Advertisement

Optical image asymmetric cryptosystem using fingerprint based on iterative fraction Fourier transform

  • Hang Chen
  • Camel Tanougast
  • Zhengjun Liu
  • Loic Sieler
  • Harry Ramenah
Article

Abstract

A novel asymmetric cryptosystem for optical image is proposed using fingerprint based on iterative fractional Fourier transform. To enhance the security, a hyperchaotic phase generated by a 4D Lorenz system is considered as the public key in the proposed encryption system, while the private key is emerged by the retrieved phase and fingerprint. In the encryption process, the secret information is hid into the hyperchaotic phase. Subsequently, the private key can be obtained by a reversible operation. To decrypt the original image, the ciphertext and private key are imported into the input plane of fractional Fourier system. This system is also applicable for information authentication because the fingerprint is used both in encryption and decryption approach. Some numerical simulations have been done to test the validity and capability of the encryption system.

Keywords

Image encryption Cryptography Optical transform 

Notes

Acknowledgements

This work was supported by the National Natural Science Foundation of China (Grant 61575053), the Fundamental Research Funds for the Central Universities (No. HIT.BRETIII.201406), the Program for New Century Excellent Talents in University (NCET-12-0148), and the China Postdoctoral Science Foundation (2013M540278). The authors wish to thanks Mr. Chengwei Yang in Baicheng Ordnance Test Center of China for the valuable discussion. The authors are indebted to the two anonymous for their helpful comments.

References

  1. Abuturab, M.R.: Color image security system based on discrete Hartley transform in gyrator transform domain. Opt. Lasers Eng. 51, 317–324 (2013)CrossRefGoogle Scholar
  2. Abuturab, M.R.: An asymmetric single-channel color image encryption based on Hartley transform and gyrator transform. Opt. Lasers Eng. 69, 49–57 (2015)CrossRefGoogle Scholar
  3. Azoug, S.E., Bouguezel, S.: A non-linear preprocessing for opto-digital image encryption using multiple-parameter discrete fractional Fourier transform. Opt. Commun. 359, 85–94 (2016)ADSCrossRefGoogle Scholar
  4. Chen, W., Chen, X.: Optical color image encryption based on an asymmetric cryptosystem in the Fresnel domain. Opt. Commun. 284, 3913–3917 (2011)ADSCrossRefGoogle Scholar
  5. Chen, W., Chen, X., Sheppard, C.J.R.: Optical color-image encryption and synthesis using coherent diffractive imaging in the Fresnel domain. Opt. Express 20, 3853–3865 (2012)ADSCrossRefGoogle Scholar
  6. Chen, H., Du, X., Liu, Z., Yang, C.: Optical color image hiding scheme by using Gerchberg-Saxton algorithm in fractional Fourier domain. Opt. Lasers Eng. 66, 144–151 (2015)CrossRefGoogle Scholar
  7. Chen, H., Tanougast, C., Liu, Z., et al.: Securing color image by using hyperchaotic system in gyrator transform domains. Opt. Quant. Electron. 48(8), 396–408 (2016a)CrossRefGoogle Scholar
  8. Chen, H., Du, X., Liu, Z.: Optical hyperspectral data encryption in spectrum domain by using 3D Arnold and gyrator transforms. Spectrosc. Lett. 49, 103–107 (2016b)ADSCrossRefGoogle Scholar
  9. Guo, Q., Guo, J., Liu, Z., Liu, S.: An adaptive watermarking using fractal dimension based on random fractional Fourier transform. Opt. Laser Tech. 44, 124–129 (2012)ADSCrossRefGoogle Scholar
  10. Johnson, E.G., Brasher, J.D.: Phase encryption of biometrics in diffractive optical elements. Opt. Lett. 21, 1271–1273 (1996)ADSCrossRefGoogle Scholar
  11. Li, H., Wang, Y.: Double-image encryption based on iterative gyrator transform. Opt. Commun. 281, 5745–5749 (2008)ADSCrossRefGoogle Scholar
  12. Liu, Z., Liu, S.: Random fractional Fourier transform. Opt. Lett. 32, 2088–2090 (2007a)ADSCrossRefGoogle Scholar
  13. Liu, Z., Liu, S.: Double image encryption based on iterative fractional Fourier transform. Opt. Commun. 275, 324–329 (2007b)ADSCrossRefGoogle Scholar
  14. Liu, Z., Chen, H., Liu, T., Li, P., Dai, J., Sun, X., Liu, S.: Double-image encryption based on the affine transform and the gyrator transform. J. Opt. 12, 035407 (2010a)ADSCrossRefGoogle Scholar
  15. Liu, Z., Xu, L., Guo, Q., Lin, C., Liu, S.: Image watermarking by using phase retrieval algorithm in gyrator transform domain. Opt. Commun. 283, 4923–4927 (2010b)ADSCrossRefGoogle Scholar
  16. Liu, W., Liu, Z., Liu, S.: Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang–Gu algorithm. Opt letters 38, 1651–1653 (2013)ADSCrossRefGoogle Scholar
  17. Liu, Z., Guo, C., Tan, J., et al.: Securing color image by using phase-only encoding in Fresnel domains. Opt. Lasers Eng. 68, 87–92 (2015)CrossRefGoogle Scholar
  18. Lohmann, A.W.: Image rotation, Wigner rotation, and the fractional Fourier transform. J. Opt. Soc. Am. A 10, 2181–2186 (1993)ADSCrossRefGoogle Scholar
  19. Mehra, I., Nishchal, N.K.: Optical asymmetric watermarking using modified wavelet fusion and diffractive imaging. Opt. Lasers Eng. 68, 74–82 (2015)CrossRefGoogle Scholar
  20. Meng, X.F., Cai, L.Z., Xu, X.F., Yang, X.L., Shen, X.X., Dong, G.Y., Wang, Y.R.: Two-step phase shifting interferometry and its application in image encryption. Opt. Lett. 31, 1414–1416 (2006)ADSCrossRefGoogle Scholar
  21. Ozaktas, H.M., Kutay, M.A., Zalevsky, Z.: The fractional Fourier transform with applications in optics and signal processing. Wiley, New York (2001)Google Scholar
  22. Peng, X., Zhang, P., Wei, H., Yu, B.: Known-plaintext attack on optical encryption based on double random phase keys. Opt. Lett. 31, 1044–1046 (2006a)ADSCrossRefGoogle Scholar
  23. Peng, X., Wei, H., Zhang, P.: Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain. Opt. Lett. 31, 3261–3263 (2006b)ADSCrossRefGoogle Scholar
  24. Rajput, S.K., Nishchal, N.K.: Fresnel domain nonlinear optical image encryption scheme based on Gerchberg–Saxton phase-retrieval algorithm. Appl. Opt. 53, 418–425 (2014a)ADSCrossRefGoogle Scholar
  25. Rajput, S.K., Nishchal, N.K.: Fresnel domain nonlinear optical image encryption scheme based on Gerchberg–Saxton phase-retrieval algorithm. Appl. Opt. 53, 418–425 (2014b)ADSCrossRefGoogle Scholar
  26. Refregier, P., Javidi, B.: Optical image encryption based on input plane and Fourier plane random encoding. Opt. Lett. 20, 767–769 (1995)ADSCrossRefGoogle Scholar
  27. Situ, G.H., Zhang, J.J.: Double random-phase encoding in the Fresnel domain. Opt. Lett. 29, 1584–1586 (2004)ADSCrossRefGoogle Scholar
  28. Sui, L., Liu, B., Wang, Q., Li, Y., Liang, J.: Double-image encryption based on Yang–Gu mixture amplitude-phase retrieval algorithm and high dimension chaotic system in gyrator domain. Opt. Commun. 354, 184–196 (2015)ADSCrossRefGoogle Scholar
  29. Unnikrishnan, G., Joseph, J., Singh, K.: Optical encryption by double-random phase encoding in the fractional Fourier domain. Opt. Lett. 25, 887–889 (2000)ADSCrossRefGoogle Scholar
  30. Wang, R., Watson, I., Chatwin, C.: Random phase encoding for optical security. Opt. Eng. 35, 2464–2469 (1996)ADSCrossRefGoogle Scholar
  31. Wang, Q., Guo, Q., Lei, L., Zhou, J.: Optical interference-based image encryption using circular harmonic expansion and spherical illumination in gyrator transform domain. Opt. Commun. 346, 124–132 (2015)ADSCrossRefGoogle Scholar
  32. Yan, A., Poon, T.C., Hu, Z., et al.: Optical image encryption using optical scanning and fingerprint keys. J. Mod. Opt. 63(3), S38–S43 (2016)ADSCrossRefGoogle Scholar
  33. Zhao, T., Ran, Q., Yuan, L., et al.: Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography. Opt. Lasers Eng. 72, 12–17 (2015)CrossRefGoogle Scholar
  34. Zhao, T., Ran, Q., Yuan, L., Chi, Y., Ma, J.: Optical image encryption using password key based on phase retrieval algorithm. J. Mod. Opt. 63, 771–776 (2016)ADSCrossRefGoogle Scholar
  35. Zhou, N., Hua, T., Gong, L.: Quantum image encryption based on generalized Arnold transform and double random-phase encoding. Quantum Inf. Process. 14, 1193–1213 (2015)ADSMathSciNetCrossRefMATHGoogle Scholar
  36. Zhu, N., Wang, Y., Liu, J., Xie, J., Zhang, H.: Optical image encryption based on interference of polarized light. Opt. Express 17, 13418–13424 (2009)ADSCrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2017

Authors and Affiliations

  • Hang Chen
    • 1
    • 2
  • Camel Tanougast
    • 1
  • Zhengjun Liu
    • 2
  • Loic Sieler
    • 1
  • Harry Ramenah
    • 1
  1. 1.Laboratoire Conception Optimisation et Modélisation des SystèmsUniversity de LorraineMetzFrance
  2. 2.Department of Automation Measurement and ControlHarbin Institute of TechnologyHarbinChina

Personalised recommendations