Research on Improving Data Efficiency in Double Random Phase Encryption
Abstract
1. Introduction
2. Principle
2.1. Double Random Phase Encryption
2.1.1. Encryption
2.1.2. Decryption
2.2. DRPE for Simultaneous Encryption of Two Images
2.2.1. Encryption
2.2.2. Decryption
2.3. RSA Cryptography
2.4. Bit-Plane Representation
3. Proposed Method
3.1. DRPE Capable of Simultaneously Encrypting Three Images
3.1.1. Encryption
3.1.2. Decryption
3.2. Image Composition Based on High-Order Bit Extraction
3.2.1. Configuration Using Four High-Order Bits
3.2.2. Configuration Using Five High-Order Bits
3.3. DRPE Capable of Simultaneously Encrypting Six Images
3.3.1. Encryption
3.3.2. Decryption
4. Experimental Procedure
5. Results
5.1. Results of DRPE Capable of Simultaneously Encrypting Three Images
5.2. Results of Image Composition Using Four High-Order Bits
5.3. Results of Image Composition Using Five High-Order Bits
5.4. Results of DRPE Capable of Simultaneously Encrypting Six Images
6. Security Analysis
6.1. Key Space Analysis
6.2. Key Sensitivity Analysis
6.3. Statistical Analysis
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviations
| DRPE | Double random-phase encryption |
| PSNR | Peak signal to noise ratio |
| SSIM | Structural similarity index measure |
References
- Refregier, P.; Javidi, B. Optical image encryption based on input plane and Fourier plane random encoding. Opt. Lett. 1995, 20, 767–769. [Google Scholar] [CrossRef] [PubMed]
- Cho, K.O.; Lee, M.C.; Cho, M. Three-dimensional photon counting double-random-phase encryption with occlusion layers. J. Inf. Disp. 2014, 15, 127–133. [Google Scholar] [CrossRef]
- Liao, M.; Zheng, S.; Pan, S.; Lu, D.; He, W.; Situ, G.; Peng, X. Deep-learning-based ciphertext-only attack on optical double random phase encryption. Opto-Electron. Adv. 2021, 4, 200016-1. [Google Scholar] [CrossRef]
- Cheng, X.; Cai, L.; Wang, Y.; Meng, X.; Zhang, H.; Xu, X.; Shen, X.; Dong, G. Security enhancement of double-random phase encryption by amplitude modulation. Opt. Lett. 2008, 33, 1575–1577. [Google Scholar] [CrossRef] [PubMed]
- Dou, S.; Shen, X.; Lin, C. Security-enhanced optical nonlinear cryptosystem based on double random phase encoding. Opt. Laser Technol. 2020, 123, 105897. [Google Scholar] [CrossRef]
- Zhou, K.; Fan, J.; Fan, H.; Li, M. Secure image encryption scheme using double random-phase encoding and compressed sensing. Opt. Laser Technol. 2020, 121, 105769. [Google Scholar] [CrossRef]
- Rajasekar, V.; Premalatha, J.; Sathya, K. Cancelable Iris template for secure authentication based on random projection and double random phase encoding. Peer-to-Peer Netw. Appl. 2021, 14, 747–762. [Google Scholar] [CrossRef]
- Kim, S.; Jeong, J.; Cho, M.; Lee, M.C. Advanced double random phase encryption for simultaneous two primary data. In 2025 International Technical Conference on Circuits/Systems, Computers, and Communications (ITC-CSCC); IEEE: Piscataway, NJ, USA, 2025; pp. 1–5. [Google Scholar]
- Arimoto, H.; Javidi, B. Integral three-dimensional imaging with digital reconstruction. Opt. Lett. 2001, 26, 157–159. [Google Scholar] [CrossRef] [PubMed]
- Javidi, B.; Carnicer, A.; Arai, J.; Fujii, T.; Hua, H.; Liao, H.; Martínez-Corral, M.; Pla, F.; Stern, A.; Waller, L.; et al. Roadmap on 3D integral imaging: Sensing, processing, and display. Opt. Express 2020, 28, 32266–32293. [Google Scholar] [CrossRef] [PubMed]
- Lee, J.; Usmani, K.; Javidi, B. Polarimetric 3D integral imaging profilometry under degraded environmental conditions. Opt. Express 2024, 32, 43172–43183. [Google Scholar] [CrossRef]
- Jang, J.Y.; Cho, M. Three-Dimensional Double Random-Phase Encryption for Simultaneous Two-Primary Data. Electronics 2024, 13, 823. [Google Scholar] [CrossRef]
- Goodman, J.W. Introduction to Fourier Optics; Roberts and Company Publishers: Greenwood Village, CO, USA, 2005. [Google Scholar]
- Mumtaz, M.; Ping, L. Forty years of attacks on the RSA cryptosystem: A brief survey. J. Discret. Math. Sci. Cryptogr. 2019, 22, 9–29. [Google Scholar] [CrossRef]
- Wahab, O.F.A.; Khalaf, A.A.; Hussein, A.I.; Hamed, H.F. Hiding data using efficient combination of RSA cryptography, and compression steganography techniques. IEEE Access 2021, 9, 31805–31815. [Google Scholar] [CrossRef]
- Imam, R.; Areeb, Q.M.; Alturki, A.; Anwer, F. Systematic and critical review of rsa based public key cryptographic schemes: Past and present status. IEEE Access 2021, 9, 155949–155976. [Google Scholar] [CrossRef]
- Zhou, Y.; Cao, W.; Chen, C.P. Image encryption using binary bitplane. Signal Process. 2014, 100, 197–207. [Google Scholar] [CrossRef]
- Zhang, X.; Gao, T. Multiple-image encryption algorithm based on the bit plane and superpixel. Multimed. Tools Appl. 2023, 82, 19969–19991. [Google Scholar] [CrossRef]
- Zhang, Z.; Wang, H.; Chen, Z.; Liu, S. Learned lossless image compression based on bit plane slicing. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition; IEEE: Piscataway, NJ, USA, 2024; pp. 27579–27588. [Google Scholar]
- Salmon, J.K.; Moraes, M.A.; Dror, R.O.; Shaw, D.E. Parallel random numbers: As easy as 1, 2, 3. In Proceedings of the 2011 International Conference for High Performance Computing, Networking, Storage and Analysis; Association for Computing Machinery: New York, NY, USA, 2011; pp. 1–12. [Google Scholar]
- Lin, T.Y.; Maire, M.; Belongie, S.; Hays, J.; Perona, P.; Ramanan, D.; Dollár, P.; Zitnick, C.L. Microsoft coco: Common objects in context. In Proceedings of the European Conference on Computer Vision; Springer: Berlin/Heidelberg, Germany, 2014; pp. 740–755. [Google Scholar]
- Mohammadi, P.; Ebrahimi-Moghadam, A.; Shirani, S. Subjective and objective quality assessment of image: A survey. arXiv 2014, arXiv:1406.7799. [Google Scholar] [CrossRef]
- Hore, A.; Ziou, D. Image quality metrics: PSNR vs. SSIM. In 2010 20th International Conference on Pattern Recognition; IEEE: Piscataway, NJ, USA, 2010; pp. 2366–2369. [Google Scholar]
- Sara, U.; Akter, M.; Uddin, M.S. Image quality assessment through FSIM, SSIM, MSE and PSNR—a comparative study. J. Comput. Commun. 2019, 7, 8–18. [Google Scholar] [CrossRef]
- Zhang, B.; Zhou, N.R.; Zhou, S.; Wang, M.M. Novel 4D chaotic system based on memristor and its application in secure color image encryption. Digit. Signal Process. 2025, 170, 105791. [Google Scholar] [CrossRef]









































| Decrypted Images | PSNR [dB] | SSIM |
|---|---|---|
| Image 1 (Figure 26a) | 311.317 | 1.0000 |
| Image 2 (Figure 26b) | 317.396 | 1.0000 |
| Image 3 (Figure 26c) | 327.607 | 1.0000 |
| Image 4 (Figure 26d) | 311.897 | 1.0000 |
| Image 5 (Figure 26e) | 311.700 | 1.0000 |
| Image 6 (Figure 26f) | 326.013 | 1.0000 |
| Decomposition Images | PSNR [dB] | SSIM |
|---|---|---|
| Image 1 (Figure 28a) | 29.150 | 0.9750 |
| Image 2 (Figure 28b) | 29.160 | 0.9714 |
| Image 3 (Figure 28c) | 28.627 | 0.8750 |
| Image 4 (Figure 28d) | 29.284 | 0.9585 |
| Image 5 (Figure 28e) | 29.232 | 0.9660 |
| Image 6 (Figure 28f) | 29.126 | 0.9630 |
| Decomposition Images | PSNR [dB] | SSIM |
|---|---|---|
| Image 7 (Figure 29d) | 31.798 | 0.6275 |
| Image 8 (Figure 29e) | 30.905 | 0.4434 |
| Decomposition Images | PSNR [dB] | SSIM |
|---|---|---|
| Image 1 (Figure 31a) | 35.668 | 0.9935 |
| Image 2 (Figure 31b) | 35.685 | 0.9915 |
| Image 3 (Figure 31c) | 35.344 | 0.9653 |
| Image 4 (Figure 31d) | 35.701 | 0.9889 |
| Image 5 (Figure 31e) | 35.703 | 0.9879 |
| Image 6 (Figure 31f) | 35.641 | 0.9906 |
| Decomposition Images | PSNR [dB] | SSIM |
|---|---|---|
| Image 7 (Figure 32d) | 36.857 | 0.7538 |
| Image 8 (Figure 32e) | 36.065 | 0.6962 |
| Decomposition Images | PSNR [dB] (4 bit) | PSNR [dB] (5 bit) | SSIM (4 bit) | SSIM (5 bit) |
|---|---|---|---|---|
| Image 1 (Figure 35a and Figure 36a) | 29.150 | 35.668 | 0.9750 | 0.9935 |
| Image 2 (Figure 35b and Figure 36b) | 29.160 | 35.685 | 0.9714 | 0.9915 |
| Image 3 (Figure 35c and Figure 36c) | 28.627 | 35.344 | 0.8750 | 0.9653 |
| Image 4 (Figure 35d and Figure 36d) | 29.284 | 35.701 | 0.9585 | 0.9889 |
| Image 5 (Figure 35e and Figure 36e) | 29.232 | 35.703 | 0.9660 | 0.9879 |
| Image 6 (Figure 35f and Figure 36f) | 29.126 | 35.641 | 0.9630 | 0.9906 |
| Evaluation Metrics | Three-Image DRPE | Six-Image DRPE (4 bit) | Six-Image DRPE (5 bit) | Two-Image DRPE | Basic DRPE | [25] |
|---|---|---|---|---|---|---|
| Entropy | ||||||
| amp | 6.9169 | 7.1495 | 7.1501 | 7.0799 | 6.8887 | 7.9986 |
| pha | 7.9644 | 7.9091 | 7.8794 | 7.9323 | 7.9973 | — |
| CC (amp) | ||||||
| H | 0.7701 | 0.8491 | 0.7475 | 0.8869 | 0.0082 | 0.0028 |
| V | 0.6790 | 0.8630 | 0.7625 | 0.8486 | 0.0090 | 0.0014 |
| D | 0.6338 | 0.7689 | 0.6705 | 0.8016 | 0.0068 | 0.0023 |
| CC (pha) | ||||||
| H | 0.6250 | 0.6843 | 0.6028 | 0.6981 | 0.0097 | — |
| V | 0.5652 | 0.7056 | 0.6178 | 0.6605 | 0.0095 | — |
| D | 0.5306 | 0.6123 | 0.5554 | 0.6152 | 0.0073 | — |
| Simultaneous count | 3 | 6 | 6 | 2 | 1 | 1 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.
Share and Cite
Okubo, I.; Cho, B.; Cho, M.; Lee, M.-C. Research on Improving Data Efficiency in Double Random Phase Encryption. Electronics 2026, 15, 934. https://doi.org/10.3390/electronics15050934
Okubo I, Cho B, Cho M, Lee M-C. Research on Improving Data Efficiency in Double Random Phase Encryption. Electronics. 2026; 15(5):934. https://doi.org/10.3390/electronics15050934
Chicago/Turabian StyleOkubo, Iori, Byungwoo Cho, Myungjin Cho, and Min-Chul Lee. 2026. "Research on Improving Data Efficiency in Double Random Phase Encryption" Electronics 15, no. 5: 934. https://doi.org/10.3390/electronics15050934
APA StyleOkubo, I., Cho, B., Cho, M., & Lee, M.-C. (2026). Research on Improving Data Efficiency in Double Random Phase Encryption. Electronics, 15(5), 934. https://doi.org/10.3390/electronics15050934

