Abstract
A novel image authentication scheme based on two level phase retrieval algorithm (PRA) propagated in fractional Hartley transform (FrHT) to extract two phase-only masks (POMs) is proposed. PRA is based on iterative phase mask which uses nonlinear process to generate POMs which in turn makes the system immune to chosen plaintext attack (CPA) and known plaintext attack (KPA). Random amplitude mask (RAM) and random phase mask (RPM) are used as encryption keys which makes the system immune to special attack. Further multiple level of security leads to the achievement of non-convergence of MSE and good performance in the retrieval process. Apart from encrypting the information, authentication has also been included in the scheme. The features incorporated in any plaintext have been shown to provide unique signatures, which can be used to verify their authenticity. The content of the original images can be authenticated only if the authentication key is correct. The robustness of the proposed multiple level cryptosystem has been examined based on various parameters by simulating on MATLAB 9.4.0 (R2018a). The experimental results highlight the suitability and shows the attacker cannot recover the original image without the knowledge of POMs. The scheme has also been compared with similar algorithms which proves that the proposed two-level scheme is more secure, feasible and effective.
Similar content being viewed by others
References
Matoba O, Nomura T, Perez-Cabre E, Millan MS, Javidi B (2009) Optical techniques for information security. Proc IEEE 97:1128–1148
Alfalou A, Brosseau C (2009) Optical image compression and encryption methods. Adv Opt Photon 1:589–636
Millan M S and Perez-Cabre E, (2011) Optical data encryption, optical and digital image processing: fundamentals and applications, G. Cristobal P. Schelkens and H. Thienpont, eds (Wiley), 739-767
Refregier P, Javidi B (1995) Optical image encryption based on input plane and Fourier plane random encoding. Opt Lett 20:767–769
Unnikrishnan G, Joseph J, Singh K (2000) Optical encryption by double random phase encoding in the fractional Fourier domain, opt. Lett 25:887–889
Liu X, Mei W, Du H (2014) Optical image encryption based on compressive sensing and chaos in the fractional Fourier domain. J Mod Opt 61(19):1570–1577
Singh H (2016) Optical cryptosystem of color images using random phase masks in the fractional wavelet transform domain. In AIP conference proceedings, 1728, 020063-1/4
Situ G, Zhang J (2004) Double random-phase encoding in the Fresnel domain. Opt Lett 29:1584–1586
Singh H, Yadav AK, Vashisth S, Singh K (2015) Optical image encryption using devil’s vortex Toroidal lens in the Fresnel transform domain. International J of Opt 926135:1–13
Singh H, Yadav AK, Vashisth S, Singh K (2015) Double phase-image encryption using gyrator transforms, and structured phase mask in the frequency plane. Opt Lasers Eng 67:145–156
Chen L, Zhao D (2006) Optical image encryption with Hartley transforms. Opt Lett 31:3438–3440
Zhou N, Wang Y, Gong L (2011) Novel optical image encryption scheme based on fractional Mellin transform. Opt Commun 284:3234–3242
Zhou N, Li H, Wang D, Pan S, Zhou Z (2015) Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform. Opt Commun 343:10–21
Kumar P, Joseph J, Singh K (2016) Double random phase encoding based optical encryption systems using some linear canonical transforms: weaknesses and countermeasures. Springer series in Optical Sciences 198:367–396
Carnicer A, Montes-U M, Arcos S, Juvells I (2005) Vulnerability to chosen–ciphertext attacks of optical encryption schemes based on double random phase keys. Opt Lett 30:1644–1646
Peng X, Peng Z, Wei H, Yu B (2006) Known-plaintext attack on optical encryption based on double random phase keys. Opt Lett 31:1044–1046
Li G, Yang W, Li D, Situ G (2017) Cyphertext-only attack on the double random-phase encryption: experimental demonstration. Opt Exp 25(8):8690–8697
Qin W, Peng X (2010) Asymmetric cryptosystem based on phase-truncated Fourier transforms. Opt Lett 35:118–120
Wang X, Zhao D (2011) Multiple-image encryption based on nonlinear amplitude-truncation and phase-truncation in Fourier domain. Opt Commun 284:148–152
Rajput SK, Nishchal NK (2012) Image encryption based on interference that uses fractional Fourier domains asymmetric keys. Appl Opt 51:1446–1452
Ding X, Deng X, Song K, Chen G (2013) Security improvement for asymmetric cryptosystem based on spherical wave illumination. Appl Opt 52(3):467–473
Liu W, Liu Z, Liu S (2013) Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang-Gu algorithm. Opt Lett 38:1651–1653
Wang X, Zhao D (2012) A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms. Opt Commun 285:6,1078–1081
Wang X, Zhao D (2012) Double images encryption method with resistance against the specific attack based on an asymmetric algorithm. Opt Express 20(11):11994–12003
Xiaopeng D (2014) A hybrid attack on ‘double images encryption method with resistance against the specific attack based on an asymmetric algorithm. Opt Commun 317:7–12
Mehra I, Rajput SK, Nishchal NK (2014) Cryptanalysis of an image encryption scheme based on joint transform correlator with amplitude and phase truncation approach. Opt Laser Eng 52:167–173
Wang Y, Quan C, Tay CJ (2016) New method of attack and security enhancement on an asymmetric cryptosystem based on equal modulus decomposition. Appl Opt 55(4):679–686
Singh H (2017) Nonlinear optical double image encryption using random-vortex in fractional Hartley transform domain. Opt Appl 47(4):557–578
Khurana M, Singh H (2017) An asymmetric image encryption based on phase truncated hybrid transform. 3D Research 8(28):1–17
Maan P, Singh H (2018) Non-linear cryptosystem for image encryption using radial Hilbert mask in fractional Fourier transform domain. 3D Research 9(53):1–12
Khurana M, Singh H (2019) A spiral-phase rear mounted triple masking for secure optical image encryption based on gyrator transform. Recent patents on Computer Science 12(2):80–84
Xiong Y, He A, Quan C (2018) Security analysis of a double-image encryption technique based on an asymmetric algorithm. J. Opt Soc Am A 35(2):320–326
Xiong Y, He A, Quan C (2018) Hybrid attack on an optical cryptosystem based on phase-truncated Fourier transforms and a random amplitude mask. Appl Opt 57(21):6010–6016
Zalevsky Z, Mendlovic D, Dorsch RG (1996) Gerchberg Saxton algorithm applied in the fractional Fourier or the Fresnel domain. Opt Lett 21:842–844
Hwang HE, Chang HT, Lie WN (2009) Multiple-image encryption and multiplexing using a modified Gerchberg-Saxton algorithm and phase modulation in Fresnel-transform domain. Opt Lett 34:3917–3919
Deng X, Zhao D (2012) Multiple-image encryption using phase retrieve algorithm and intermodulation in Fourier domain opt. Laser Technol 44:374–377
Wang X, Zhao D (2013) Amplitude-phase retrieval attack free cryptosystem based on direct attack to phase-truncated Fourier transform-based encryption using a random amplitude mask. Opt Lett 38:3684–3686
Chen W, Chen X (2014) Optical multiple-image authentication based on modified Gerchberg–Saxton algorithm with random sampling opt. Commun. 318:128–132
Wang X, Chen W, Chen X (2014) Fractional Fourier domain optical image hiding using phase retrieval algorithm based on iterative nonlinear double random phase encoding. opt. Exp. 22:22981–22995
Liu Z, Guo C, Tan J, Wu Q, Pan L, Liu S (2015) Iterative phase-amplitude retrieval with multiple intensity images at output plane of gyrator transforms. J. Opt. 17:025701
Sui L, Zhang X, Tian A (2017) Optical multiple-image authentication scheme based on the phase retrieval algorithm in gyrator domain. J Opt 19(055702):1–14
Chen L, Chang G, He B, Mao H, Zhao D (2017) Optical image conversion and encryption by diffraction, phase retrieval algorithm and incoherent superposition. Opt. Laser Eng. 88:221–232
Rajput SK, Nishchal NK (2014) An optical encryption and authentication scheme using asymmetric keys. J Opt Soc Am A 31:1233–1238
Wang Q, Alfalou A, Brosseau C (2016) Security enhanced multiple-image authentication based on cascaded optical interference and sparse phase mixed encoding. opt. Commun. 372:144–154
Wang Q, Alfalou A and Brosseau C (2016) Optical multiple image authentication based on cascaded phase filtering structure Proc. SPIE, Optics and Photonics for Counterterrorism, Crime Fighting, and Defence XII, 9995, 999503–1/4
Fan D, Meng X, Wang Y, Yang X, Pan X, Peng X, He W, Dong G, Cheng H (2015) Multiple-image authentication with a cascaded multilevel architecture based on amplitude field random sampling and phase information multiplexing. Appl. Opt. 54:3204–3215
Vashisth S, Yadav AK, Singh H, Singh K (2015) Watermarking in gyrator domain using an asymmetric cryptosystem. Proc SPIE 9654:96542E–9651/8
Abuturab MR (2015) Gyrator wavelet transform based non-linear multiple single channel information fusion authentication. Opt Commun 355:462–478
Yadav AK, Vashisth S, Singh H, Singh K (2015) A phase-image watermarking scheme in gyrator domain using devil’s vortex Fresnel lens as a phase mask. Opt Commun 344:172–180
Girija R, Singh H (2018) A cryptosystem based on deterministic phase masks and fractional Fourier transform deploying singular value decomposition. opt. Quantum Electronics 50(210):1–24
Yadav P, Singh H (2018) Optical double image hiding in the fractional Hartley transform using structured phase filter and Arnold transform. 3D Research 9(20):1–20
Zhao D, Li X, Chen L (2008) Optical image encryption with redefined fractional Hartley transform. Opt Commun 281(21):5326–5329
Xinxin L, Daomu Z (2010) Optical color image encryption with redefined fractional Hartley transform. Optik – International Journal for Light and Electron Optics 121(7):673–677
Girija R and Singh H (2018) Enhancing security of double random phase encoding based on random S-box, 3D research, 9:15 (1-20).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Khurana, M., Singh, H. Two level phase retrieval in fractional Hartley domain for secure image encryption and authentication using digital signatures. Multimed Tools Appl 79, 13967–13986 (2020). https://doi.org/10.1007/s11042-020-08658-3
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-08658-3