You are currently viewing a new version of our website. To view the old version click .
Mathematics
  • Article
  • Open Access

10 April 2022

Double Image Encryption Scheme Based on Compressive Sensing and Double Random Phase Encoding

and
College of Computer Science, Chongqing University, Chongqing 400044, China
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Mathematical Methods for Computer Science

Abstract

In order to overcome the shortcomings of the standard compressive sensing (CS) encryption framework, a novel fusion application scheme of CS and optical transformation technology is proposed. The proposed scheme, making full use of the feature of CS to achieve compression and encryption simultaneously, compresses and encrypts two images into one image, which not only reduces storage space and transmission bandwidth, but also improves the security performance of encryption. In the proposed scheme, the two original images are first sampled with CS, and then double random phase coding is performed to obtain two small-sized images. Meanwhile, the two original images are directly encrypted with double random phase coding to obtain the authentication information. Next, we combine two small-sized images and authentication information into one image, and finally perform double random phase coding again to obtain the final encrypted image. It should be emphasized that the proposed scheme has the function of image authentication. Experiment results validate the effectiveness and advancement of the proposed fusion application scheme.

1. Introduction

Since compressive sensing (CS) theory was proposed in 2004 [1,2,3], it has shown broad application prospects in many fields including signal processing, communication system, image coding, and so on. The main principle of CS is that for a sparse or compressible high-dimensional signal, the measurement matrix can be used to project it onto a low-dimensional space, and then the original high-dimensional signal can be reconstructed from a small number of projections by solving the optimization problem. CS can simultaneously realize sampling and compression, so that the original signal can still be reconstructed under the condition of greatly reducing the sampling rate, and the cost is higher computational complexity in the decoding and reconstruction process. This projection of CS is a way of information protection [4].
When applied to information encryption, CS can be regarded as a symmetric cryptographic system, and its characteristics of simultaneously realizing sampling and compression are manifested as simultaneously realizing encryption and compression. The sparse signal, measurement matrix, compressed sampling, measured values, signal reconstruction, and reconstructed signal of CS correspond to the plaintext information, key, encryption operation, ciphertext information, decryption operation, and decrypted plaintext information in the traditional symmetric cryptosystem. The good fit between CS and traditional symmetric cryptographic systems makes it more natural to apply it to information encryption.
However, the standard CS encryption framework has its own shortcomings like other encryption techniques. For example, the measurement matrix used as the key requires a large storage and transmission overhead; the decryption and reconstruction of the signal is realized by solving an optimization problem, which is more timeconsuming compared with the compression and encryption process [5,6,7]; the measurement values, as ciphertext, will leak the energy information of the plaintext; the encryption cannot achieve the perfect security defined by Shannon [8]. Obviously, in order to overcome the above shortcomings and improve the security level and encryption performance of encryption, the standard CS encryption framework needs to be improved or introduced other techniques for “repair”.
With the rapid development of multimedia information-processing technology, network technology, and cloud computing, image, as a form of multimedia data, is widely used in military, law, economics, medicine, and daily life and other fields, becoming a frequently used information transmission carrier. However, when an image is transmitted through an insecure channel, it is often very susceptible to illegal operations, such as stealing, leaking, and tampering, thereby causing immeasurable losses to the holder of the image. In this way, protecting the privacy of image information has become a very urgent need, which has very important significance and research value.
As more and more researchers pay attention to and participate in the research of image information privacy protection, a large number of image encryption methods and techniques continue to emerge. Among these methods and techniques, image encryption based on CS is believed to be particularly suitable for use in resource-limited scenarios since CS can realize image compression and encryption simultaneously, which has therefore been favored by researchers. As mentioned earlier, the standard CS encryption framework has shortcomings, so the application of CS to image encryption also needs to be improved and “fixed”. Improvement and “repair” are often achieved by combining CS with other image encryption techniques such as optical transformation. As we all know, in the field of image encryption, chaotic system [9,10,11,12,13,14,15,16,17,18,19] and optical transformation are the two most extensive and important techniques. Optical transformation techniques have the characteristics of excellent parallelism, ultra-high speed, large capacity, and small size. The fusion of CS and optical transformation techniques not only strengthens security, but also retains the advantages of the standard CS encryption framework to the greatest extent.
The fusion of CS image encryption and other image encryption techniques brings new vitality to image encryption and provides powerful technology guarantee for safer and more efficient applications of images in military, medical, economic, legal, and other industries.
However, in the existing image encryption methods based on CS and optical transformation, the encrypted image often fails to maintain the same size as the original image, which makes it easy for attackers to perceive compressed sensing encryption. In this way, encrypted images are subject to more targeted attacks and cracking threats. For this reason, we propose a scheme of encrypting two images into one image using CS and double random phase encoding (DRPE), which not only makes the encrypted image consistent in size with the original image, but also gives full play to the compression function of CS. In the proposed scheme, the two original images are first sampled with CS, and then DRPE is performed to obtain two small-sized images. Meanwhile, the two original images are directly encrypted with DRPE to obtain the authentication information. Next, we combine two small-sized images and authentication information into one image, and finally perform DRPE again to obtain the final encrypted image. It should be emphasized that the proposed scheme has the function of image authentication.

3. The Proposed Scheme

3.1. The Framework of Proposed Scheme

The proposed double image encryption scheme based on CS and DRPE includes two main stages: the encryption stage and the decryption stage. In the encryption stage, the two original images A and B are compressed and sampled (encrypted), respectively, through CS, and then DRPE is performed to obtain two small-sized images, A1 and B1. Meanwhile, the two original images are directly encrypted with DRPE to obtain the authentication information, A2 and B2. Next, the two small-sized images (A1 and B1) are combined with the authentication information of the two images (A2 and B2) into an image C, and we finally perform DRPE on C to obtain the final encrypted image. The decryption process is the reverse process of encryption. Figure 1 shows the overall framework of the encryption process.
Figure 1. The framework of the proposed encryption process.

3.2. Compresive Sampling and DRPE Encryption

The double image encryption scheme based on CS and DRPE can encrypt two images into one image in one encryption process. The whole process uses CS two times and DRPE five times. In this proposed scheme, the purpose of using CS is to compress the original image, and the starting point for compressing and encrypting two images at the same time is not only to improve the efficiency of image transmission when resources are limited, but also to make the attacker imperceptible for reducing threats against CS encryption. The detailed steps of compressive sampling and DRPE encryption are as follows:
Step 1: For original image A and B with size of N × N , perform discrete wavelet transform (DWT), respectively, to obtain the coefficient matrices CMA and CMB.
C M A = Ψ × A × Ψ
C M A = Ψ × B × Ψ
where Ψ is an orthogonal wavelet matrix and its transpose is Ψ .
Step 2: Set the sample rate to 3/8. Without loss of generality, use a random Gaussian matrix to generate two measurement matrices Φ A and Φ B with size of ( 3 / 8 N ) × N .
Step 3: The coefficient matrices CMA and CMB are sampled with the measurement matrices Φ A and Φ B , respectively, and the measurement value matrices Y A and Y B are obtained.
Y A = Φ A × C M A
Y B = Φ B × C M B
Step 4: According to DRPE proposed by Philippe Refregier and Bahram Javidi in [20], construct two independent random matrices R 1 and R 2 with size of ( 3 / 8 N ) × N uniformly distributed on [0, 1], denoted as s ( x , y ) and f ( u , v ) , respectively. Use the following formulas to generate the space-domain encryption key R P M 1 and the frequency-domain encryption key R P M 2 for DRPE, denoted as m ( x , y ) and M ( u , v ) , respectively.
m ( x , y ) = exp [ i 2 π s ( x , y ) ]
M ( u , v ) = exp [ i 2 π f ( u , v ) ]
where ( x , y ) are the space domain coordinates and ( u , v ) are the frequency domain coordinates.
Step 5: Quantify the measurement matrices Y A and Y B to the interval [0, 255]. Perform DRPE to Y A and Y B to obtain encrypted matrices E A 1 and E B 1 .
E A 1 = F T 1 { F T { Y A q m ( x , y ) } · M ( u , v ) } = Y A q m ( x , y ) F T 1 { M ( u , v ) }
E B 1 = F T 1 { F T { Y B q m ( x , y ) } · M ( u , v ) } = Y B q m ( x , y ) F T 1 { M ( u , v ) }
where Y A q and Y B q are the quantized matrices of measurement value matrices Y A and Y B , respectively, “ ” denotes convolution operation, F T { · } denotes Fourier transform, and F T 1 { · } denotes inverse Fourier transform. The obtained encryption matrices E A 1 and E B 1 are both generalized stationary random white noise.
Step 6: The same as Step 4. Construct two independent random matrices R 3 and R 4 with size of N × N uniformly distributed on [0, 1]. Generate the space-domain encryption key R P M 3 and the frequency-domain encryption key R P M 4 for DRPE, respectively.
Step 7: The same as Step 5. Perform DRPE directly to original images A and B to obtain encrypted matrices E A and E B . Compute the phase diagram matrices P H A and P H B , respectively, by the following formulas:
P H A = a n g l e ( E A ) × 180 / π
P H B = a n g l e ( E B ) × 180 / π
where a n g l e ( ) is a function for calculating the complex phase angle of E A and E B .
Step 8: Use 0 as the threshold to quantify P H A and P H B , respectively, obtaining two binary images I A and I B .
I A ( x , y ) = { 1 ,     P H A ( x , y ) > 0 0 ,   P H A ( x , y ) 0
I B ( x , y ) = { 1 ,     P H B ( x , y ) > 0 0 ,   P H B ( x , y ) 0
Step 9: Combine every 8 pixels of binary image images I A and I B into a gray image pixel with value range of [0, 255] to obtain the authentication information matrices E A 2 and E B 2 of original images A and B, respectively. They have the same size, ( 1 / 8 N ) × N .
Step 10: Combine, E A 1 , E B 1 , E A 2 , and E B 2 generated by the above steps into an image C, the size of which is exactly N × N , which is consistent with the size of the original images A and B.
Step 11: Using the space-domain encryption key R M P 3 and the frequency-domain encryption key R M P 4 generated by Step 6, DRPE is performed on C again to obtain the final encrypted image E C , with size of N × N . So far, the proposed scheme has successfully encrypted the two original images into one ciphertext image.

3.3. Decryption Process

The decryption process is the reverse process of encryption. The entire decryption process uses two times of CS reconstruction and five times of inverse DRPE. Figure 2 shows the framework of the decryption process.
Figure 2. The framework of the proposed decryption process.
Step 1: With the help of the frequency-domain encryption key R M P 4 generated by the encryption process Step 6, the frequency-domain decryption key R M P 4 is constructed. The decryption key is the complex conjugate function of the encryption key, M ( u , v ) .
M ( u , v ) = exp [ i 2 π f ( u , v ) ]
Step 2: Perform inverse DRPE on the ciphertext image E C to obtain the decrypted image C ˜ .
C ˜ ( x , y ) = F T 1 { F T { E C ( x , y ) } · exp [ i 2 π f ( u , v ) ] }
Substitute the formula similar with Step 5 in the encryption process into the above formula. The above formula can be further simplified:
C ˜ ( x , y ) = F T 1 { F T { C ( x , y ) · exp [ i 2 π s ( x , y ) ] } } = C ( x , y ) · exp [ i 2 π s ( x , y ) ]
where C ( x , y ) denotes the original image of C. exp [ i 2 π s ( x , y ) ] is the space-domain encryption key R M P 3 . Since C ( x , y ) is a positive real value, the phase term will disappear when a light intensity detector such as a CCD is placed on the output surface for detection, and the original image C ( x , y ) can be obtained.
Step 3: With the help of compressive sampling rate and authentication message processing algorithm during encryption, decompose the decrypted image C ˜ into four parts A ˜ 1 , B ˜ 1 , A ˜ 2 , and B ˜ 2 . The size of A ˜ 1 and B ˜ 1 is ( 3 / 8 N ) × N , while the size of A ˜ 2 and B ˜ 2 is ( 1 / 8 N ) × N .
Step 4: With the help of the space-domain encryption key R P M 1 and the frequency-domain encryption key R P M 2 generated by Step 4 in the encryption process, use the algorithm shown in decryption process Step 1 to generate the frequency-domain decryption key, and use the algorithm shown in decryption process Step 2 to perform inverse DRPE on A ˜ 1 and B ˜ 1 , respectively, to obtain Y ˜ A and Y ˜ B .
Step 5: Decompose each pixel of A ˜ 2 and B ˜ 2 (value range [0, 255]) bit by bit into eight binary values, respectively, and rearrange these binary values into two N × N -sized matrices to obtain two binary images.
Step 6: Perform the following transformations on the binary images A ˜ 2 and B ˜ 2 to obtain two phase images P H ˜ A and P H ˜ B .
P H ˜ A = { π ,         A ˜ 2 ( x , y ) = 0 π ,             A ˜ 2 ( x , y ) = 1
P H ˜ B = { π ,         B ˜ 2 ( x , y ) = 0 π ,             B ˜ 2 ( x , y ) = 1
Step 7: The same as Step 1 of the decryption process. The frequency-domain decryption key for DRPE decryption is calculated. Using the algorithm of Step 2 in the decryption process, DRPE decryption is performed on P H ˜ A and P H ˜ B , and the authentication information P A A and P A B for detection and authentication are obtained, respectively.
Step 8: With the help of the orthogonal wavelet matrix Ψ and the measurement matrices Φ A and Φ B generated by Step 1 and Step 2 in the encryption process, the OMP algorithm is applied for reconstruction, and the reconstructed images A ˜ and B ˜ are obtained.
Step 9: With the help of P A A and P A B obtained in Step 7 of the decryption process, authentication is performed on the reconstructed image A ˜ and B ˜ . For authentication testing, it is first necessary to calculate the statistical non-linear correlation between the reconstructed image and the authentication information. The mathematical definition is as follows:
C O ( x , y ) = F T 1 { | A ˜ ( μ , η ) · P A A ( ξ , υ ) | k · exp [ φ A ˜ ( μ , η ) φ P A A ( ξ , υ ) ] }
where A ˜ ( μ , η ) denotes the reconstructed image A ˜ , P A A ( ξ , υ ) denotes the 2D Fourier transform form of the authentication information P A A , φ A ˜ ( μ , η ) denotes the phase image of reconstructed image A ˜ , and φ P A A ( ξ , υ ) denotes the phase image of authentication information P A A . The parameter k is usually set to 0.3.
Peak to Correlation Energy (PCE) [33] refers to the energy ratio of the correlation peak on the entire correlation surface, which is usually used to measure the correlation between the reconstructed image and the authentication information. Its mathematical definition is as follows:
P C E = max ( C O ( x , y ) 2 ) X = 1 M y = 1 N C O ( x , y ) 2
where M and N are the size of the image in the horizontal and vertical directions, respectively. The higher the PCE value, the stronger the correlation between the reconstructed image and the authentication information.

4. Experiments and Analysis

In order to evaluate the performance of the proposed scheme, this section conducts simulation experiments and analysis. Image Lady, Woman, Milkdrop, and Airplane with size of 256 × 256 are chosen as test images. Two-dimensional discrete wavelet transform is applied for sparse representation of the test images. Without loss of generality, the compression rate is set to 3/8 and the Orthogonal Match Pursuit (OMP) algorithm is used to reconstruct the original image.

4.1. Encryption and Decryption Effect Evaluation

Based on the theoretical analysis of the proposed scheme, the encryption effects of this scheme come from the dual effects of CS and DRPE. Figure 3 shows the relevant experimental results. From left to right, the first to third columns correspond to the original images, the encrypted image, and the reconstructed image with the correct secret key.
Figure 3. Effectiveness evaluation of the proposed scheme. (a) Original images Lady and Woman, (b) encrypted image, and (c) reconstructed images Lady (PSNR: 30.2424 dB) and Woman (PSNR: 32.8682 dB). (d) Original images Milkdrop and Airplane, (e) encrypted image, and (f) reconstructed imagesMilkdrop (PSNR: 32.740 dB) and Airplane (PSNR: 33.6446 dB). (g) Original images Woman and Milkdrop, (h) encrypted image, and (i) reconstructed images Woman (PSNR: 32.9014 dB) and Milkdrop (PSNR: 32.7725 dB). (j) Original images Airplane and Lady, (k) encrypted image, and (l) reconstructed images Airplane (PSNR: 33.6833 dB) and Lady (PSNR: 30.3596 dB).
From the perspective of encryption performance, it is impossible to obtain any valuable information from the encrypted image. Encrypt two original images with a size of 256 × 256 into an encrypted image with a size of 256 × 256 , and the storage space occupied by the encrypted image is only half of the original images. It can be seen that the encryption performance and compression performance of the proposed scheme were verified. Next, we mainly use visual effects and peak signal-to-noise ratio (PSNR), a commonly used evaluation indicator of decrypted image quality, to evaluate the quality of the image decrypted and reconstructed with the correct key. In terms of visual effects, the decrypted and reconstructed image in column 3 is very similar to the original image in column 1, and the main information in the original image can be clearly identified in the decrypted and reconstructed image. From the value of peak signal-to-noise ratio, the PSNR of the decrypted and reconstructed images are both greater than 30 dB . In addition, since the proposed scheme is to encrypt two images into one image, we deliberately set up comparative simulation experiments to investigate whether the two images affect each other’s decryption and reconstruction image quality. Through experiments, it can be seen that the quality of the reconstructed image has nothing to do with the partner image when not being attacked. For example, the PSNR of the reconstructed and decrypted image after encrypting image Woman and Lady together is 32.8682 dB , and the PSNR of the reconstructed and decrypted image after encrypting image Woman and Milkdrop together is 32.9014 dB . The difference between the two is only due to the quantization error in both the encryption process and decryption process.

4.2. Histogram Analysis

The image histogram is used to represent the histogram of the brightness distribution in the digital image. It plots the number of pixels of each brightness value in the image. It is an effective indicator for evaluating the distribution of pixel values. The histogram does not change due to image translation, rotation, or scaling.Generally speaking, the histogram of the plaintext image shows obvious statistical law, and the attack against this statistical law is called a statistical analysis attack. The histogram statistical analysis attack means that the attacker cracks the encrypted image by analyzing the law of the histogram of the encrypted image and the original image. An effective image encryption scheme should make the histograms of encrypted images uniformly distributed or make the histograms of all encrypted images have similar distributions, so as to effectively resist attacks based on pixel value statistics. Figure 4 shows the simulation results of the histogram. It is not difficult to see from the figure that the histogram of any image in each group of images is obviously different from the histogram of encrypted image.
Figure 4. Histogram analysis. (a) Original image Lady, (b) original imageWoman, (c) encrypted image 1, (d) the histogram of Lady, (e) the histogram of Woman, (f) and the histogram of encrypted image 1. (g) Original image Milkdrop, (h) original image Airplane, (i) encrypted image 2, (j) the histogram of Milkdrop, (k) the histogram of Airplane, and (l) the histogram of encrypted image 2. (m) Original image Woman, (n) original image Milkdrop, (o) encrypted image 3, (p) the histogram of Woman, (q) the histogram of Milkdrop, and (r) the histogram of encrypted image 3. (s) Original image Airplane, (t) original image Lady, (u) encrypted image 4, (v) the histogram of Airplane, (w) the histogram of Lady, and (x) the histogram of encrypted image 4.
In addition, for all encrypted images, their histograms show similar distribution rules, and it is impossible to distinguish the effective features of original images from encrypted images.
In order to measure the similarity of the histograms, we use the Euclidean distance method, that is, to compare their similarity by calculating the Euclidean distance of the histograms of two images. The smaller the value, the more similar the histograms of the two images. Table 1 shows the Euclidean distances between the histograms of each encrypted image in Figure 4. It can be seen from the numerical value that the similarity of the histograms of all ciphertext images is very high.
Table 1. Comparison of histogram similarity between cipher images in Figure 4.
In summary, it can be concluded that this encryption scheme can effectively resist histogram statistical analysis attacks.

4.3. Key Space Analysis

The key space is an important indicator to measure the security performance of an encryption system. The larger the key space, the more difficult it is to brute force. The size of the key space is determined by the key length. According to [34], when the key space is greater than 2 100 , in theory, the cryptosystem can resist brute force attacks. The proposed encryption scheme uses a set of keys, including parameters such as sampling rate, four random phase masks, and a CS measurement matrix. The sampling rate is a double-precision type with a value range of [0, 1]. The random phase mask and the measurement matrix are both matrices. They are used as keys. Obviously, the key space is extremely large, so that the attacker cannot make enough attempts within the effective time. Therefore, it can resist brute force attacks well.

4.4. Correlation Analysis

Another important indicator for evaluating the performance of an image encryption scheme is the correlation between adjacent pixels. Generally speaking, there is a strong correlation between adjacent pixels of a plaintext image, while the correlation between adjacent pixels of a ciphertext image encrypted by an effective encryption scheme is relatively low. In the adjacent pixel correlation simulation, without loss of generality, we choose image Lady and Woman as plaintext images, and use the encrypted image of the two as the contrast ciphertext image. In order to calculate the correlation coefficient in the horizontal direction, the vertical direction and the diagonal direction, 5000 pairs are randomly selected from the plaintext images and the ciphertext image, respectively. The following formula is the mathematical definition of the correlation coefficient Cor, which is used to evaluate the correlation between two adjacent pixels
C o r ( X ) = i = 1 m ( x i E ( x ) ) ( y i E ( y ) ) i = 1 m ( x i E ( x ) ) 2 i = 1 m ( y i E ( y ) ) 2
where x i and y i denote two randomly selected pixels in the test image, m denotesthe number of selected pixel pair, and E ( · ) refers to the function to calculate the average. Figure 5 and Table 2 show the correlation calculation results of the original image and the encrypted image involved in the proposed scheme in the horizontal, vertical, and diagonal directions. From the figure, we can clearly see that there is a strong correlation between the pixels of the original image, while the correlations between the pixels of the encrypted image are weak.
Figure 5. Correlation analysis: (ac) horizontal direction, vertical direction, and diagonal direction in plain image Lady; (df) horizontal direction, vertical direction, and diagonal direction in plain image Woman; (gi) horizontal direction, vertical direction, and diagonal direction in encrypted image.
Table 2. Correlation coefficients of two adjacent pixels in the pain and encrypted images.

4.5. Authentication Performance Analysis

The proposed scheme can conduct authentication. Step 9 in decryption process gives the method of authentication, i.e., calculating the peak correlation energy (PCE). Table 3 and Figure 6 show the PCE values of the relevant reconstructed images and the corresponding authentication information. It can be seen from the third column of Figure 6 that there is a peak on the correlation plane between the reconstructed image and the authentication information, which shows that the reconstructed image has a strong correlation with the authentication information.
Table 3. The PCE values between the constructed images and their authentication information.
Figure 6. Authentication performance analysis. (a) The reconstructed images Lady and Woman, (b) the authentication information, and (c) PCE: Lady (PCE: 0.002625) andWoman (PCE: 0.003823). (d) The reconstructed images Milkdrop and Airplane, (e) the authentication information, and (f) PCE: Milkdrop (PCE: 0.004608) and Airplane (PCE: 0.000711). (g) The reconstructed images Woman and Milkdrop, (h) the authentication information, and (i) PCE: Woman (PCE: 0.002654) and Milkdrop (PCE: 0.004656). (j) The reconstructed images Airplane and Lady, (k) the authentication information, and (l) PCE: Airplane (PCE: 0.000522) and Lady (PCE: 0.003023).

4.6. Robustness Analysis

In order to test the robustness of the proposed scheme against noise attacks, we test the quality of decrypted reconstructed images under different intensities of noise. In this section, image Lady and Woman with size of 256 × 256 are selected as the test images. Salt and pepper noise with an intensity of 0.001%, 0.003%, 0.005%, and 0.007% is respectively added to the ciphertext image encrypted by the above two images, and then we decrypt and reconstruct the encrypted ciphertext. Figure 7 shows the results of the simulation experiment. Similarly, Gaussian noise with intensity 0.0001%, 0.0003%, 0.0005%, and 0.0007% is respectively added to the ciphertext image encrypted by the above two images, and then the encrypted ciphertext is decrypted and reconstructed. Figure 8 gives the results of the simulation experiment. We add speckle noise with an intensity of 0.0001%, 0.0003%, 0.0005%, and 0.0007% to the ciphertext image encrypted by the above two images, respectively, and then decrypt and reconstruct the encrypted ciphertext. Figure 9 shows the result of the simulation experiment. Through the above three anti-noise tests, it can be seen that when the ciphertext image is contaminated by different noises, the decrypted and reconstructed image still maintains a higher PSNR with the original image, which is meaningful.
Figure 7. Robustness evaluation against salt and pepper noise: the first column is sequentially cipher image with salt and pepper noise intensities of 0.001%, 0.003%, 0.005%, and 0.007%, while the second and third columns denote the decrypted images corresponding to the first column, respectively. (a) Salt and pepper noise with intensity of 0.001%, (b) PSNR = 30.0951, (c) PSNR = 32.6647; (d) salt and pepper noise with intensity of 0.003%, (e) PSNR = 26.5440, (f) PSNR = 28.5623; (g) salt and pepper noise with intensity of 0.005%, (h) PSNR = 26.2989, (i) PSNR = 28.0024; (j) salt and pepper noise with intensity of 0.007%, (k) PSNR = 25.9692, (l) PSNR = 27.9644.
Figure 8. Robustness evaluation against Gaussian noise: the first column has asequentially cipher image with Gaussian noise intensities of 0.0001%, 0.0003%, 0.0005%, and 0.0007%, while the second and third columns denote the decrypted images corresponding to the first column, respectively. (a) Gaussian noise with intensity of 0.0001%, (b) PSNR = 29.8744 dB, (c) PSNR = 32.2412 dB; (d) Gaussian noise with intensity of 0.0003%, (e) PSNR = 29.1993 dB, (f) PSNR = 31.4085 dB; (g) Gaussian noise with intensity of 0.0005%, (h) PSNR = 28.7798 dB, (i) PSNR = 31.0102 dB; (j) Gaussian noise with intensity of 0.0007%, (k) PSNR = 28.5866 dB, (l) PSNR = 30.6265 dB.
Figure 9. Robustness evaluation against speckle noise: the first column has a sequentially cipher image with speckle noise intensities of 0.0001%, 0.0003%, 0.0005%, and 0.0007%, while the second and third columns denote the decrypted images corresponding to the first column, respectively. (a) Speckle noise with intensity of 0.0001%, (b) PSNR = 30.0951 dB, (c) PSNR = 32.6647 dB; (d) speckle noise with intensity of 0.0003%, (e)PSNR = 30.0451 dB, (f) PSNR = 32.5451 dB; (g) speckle noise with intensity of 0.0005%, (h) PSNR = 29.9122 dB, (i) PSNR = 32.3052 dB; (j) speckle noise with intensity of 0.0007%, (k) PSNR = 29.7490 dB, (l) PSNR = 32.1894 dB.
In order to test the robustness of the proposed scheme against shearing attacks, we cut the image blocks with size of in the upper left corner, lower left corner, upper right corner, lower right corner, and central position of the ciphertext image in order to obtain the corresponding shearing-attacked ciphertext images, which are shown in the first column of Figure 10. The second and third columns of Figure 10 show the decrypted and reconstructed images corresponding to the shearing-attacked ciphertext images. The experimental simulation results show that the decrypted and reconstructed images from the shearing-attacked ciphertext images still contain most of the information of the original image, indicating that the proposed scheme can resist the shearing attack to a certain extent.
Figure 10. Robustness against shearing attack analysis: The first row to the fifth row in the first column are sequentially the cipher image with shearing attack in the upper left corner, the upper right corner, the bottom left corner, the bottom right corner, and the central directions; the second column and the third column denote the decrypted images corresponding to the first column.
For the perspective of the robustness against differential attack, we give our theoretical analysis here. Differential attack works when the key is reused. In this proposed scheme, the key, including sampling/compression rate, four random phase masks, and a CS measurement matrix, is used only once. We change our key each time of encryption. Therefore, the proposed scheme can resist differential attack.

5. Conclusions

This paper puts forward a new secure double image encryption scheme based on CS and DRPE, which not only realizes the compression and encryption of two images into one image, but also realizes image authentication. In the proposed scheme, the two original images are firstly compressed using CS, and then DRPE is performed to obtain two small-sized images. Meanwhile, the two original images are directly subjected to DRPE to obtain the authentication information. Then, we combine two small-size images and authentication information into one image, and finally perform DRPE to obtain the final encrypted image. The proposed scheme makes full use of the advantages of CS to achieve compression and encryption simultaneously, and combines CS with optical transformation technology, which not only reduces storage space and transmission bandwidth, but also improves the security performance of encryption. It has better application value in resource-constrained scenarios.

Author Contributions

Conceptualization, R.Z.; validation, D.X.; Writing—original draft, R.Z.; supervision, D.X.; project administration, D.X.; funding acquisition, D.X. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China (Grant No. 62072063).

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Donoho, D.L. Compressed sensing. IEEE Trans. Inf. Theory 2006, 52, 1289–1306. [Google Scholar] [CrossRef]
  2. Candes, E.J.; Romberg, J.; Tao, T. Robust uncertainty principles: Exact signal reconstruction from highly incomplete frequency information. IEEE Trans. Inf. Theory 2006, 52, 489–509. [Google Scholar] [CrossRef] [Green Version]
  3. Candès, E.J.; Wakin, M.B. An Introduction to Compressive Sampling. IEEE Signal Process. Mag. 2008, 25, 21–30. [Google Scholar] [CrossRef]
  4. Candes, E.J.; Tao, T. Near-Optimal Signal Recovery from Random Projections: Universal Encoding Strategies? IEEE Trans. Inf. Theory 2006, 52, 5406–5425. [Google Scholar] [CrossRef] [Green Version]
  5. Tropp, J.A.; Gilbert, A.C. Signal Recovery from Random Measurements Via Orthogonal Matching Pursuit. IEEE Trans. Inf. Theory 2007, 53, 4655–4666. [Google Scholar] [CrossRef] [Green Version]
  6. Figueiredo, M.; Nowak, R.D.; Wright, S.J. Gradient Projection for Sparse Reconstruction: Application to Compressed Sensing and Other Inverse Problems. IEEE J. Sel. Top. Signal Process. 2007, 1, 586–597. [Google Scholar] [CrossRef] [Green Version]
  7. Chartrand, R. Exact Reconstruction of Sparse Signals via Nonconvex Minimization. IEEE Signal Process. Lett. 2007, 14, 707–710. [Google Scholar] [CrossRef]
  8. Shannon, C.E. Communication theory of secrecy systems. Bell Syst. Tech. J. 1949, 28, 656–715. [Google Scholar] [CrossRef]
  9. Hua, Z.; Zhou, Y. Image encryption using 2D logistic-adjusted-sine map. Inf. Sci. 2016, 339, 237–253. [Google Scholar] [CrossRef]
  10. Wang, X.; Teng, L.; Qin, X. A novel color image encryption algorithm based on chaos. Signal Process. 2012, 92, 1101–1108. [Google Scholar] [CrossRef]
  11. Zhang, Y.; Xiao, D. Self-adaptive permutation and combined global diffusion for chaotic color image encryption. AEU Int. J. Electron. Commun. 2014, 68, 361–368. [Google Scholar] [CrossRef]
  12. Lui, O.-Y.; Wong, K.-W.; Chen, J.; Zhou, J. Chaos-based joint compression and encryption algorithm for generating variable length ciphertext. Appl. Soft Comput. 2012, 12, 125–132. [Google Scholar] [CrossRef]
  13. Hua, Z.; Zhou, Y.; Pun, C.M.; Chen, C.L.P. 2D Sine Logistic modulation map for image encryption. Inf. Sci. 2014, 297, 80–94. [Google Scholar] [CrossRef]
  14. Zhang, L.Y.; Hu, X.; Liu, Y.; Wong, K.-W.; Gan, J. A chaotic image encryption scheme owning temp-value feedback. Commun. Nonlinear Sci. Numer. Simul. 2014, 19, 3653–3659. [Google Scholar] [CrossRef] [Green Version]
  15. Wen, W.; Zhang, Y.; Fang, Z.; Chen, J.-X. Infrared target-based selective encryption by chaotic maps. Opt. Commun. 2015, 341, 131–139. [Google Scholar] [CrossRef]
  16. Chen, J.-X.; Zhu, Z.-L.; Liu, Z.; Fu, C.; Zhang, L.-B.; Yu, H. A novel double-image encryption scheme based on cross-image pixel scrambling in gyrator domains. Opt. Express 2014, 22, 7349–7361. [Google Scholar] [CrossRef]
  17. Chen, J.-X.; Zhu, Z.-L.; Fu, C.; Zhang, L.-B.; Zhang, Y. Cryptanalysis and improvement of an optical image encryption scheme using a chaotic Baker map and double random phase encoding. J. Opt. 2014, 16, 125403. [Google Scholar] [CrossRef]
  18. Chen, J.-X.; Zhu, Z.-L.; Fu, C.; Zhang, L.-B.; Yu, H. Analysis and improvement of a double-image encryption scheme using pixel scrambling technique in gyrator domains. Opt. Lasers Eng. 2015, 66, 1–9. [Google Scholar] [CrossRef]
  19. Zhang, Y.; Xiao, D.; Wen, W.; Tian, Y. Edge-based lightweight image encryption using chaos-based reversible hidden transform and multiple-order discrete fractional cosine transform. Opt. Laser Technol. 2013, 54, 1–6. [Google Scholar] [CrossRef]
  20. Refregier, P.; Javidi, B. Optical image encryption using inputplane and Fourier plane random encoding. Opt. Lett. 1995, 20, 767–769. [Google Scholar] [CrossRef]
  21. Unnikrishnan, G.; Joseph, J.; Singh, K. Optical encryption by double-random phase encoding in the fractional Fourier domain. Opt. Lett. 2000, 25, 887–889. [Google Scholar] [CrossRef]
  22. Situ, G.; Zhang, J. Double random-phase encoding in the Fresnel domain. Opt. Lett. 2004, 29, 1584–1586. [Google Scholar] [CrossRef] [PubMed]
  23. Zhang, Y.; Wang, B. Optical image encryption based on interference. Opt. Lett. 2008, 33, 2443–2445. [Google Scholar] [CrossRef] [PubMed]
  24. Qin, W.; Peng, X. Asymmetric cryptosystem based on phase-truncated Fourier transforms. Opt. Lett. 2010, 35, 118–120. [Google Scholar] [CrossRef] [PubMed]
  25. Nomura, T.; Javidi, B. Optical encryption using a joint transform correlator architecture. Opt. Eng. 2000, 39, 2031–2035. [Google Scholar]
  26. Lu, P.; Xu, Z.; Lu, X.; Liu, X. Digital image information encryption based on Compressive Sensing and double random-phase encoding technique. Optik 2013, 124, 2514–2518. [Google Scholar] [CrossRef]
  27. Rawat, N.; Kumar, R.; Lee, B. Implementing compressive fractional Fourier transformation with iterative kernel steering re-gression in double random phase encoding. Optik 2014, 125, 5414–5417. [Google Scholar] [CrossRef]
  28. Deepan, B.; Quan, C.; Wang, Y.; Tay, C.J. Multiple-image encryption by space multiplexing based on compressive sensing and the double-random phase-encoding technique. Appl. Opt. 2014, 53, 4539–4547. [Google Scholar] [CrossRef] [PubMed]
  29. Zhang, Y.; Zhang, L.Y. Exploiting random convolution and random subsampling for image encryption and compression. Electron. Lett. 2015, 51, 1572–1574. [Google Scholar] [CrossRef]
  30. Liu, Y.; Hu, Y.; Li, Y.; Qin, Q.; Li, G.; Tan, Z.; Wang, M.; Yan, F. Image Compression-Encryption Scheme via Fiber Specklegram-Based Compressive Sensing and Double Random Phase Encoding. IEEE Photon. J. 2020, 12, 7102311. [Google Scholar] [CrossRef]
  31. Liu, J.L.; Zhang, M.; Tong, X.J.; Wang, Z. Image compression-encryption algorithm based on 2D compressive sensing and dou-ble random phase encoding. J. Phys. Conf. Ser. 2020, 1684, 012123. [Google Scholar] [CrossRef]
  32. Li, H.; Yu, C.; Wang, X. A novel 1D chaotic system for image encryption, authentication and compression in cloud. Multimed. Tools Appl. 2020, 80, 8721–8758. [Google Scholar] [CrossRef]
  33. Kumar, B.V.K.V.; Hassebrook, L. Performance measures for correlation filters. Appl. Opt. 1990, 29, 2997–3006. [Google Scholar] [CrossRef] [PubMed]
  34. Alvarez, G.; Li, S. Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems. Int. J. Bifurc. Chaos 2006, 16, 2129–2151. [Google Scholar] [CrossRef] [Green Version]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.