Abstract
In this work, we present a new nonlinear joint transform correlator (JTC) architecture in the Fourier domain (FD) for the encryption and decryption of two simultaneous images. The main features of the proposed system are its increased level of security, the obtention of a single real-valued encrypted signal that contains the ciphered information of the two primary images and, additionally, a high image quality for the two final decrypted signals. The two images to be encrypted can be either related to each other, or independent signals. The encryption system is based on the double random phase encoding (DRPE), which is implemented by using a nonlinear JTC in the FD. The input plane of the JTC has four non-overlapping data distributions placed side-by-side with no blank spaces between them. The four data distributions are phase-only functions defined by the two images to encrypt and four random phase masks (RPMs). The joint power spectrum (JPS) is produced by the intensity of the Fourier transform (FT) of the input plane of the JTC. One of the main novelties of the proposal consists of the determination of the appropriate two nonlinear operations that modify the JPS distribution with a twofold purpose: to obtain a single real-valued encrypted image with a high level of security and to improve the quality of the decrypted images. The security keys of the encryption system are represented by the four RPMs, which are all necessary for a satisfactory decryption. The decryption system is implemented using a 4f-processor where the encrypted image and the security keys given by the four RPMs are introduced in the proper plane of the processor. The double image encryption system based on a nonlinear JTC in the FD increases the security of the system because there is a larger key space, and we can simultaneously validate two independent information signals (original images to encrypt) in comparison to previous similar proposals. The feasibility and performance of the proposed double image encryption and decryption system based on a nonlinear JTC are validated through computational simulations. Finally, we additionally comment on the proposed security system resistance against different attacks based on brute force, plaintext and deep learning.
1. Introduction
Many encryption techniques use optical processing systems to take advantage of their ultrafast computational speed, high parallel processing capacity, and also the wide variety of controllable physical parameters. All the mentioned features make optical processors very attractive for information encryption techniques with high levels of security [1,2,3,4,5,6].
The technique of double random phase encoding (DRPE) has been extensively shown as an important technique to encrypt images by using optical means [7,8]. This DRPE has been typically implemented with a joint transform correlator (JTC) architecture [2,4,5,9,10,11,12,13,14]. The JTC architecture for optical encryption systems commonly uses two random phase masks (RPMs) in its input plane with the purpose of converting a single original image into a stationary white noise signal (encrypted image) in the Fourier domain (FD) [5]. The initial JTC-based encryption systems presented in prior works [2,4,9,10,11] were implemented by using linear 2f optical processors, which have been shown to be vulnerable against the chosen-plaintext attack (CPA) [15], the known-plaintext attack (KPA) [16,17], the ciphertext-only attack (COA) [18] and an attack based on deep learning [19]. In order to enhance the quality of the decrypted image and to improve the security of the previous linear JTC-based encryption systems, nonlinear JTC architectures were proposed in different optical processing domains [5,6,20,21,22,23,24,25,26,27,28,29]. Up to now, the mentioned nonlinear JTC architectures were applied to encrypt only a single image or piece of information.
In this work, we propose a new extension of the single image encryption system based on a nonlinear JTC [6,20] to a double image encryption system using new nonlinear modifications applied to the JTC architecture in the FD. The purpose of using two images in this paper is to obtain a robust encryption–decryption system for two different pieces of information. Moreover, the simultaneous encryption of the two primary images is achieved in a single step, differently to other works that use a sequential procedure with a number of steps coincident with the number of images to encrypt. The two original images to encrypt are encoded in phase; this fact produces an improvement in the security of the proposed encryption system against CPA, KPA and COA because the phase encoding is a nonlinear operation, and the RPMs bonded to these two original images encoded in phase become security keys [28,30]. All the input plane of the JTC is fully encoded in phase, and it is composed by four non-overlapping data distributions placed side-by-side with no blank spaces between them. These four data distributions are designed by using the two original images encoded in phase and four RPMs. The joint power spectrum (JPS) is the intensity of the Fourier transform (FT) of the input plane of the JTC. The real-valued encrypted image is computed by using two new nonlinear modifications applied on the JPS. We remark that the definitions of these two nonlinear modifications are entirely new and different from the nonlinear modifications presented in previous works of JTC-based encryption systems. The new nonlinear operations introduced in the JPS allow a correct retrieval of the decrypted images, with a remarkable signal quality. In addition to this, the applied nonlinearities break the linear behaviour of previous JTC-based encryption systems that have been shown to be vulnerable to different types of attacks. The security keys of the proposed encryption system are represented by four RPMs with a larger key space.
With respect to other JTC-based systems developed in former works [2,5,6,9,10,11,12,13,14,20,21,22,23,24,25,26,27,28,29], the proposed encryption and decryption system for two images allows the simultaneous encryption of two images with a high level of security for the single real-valued encrypted image, besides retrieving high quality decrypted images, either simultaneously or separately. Our encryption and decryption system is not an iterative algorithm, the definitions of the two nonlinear operations applied on the JPS are entirely new, and the use of a new nonlinear JTC allows for breaking the linearity of former JTC-based encryption systems, aiming to obtain an encrypted image better protected against several attacks.
The paper is organized as follows: Section 2 reviews the state of the art related to the proposal of this work, remarking on the differences and advantages of the current proposal in comparison to other existing systems based on optical processors. In Section 3, the double-image encryption and decryption systems are presented. In Section 4, the simulation results of the proposed system are computed to illustrate the proposal. Finally, Section 5 contains our conclusions.
2. Related Works
Several works have been proposed for the encryption and decryption of two images based on optical techniques [31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48]. In [31,36], one image to encrypt is encoded in amplitude and the other image is encoded in phase, in order to obtain a single complex-valued input image for the encryption system based on the classical DRPE. The double-image encryption presented in [32] was developed using a linear JTC, two-step-only quadrature phase-shifting digital holography, one image encoded in amplitude and the other image encoded in phase placed at the same location of the input plane of the JTC, in order to generate two encrypted images given by two nonnegative interferograms. Other double image encryption also based on a linear JTC and the two-step phase-shifting digital holography uses two images encoded in amplitude sequentially at the input plane of the encryption system and produces two encrypted images [33]. The double-image encryption in [34] generated two encrypted images by using two images to encrypt encoded in phase and a numerical algorithm based on two channels. A 4f-processor is used in [35] to encrypt two images encoded in amplitude into two encrypted images by using an addition and subtraction process in the FD. Other double-image encryption systems are based on wavelength multiplexing [37] and iterative phase retrieval algorithms [38,39,40,41].
In [42,43], the two images to encrypt were encoded in amplitude at different locations at the input plane of a linear JTC architecture. The nonlinear JTC system presented in [44] used several input images, one for encryption and decryption and two more images as keys for authentication of the first one. The last two images were used exclusively for verification purposes of a single input image and not for decryption. The nonlinear operations applied on the JPS in [44] are conceptually different from the nonlinear operations proposed in this paper. The double-image encryption system in [45] was implemented using a nonlinear JTC with one image encoded in amplitude and the other image encoded in phase placed at the same location of the input plane of the JTC. The encrypted image was a single real-valued image. In this paper, the two original images to encrypt are encoded in phase at different locations of the input plane of the JTC and the definitions of the nonlinear operations applied on the JPS differ from the definitions of the nonlinear operations applied in [45]. The security system presented in [46] was performed using a classic DRPE and the Gyrator transform. The two original images to encrypt in [46] represent the real and imaginary parts of a complex-valued image at the input plane of the encryption system and the encrypted image is also a complex-valued image. The double-image encryption in [47] was based on the linear DRPE in the Fresnel domain with the two original images to encrypt encoded in amplitude at the input plane of the encryption system. In [48], an asymmetric double-image encryption system was developed using the linear DRPE in the Fresnel domain with one image encoded in amplitude and the other image encoded in phase placed at the same location of the input plane of the encryption system. The encrypted image generated in [48] was a complex-valued image.
The double-image encryption systems, based on the amplitude encoding for the two images to encrypt and the classical DRPE (linear JTC architectures), are vulnerable to some security attacks [19,30]. In general, the numerical and iterative algorithms for double-image encryption are time consuming and their encryption–decryption process differs from the DRPE technique proposed in [2,5,7,9,20]. We point out that the proposed security system in this work allows for a simultaneous encryption of two images, their decryption, either jointly or separately, and it is a new nonlinear JTC-based encryption system with a high level of security for the single real-valued encrypted image.
3. Encryption and Decryption Systems Based on a Nonlinear JTC Architecture in the FD
3.1. Encryption System
In this section, we describe the proposed two-image encryption system by using the equations of a nonlinear JTC architecture [2,5,6,7,8,9,10,20,21,22,25,26,28,29]. The two original images to encrypt and have real values in the interval [0, 1]. These two original images are encoded in phase
and the RPMs are defined by the following equation:
where x and y denote the input coordinates at the spatial domain, , , and are normalized positive function randomly generated, statistically independent and uniformly distributed in the interval [0, 1] [7,9,20]. All the images used in the encryption and decryption systems have pixels size. Figure 1a depicts the encryption system scheme (part I) using a nonlinear JTC architecture and the decryption system scheme (part II) based on a 4f-processor.
Figure 1.
(a) The two-image encryption system scheme using a nonlinear JTC architecture (part I) and the decryption system scheme composed of a 4f-processor (part II). Data distributions located in the input plane of the: (b) encryption system, and (c) decryption system.
Figure 1b shows four phase-only data distribution spatially separated for the input plane of the JTC-based encryption system. The first and second data distributions are represented by and , respectively, and these data distributions are defined by the original images to encrypt encoded in phase and bonded to the RPMs and , respectively:
The third and fourth data distributions of the input plane of the JTC are given by the RPMs and , respectively. The data distributions of the input plane of the JTC-based encryption system , , and are located centred at the coordinates , , and , respectively. All four data distributions do not overlap spatially and there is not blank space between them [28].
The JPS is the intensity of the FT () of the input plane of the JTC, and it is given by
where u and v indicate the output coordinates in the FD and the distributions denoted by capital letters represent the FTs of the distributions denoted in lowercase letters.
In the next step of the encryption system, the JPS is modified by two new nonlinear operations with the purpose of obtaining the encrypted image
with
The superscript presented in Equation (5) denotes the complex conjugation operation. The two new nonlinear terms given by Equation (6) are introduced in the definition of the encrypted image with the double purpose of improving the quality of the decrypted images and increasing the security of the encrypted image against several plaintext attacks, in a similar way as it was proposed in [5,20,21,25,28,44,49]. The new nonlinear term represented by has cross-correlation terms in the FD between and , and also between and , besides the usual terms given by the following intensity distributions , , and used in [5,20,44]. The subtraction of from the allows a correct implementation of the DRPE technique because all the terms presented in the numerator of Equation (5) are cross-correlation terms in the FD between and with and . The nonlinear term introduced in Equation (5) allows the proposed security system to more closely approach the output result to the original DRPE technique [5,7,20]. Since the JPS modifications consist of nonlinear operations, they also contribute to increasing the overall security of the processor against plaintext attacks in comparison with the other linear systems.
The encrypted image given by Equation (5) is computed from three intensities distributions, which can be sequentially captured when different data distributions are separately displayed at the input plane of the JTC. Therefore, the encrypted image is a real-valued distribution and the security keys of the encryption system are given by the four RPMs (, , and ). The proposed encryption and decryption systems can be implemented by using optical FT setups and the three intensities distributions needed to compute the encrypted image can be performed at the speed of light [6,8]. A 2f and 4f optical processors can be used in order to implement the proposed encryption and decryption systems, respectively. The two nonlinear operations applied to the JPS in Equation (5) are performed by digital computation. The numerical computational complexity of the encryption system is mainly given by the three two-dimensional (2D) fast Fourier transforms (FFTs) to compute the terms , and utilized in the definition of the encrypted image. The term is computed by applying the 2D FFT to an image that has pixels size and the terms and are computed by applying the 2D FFT to two different images that have pixels size.
3.2. Decryption System
The decryption system scheme is presented in Figure 1a (part II), and it is based on two successive FTs (4f-processor). In the first step of the decryption system, the third and fourth data distributions and are placed at the input plane of the decryption system (Figure 1c) at coordinates and , respectively, and this input plane is Fourier transformed; the result of this transformation is multiplied by the encrypted image to obtain
The output plane of the decryption system is given by the inverse FT of Equation (7). This output plane has several data distributions spatially separated. The first eight terms of Equation (7) are the most interesting terms since they retain the two original images to be decrypted. The first four terms of Equation (7) allow for recovering the data distribution , centred at coordinates and the data distribution placed at coordinates is retrieved by using the fourth to the eighth term of the same equation. The last eight terms of Equation (7) are noisy data distributions at the output plane of the decryption system, and these terms are spatially separated from the sought distributions and . The retrieval of the data distribution and from Equation (7) is given by
Finally, the decrypted images are obtained from the previous equation as follows:
where denotes the phase of a complex-valued function. In order to obtain the decrypted images and as replicas of the original images and , respectively, the four security keys given by the RPMs , , and used in the decryption system have to be the same as the security keys used in the encryption system. We remark that the new nonlinear operations introduced in the JPS given by the terms and , allow for the retrieval of the two original images in Equation (9). The proposed decryption system can be implemented by using two optical FTs which can be performed at the speed of light [6,8]. The numerical computational complexity of the decryption system is mainly given by the computation of two successive 2D FFTs applied to two different images that have pixels size. These two sequentially 2D FFTs are needed to obtain the output plane of the decryption system.
4. Simulation Results
The simulation results for the encryption and decryption systems described in Section 3 are depicted in Figure 2. All the images utilized in this simulation test have a resolution of pixels (). The original images to be encrypted and are displayed in Figure 2a and Figure 2b, respectively. Function is a binary image with real values of 0 or 1. Function is a grayscale image with real values in the interval [0, 1]. The grayscale image of the random distribution of the RPM is shown in Figure 2c. The grayscale images of the random distributions , and of the RPMs , and , respectively, have different values but similar appearance to the image depicted in Figure 2c.
Figure 2.
(a,b) Original images to be encrypted and , respectively; (c) image of the random distribution of the RPM ; (d) encrypted image ; (e,f) correct decrypted images and , respectively, using the right four security RPMs; (g,h) wrong decrypted images and , respectively, when the incorrect security key RPM and the other three correct security keys RPMs are used in the decryption system.
The image depicted in Figure 2d corresponds to the real-valued encrypted image with a noisy appearance which does not reveal any information about any of the original images and . Figure 2e,f show the decrypted images and using the same values of the security keys (the four RPMs) that were used in the encryption system. These two decrypted images have been obtained through the whole process represented by Equations (7)–(9) and depict the magnified region centred at coordinates and of the output plane of the decryption system. The decrypted images presented in Figure 2g,h correspond to the use of a wrong security key RPM along with the other three correct security keys RPMs used in the decryption stage. If the other security keys’ RPMs , or are wrong in the decryption system, the decrypted images will be noisy distributions very similar to the images presented in Figure 2g,h. Therefore, all correct security key RPMs are required in the decryption system in order to obtain a meaningful simultaneous retrieval of the two original images.
The root mean square error (RMSE) is used in order to evaluate the quality of the decrypted images, and this RMSE is given by [20]
The values of the RMSE are in the interval of [0,1]. The best quality of the decrypted images would be for RMSE values close or equal to 0. Bad quality decrypted images will obtain RMSE values close to 1. The RMSEs between the original images of Figure 2a,b and the correct decrypted images of Figure 2e,f are and , respectively. The RMSEs for the case of the wrong decrpyted images of Figure 2g,h with respect to the original images of Figure 2a,b are and , respectively.
There exists the possibility to separately retrieve the correct decrypted image or under certain combinations for the values of the security keys, this fact is due to the results obtained in Equation (9). Thus, when the security keys , and are correct and is wrong in the decryption system, we obtain the same correct decrypted image depicted in Figure 2e and a noisy decrypted image very similar to the image shown in Figure 2h. The other case uses the correct security keys , and , and the wrong security key in the decryption system, with the purpose of recovering the same correct decrypted image presented in Figure 2f and a noisy decrypted image very similar to the image displayed in Figure 2g.
Key Space and Robustness to Attacks
The key space of the encryption–decryption system of this work is given by all of the possible combinations of the four security keys RPMs (, , and ). The RPMs have a random distribution, which is a grayscale image with pixels size and every pixel of this image has 256 different values. Therefore, the all possible combinations required to retrieve the four RPMs is of the order of . For this reason, a brute force attack applied to the proposed encryption–decryption system is impractical due to the larger key space of this security system [50].
Several JTC architectures utilized in security systems have been shown to be vulnerable to several attacks, such as the CPA [15], the KPA [16,17] and the COA [18], among others, due to their linearity. The nonlinear JTC architectures presented in references [5,20,21,25,28,44] improved the security for the JTC-based encryption system against CPA, KPA and COA. The phase encoding of the input plane of the proposed JTC-based encryption system is a nonlinear operation that allows for an improved security against COA described in [18] because this COA is based on an iterative phase retrieval algorithm that permits retrieving a single plaintext (original image to be encrypted) encoded in amplitude by using only a ciphertext (encrypted image). In the current proposal, the two primary images or plaintexts are phase-encoded at the JTC input plane. Thus, this COA will hardly retrieve the correct values for the two phase-encoded plaintexts, and it also cannot retrieve the four security keys RPMs (, , and ) [5,18,28,30,44]. The two new nonlinear operations applied to the JPS to compute the encrypted image are very important in order to break the linearity of the JTC-based encryption systems and to increase the security of the encrypted image against CPA and KPA, as it was proved in [5,20,21,28]. The introduction of this two new nonlinear operations over the JPS allows the simultaneous encryption of the two phase-encoded original images (plaintexts) by implementing a DRPE technique with four security keys’ RPMs. The CPA and KPA described in references [15] and [16,17], respectively, were specifically designed to find only one security key RPM () because there was a single plaintext encoded in amplitude for the linear JTC-based encryption system under attack. These CPA and KPA would not be able to find the other RPM (). Therefore, these CPA and KPA would probably fail if they were applied to the current nonlinear system proposed in this work because these attacks would not be able to retrieve the correct values of the four security keys’ RPMs.
Recently, the DRPE has been shown to be vulnerable to an attack implemented with deep learning [19]. Such an attack was designed for a linear 4f-processor system whose single image to encrypt was encoded in amplitude (real-valued distribution). Therefore, the attack described in reference [19] is not suitable for the security system of this paper, and it is not able to retrieve the four security keys RPMs because the proposed encryption system in this work is designed with a nonlinear 2f-processor system (JTC architecture), and the two original images to encrypt are encoded in phase (complex-valued distribution).
5. Conclusions
In this paper, we have presented a novel extension of the single image encryption system based on a nonlinear JTC to a double image encryption system using new nonlinear modifications applied to the JTC architecture in the FD. The original images to be encrypted are two images (either binary or grayscale) with or without relationship between them. The security keys of the proposed encryption–decryption system are given by four RPMs. The new nonlinear operations applied on the JPS in order to obtain the encrypted image have allowed for retrieving the two correct decrypted images and an improvement in the security of the proposed encryption–decryption system against brute force and plaintext attacks due to a correct implementation of the DRPE technique based on a nonlinear JTC architecture. The right simultaneous retrieval of the two original images at the output plane of the decryption system is only possible when the same four security keys RPMs of the encryption system are applied in the decryption system. Decryption of the original images with the best image quality is only achieved by using the correct four security keys RPMs and the new nonlinear operations applied on the JPS. The design of the proposed security system has allowed the possibility to separately retrieve one of the two correct decrypted images. The proposed encryption and decryption systems in this work can be implemented using optical setups based on 2f and 4f processors, respectively, except for the nonlinear operations applied to the JPS which have to be digitally computed. Finally, the larger key space, the nonlinear modifications in the JTC architecture and the phase encoding of the two original images to encrypt allowed an improved security for the encrypted image against several attacks because the linearity of the previous JTC-based encryption systems was broken and the design of the proposed nonlinear security system caused the simultaneous encryption of the two original images by implementing a correct DRPE technique with four security keys RPMs.
Author Contributions
The work described in this article was the collaborative development of all authors. Conceptualization, R.A.P., E.P.-C., J.M.V., M.S.M. and C.O.T.; methodology, R.A.P., E.P.-C., J.M.V., M.S.M. and C.O.T.; software, R.A.P. and J.M.V.; validation, E.P.-C., J.M.V., M.S.M. and C.O.T.; investigation, R.A.P., E.P.-C., J.M.V., M.S.M. and C.O.T.; writing—original draft preparation, R.A.P. and J.M.V.; writing—review and editing, E.P.-C., J.M.V., M.S.M. and C.O.T.; supervision, E.P.-C., J.M.V., M.S.M. and C.O.T. All authors have read and agreed to the published version of the manuscript.
Funding
This research has been funded by the Universidad de La Guajira (Riohacha), the Universidad Popular del Cesar (Valledupar) and the Universitat Politècnica de Catalunya · BarcelonaTech.
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
The supporting information can be found from the corresponding author.
Conflicts of Interest
The authors declare no conflict of interest.
Abbreviations
The following abbreviations are used in this manuscript:
| 2D | Two-Dimensional |
| CPA | Chosen-Plaintext Attack |
| COA | Ciphertext-Only Attack |
| DRPE | Double Random Phase Encoding |
| FFT | Fast Fourier Transform |
| FD | Fourier Domain |
| FT | Fourier Transform |
| KPA | Known-Plaintext Attack |
| JTC | Joint Transform Correlator |
| JPS | Joint Power Spectrum |
| RPMs | Random Phase Masks |
| RMSE | Root Mean Square Error |
References
- Muniraj, I.; Sheridan, J.T. Optical Encryption and Decryption, 1st ed.; SPIE Press: Bellingham, WA, USA, 2019. [Google Scholar]
- Millán, M.S.; Pérez-Cabré, E. Optical data encryption. In Optical and Digital Image Processing: Fundamentals and Applications; Cristóbal, G., Schelkens, P., Thienpont, H., Eds.; Wiley-VCH Verlag GmbH & Co.: Weinheim, Germany, 2011; pp. 739–767. [Google Scholar]
- Chen, W.; Javidi, B.; Chen, X. Advances in optical security systems. Adv. Opt. Photonics 2014, 6, 120–155. [Google Scholar] [CrossRef]
- Javidi, B.; Carnicer, A.; Yamaguchi, M.; Nomura, T.; Pérez-Cabré, E.; Millán, M.; Nishchal, N.; Torroba, R.; Barrera, J.; He, W.; et al. Roadmap on optical security. J. Opt. 2016, 18, 083001. [Google Scholar] [CrossRef]
- Millán, M.S.; Pérez-Cabré, E.; Vilardy, J.M. Nonlinear techniques for secure optical encryption and multifactor authentication. In Advanced Secure Optical Image Processing for Communications; Al Falou, A., Ed.; IOP Publishing: Bristol, UK, 2018; pp. 8-1–8-33. [Google Scholar]
- Vilardy, J.M.; Millán, M.S.; Pérez-Cabré, E. Experimental optical encryption scheme for the double random phase encoding using a nonlinear joint transform correlator. Optik 2020, 217, 164653. [Google Scholar] [CrossRef]
- Réfrégier, P.; Javidi, B. Optical image encryption based on input plane and Fourier plane random encoding. Opt. Lett. 1995, 20, 767–769. [Google Scholar] [CrossRef]
- Goodman, J.W. Introduction to Fourier Optics, 3rd ed.; Roberts & Company Publishers: Englewood, CO, USA, 2005. [Google Scholar]
- Nomura, T.; Javidi, B. Optical encryption using a joint transform correlator architecture. Opt. Eng. 2000, 39, 2031–2035. [Google Scholar]
- Rueda, E.; Barrera, J.F.; Henao, R.; Torroba, R. Optical encryption with a reference wave in a joint transform correlator architecture. Opt. Commun. 2009, 282, 3243–3249. [Google Scholar] [CrossRef]
- Barrera, J.F.; Vélez, A.; Torroba, R. Experimental multiplexing protocol to encrypt messages of any length. J. Opt. 2013, 15, 055404. [Google Scholar] [CrossRef]
- Cai, J.; Shen, X.; Fan, C.; Zhou, B. Security-enhanced optical encryption based on JTC architecture with confused ciphertext. Optik 2020, 206, 163742. [Google Scholar] [CrossRef]
- Zhong, Y.; Chen, L.; Gan, W.; Liu, Y. Image Encryption System Based on Joint Transformation Correlation and Ptychography. IEEE Photonics J. 2020, 12, 1–10. [Google Scholar] [CrossRef]
- Chen, Q.; Shen, X.; Cheng, Y.; Lin, C.; Liu, Y.; Zhou, B. A security-enhanced joint transform correlator optical encryption system with cropping operation. Optik 2021, 245, 167654. [Google Scholar] [CrossRef]
- Barrera, J.F.; Vargas, C.; Tebaldi, M.; Torroba, R. Chosen-plaintext attack on a joint transform correlator encrypting system. Opt. Commun. 2010, 283, 3917–3921. [Google Scholar] [CrossRef]
- Barrera, J.F.; Vargas, C.; Tebaldi, M.; Torroba, R.; Bolognini, N. Known-plaintext attack on a joint transform correlator encrypting system. Opt. Lett. 2010, 35, 3553–3555. [Google Scholar] [CrossRef]
- Dou, S.; Shen, X.; Zhou, B.; Lin, C.; Huang, F.; Lin, Y. Known-plaintext attack on JTC-based linear cryptosystem. Optik 2019, 198, 163274. [Google Scholar] [CrossRef]
- Zhang, C.; Liao, M.; He, W.; Peng, X. Ciphertext-only attack on a joint transform correlator encryption system. Opt. Express 2013, 21, 28523–28530. [Google Scholar] [CrossRef] [PubMed]
- Hai, H.; Pan, S.; Liao, M.; Lu, D.; He, W.; Peng, X. Cryptanalysis of random-phase-encoding-based optical cryptosystem via deep learning. Opt. Express 2019, 27, 21204–21213. [Google Scholar] [CrossRef]
- Vilardy, J.M.; Millán, M.S.; Pérez-Cabré, E. Improved decryption quality and security of a joint transform correlator-based encryption system. J. Opt. 2013, 15, 025401. [Google Scholar] [CrossRef]
- Vilardy, J.M.; Millán, M.S.; Pérez-Cabré, E. Nonlinear optical security system based on a joint transform correlator in the Fresnel domain. Appl. Opt. 2014, 53, 1674–1682. [Google Scholar] [CrossRef]
- Vilardy, J.M.; Millán, M.S.; Pérez-Cabré, E. Joint transform correlator-based encryption system using the Fresnel transform and nonlinear filtering. Proc. SPIE 2013, 8785, 87853J. [Google Scholar]
- Barrera, J.F.; Jaramillo, A.; Vélez, A.; Torroba, R. Experimental analysis of a joint free space cryptosystem. Opt. Lasers Eng. 2016, 83, 126–130. [Google Scholar]
- Dou, S.; Shen, X.; Zhou, B.; Wang, L.; Lin, C. Experimental research on optical image encryption system based on joint Fresnel transform correlator. Opt. Laser Technol. 2019, 112, 56–64. [Google Scholar] [CrossRef]
- Vilardy, J.M.; Torres, Y.; Millán, M.S.; Pérez-Cabré, E. Generalized formulation of an encryption system based on a joint transform correlator and fractional Fourier transform. J. Opt. 2014, 16, 125405. [Google Scholar] [CrossRef]
- Vilardy, J.M.; Millán, M.S.; Pérez-Cabré, E. Images encryption system based on a fractional joint transform correlator and nonlinear filtering. Opt. Pura Apl. 2014, 47, 35–41. [Google Scholar] [CrossRef]
- Jaramillo, A.; Barrera, J.F.; Vélez, A.; Torroba, R. Fractional optical cryptographic protocol for data containers in a noise-free multiuser environment. Opt. Lasers Eng. 2018, 102, 119–125. [Google Scholar] [CrossRef]
- Vilardy, J.M.; Millán, M.S.; Pérez-Cabré, E. Nonlinear image encryption using a fully phase nonzero-order joint transform correlator in the Gyrator domain. Opt. Lasers Eng. 2017, 89, 88–94. [Google Scholar] [CrossRef]
- Vilardy, J.M.; Perez, R.A.; Torres, C.O. Optical image encryption using a nonlinear joint transform correlator and the Collins diffraction transform. Photonics 2019, 6, 115. [Google Scholar] [CrossRef]
- Guo, C.; Liu, S.; Sheridan, J.T. Iterative phase retrieval algorithms. Part II: Attacking optical encryption systems. Appl. Opt. 2015, 54, 4709–4719. [Google Scholar] [CrossRef] [PubMed]
- Vilardy, J.M.; Torres, C.O.; Jimenez, C.J. Double image encryption method using the Arnold transform in the fractional Hartley domain. Proc. SPIE 2013, 8785, 87851R. [Google Scholar]
- Li, J.; Zheng, T.; Liu, Q.Z.; Li, R. Double-image encryption on joint transform correlator using two-step-only quadrature phase-shifting digital holography. Opt. Commun. 2012, 285, 1704–1709. [Google Scholar] [CrossRef]
- Shi, X.; Zhao, D.; Huang, Y. Double images hiding by using joint transform correlator architecture adopting two-step phase-shifting digital holography. Opt. Commun. 2013, 297, 32–37. [Google Scholar] [CrossRef]
- Singh, H.; Yadav, A.K.; Vashisth, S.; Singh, K. Double phase-image encryption using gyrator transforms, and structured phase mask in the frequency plane. Opt. Lasers Eng. 2015, 67, 145–156. [Google Scholar] [CrossRef]
- Yu, N.; Xi, S.; Wang, X.; Zhang, C.; Wang, W.; Dong, Z.; Zhua, Q.; Liua, X.; Wang, H. Double images encryption in optical image subtraction/addition 4F system. Optik 2019, 178, 135–141. [Google Scholar] [CrossRef]
- Vilardy, J.M.; Alfaro, E.; Jimenez, C.J. Correlation operation in the Fresnel domain and truncation operations applied to the simultaneous encryption of two images. J. Physics Conf. Ser. 2022, 2307, 012043. [Google Scholar] [CrossRef]
- Zhang, Y.; Zhang, X.; Shan, M.; Zhong, Z.; Liu, B.; Yu, L.; Liu, L. Asymmetric double-image encryption via wavelength multiplexing. Appl. Opt. 2022, 61, 1248–1253. [Google Scholar] [CrossRef]
- Li, W.; Kim, N.; Shan, M. Experimentally implementable double-image optical encryption based on Gerchberg-Saxton algorithm. In Imaging and Applied Optics 2014; Optica Publishing Group: Washington, DC, USA, 2014; paper JTu4A.41. [Google Scholar]
- Sui, L.; Lu, H.; Ning, X.; Wang, Y. Asymmetric double-image encryption method by using iterative phase retrieval algorithm in fractional Fourier transform domain. Opt. Eng. 2014, 53, 026108. [Google Scholar] [CrossRef]
- Rajput, S.K.; Nishchal, N.K. Optical double image security using random phase fractional Fourier domain encoding and phase-retrieval algorithm. Opt. Commun. 2017, 388, 38–46. [Google Scholar] [CrossRef]
- Kumar, R.; Sheridan, J.T.; Bhaduri, B. Nonlinear double image encryption using 2D non-separable linear canonical transform and phase retrieval algorithm. Opt. Laser Technol. 2018, 107, 353–360. [Google Scholar] [CrossRef]
- Wang, X.; Zhao, D. Double images encryption method with resistance against the specific attack based on an asymmetric algorithm. Opt. Express 2012, 20, 11994–12003. [Google Scholar] [CrossRef] [PubMed]
- Xiaopeng, D. A hybrid attack on `double images encryption method with resistance against the specific attack based on an asymmetric algorithm’. Opt. Commun. 2014, 317, 7–12. [Google Scholar] [CrossRef]
- Vilardy, J.M.; Millán, M.S.; Pérez-Cabré, E. Image encryption system based on a nonlinear joint transform correlator for the simultaneous authentication of two users. Photonics 2019, 6, 128. [Google Scholar] [CrossRef]
- Zhao, H.; Zhong, Z.; Fang, W.; Xie, H.; Zhang, Y.; Shan, M. Double-image encryption using chaotic maps and nonlinear non-DC joint fractional Fourier transform correlator. Opt. Eng. 2016, 55, 093109. [Google Scholar] [CrossRef]
- Liu, Z.; Zhang, Y.; Li, S.; Liu, W.; Liu, W.; Wang, Y.; Liu, S. Double image encryption scheme by using random phase encoding and pixel exchanging in the gyrator transform domains. Opt. Laser Technol. 2013, 47, 152–158. [Google Scholar] [CrossRef]
- Liansheng, S.; Cong, D.; Xiao, Z.; Ailing, T.; Anand, A. Double-image encryption based on interference and logistic map under the framework of double random phase encoding. Opt. Lasers Eng. 2019, 122, 113–122. [Google Scholar] [CrossRef]
- Su, Y.; Xue, X.; Deng, R.; Wang, Y.; Zhao, Q.; Li, T.; Li, Y.; Liu, S.; Zhao, J. Asymmetric double-image encryption based on chaotic random phase encoding. Appl. Opt. 2022, 61, 7608–7617. [Google Scholar] [CrossRef] [PubMed]
- Li, C.T.; Yin, S.; Yu, F.T.S. Nonzero-order joint transform correlator. Opt. Eng. 1998, 37, 58–65. [Google Scholar] [CrossRef]
- Frauel, Y.; Castro, A.; Naughton, T.J.; Javidi, B. Resistance of the double random phase encryption against various attacks. Opt. Express 2007, 15, 10253–10265. [Google Scholar] [CrossRef] [PubMed]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).