A Novel Signature and Authentication Cryptosystem for Hyperspectral Image by Using Triangular Association Encryption Algorithm in Gyrator Domains

A novel optical signature and authentication cryptosystem is proposed by applying triangular association encryption algorithm (TAEA) and 3D Arnold transform in Gyrator domains. Firstly, a triangular association encryption algorithm (TAEA) is designed, which makes it possible to turn the diffusion of pixel values within bands into the diffusion within and between bands. Besides, the image signature function is considered and utilized in the proposed cryptosystem. Without the image signature, the original image cannot be restored even if all of the keys are obtained. Moreover, the image integrity authentication function is provided to prevent pixel values from being tampered with. Through the numerical simulation of various types of attacks, the effectiveness and capability of the proposed hyperspectral data signature and authentication cryptosystem is verified.


Introduction
The explosion of information has brought the development of the information society, which has also brought threats to information security. As the mainstream information carrier, the security of images is faced with many challenges and threats. The security of an image can be achieved through traditional mathematical and non-traditional methods. Because digital images have the characteristics of strong pixel correlation, large data capacity and high redundancy, images are more suitable to be encrypted by non-traditional cryptographic algorithms, such as optical [1] and chaotic mapping [2].
Because of its ability to arbitrarily select optical parameters, such as amplitude, phase, polarization and wavelength, to construct multidimensional data in different ways, as well as the inherently high parallel processing speed, optical information encryption technology has an important potential for secure applications of increased security for information [3,4]. Since the double random phase encoding (DRPE) system was first proposed by Refregier and Javidi in 1995 [1], optical encryption opened up a new era of information security and promoted the development of cryptography. Optics were greatly developed in various transform domains, such as the fractional Fourier domain, discrete cosine transform domains and the Gyrator domain [5][6][7][8][9][10][11], besides, a variety of optical processing systems using random phase coding schemes were proposed to protect, store and decrypt information [12][13][14][15][16][17][18].
The optical techniques mentioned above [2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18] are usually applied to single image coding and are perfectly suitable for grayscale and color images. Compared with single band and few bands, hyperspectral images have more bands. The information of the image is stored in each band, and the different bands are closely related. This puts forward higher requirements for the confidentiality of the hyperspectral images. It needs not only to keep a single image confidential, but also to pay attention to the relationship between the bands. Some problems may occur when the single image encryption method is directly used in hyperspectral image encryption. For hyperspectral images with multiple bands, the same encryption method and key parameters are used repeatedly, which is equivalent to providing the corresponding ciphertext of different plaintext. This means that the attacker will be provided with a lot of known plaintext attack materials [19,20], which is a great threat to the encryption system.
Because hyperspectral images are applicable to many scenarios, especially in the field of remote sensing, hyperspectral image encryption has attracted attention at home and abroad. In recent decades, based on the sensitivity of the optical parameters, many researchers have proposed the technology of optical multiplexing to realize optical multiple image coding [21][22][23][24][25][26]. However, these multi-image encryption techniques based on multiplexing strategies are severely limited by optical calibration problems and the limited number of secret images that need to be hidden.
The application of chaos can help disrupt the connections between the pixels in an hyperspectral image. For example, Hang Chen presents an optical hyperspectral image cryptosystem using improved Chirikov mapping in the gyrator transform domains [27]. The improved Chirikov mapping can help the optical encryption scheme to simultaneously hide the spatial and spectrum information. However, the original hyperspectral image needs to be converted into a binary format and then extended into a one dimensional array, which will be a waste of time. Chaotic/hyperchaotic systems have been studied deeply in the field of hyperspectral image encryption, due to their high randomness, sensitivity of parameters and speed of multi-dimensional parallel processing. In the same way as the methods in other literature [13,[28][29][30][31][32][33][34], using chaos or high-dimensional chaos for hyperspectral image encryption is also a scheme that uses chaos to generate sequences and then encrypts the pixels one by one, which is quite complicated.
The 3D Arnold transform can operate directly on the pixels, eliminating the need to convert the image formats. This paper draws lessons from the integer nonlinear coupled chaos model [35]. In this paper, an optical hyperspectral image cryptosystem is proposed by using the triangular association encryption algorithm(TAEA) model with signature and authentication based on 3D Arnold in the Gyrator domains. Limitations on the dimension of encrypted objects can be overcome by using the block mobile method. The triangular association encryption algorithm is developed, based on 3D Arnold in the Gyrator domains. Only in this way can the advantages of optical encryption be exploited, and the scrambling and diffusion within the bands can be extended to the ones within and between bands. On the basis of these, the algorithm also adds a signature and integrity authentication. It not only improves the security of the algorithm, but also confirms the identity of the other party and prevents tampering attacks. This algorithm is suitable for the transmission of important hyperspectral data, when such transmission needs to confirm the identity of the sender and prevent intermediate attackers from tampering.
Compared with the other hyperspectral encryption algorithms, the biggest advantage of the algorithm designed in this paper is that it is not limited to the size of the hyperspectral images. Almost all of the sizes of hyperspectral images can be directly processed by this algorithm without preprocessing. In addition, it adds the functions of signature and digital authentication.
The rest of this article is organized as follows. In Section 2, the proposed encryption/decryption algorithm is described in detail. In Section 3, the numerical simulation results are presented to verify the effectiveness and robustness of the proposed algorithm. Finally, the conclusion is summarized.

1.
The image as the signature formed by the identity information of the sender 'Lena' or another one is attached to the hyperspectral data as the (N + 1)th layer; 2.
Set the side length to be equal to N in the block mobile method of 3D Arnold. Except the (N + 1)th layer, the N-layer hyperspectral data are scrambled by using the block mobile method of 3D Arnold (see Figure 1); 3.
Then perform the Gyrator transform for the first N layers; 5.
Get the encrypted image with the signature. The signature is still the original identity image, which will not be transmitted to the receiver directly. The signature information is communicated in advance and is known only to the sender and receiver; 6.
Take real integers from the first N layers. Let the side length be equal to N + 1 in the block mobile method of 3D Arnold. The N + 1 layers hyperspectral data are performed, using the block mobile method of 3D Arnold (see Figure 1). Then, the algorithm of image integrity authentication is performed for every layer (see (8)); 7.
Add the single-layer secret information obtained in step-6 to the first N layers encryption information obtained in step-5 to form the ciphertext of N + 1 layers; 8.
The encrypted image information of N + 1 layers obtained in step-7, which has the function of signature and integrity authentication, can be transmitted to the recipient. Next, the 3D Arnold map and block mobile method, triangular association encryption algorithm, image signature, image integrity authentication and Gyrator transform are briefly introduced in this section.

D Arnold Map and Block Mobile Method
Arnold transform, called cat mapping, is a nonlinear discrete system often used in image encryption. The 3D Arnold transform evolves from the 2D Arnold in order to meet the higher security requirements as encrypted objects change from lower to higher dimensions. The mathematical definition [36,37] of a 3D Arnold map is as follows: As shown in Equation (1), B is the coefficient matrix of 3D Arnold and the parameters must satisfy the relationship in Equation (2). The variation range of these variables is a positive integer in Equation (2). As shown in Equation (3), the period of the transformation is dependent on L, which is the size of image; before the transformation, the position coordinates of the pixels is (x n , y n , h n ) and (x n+1 , y n+1 , h n+1 ) is the position coordinates of pixels after the transformation. The pixel value of the image changes according to the position.
However, in the specific application, the premise of using 3D is that the object of the transformation has to be a square matrix, such as 256 × 256 × 256. To solve this problem, the block mobile method, as an innovative use of 3D Arnold, is proposed in this paper.
In Figure 2a, the hyperspectral images have three dimensions. In Equation (4), x and y are the side length of a single band image, then the minimum number of square moves is a 2 . Then, follow a certain rule to move the square horizontally, longitudinally and diagonally until the entire image area is covered, as shown in Figure 2b. Firstly, set the side length of the spatial mobile module as h. From the x-y plane, there is a square moving with a side length of h, and it can cover the whole plane at least four times. In this article, the step length we take is long enough to make the moving module move twice along the x axis and twice along the y axis, so that the whole hyperspectral image can be covered. From the perspective of permutation and combination, there are 24 kinds of this movement mode. The schematic diagram shows that the module moves to (0, 0) points first, and then to (256, 0), then to (0, 256), then to (256, 256) finally. After moving four times, in order to avoid periodic cycles, the 3D Arnold scrambling blocks can also be selected to be executed 2 108 times in different positions.
The process and results of the block mobile method are shown in Figure 2b,c. As the block steps, the overlapping areas will appear. The end result is that 3D Arnold performs different times in different areas of the image, so that a higher level of security is achieved. More importantly, this method is easy to implement and can be applied to the vast majority of hyperspectral images.

Triangular Association Encryption Algorithm (TAEA)
For grayscale and color images, as a key part of the image encryption diffusion, the diffusion is often used in-band. However, for hyperspectral images, the realization of diffusion in-band and inter-band can not only improve the efficiency, but also improve the

Triangular Association Encryption Algorithm (TAEA)
For grayscale and color images, as a key part of the image encryption diffusion, the diffusion is often used in-band. However, for hyperspectral images, the realization of diffusion in-band and inter-band can not only improve the efficiency, but also improve the security level. The TAEA designed in this paper can achieve the above goals and requirements perfectly. The model is as follows: where, [x n+1 (i), y n+1 (i), h n+1 (i)] is the pixel coordinates after transformation; and I[x n+1 (i), y n+1 (i), h n+1 (i)] is the corresponding pixel value; [x n (i), y n (i), h n (i)] is the pixel coordinates before transformation; and I[x n (i), y n (i), h n (i)] is the corresponding pixel value; [x n (i), y n (i), N + 1] is the pixel coordinates at layer N + 1 corresponding to [x n (i), y n (i), h n (i)], and I[x n (i), y n (i), N + 1] is the corresponding pixel value; n is steps of iteration; i = 1, 2, · · · , N is number of transformation; N is system grid points. [x n (i + a 0 ), y n (i + a 0 ), h n (i + a 0 )] are determined by the model as follows: where a 0 is a positive integer. According to the reference [36], the period of 3D Arnold is related to the size of image, and the period of the 64 × 64 × 64 image is 112. The object size of this study is 256 × 256 × 189, and the period is much larger than 112. Therefore, to be on the safe side, we set the variation range of a 0 as 112. The mathematical form of function g, called dynamic integer tent mapping [38], is as follows. The tent map has good ergodic uniformity and can improve the optimization speed of the algorithm. Moreover, it can be used together with Arnold transform to give better play to the chaotic characteristics of the system: where µ ∈ (0, 2] and b is digit of the system; and j k represents the displacement of the mapping. Multi-dimensional chaotic integer sequences with good pseudo randomness can be generated in this model rapidly and in parallel. In space, three points [x n (i), y n (i), h n (i)], [x n (i), y n (i), N + 1] and [x n (i + a 0 ), y n (i + a 0 ), h n (i + a 0 )] form a triangle, as shown in Figure 3, so the algorithm model is called the triangular association encryption algorithm (TAEA).

Image Signature
The image signature can confirm that an image message is indeed sent by a sender, no one can forge the message, and the sender cannot deny. When the text message is digitally signed, the message's digest is calculated and then signed. The image signature method proposed in this paper can be implemented in the process of encryption, which is secure, convenient and fast.
The N + 1th layer is the additional signature layer, which could be information about identity, or could be an image. We can also adopt a more convenient method, select a band of hyperspectral image as the signature layer, and attach it at the end. Thus, the transmission of the signature data means to transport only one band position. In Equation (4), the pixel values on the N + 1th layer are used in each operation. So, in the decryption process, you cannot decrypt the message without the N + 1th layer; similarly, the signature information of the other party can be used as the N + 1th layer to decrypt the message and confirm the identity of the sender.
As shown in Figure 4, Bobo use the identity information as a signature for encryption; only Tom can restore the message correctly because he has Bobo's signature.

Image Integrity Authentication
Images can also be tampered with during transmission. If the information is tampered with, the algorithm of image integrity authentication proposed in this paper will detect it.
After the signature encryption is performed, the authentication algorithm is performed separately for every layer. However, only the N + 1th layer is attached to the secret information sent. In this algorithm, if the original information is changed as little as one pixel, the SSIM value will also drop below 0.6 (see numerical simulation).

Gyrator Transform
The Gyrator transform is both a generalized Fourier transform and a special linear regular transform. This optical transform only has a two dimensional format, thus it is suitable for digital image processing and image encryption applications, and has attracted Appl. Sci. 2022, 12, 7649 8 of 20 more and more attention in recent years. The mathematical definition of the Gyrator transformation [39] can be described as: where (x, y) is the input spatial position coordinate and (u, v) is the frequency coordinate of the transformation domain; g(x, y) represents the original image and G(u, v) represents the image output by the Gyrator transformation. In which the parameter α is the fractional order of the Gyrator transformation, that is, the rotation angle. Besides, the Gyrator transform becomes a Fourier transform when α= π 2 . Two important properties are often used when using Gyrator transformation in optical encryption systems. As shown in (10), the transformation is invertible, and the Gyrator transformation for which the fractional order is α, followed by the Gyrator transformation for which the fractional order is −α yields 1. It can be seen from (11) that its period is 2π:

Numerical Simulation
Various numerical simulations are performed to verify the feasibility and effectiveness of the optical signature and authentication cryptosystem by using a triangular association encryption algorithm (TAEA) and 3D Arnold transform in the Gyrator domains. Numerical experiments consider a hyperspectral image 'airport', which has 256 × 256 × 189 pixels as the secret information needed to be encrypted in the following experiments. A grayscale image of the color image 'Lena' having 256 × 256 × 3 pixels is considered as the image signature. The pseudo color composites combined of the 30th, 70th and 100th band and the image signature 'Lena' are depicted in Figure 5a,b. In the following tests, matrix B (see (1)) is used for the transformation, and we set a = b = c = d = e = f = 1. The number of 3D Arnold transformation is k = 3, and the number of triangular association encryptions is a 0 = 3. The parameters θ in the Gyrator transform is set as 0.5. What is more, in the block mobile method of 3D Arnold, set "upper left" as "1", "lower left" as "2", "upper right" as "3" and "lower right" as "4". In the experiment, the normal order of movement is "1234".
The computer environment for the experiment is the Windows 10 system, Intel (R) Core (TM) i7-10700 CPU @ 2.90GHz, and 8.00 GB of RAM. Then, we obtain the final encrypted and decrypted images shown as Figure 6a,b. The time required for the encryption and decryption is respectively 15.391 s and 13.283 s. The decrypted image (see Figure 6b) and the original image (see Figure 5a) are visually similar. This paper introduced a structural similarity index (SSIM) function in order to numerically measure the difference between the original image and the decrypted image. The SSIM value of two same images is equal to 1. If two images are very different, then the SSIM value is near to 0. The mathematical expression of the SSIM [40] is as follows: where, v A and v B are the average of A and B; ∂ 2 A is the variance of A; ∂ 2 B is the variance of B; ∂ AB is the covariance of A and B; N is the value variation range of pixels, r 1 = (i 1 L) 2 , r 2 = (i 2 L) 2 , i 1 = 0.01, i 2 = 0.03.
The following experiments were quantitatively analyzed in detail. Note that, since the output of the Gyrator transform is complex, the simulation appears to be a real function.

Theoretical Analysis and Algebraic Attack
The image encryption system is based on optical and chaos theory. To prove its security, we must first test whether it can withstand the theoretical analysis against the weakness of the chaotic linear transformation and algebraic attack [41].
In the triangle correlation algorithm (TAEA) used in this paper, although the Arnold transform is linear, the Tent map is nonlinear, and the two are not a simple cascade, so the whole encryption system is not linear. Therefore, the theoretical analysis method for the weakness of the linear chaotic encryption system described in the "Cryptanalysis of Chaotic Ciphers" [41] is not applicable. We can also assume that the system is secure in this respect.
Algebraic attack methods are implemented based on key space or cycle, so we now analyze the key space of the encryption system. The 3D Arnold has six parameters a, b, c, d, e, f, and they're all eight bits, and there are 4 × 3 × 2 types of module movement methods. The variation range of a 0 is set as 112. µ and θ are the double-precision floating point data, and the computer used for the simulation is 64-bit. So, the key space is 2 108 × 2 8 × 2 8 × 2 8 × 2 8 × 2 8 × 2 8 × 24 × 112 × 2 64 × 2 64 > 2 294 > 10 87 . The encryption system is computationally secure and can withstand violent attacks [42,43] and algebraic attacks based on key space analysis.
According to Kerckhoff's criterion [44], a good encryption algorithm should have enough key space. The key space comparison of several encryption algorithms is shown in Table 1. Compared with the encryption algorithm in literature [27,[45][46][47][48], the key space of the encryption algorithm in this paper is larger, which can better resist the exhaustive attack. Table 1. Comparison of key space among several algorithms.

Test the Sensitivity of Keys
This paper will firstly test the sensitivity of some of the keys in protecting the secret images. Some attackers are designed to have a complete encryption and decryption system, but with partial keys which are incorrect.
Suppose the attackers wants to gain the three keys, one is the number of the 3D Arnold transformation (k = 3), one is the number of the triangular association encryptions (a = 3) and one is the order of the block mobile method (O = "1234").
First, attacker-1 has obtained all of the keys, except the number of the 3D Arnold transformations. He assumes that k = 2 and Figure 7 shows the decrypted image. Attacker-1 cannot obtain any information about the original text from Figure 7d    Attacker-3 has obtained all of the keys, except the order of the block mobile method. He assumes that O = "1324" and Figure 9 shows the decrypted image. Attacker-3 cannot obtain any information about the original text from the Figure 9a-d. Besides, the keys held by the recipient and the three attackers are listed in Table 2, with the SSIM values by calculating the difference between the original and the tampered value. The results in Table 2 show that any small change in the keys can make a huge difference in the results, demonstrating the high sensitivity and ability of the keys to protect information. The keys above can only be integers, then this paper will further test the sensitivity of the angle of the Gyrator transformation, whose range of change is real. Figure 10 shows the corresponding SSIM curve with the angle of the Gyrator transformation changing near the right value, under the condition that the correct key and decryption method are known. In this test, the correct angle and the sampling step are set to 0.5 and 0.005. When the step is +1 or −1, that is, when the angle is 0.495 and 0.505, two decrypted images are completely unrecognizable. In fact, it would be worse if the angle value deviates more from the set value. Therefore, in terms of the effect of protecting secret images, the angle is a good additional key.

Test Resistance to the Noise Attack
The next analysis of robustness will perform a noise attack on the hyperspectral image encryption system. In order to complete the noise attack robustness experiments [49], this paper introduces the following noise model:

Test Resistance to the Noise Attack
The next analysis of robustness will perform a noise attack on the hyperspectral image encryption system. In order to complete the noise attack robustness experiments [49], this paper introduces the following noise model: where H(x, y) represents the test image before adding noise and H (x, y) represents the test image after adding noise respectively. The symbol p represents the intensity factor of the noise. In addition, the size of the test image is same as random data ξ 0,1 (x, y), of which the mean value is 0 and standard deviation is 1.
Thus, different ciphertexts are obtained by adding different intensities of noise, which are decrypted and compared with the original text to obtain the SSIM change diagram, as shown in the Figure 11. In the calculation, the variation range of noise intensity is 0 to 1, and the variation step is 0.01, that is, the number of the decryption is 101. Note that when the noise intensity is 0.5 and 1, the main information of the decrypted image can be recognized, as shown in the figure. So, we can say that this system can resist the noise attack effectively.

Test Resistance to the Occlusion Attack
Next, the occlusion attack experiment is carried out. It is assumed that the attacker intercepts and captures the transmitted secret information in the transmission channel. In order to simplify the process, 0 was used in the experiment to represent the obscured pixel in this experiment. The receiver partly decrypts the occluded information with the known decryption scheme and keys.
In Figure 12, the occluded secret information is up there and the corresponding decryption information is down there. To improve persuasion, cover the middle half, the upper half and the whole of the single layer first. Then cover the middle half, the upper half and the whole of the three layers.
As shown in Figure 12a, the middle half of the layer-1 is obscured; in Figure 12b, the upper half of the layer-100 is obscured; in Figure 12c, the whole layer-189 is obscured. The corresponding decrypted information is shown in Figure 12d-f, and the primary information of the original image can be identified well.
As shown in Figure 12g, the middle half of the layer-1, layer-100 and layer-189 are obscured; in Figure 12h, the upper half of the three layers are obscured; in Figure 12i, the whole of the three layers are obscured. The corresponding decrypted images are shown in Figure 12j-l, and the main information can be identified from the image.
The experimental results show that the occlusion attack has a poor effect on the cryptographic system. (j) decrypted image of (g) (k) decrypted image of (h) (l) decrypted image of (i) As shown in Figure 12a, the middle half of the layer-1 is obscured; in Figure 12b, the upper half of the layer-100 is obscured; in Figure 12c, the whole layer-189 is obscured. The

Test Resistance to the Known and Chosen Plaintext Attack
Among the existing attack schemes which are used to verify the security of cryptosystem, the most widely used and effective schemes are the known plaintext attack and the chosen plaintext attack. Firstly, a model for encryption is expressed as follows [19,50]: where the symbol GN α represents that the Gyrator transform is performed with rotation angle α. The two random phase masks are indicated by functions ξ 1 (x, y) and ξ 2 (x , y ). In this paper, the function E(x, y) is used to represent the components of the ciphertexts. Accordingly, the iterative phase retrieval algorithm and the impulse function can be used as the known plaintext attack and chosen plaintext attack, respectively.
Here, the new layer-100 and layer-120 of 'sandiegou' having 256 × 256 × 60 pixels are displayed in Figure 13a,b, which are encrypted by using the proposed cryptosystem. Figure 13c,d represents the results of encryption. As shown in Figure 13a, to perform the attack experiment, the original color image and its encrypted data are assumed to have been stolen by the attacker. Then, in simulation, the attacker tries their best to obtain the decrypted data of the layer-120 of 'sandiegou'. In the known plaintext attack, the phase retrieval algorithm is performed 500 times. The attack results are shown in Figure 13e,f, from which it can be seen that the recovery results are in random mode.

Test Validity of the Image Signature
The function of the signature is to confirm the identity of the sender party, and in the absence of a signature, the secret information cannot be decrypted. Next, the decryption algorithm is performed with a correct signature and a fake signature, as shown in Figure 14.
If the attacker uses a fake signature or other data as the signature, he will not obtain the right original information, just as shown in Figure 14b-f. It can only be completely decrypted only if the signature of 'Lena' is used for the decryption. The sender can also be identified as 'Lena'. So, the validity of the signature algorithm is well provided.

Test Validity of the Image Signature
The function of the signature is to confirm the identity of the sender party, and in the absence of a signature, the secret information cannot be decrypted. Next, the decryption algorithm is performed with a correct signature and a fake signature, as shown in Figure  14. If the attacker uses a fake signature or other data as the signature, he will not obtain the right original information, just as shown in Figure 14b-f. It can only be completely decrypted only if the signature of 'Lena' is used for the decryption. The sender can also be identified as 'Lena'. So, the validity of the signature algorithm is well provided.

Test Validity of the Image Integrity Authentication
After obtaining the signature and the key, the attacker can obtain the original text. Then the attacker can tamper with the original text and use the same encryption techniques to obtain the ciphertext and send it to the recipient. The integrity authentication algorithm can prevent the tampering attacks by checking whether the original message has been tampered with. The receiver performs the image integrity authentication algorithm to obtain N + 1 layers, and compares the calculated (N + 1)th layer with the (N + 1)th layer in the ciphertext to calculate the SSIM value. As shown in Table 3, this algorithm is very sensitive to tampering, even if one pixel value is changed, the SSIM value greatly changes. The SSIM value decreases to below 0.08 when nine elements are changed. It shows that the algorithm can effectively resist a tamper attack.

Test Validity of the Image Integrity Authentication
After obtaining the signature and the key, the attacker can obtain the original text. Then the attacker can tamper with the original text and use the same encryption techniques to obtain the ciphertext and send it to the recipient. The integrity authentication algorithm can prevent the tampering attacks by checking whether the original message has been tampered with. The receiver performs the image integrity authentication algorithm to obtain N + 1 layers, and compares the calculated (N + 1)th layer with the (N + 1)th layer in the ciphertext to calculate the SSIM value. As shown in Table 3, this algorithm is very sensitive to tampering, even if one pixel value is changed, the SSIM value greatly changes. The SSIM value decreases to below 0.08 when nine elements are changed. It shows that the algorithm can effectively resist a tamper attack.

Conclusions
In summary, an optical hyperspectral image cryptosystem is proposed, using a triangular association encryption algorithm model with signature and authentication in Gyrator domains (TASA). The number of the hyperspectral bands is not unique, and the proposed cryptographic system can be implemented in different multi-band images. The block mobile method makes the 3D Arnold more suitable for hyperspectral images with a different number of bands, and increases the difficulty of deciphering the images. The triangular association encryption algorithm model makes diffusion expand from within the band to within and between the bands, avoiding the repeated operation of a single encryption algorithm on different bands. The image signature not only provides a large number of additional keys, but also enables the receiver to verify the identity of the originator. Moreover, the image integrity authentication enables the receiver to verify the integrity of the received message. By using numerical simulation, including various potential attack experiments, the optical hyperspectral image cryptosystem is proved to have the characteristics of effectiveness, security and robustness, and the functions of image signature and image integrity authentication.

Institutional Review Board Statement: Not applicable.
Informed Consent Statement: Not applicable.

Data Availability Statement:
The datasets generated and/or analyzed during the current study are available from the corresponding author on reasonable request.