two-dimensional (2D) logistic map, the double random phase encoding (DRPE) in gyrator transform (GT) domain and the three-step phase-shifting interferometry (PSI) is presented. First, we propose a new color image processing tool termed as the quaternion Hartley transform, and we develop an efficient method to calculate the QHT of a quaternion matrix. In the presented encryption scheme, the original color and grayscale images are represented by quaternion algebra and processed holistically in a vector manner using QHT. To enhance the security level, a 2D logistic map-based scrambling technique is designed to permute the complex amplitude, which is formed by the components of the QHT-transformed original images. Subsequently, the scrambled data is encoded by the GT-based DRPE system. For the convenience of storage and transmission, the resulting encrypted signal is recorded as the real-valued interferograms using three-step PSI. The parameters of the scrambling method, the GT orders and the two random phase masks form the keys for decryption of the secret images. Simulation results demonstrate that the proposed scheme has high security level and certain robustness against data loss, noise disturbance and some attacks such as chosen plaintext attack.

Keywords

Quaternion Hartley transform;Two-dimensional logistic map;Gyrator transform;Image encryption;

Language

Korean

References

1.

P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767-769 (1995).

2.

E. Tajahuerce, O. Matoba, S. C. Verrall, and B. Javidi, “Optoelectronic information encryption with phase-shifting interferometry,” Appl. Opt. 39, 2313-2320 (2000).

3.

I. H. Lee and M. J. Cho, “Double random phase encryption using orthogonal encoding for multiple-image transmission,” J. Opt. Soc. Korea 18, 201-206 (2014).

4.

J. C. Zheng and X. Q. Li, “Image authentication using only partial phase information from a double-random-phase-encrypted image in the Fresnel domain,” J. Opt. Soc. Korea 19, 241-247 (2015).

5.

S. Yuan, Y. H. Xin, M. T. Liu, S. X. Yao, and X. J. Sun, “An improved method to enhance the security of double random-phase encoding in the Fresnel domain,” Optics & Laser Technology 44, 51-56 (2012).

6.

N. K. Nischal, J. Joseph, and K. Singh, “Securing information using fractional Fourier transform in digital holography,” Opt. Commun. 235, 253-259 (2004).

7.

Q. Wang, Q. Guo, and L. Lei, “Double image encryption based on phase–amplitude mixed encoding and multistage phase encoding in gyrator transform domains,” Optics & Laser Technology 48, 267-279 (2013).

8.

I. Muniraj, C. L. Guo, B. G. Lee, and J. T. Sheridan, “Interferometry based multispectral photonlimited 2D and 3D integral image encryption employing the Hartley transform,” Opt. Express 23, 15907-15920 (2015).

10.

M. R. Abuturab, “Securing color information using Arnold transform in gyrator transform domain,” Optics and Lasers in Engineering 50, 772-779 (2012).

11.

S. Q. Zhang and M. A. Karim, “Color image encryption using double random phase encoding,” Microwave Opt. Technol. Lett. 21, 318-323 (1999).

12.

M. Joshi, C. Shakher, and K. Singh, “Color image encryption and decryption for twin images in fractional Fourier domain,” Opt. Commun. 281, 5713-5720 (2008).

13.

W. Chen, C. Quan, and C. Tay, “Optical color image encryption based on arnold transform and interference method,” Opt. Commun. 282, 3680-3685 (2009).

14.

S. K. Rajput and N. K. Nishchal, “Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask,” Appl. Opt. 51, 5377-5386 (2012).

15.

I. Mehra and N. K. Nishchal, “Image fusion using wavelet transform and its application to asymmetric cryptosystem and hiding,” Opt. Express 22, 5474-5482 (2014).

16.

X. X. Li and D. M. Zhao, “Optical color image encryption with redefined fractional Hartley transform,” Optik 121, 673-677 (2010).

17.

X. L. Wang, H. C. Zhai, Z. L. Li, and Q. Ge, “Double random-phase encryption based on discrete quaternion Fourier-transforms,” Optik 122, 1856-1859 (2011).

18.

Z. H. Shao, H. Z. Shu, J. S. Wu, Z. F. Dong, G. Coatrieux, and J. L. Coatrieux, “Double color image encryption using iterative phase retrieval algorithm in quaternion gyrator domain,” Opt. Express 22, 4932-4943 (2014).

19.

M. R. Abuturab, “Generalized Arnold map-based optical multiple color-image encoding in gyrator transform domain,” Opt. Commun. 343, 157-171 (2015).

20.

W. R. Hamilton, Elements of Quaternions (Cambridge University Press, Cambridge, UK, 2009), Chapter 2.

21.

N. Gupta and D. K. Saxena, “Implementation and contrasting comparision of transform techniques of OFDM,” International Journal of Computer Applications 72, 47-51 (2013).

22.

Z. J. Liu, D. Z. Chen, J. P. Ma, S. Y. Wei, Y. L. Zhang, J. M. Dai, and S. T. Liu, “Fast algorithm of discrete gyrator transform based on convolution operation,” Optik 122, 864-867 (2011).

23.

S. Zhang, D. V. D. Weide, and J. Oliver, “Superfast phaseshifting method for 3-D shape measurement,” Opt. Express 18, 9684-9689 (2010).

24.

L. Z. Cai, Q. Liu, and X. L. Yang, “Phase-shift extraction and wave-front reconstruction in phase-shifting interferometry with arbitrary phase steps,” Opt. Lett. 28, 1808-1810 (2003).

25.

L. Z. Cai, M. Z. He, Q. Liu, and X. L. Yang, “Digital image encryption and watermarking by phase-shifting interferometry,” Appl. Opt. 43, 3078-3084 (2004).

26.

D. M. Chen, Y. M. Liu, X. D. Chen, Y. P. Chang, and J. Wang, “A novel chaotic map and DES based file encryption algorithm,” International Journal of Advancements in Computing Technology 3, 198-205 (2011).

27.

M. Z. He, Q. F. Tan, L. C. Cao, Q. S. He, and G. F. Jin, “Security enhanced optical encryption system by random phase key and permutation key,” Opt. Express 17, 22462-22473 (2009).

28.

Y. Wang, D. L. Zheng, and L. Ju, "Digital image encryption algorithm based on three-dimension Lorenz chaos," Journal of University of Science and Technology Beijing 26, 678-682 (2004). (in Chinese)

29.

M. Smila and S. Sankar, “Novel algorithms for finding an optimal scanning path for JPEG image compression,” IJETCSE 8, 230-236 (2014).

30.

T. K. Tsui, X. P. Zhang, and D. Androutsos, “Color image watermarking using multidimensional Fourier transforms,” IEEE Trans. Inform. Forensics Secur. 3, 16-28 (2008).

31.

X. G. Wang and D. M. Zhao, “Image encryption based on anamorphic fractional Fourier transform and three-step phase-shifting interferometry,” Opt. Commun. 268, 240-244 (2006).

32.

Y. Zhang and D. Xiao, “Double optical image encryption using discrete Chirikov standard map and chaos-based fractional random transform,” Opt. Lasers Eng. 51, 472-480 (2013).

33.

R. C. Gonzalez and R. E. Woods, Digital Image Processing, 3rd ed. (Prentice Hall, New Jersey, USA, 2007), Chapter 5.

34.

X. Peng, H. Z. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31, 3261-3263 (2006).

35.

P. Rajavel, “Directional Hartley transform and content based image retrieval,” Signal Processing 90, 1267-1278 (2010).

36.

C. B. Li, Data Structure (Tsinghua University Press, Beijing, PRC, 2013), Chapter 9. (in Chinese)

37.

X. Su, "Virtual optical encryption system based on coupling sawtooth spatiotemporal chaos," Master Thesis, Nanjing University of Posts and Telecommunications (2014). (in Chinese)