Skip to main content
Log in

Two level phase retrieval in fractional Hartley domain for secure image encryption and authentication using digital signatures

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

A novel image authentication scheme based on two level phase retrieval algorithm (PRA) propagated in fractional Hartley transform (FrHT) to extract two phase-only masks (POMs) is proposed. PRA is based on iterative phase mask which uses nonlinear process to generate POMs which in turn makes the system immune to chosen plaintext attack (CPA) and known plaintext attack (KPA). Random amplitude mask (RAM) and random phase mask (RPM) are used as encryption keys which makes the system immune to special attack. Further multiple level of security leads to the achievement of non-convergence of MSE and good performance in the retrieval process. Apart from encrypting the information, authentication has also been included in the scheme. The features incorporated in any plaintext have been shown to provide unique signatures, which can be used to verify their authenticity. The content of the original images can be authenticated only if the authentication key is correct. The robustness of the proposed multiple level cryptosystem has been examined based on various parameters by simulating on MATLAB 9.4.0 (R2018a). The experimental results highlight the suitability and shows the attacker cannot recover the original image without the knowledge of POMs. The scheme has also been compared with similar algorithms which proves that the proposed two-level scheme is more secure, feasible and effective.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Matoba O, Nomura T, Perez-Cabre E, Millan MS, Javidi B (2009) Optical techniques for information security. Proc IEEE 97:1128–1148

    Google Scholar 

  2. Alfalou A, Brosseau C (2009) Optical image compression and encryption methods. Adv Opt Photon 1:589–636

    Google Scholar 

  3. Millan M S and Perez-Cabre E, (2011) Optical data encryption, optical and digital image processing: fundamentals and applications, G. Cristobal P. Schelkens and H. Thienpont, eds (Wiley), 739-767

  4. Refregier P, Javidi B (1995) Optical image encryption based on input plane and Fourier plane random encoding. Opt Lett 20:767–769

    Google Scholar 

  5. Unnikrishnan G, Joseph J, Singh K (2000) Optical encryption by double random phase encoding in the fractional Fourier domain, opt. Lett 25:887–889

    Google Scholar 

  6. Liu X, Mei W, Du H (2014) Optical image encryption based on compressive sensing and chaos in the fractional Fourier domain. J Mod Opt 61(19):1570–1577

    Google Scholar 

  7. Singh H (2016) Optical cryptosystem of color images using random phase masks in the fractional wavelet transform domain. In AIP conference proceedings, 1728, 020063-1/4

  8. Situ G, Zhang J (2004) Double random-phase encoding in the Fresnel domain. Opt Lett 29:1584–1586

    Google Scholar 

  9. Singh H, Yadav AK, Vashisth S, Singh K (2015) Optical image encryption using devil’s vortex Toroidal lens in the Fresnel transform domain. International J of Opt 926135:1–13

    Google Scholar 

  10. Singh H, Yadav AK, Vashisth S, Singh K (2015) Double phase-image encryption using gyrator transforms, and structured phase mask in the frequency plane. Opt Lasers Eng 67:145–156

    Google Scholar 

  11. Chen L, Zhao D (2006) Optical image encryption with Hartley transforms. Opt Lett 31:3438–3440

    Google Scholar 

  12. Zhou N, Wang Y, Gong L (2011) Novel optical image encryption scheme based on fractional Mellin transform. Opt Commun 284:3234–3242

    Google Scholar 

  13. Zhou N, Li H, Wang D, Pan S, Zhou Z (2015) Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform. Opt Commun 343:10–21

    Google Scholar 

  14. Kumar P, Joseph J, Singh K (2016) Double random phase encoding based optical encryption systems using some linear canonical transforms: weaknesses and countermeasures. Springer series in Optical Sciences 198:367–396

    MathSciNet  MATH  Google Scholar 

  15. Carnicer A, Montes-U M, Arcos S, Juvells I (2005) Vulnerability to chosen–ciphertext attacks of optical encryption schemes based on double random phase keys. Opt Lett 30:1644–1646

    Google Scholar 

  16. Peng X, Peng Z, Wei H, Yu B (2006) Known-plaintext attack on optical encryption based on double random phase keys. Opt Lett 31:1044–1046

    Google Scholar 

  17. Li G, Yang W, Li D, Situ G (2017) Cyphertext-only attack on the double random-phase encryption: experimental demonstration. Opt Exp 25(8):8690–8697

    Google Scholar 

  18. Qin W, Peng X (2010) Asymmetric cryptosystem based on phase-truncated Fourier transforms. Opt Lett 35:118–120

    Google Scholar 

  19. Wang X, Zhao D (2011) Multiple-image encryption based on nonlinear amplitude-truncation and phase-truncation in Fourier domain. Opt Commun 284:148–152

    Google Scholar 

  20. Rajput SK, Nishchal NK (2012) Image encryption based on interference that uses fractional Fourier domains asymmetric keys. Appl Opt 51:1446–1452

    Google Scholar 

  21. Ding X, Deng X, Song K, Chen G (2013) Security improvement for asymmetric cryptosystem based on spherical wave illumination. Appl Opt 52(3):467–473

    Google Scholar 

  22. Liu W, Liu Z, Liu S (2013) Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang-Gu algorithm. Opt Lett 38:1651–1653

    Google Scholar 

  23. Wang X, Zhao D (2012) A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms. Opt Commun 285:6,1078–1081

    Google Scholar 

  24. Wang X, Zhao D (2012) Double images encryption method with resistance against the specific attack based on an asymmetric algorithm. Opt Express 20(11):11994–12003

    Google Scholar 

  25. Xiaopeng D (2014) A hybrid attack on ‘double images encryption method with resistance against the specific attack based on an asymmetric algorithm. Opt Commun 317:7–12

    Google Scholar 

  26. Mehra I, Rajput SK, Nishchal NK (2014) Cryptanalysis of an image encryption scheme based on joint transform correlator with amplitude and phase truncation approach. Opt Laser Eng 52:167–173

    Google Scholar 

  27. Wang Y, Quan C, Tay CJ (2016) New method of attack and security enhancement on an asymmetric cryptosystem based on equal modulus decomposition. Appl Opt 55(4):679–686

    Google Scholar 

  28. Singh H (2017) Nonlinear optical double image encryption using random-vortex in fractional Hartley transform domain. Opt Appl 47(4):557–578

    Google Scholar 

  29. Khurana M, Singh H (2017) An asymmetric image encryption based on phase truncated hybrid transform. 3D Research 8(28):1–17

    Google Scholar 

  30. Maan P, Singh H (2018) Non-linear cryptosystem for image encryption using radial Hilbert mask in fractional Fourier transform domain. 3D Research 9(53):1–12

    Google Scholar 

  31. Khurana M, Singh H (2019) A spiral-phase rear mounted triple masking for secure optical image encryption based on gyrator transform. Recent patents on Computer Science 12(2):80–84

    Google Scholar 

  32. Xiong Y, He A, Quan C (2018) Security analysis of a double-image encryption technique based on an asymmetric algorithm. J. Opt Soc Am A 35(2):320–326

    Google Scholar 

  33. Xiong Y, He A, Quan C (2018) Hybrid attack on an optical cryptosystem based on phase-truncated Fourier transforms and a random amplitude mask. Appl Opt 57(21):6010–6016

    Google Scholar 

  34. Zalevsky Z, Mendlovic D, Dorsch RG (1996) Gerchberg Saxton algorithm applied in the fractional Fourier or the Fresnel domain. Opt Lett 21:842–844

    Google Scholar 

  35. Hwang HE, Chang HT, Lie WN (2009) Multiple-image encryption and multiplexing using a modified Gerchberg-Saxton algorithm and phase modulation in Fresnel-transform domain. Opt Lett 34:3917–3919

    Google Scholar 

  36. Deng X, Zhao D (2012) Multiple-image encryption using phase retrieve algorithm and intermodulation in Fourier domain opt. Laser Technol 44:374–377

    Google Scholar 

  37. Wang X, Zhao D (2013) Amplitude-phase retrieval attack free cryptosystem based on direct attack to phase-truncated Fourier transform-based encryption using a random amplitude mask. Opt Lett 38:3684–3686

    Google Scholar 

  38. Chen W, Chen X (2014) Optical multiple-image authentication based on modified Gerchberg–Saxton algorithm with random sampling opt. Commun. 318:128–132

    Google Scholar 

  39. Wang X, Chen W, Chen X (2014) Fractional Fourier domain optical image hiding using phase retrieval algorithm based on iterative nonlinear double random phase encoding. opt. Exp. 22:22981–22995

    Google Scholar 

  40. Liu Z, Guo C, Tan J, Wu Q, Pan L, Liu S (2015) Iterative phase-amplitude retrieval with multiple intensity images at output plane of gyrator transforms. J. Opt. 17:025701

    Google Scholar 

  41. Sui L, Zhang X, Tian A (2017) Optical multiple-image authentication scheme based on the phase retrieval algorithm in gyrator domain. J Opt 19(055702):1–14

    Google Scholar 

  42. Chen L, Chang G, He B, Mao H, Zhao D (2017) Optical image conversion and encryption by diffraction, phase retrieval algorithm and incoherent superposition. Opt. Laser Eng. 88:221–232

    Google Scholar 

  43. Rajput SK, Nishchal NK (2014) An optical encryption and authentication scheme using asymmetric keys. J Opt Soc Am A 31:1233–1238

    Google Scholar 

  44. Wang Q, Alfalou A, Brosseau C (2016) Security enhanced multiple-image authentication based on cascaded optical interference and sparse phase mixed encoding. opt. Commun. 372:144–154

    Google Scholar 

  45. Wang Q, Alfalou A and Brosseau C (2016) Optical multiple image authentication based on cascaded phase filtering structure Proc. SPIE, Optics and Photonics for Counterterrorism, Crime Fighting, and Defence XII, 9995, 999503–1/4

  46. Fan D, Meng X, Wang Y, Yang X, Pan X, Peng X, He W, Dong G, Cheng H (2015) Multiple-image authentication with a cascaded multilevel architecture based on amplitude field random sampling and phase information multiplexing. Appl. Opt. 54:3204–3215

    Google Scholar 

  47. Vashisth S, Yadav AK, Singh H, Singh K (2015) Watermarking in gyrator domain using an asymmetric cryptosystem. Proc SPIE 9654:96542E–9651/8

    Google Scholar 

  48. Abuturab MR (2015) Gyrator wavelet transform based non-linear multiple single channel information fusion authentication. Opt Commun 355:462–478

    Google Scholar 

  49. Yadav AK, Vashisth S, Singh H, Singh K (2015) A phase-image watermarking scheme in gyrator domain using devil’s vortex Fresnel lens as a phase mask. Opt Commun 344:172–180

    Google Scholar 

  50. Girija R, Singh H (2018) A cryptosystem based on deterministic phase masks and fractional Fourier transform deploying singular value decomposition. opt. Quantum Electronics 50(210):1–24

    Google Scholar 

  51. Yadav P, Singh H (2018) Optical double image hiding in the fractional Hartley transform using structured phase filter and Arnold transform. 3D Research 9(20):1–20

    Google Scholar 

  52. Zhao D, Li X, Chen L (2008) Optical image encryption with redefined fractional Hartley transform. Opt Commun 281(21):5326–5329

    Google Scholar 

  53. Xinxin L, Daomu Z (2010) Optical color image encryption with redefined fractional Hartley transform. Optik – International Journal for Light and Electron Optics 121(7):673–677

    Google Scholar 

  54. Girija R and Singh H (2018) Enhancing security of double random phase encoding based on random S-box, 3D research, 9:15 (1-20).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mehak Khurana.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Khurana, M., Singh, H. Two level phase retrieval in fractional Hartley domain for secure image encryption and authentication using digital signatures. Multimed Tools Appl 79, 13967–13986 (2020). https://doi.org/10.1007/s11042-020-08658-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-08658-3

Keywords

Navigation