Asian Journal of Physics Vol 32, Nos 5 – 8 (2023) 385-397

An asymmetric cryptosystem using deterministic phase masks, double random phase encoding, orthogonal encoding and decoding, and fractional Fourier transform

R Girija1, H Singh2, and Kehar Singh3
1Department of Computer Science & Engineering,
Manav Rachna International Institute of Research and Studies, Faridabad-121 004, India.

2Department of Applied Sciences, The NorthCap University, Gurugram-122 017, India
3Optics and Photonics Center, Indian Institute of Technology Delhi, New Delhi-110 016, India
Dedicated in memory of Prof John Sheridan


A Double Random Phase Encoding (DRPE) scheme has been proposed based on the use of deterministic phase masks, the fractional Fourier transform, and orthogonal encoding and decoding. In the proposed scheme, grey images are encrypted using an asymmetric cryptosystem. In order to convert the encrypted information to encoded information, Hadamard matrix with orthogonal property is used. In place of traditional masks, deterministic phase masks have been employed. Together with the use of orthogonal encoding, security of the proposed system is enhanced albeit at the cost of slight complication. The orthogonal encoding comprises only modest linear actions and is easy to implement. Numerous simulation results are provided in order to validate the proposed cryptosystem. Results have been provided for the mean-squared-error, peak signal-to-noise ratio, correlation-coefficient, histogram analysis, entropy, and sensitivity. © Anita Publications. All rights reserved.
Keywords: Deterministic phase masks, Orthogonal encoding and decoding, Hadamard Matrix, Fractional Fourier transform.


Peer Review Information
Method: Single- anonymous; Screened for Plagiarism? Yes
Buy this Article in Print © Anita Publications. All rights reserve

References

  1. Schneir B, Applied Cryptography: Protocols, Algorithms, and Source Code in C (2nd ed. John Wiley Hoboken, NJ USA, 1996)
  2. Stallings W, Cryptography and Network Security: Principles and Practice, 2nd edn, (Prentice Hall, Hoboken NJ USA), 2000.
  3. Singh K, Unnikrishnana G, Nishchal N K, Photorefractive Processing for Data Security, Proc SPIE Vol 4803, pp 205-219, in ‘Photorefractive Fibers and Crystal Devices: Materials, Optical Properties, and Applications VII’ (SPIE Press Bellingham WA, USA), 2002.
  4. Javidi B (Ed), Optical and Digital Techniques for Information Security, (Springer Berlin), 2005.
  5. Naughton T J, Sheridan J T, Optics in Information Systems, SPIE Int’l Techn Group Newsletter, 16(2005)1–12.
  6. Singh K, John R, Joseph J, Encrypted holographic memories for information security, Bull Laser Spectrosc Soc, India, 15(2005-6)1–19.
  7. Matoba O, Nomura T, Perez-Cabre E, Millan M S, Javidi B, Optical techniques for information security, Proc IEEE, 97(2009)1128–1148.
  8. Al Falou A, Brosseau C, Optical image compression and encryption methods, Adv Opt Photon, 1(2009)589–636.
  9. Kumar A, Singh M, Singh K, Speckle coding for optical and digital data security applications, In Advances in Speckle Metrology and Related Techniques, Chap 6, pp 239–299, (Ed) Kaufmann G, (Wiley-VCH Weinheim, Germany), 2011.
  10. Liu S, Guo C, Sheridan J T. A review of optical image encryption techniques, Opt Laser Technol, 57(2014)327–342.
  11. Chen W, Javidi B, Chen X, Advances in optical security systems, Adv Opt Photon, 6(2014)120–155.
  12. Yadav A K, Vashisth S, Singh H, Singh K, Optical cryptography and watermarking using some fractional canonical transforms and structured masks, in Advances in Optical Science and Engineering, Lakshminarayanan V, Bhattacharya I, (Eds), Chap 5, pp 25–36, Springer Proceedings in Physics 166, (Springer India), 2015,
  13. Al Falou A, Situ G, Peng X, He W, Rastogi P, 3DIM-DS 2015: Optical image processing in the context of 3D imaging, metrology, and data security, Opt Lasers Eng, 89(2015)1–202 (Special issue).
  14. Kumar P, Joseph J, Singh K, Double random phase encoding based optical encryption systems using some linear canonical transforms: weaknesses and countermeasures. In: Healy J, Kutay A, Ozaktas M, Sheridan J (eds), Linear Canonical Transforms. Springer Series in Optical Sciences, 198, (Springer New York), 2016, pp. 367–396.
  15. Javidi B, Carnicer A, Yamaguchi M, Nomura T, Pérez-Cabré E, Millán M S, Nishchal N K, Torroba R, Barrera J F, He W, Peng X, Stern A, Rivenson Y, Alfalou A, Brosseau C, Guo C, Sheridan J T, Situ G, Naruse M, Matsumoto T, Juvells I, Tajahuerce E, Lancis J, Chen W, Chen X, Pinkse Pepijn W H, Mosk A P, Markman A, Roadmap on optical security, J Opt (IOP), 18(2016)1–39.
  16. Singh K, Photorefractive optical cryptography: a personal tour, In Advances in Optical Science and Engineering’ Springer Proceedings in Physics194, (Eds) Bhattacharya I, Chakrabarti S, Reehal H S, Lakshminarayanan, (Springer Nature Singapore Pvt Ltd), 2017.
  17. Al Falou A (Ed), Advanced Secure Optical Image Processing for Communications, (IOP Publ, Bristol, U K), 2018.
  18. Singh P, Yadav A K, Vashisth S, Singh K, Review of optical image encryption schemes based on fractional Hartley transform, Asian J Phys, 28(2019)701–716.
  19. Nishchal N K, Optical Cryptosystems, IOP Publishing, (Bristol, UK), 2019,
  20. Muniraj I, Sheridan J T, Optical Encryption and Decryption, (SPIE Press Bellingham WA USA), 2019.
  21. Zamrani W, Ahouzi E, Lizana A, Campos J, Yzuel M J: Optical image encryption technique based on deterministic phase masks, Opt Eng, 55(2016); doi.org/10.1117/1.OE.55.10.103108.
  22. Girija R, Singh H, A cryptosystem based on deterministic phase masks and fractional Fourier transform deploying singular value decomposition, Opt Quant Electron, 50, 210 (2018); doi: 10.1007/s11082-018-1472-6.
  23. Garcia J, Mas D, Dorsch R G, Fractional-Fourier-transform calculation through the fast-Fourier-transform algorithm, Appl Opt, 35(1996)7013–7018.
  24. Ozaktas H M, Zalevsky Z, Kutay M A, The Fractional Fourier Transform with Applications in Optics and Signal Processing, (Wiley Chechester), 2001.
  25. Unnikrishnan G, Singh K, Optical encryption by double-random phase encoding in the fractional Fourier domain, Opt Lett, 25(2000)887–889.
  26. Hennelly B M, Sheridan J T, Image encryption and the fractional Fourier transform, Optik, 114(2003)251–265.
  27. Zhou N, Dong T, Wu J, Novel image encryption algorithm based on multiple-parameter discrete fractional random transform, Opt Commun, 283(2010)3037–3042.
  28. Lee I, Cho M, Double random phase encryption based orthogonal encoding technique for color images, J Opt Soc Korea, 18(2014)129–133.
  29. Sylvester J J, Thoughts on orthogonal matrices, simultaneous sign successions, and tessalated pavements in two or more colours, with applications to Newton’s rule, ornamental tile work, and the theory of numbers, Phil Mag, 34(1867)461–475.
  30. Girija R, Singh H, Triple-level cryptosystem using deterministic masks and modified Gerchberg-Saxton iterative algorithm in fractional Hartley domain by positioning singular value decomposition, Optik, 187(2019)238–257.
  31. Girija R, Singh H, Abirami G, Cryptanalysis of DRPE using complex S-Box based on linear canonical transform, Multimed Tools Appl, 82(2023)12151–12166.
  32. Girija R, Singh H, Symmetric cryptosystem based on chaos structured phase masks and equal modulus decomposition using fractional Fourier transform, 3D Res, 9(2018); doi.org/10.1007/s13319-018-0192-9.
  33. Girija R, Singh H, An asymmetric cryptosystem based on the random weighted singular value decomposition and fractional Hartley domain, Multimed Tools Appl, 79(2020)34717–34735.
  34. Girija, R, Singh, H, Abirami, G. Optical medical image encryption based on digital hologram in various domains. J Opt, (2023), doi.org/10.1007/s12596-023-01186-x.
  35. Mandapati V C, Vardhan H, Prabhakar S, Sakshi, Kumar R, Reddy S G, Singh R P, Singh K, Multi-user nonlinear optical cryptosystem based on polar decomposition and fractional vortex speckle patterns, Photonics, 10(2023) 561; doi.org/10.3390/photonics10050561.
  36. Sachin, Singh P, Singh K, Nonlinear image authentication algorithm based on double fractional Mellin domain, Nonlinear Dyn, 111(2023)13579–13600.
  37. Wu H, Li Q, Meng X, Yang X, Liu S, Yin Y, Cryptographic analysis on an optical random-phase-encoding cryptosystem for complex targets based on physics-informed learning, Opt Express, 29(2021)33558–33571.
  38. Yi F, Jeong O, Moon I, Privacy-preserving image classification with deep learning and double random phase encoding, IEEE Access, 9(2021)136126–136134.
  39. Panchikkil S, Manikandan S V M, Zhang Y, A convolutional neural network model based reversible data hiding scheme in encrypted images with block-wise Arnold transform, Optik, 250(2022)168137; doi.org/10.1016/j.ijleo.2021.168137.
  40. Zhu A, Lin S, Wang X, Optical color ghost cryptography and steganography based on multi-discriminator generative adversarial network, Opt Commun, 512(2022)128032; doi.org/10.1016/j.optcom.2022.128032.
  41. Ahmadi K, Carnicer A, Optical visual encryption using focused beams and convolutional neural networks, Opt Lasers Eng, 161(2023)107321; doi.org/10.1016/j.optlaseng.2022.107321.
  42. Annadurai C, Nelson I, Nirmala Devi K, Manikandan R, Gandomi A H, Image watermarking-based data hiding by discrete wavelet transform quantization model with convolutional generative adversarial architectures, Appl Sci, 13(2023)804; doi.org/10.3390/app13020804.
  43. Ouyang M, Yu H, Pan D, Wan L, Zhang C, Gao S, Feng T, Li Z, Optical encryption in spatial frequencies of light fields with metasurfaces, Optica, 9(2022)1022–1028.
  44. Gao X, Li P, Zhong J, Wen D, Wei B, Liu S, Qi S, Zhao J, Stokes meta-hologram toward optical cryptography, Nature Commun, 13, Art ID:6687(2022); doi.org/10.1038/s41467-022-34542-9.
  45. Ullah N, Zhao R, Huang L, Recent advancement in optical metasurface: Fundamental to application, Micromachines, 13(2022) Art ID:1025; doi.org/10.3390/mi13071025.
  46. Zhang F, Guo Y, Pu M, Chen L, Xu M, Liao M, Li L, Li X, Ma X, Luo X, Meta-optics empowered vector visual cryptography for high security and rapid decryption, Nature Commun,14, 1946 (2023); doi.org/10.1038/s41467-023-37510-z.