Next Article in Journal
Low Phase Noise Millimeter-Wave Generation Based on Optoelectronic Feed-Forward
Previous Article in Journal
Simulation-Based Verification and Application Research of Spatial Spectrum Modulation Technology for Optical Imaging Systems
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Security-Enhanced Three-Dimensional Image Hiding Based on Layer-Based Phase-Only Hologram Under Structured Light Illumination

1
School of Computer Science and Technology, University of Science and Technology of China, Hefei 230026, China
2
Aviation Industry Crop Huadong Photoelectric Company Limited, Wuhu 241003, China
3
College of Optical and Electronic Technology, China Jiliang University, Hangzhou 310018, China
*
Author to whom correspondence should be addressed.
Photonics 2025, 12(8), 756; https://doi.org/10.3390/photonics12080756
Submission received: 28 May 2025 / Revised: 9 July 2025 / Accepted: 15 July 2025 / Published: 28 July 2025

Abstract

In this paper, a security-enhanced three-dimensional (3D) image hiding and encryption method is proposed by combining a layer-based phase-only hologram (POH) under structured light illumination with chaotic encryption and digital image watermarking technology. In the proposed method, the original 3D plaintext image is firstly encoded into a layer-based POH and then further encrypted into an encrypted phase with the help of a chaotic random phase mask (CRPM). Subsequently, the encrypted phase is embedded into a visible ciphertext image by using a digital image watermarking technology based on discrete wavelet transform (DWT) and singular value decomposition (SVD), leading to a 3D image hiding with high security and concealment. The encoding of POH and the utilization of CRPM can substantially enhance the level of security, and the DWT-SVD-based digital image watermarking can effectively hide the information of the 3D plaintext image in a visible ciphertext image, thus improving the imperceptibility of valid information. It is worth noting that the adopted structured light during the POH encoding possesses many optical parameters, which are all served as the supplementary keys, bringing about a great expansion of key space; meanwhile, the sensitivities of the wavelength key and singular matrix keys are also substantially enhanced thanks to the introduction of structured light, contributing to a significant enhancement of security. Numerical simulations are performed to demonstrate the feasibility of the proposed 3D image hiding method, and the simulation results show that the proposed method exhibits high feasibility and apparent security-enhanced effect as well as strong robustness.

1. Introduction

Image is an important carrier of information but vulnerable to attack or tampering when it is transmitted as a plaintext; therefore, image encryption technology has been a research highlight in the field of information security. Since the double random phase encoding (DRPE) method was proposed by Refregier and Javidi in 1995 [1], optical image encryption has played an increasingly important role in the field of image encryption due to its merits of rapid processing speed, high parallelism, and sufficient degree of freedom in security key [2,3]. In the past years, more and more frontier technologies, such as compressive sensing [4,5,6], metasurface [7,8,9,10], quantum walks [11,12], and ghost imaging [13,14,15], have been gradually introduced into optical image encryption, thereby promoting the vigorous development of this technology. However, most optical image encryption technologies are only applicable to the encryption of a two-dimensional (2D) image. Compared with a 2D image, a three-dimensional (3D) image possesses a richer content and larger information capacity, and it can express the depth, position, and spatial relationship of the target object more accurately and quantitatively. Consequently, how to encrypt the 3D image has become a research hotspot in the field of optical image encryption in recent years. So far, several beneficial research studies about optical 3D image encryption have been developed, whose core technologies are respectively based on diffractive imaging [16], integral imaging [17,18,19], the optical heterodyne technique [20], interferenceless coded aperture correlation holography [21], digital holography [22,23,24], and computer-generated holography [25,26,27,28,29,30,31]. It can be seen that holographic technology has very extensive applications in three-dimensional image encryption. Meanwhile, as a research hotspot in information optics, holographic technology has also been applied in more fields [32,33]. Among various holographic techniques, computer-generated holography has many unique merits of flexible encoding, easy storage, and photorealistic reconstruction for both virtual and real 3D scenes. For example, Kong et al. successively proposed an optical 3D image encryption method [25] based on Fourier computer-generated hologram (CGH) and vector stochastic decomposition algorithm and a 3D information hierarchical encryption method [26] based on Fresnel CGH and chaotic random phase mask (CRPM). Later, Han et al. [27] combined the iterative phase retrieval algorithm with the layer-oriented angular-spectrum algorithm for generating a novel 3D image encryption algorithm. In addition, Piao et al. successively proposed two multi-depth 3D image encryption methods based on a phase retrieval algorithm [28] and a CGH with a cascaded structure [29], respectively. Besides, Wang et al. [30] proposed a 3D image encryption method by using the layer-oriented angular-spectrum algorithm, double-phase method, and CRPM. Recently, Su et al. [31] also proposed a 3D image encryption method based on structured light illumination and iterative layer-oriented angular-spectrum algorithm.
However, 3D plaintext images are encrypted into the ciphertexts with noise-like distribution in all CGH-based 3D image encryption methods mentioned above [25,26,27,28,29,30,31], which may cause these ciphertexts to attract unnecessary attention during their transmission process and become vulnerable to illegal attacks, resulting in a serious threat to the security of 3D plaintext information. To solve this problem, Ji et al. [34] proposed a 3D image hiding method based on CGH and Henon mapping very recently, where the 3D plaintext image to be encrypted is firstly encoded into a phase-only hologram (POH) by using a classical layer-oriented angular-spectrum algorithm, and subsequently the POH is encrypted by introducing CRPM generated through the Henon mapping technique, and finally the encrypted result is embedded into a 2D host image by combining discrete wavelet transform (DWT) and singular value decomposition (SVD) algorithms, achieving 3D plaintext information hiding with high concealment. The biggest advantage of this innovative scheme is that the final ciphertext is a visible image not easily perceived by illegal attackers so that the concerns of potential third-party attackers regarding the encrypted 3D plaintext information can be effectively mitigated. However, the security of such a good 3D image hiding method with high imperceptibility is inadequate for high-security applications because of its small key space and low key sensitivities. Regarding key sensitivity, the decrypted 3D image’s contour can still at least be easily recognizable with the naked eyes when the error rate reaches a half for any one of two singular matrix keys, or the wavelength key deviation is near 50 nm, or the diffraction distance key deviation is near 50 mm. To be honest, these low key sensitivities are a bit difficult to accept for most of optical image encryption methods. To enhance the security of the 3D image hiding method, in this paper, we propose a security-enhanced 3D image hiding method based on layer-based POH with structured light illumination. In the proposed method, the original 3D plaintext image is initially encoded into a layer-based POH by utilizing an iterative layer-oriented angular-spectrum algorithm with structured light illumination, where the structured light has many optical parameters that all serve as digital keys with high sensitivities such that the types and quantities as well as degrees of freedom of the security keys are all greatly increased, contributing to a significant expansion of key space. Afterwards, the layer-based POH is encrypted into an encrypted phase with the help of a CRPM generated through a piecewise linear chaotic map (PWLCM), in which the key sensitivities used in PWLCM are not worse than those in a Henon map. Finally, the encrypted phase is embedded into a 2D host image by using a DWT-SVD-based digital image watermarking technology. It is certain that the final ciphertext has a visible image distribution, thus it is not easily detectable for any abnormalities, ensuring a high concealment of 3D plaintext information. Most importantly, the sensitivities of singular matrix keys and the wavelength key are substantially enhanced thanks to the introduction of structured light, leading to an apparent enhancement of the level of security. To the best of our knowledge, this is the first time that structured light illumination has been applied in the CGH-based 3D image hiding method, which contributes to a substantial security-enhanced effect, especially the greatly expanded key space and the significantly improved key sensitivities. Therefore, the proposed 3D image hiding method shows the advantages of large key space, high key sensitivities, good concealment, and a high level of security. The main innovation of this paper is the improvement for encoding the layer-based POH with the help of structured light illumination and the application of this novel POH in the digital watermarking, bringing about a security-enhanced 3D image hiding method.

2. Proposed 3D Image Hiding Method

The proposed 3D image hiding method is composed of a hiding process and a decryption process, where the framework diagrams for hiding process and decryption process are depicted in Figure 1 and Figure 2, respectively.

2.1. Hiding Process

The purpose of the proposed 3D image hiding method is to hide a 3D plaintext image in a visual ciphertext image for realizing a 3D image encryption with high security and concealment, and the proposed method is actually composed of three parts: (1) layer-based POH encoding, (2) CRPM-based encryption, and (3) DWT-SVD-based digital image watermarking. Specifically, the proposed 3D image hiding process is divided into the following nine steps:
S1: Slicing of 3D plaintext image: On the original 3D plaintext image is firstly performed an operation of slicing for adapting the subsequent layer-based POH encoding; that is, the original 3D plaintext image is divided into n parallel layers in accordance with depth information, and then the amplitude information of each layer is extracted, where the amplitude information of the i-th layer is recorded as the i-th layer of the plaintext image L i ( x i , y i ) , and i = 1 , 2 , , n stands for the layer index. Afterwards, the hiding step S2 is run.
S2: Generation and illumination of encryption structured light (ESL): A collimated plane wave with unit amplitude is phase-modulated by an encryption structured phase mask (ESPM), thus the ESL is generated. Therefore, the complex amplitude distribution of the generated ESL is equal to the phase distribution of the adopted ESPM. In the proposed method, the ESPM is composed of a Fresnel zone plate and a radial Hilbert mask, and thereby the phase distribution of this ESPM can be written by the following [35]:
E S P M ( ξ , η ) = exp ( j ( arg ( exp ( j π λ f r 2 ) ) + arg ( exp ( j P θ ) ) ) )
where arg ( · ) denotes the operation of phase extraction, j is the imaginary unit, λ is the wavelength of the incident light for encryption, r is the radius of the Fresnel zone plate, f is the focal length of the Fresnel zone plate, P is the topological charge of the radial Hilbert mask, and θ is the spatial azimuth angle of the Hilbert mask. Afterwards, the ESL begins to diffraction forward to the front surface of the POH to be retrieved, and thereby the complex amplitude distribution U 0 ( x 0 , y 0 ) of the ESL propagating forward to the front plane of the POH can be calculated by the following:
U 0 ( x 0 , y 0 ) = A S D λ , z 0 ( E S P M ( ξ , η ) ) = I F T ( F T ( E S P M ( ξ , η ) ) · exp ( j 2 π z 0 λ 1 λ 2 f x 2 λ 2 f y 2 ) )
where A S D λ , z 0 ( · ) stands for the operation of angular spectrum diffraction with the wavelength of λ and the distance of z 0 , F T ( · ) and I F T ( · ) respectively denote the Fourier transform and inverse Fourier transform, z 0 is the distance from the ESPM to the POH, and f x and f y represent spatial frequency coordinates. Afterwards, the hiding step S3 is run.
S3: Forward diffraction: The ESL propagating forward to the front plane of the POH is phase-modulated by the POH, and thus the complex amplitude distribution U 0 Δ ( x 0 , y 0 ) of the ESL propagating forward to the back plane of the POH can be expressed as the following:
U 0 Δ ( x 0 , y 0 ) = U 0 ( x 0 , y 0 ) exp ( j φ H ( x 0 , y 0 ) )
where φ H ( x 0 , y 0 ) denotes the phase distribution of the POH, and it is initially set as a random phase distributed at [0, 2π]; however, it is noted that φ H ( x 0 , y 0 ) will be continuously updated as the iteration process proceeds. Thereafter, the ESL continues to diffract forward and successively reaches the planes of n layers of plaintext images ( P l a n e 1 , P l a n e 2 , , P l a n e n ), where the complex amplitude distribution U i ( x i , y i ) of the ESL propagating forward to P l a n e i can be calculated by the following:
U i ( x i , y i ) = A S D λ , z i ( U 0 Δ ( x 0 , y 0 ) ) ( i = 1 , 2 , , n )
where z i is the distance from the POH to P l a n e i . Subsequently, the amplitude distribution A i ( x i , y i ) and phase distribution φ i ( x i , y i ) of the complex amplitude distribution U i ( x i , y i ) are extracted and saved, which are respectively expressed as follows:
A i ( x i , y i ) = U i ( x i , y i ) φ i ( x i , y i ) = arg ( U i ( x i , y i ) ) ( i = 1 , 2 , , n )
where · denotes the operation of amplitude extraction. Afterwards, the hiding step S4 is run.
S4: Convergence judgment: After the amplitude distribution A i ( x i , y i ) is obtained, it is used as the i -th layer of the decrypted image, and then the correlation coefficient C C i between the i -th layer of decrypted image A i ( x i , y i ) and the i -th layer of plaintext image L i ( x i , y i ) can be calculated. After CCs corresponding to all layers are calculated, the minimum value min { C C i } ( i = 1 , 2 , , n ) among these CCs is extracted for performing the convergence judgment. On the one hand, if min { C C i } exceeds the predefined threshold σ , the iteration has converged, and then the hiding step S6 will be run. On the other hand, if min { C C i } does not exceed the predefined threshold σ , the iteration has not yet converged, and then the amplitude constraint will be conducted, that is, the amplitude distribution A i ( x i , y i ) is replaced with the amplitude distribution L i ( x i , y i ) . Meanwhile, the phase distribution φ i ( x i , y i ) is retained, and thus a new complex amplitude distribution U i ( x i , y i ) at P l a n e i is generated, which can be expressed as the following:
U i ( x i , y i ) = L i ( x i , y i ) exp ( j φ i ( x i , y i ) ) ( i = 1 , 2 , , n )
Afterwards, the hiding step S5 is run.
S5: Backward diffraction: The new complex amplitude distribution U i ( x i , y i ) at P l a n e i will propagate backward to the back plane of the POH, where i = 1 , 2 , , n . Thereafter, the complex amplitude distribution U 0 ( x 0 , y 0 ) of the ESL propagating backward to the back plane of the POH can be calculated by the following:
U 0 ( x 0 , y 0 ) = i = 1 n I A S D λ , z i ( U i ( x i , y i ) ) = i = 1 n A S D λ , z i ( U i ( x i , y i ) ) ( i = 1 , 2 , , n )
where I A S D λ , z i ( · ) stands for the operation of inverse angular spectrum diffraction with the wavelength of λ and the distance of z i . Afterwards, a phase distribution φ H ( x 0 , y 0 ) can be derived by using the complex amplitude distribution U 0 ( x 0 , y 0 ) and the complex amplitude distribution U 0 ( x 0 , y 0 ) calculated above, which can be expressed as follows:
φ H ( x 0 , y 0 ) = arg ( U 0 ( x 0 , y 0 ) U 0 ( x 0 , y 0 ) )
Subsequently, the phase distribution φ H ( x 0 , y 0 ) of the POH is updated by using the phase distribution φ H ( x 0 , y 0 ) , that is, φ H ( x 0 , y 0 ) = φ H ( x 0 , y 0 ) . Afterwards, the hiding step S3 is run again, and the next round of iteration starts.
S6: Output of POH and CRPM-based encryption: When the iteration has converged, the phase distribution φ H ( x 0 , y 0 ) of the POH at this time can be output. So far, the original 3D plaintext image has been encoded into a layer-based POH by utilizing an iterative layer-oriented angular-spectrum algorithm with structured light illumination. Thereafter, a CRPM is generated through the PWLCM [36]. Concretely, a pseudo-random sequence x ( t ) is first produced by using the PWLCM, which can be recured by the following:
x ( t + 1 ) = x ( t ) τ , 0 x ( t ) τ x ( t ) τ 0.5 τ , τ x ( t ) 0.5 1 τ x ( t ) 0.5 τ , 0.5 x ( t ) 1 τ 1 x ( t ) τ , 1 τ x ( t ) 1
In this sequence, t = 1 , 2 , , k , and k denotes the total number of elements in a CRPM, τ is the controlling parameter within the range of [0, 0.5], and x ( 1 ) = ζ represents the initial value within the range of [0, 1]. In fact, each element of this sequence x ( t ) generated by PWLCM is distributed within the range of [0, 1]. By multiplying each element by 2π, thus each element is scaled to lie within the range of [0, 2π]. Subsequently, these elements distributed within the range of [0, 2π] are sequentially arranged into a matrix φ C ( x 0 , y 0 ) with the matrix size the same as the phase distribution φ H ( x 0 , y 0 ) of layer-based POH, and thereby a CRPM is formed. Next, this CRPM is integrated into the layer-based POH for generating a new phase distribution φ H Δ ( x 0 , y 0 ) , which is denoted as an encrypted phase (POHΔ), and it can be expressed as follows:
φ H Δ ( x 0 , y 0 ) = mod ( φ C ( x 0 , y 0 ) + φ H ( x 0 , y 0 ) , 2 π )
where mod ( · ) stands for the operation of modulo. In such a way, the layer-based POH is further encrypted into an encrypted phase POHΔ with the help of a CRPM. Afterwards, the hiding step S7 is run.
S7: DWT and SVD of host image: Firstly, a 2D visual image is selected as the host image, and then the host image is decomposed into four sub-bands ( L L 1 , L H 1 , H L 1 , H H 1 ) via DWT, which represent the low-frequency, vertical high-frequency, horizontal high-frequency, and diagonal high-frequency components, respectively. Thereafter, the low-frequency component L L 1 is further decomposed through SVD in order to generate three components ( U 1 , S 1 , V 1 ), where S 1 is a diagonal matrix, and U 1 and V 1 are two non-empty matrices. Afterwards, the hiding step S7 is run.
S8: Embedding of POH: The encrypted phase POHΔ is embedded into the diagonal matrix S 1 with the help of an embedding factor α ; thus an encryption integrated matrix B is formed, which can be mathematically expressed as follows:
B = S 1 + α φ H Δ ( x 0 , y 0 )
Afterwards, the hiding step S9 is run.
S9: Generation of ciphertext: The encryption integrated matrix B is decomposed via SVD for producing three components ( U 2 , S 2 , V 2 ), where S 2 is a diagonal matrix, and U 2 and V 2 are two non-empty matrices. Thereafter, these three components ( U 1 , S 2 , V 1 ) are employed to perform an operation of inverse SVD (ISVD) for forming a reference sub-band L L 2 , which can be expressed as the following:
L L 2 = U 1 S 2 V 1 T
Subsequently, these four components ( L L 2 , L H 1 , H L 1 , H H 1 ) are employed to perform an operation of inverse DWT (IDWT) for generating the final host image C containing the embedded POH information, which is the final ciphertext.
So far, the 3D image hiding process has been finished completely, that is, an original 3D plaintext image is hiding in a 2D host image for finally generating a ciphertext with visible image distribution, leading to a protection with high concealment for 3D plaintext information. Compared with the current 3D image hiding method [34], the introduction of structured light during the layer-based POH encoding supplies many additional optical parameters being served as digital keys, other than the traditional wavelength and distance keys, such that the types and quantities of security keys are all significantly increased, and all increased digital keys have high sensitivities, contributing to a significant expansion of key space. More importantly, the sensitivities of the wavelength key and singular matrix keys are also greatly enhanced, overcoming the problem about the intolerably low sensitivities of these keys in the current 3D image hiding method [34], bringing about an apparent security-enhanced effect.

2.2. Decryption Process

The decryption process corresponding to the proposed 3D image hiding method is concretely divided into the following five steps:
D1: DWT and SVD of ciphertext: The ciphertext C is firstly decomposed into four sub-bands ( L L 2 , L H 1 , H L 1 , H H 1 ) via DWT. Subsequently, L L 2 is further decomposed through SVD to obtain three components ( U 2 , S 2 , V 2 ). Afterwards, the decryption step D2 is run.
D2: Generation of decrypted phase: The diagonal matrix S 2 is combined with two singular matrix keys ( U 2 , V 2 ) for decryption, and these three components ( U 2 , S 2 , V 2 ) are employed to perform an operation of ISVD for generating the decryption integrated matrix B . Thereafter, the decrypted phase POH is obtained with the help of the diagonal matrix S 1 and the embedding factor α , and its phase distribution φ H ( x 0 , y 0 ) can be calculated by the following:
φ H ( x 0 , y 0 ) = 1 α ( B S 1 )
Afterwards, the decryption step D3 is run.
D3: CRPM-based decryption and output of decrypted POH: Two digital keys ( ζ , τ ) for decryption are respectively used as the controlling parameter and the initial value for generating the decryption CRPM (CRPM) through the same PWLCM as the 3D image hiding process mentioned above, and its phase distribution is recorded as φ C ( x 0 , y 0 ) . Next, the decrypted POH ( P O H ) is obtained with the help of the decrypted phase (POH) and the decryption CRPM (CRPM), and the phase distribution φ H ( x 0 , y 0 ) of P O H can be mathematically calculated by the following:
φ H ( x 0 , y 0 ) = mod ( φ H ( x 0 , y 0 ) φ C ( x 0 , y 0 ) , 2 π )
Afterwards, the decryption step D4 is run.
D4: Generation and illumination of decryption structured light (DSL): A collimated plane wave with unit amplitude is phase-modulated by a decryption structured phase mask (DSPM), thereby the DSL is generated, and then the DSL begins to diffract forward to the front surface of the P O H , thereby the complex amplitude distribution U 0 ( x 0 , y 0 ) of the DSL propagating forward to the front plane of the P O H can be expressed as follows:
U 0 ( x 0 , y 0 ) = A S D λ , z 0 ( D S P M ( ξ , η ) )
where D S P M ( ξ , η ) represents the phase distribution of the DSPM, λ is the wavelength of the decryption incident light, and z 0 is the distance between the DSPM and the P O H . Afterwards, the decryption step D5 is run.
D5: Forward propagation decryption: The DSL propagating forward to the front plane of the P O H is phase-modulated by the P O H , and then the phase-modulated DSL continues to diffract forward and successively reaches the P l a n e 1 , P l a n e 2 , , P l a n e n , thereby the amplitude distribution A i ( x i , y i ) of the DSL propagating forward to P l a n e i can be calculated by the following:
A i ( x i , y i ) = A S D λ , z i ( U 0 ( x 0 , y 0 ) exp ( j φ H ( x 0 , y 0 ) ) ) ( i = 1 , 2 , , n )
Actually, A i ( x i , y i ) is the i-th layer of the decrypted image. After decrypted images corresponding to all layers are obtained, all layers of decrypted images are finally stacked to form a decrypted 3D image.
So far, the 3D image decryption process has been finished completely. It is worth noting that the decryption steps D1–D3 are realized by using a digital approach in general, while the decryption steps D4–D5 can be performed by using either a digital approach or an optical approach with the help of a diffractive imaging system. Moreover, the required security keys for 3D image decryption include two singular matrix keys ( U 2 , V 2 ) and many digital keys containing the initial value key ζ , the controlling parameter key τ , the wavelength key λ , the distance key z 0 between the DSPM and the P O H , and the optical parameter keys of the DSPM (focal length key f and topological charge number key P ), and it is worth claiming that only when all decryption keys are correct can the original 3D plaintext image be correctly retrieved.

3. Simulations and Results

In order to demonstrate the feasibility of the proposed 3D image hiding method, a set of computational simulations are performed. Firstly, a 3D training model with the maximum depth value of 10 mm is constructed in the Autodesk 3ds Max 2023, Version 24.0 and employed as an original 3D plaintext image. Subsequently, the nearest and farthest distances from the 3D train image to the POH to be retrieved are set as 800 mm and 810 mm, respectively. After computer rendering, the amplitude map and depth map of the 3D train image are obtained, which are shown in Figure 3a,b, respectively. Moreover, the wavelength λ of the encryption incident light and the distance z 0 from ESPM to POH are respectively set as 632.8 nm and 200 mm, and the predefined threshold σ of CC is set as 0.95. Additionally, the ESPM is set to consist of a Fresnel zone plate with the focal length f of 30 mm and a radial Hilbert mask with the topological charge number P of 6, and thus the phase distribution of this ESPM can be calculated by using Equation (1), which is presented in Figure 3c. Afterwards, the POH can be generated by using an iterative layer-oriented angular-spectrum algorithm with structured light illumination, which is displayed in Figure 3d. In addition, the initial value ζ and the controlling parameter τ during the generation of CRPM are respectively set as 0.741 and 0.277 such that a CRPM can be generated by using the PWLCM, which is shown in Figure 3e. Thereafter, a grayscale image (“Barbara”) is employed as the 2D host image, which is depicted in Figure 3f. After the operation of DWT, the host image is decomposed into four sub-bands, and the DWT result is displayed in Figure 3g. Moreover, the embedding factor α during the embedding of POH is set to 0.04. After the embedding of POH, an encryption integrated matrix is generated and then decomposed for producing three components ( U 2 , S 2 , V 2 ) via SVD, where two singular matrices, U 2 and V 2 , are shown in Figure 3h,i, respectively. Finally, a ciphertext, that is, the host image C containing the embedded POH information, can be generated, which is displayed in Figure 3j. So far, the hiding process of 3D plaintext image has been finished.
The Shannon entropy, which quantifies the uncertainty, information content, or complexity of pixel values in an image, is commonly used for calculating image information entropy. Its mathematical expression is as follows:
H = i = 1 255 p ( i ) log 2 p ( i )
where p ( i ) is the ratio of the frequency of gray level i to the count of gray level i . In fact, the embedding of encrypted information into the host image typically introduces noise, which inevitably increases its information entropy. Therefore, the entropy variation Δ H serves as an effective metric for evaluating watermarking quality, which is defined as the difference between the ciphertext’s entropy and the original host image’s entropy, and this parameter can demonstrate our scheme’s performance. For the original Barbara image, the measured entropy was 7.6161 bits/pixel. After embedding the encrypted data, the entropy increased marginally to 7.6497 bits/pixel, yielding a minimal Δ H of +0.0336 bits/pixel, merely a 0.44% increase. This negligible entropy change indicates that the embedded ciphertext maintains exceptional statistical similarity to the host image. Potential attackers cannot reliably detect hidden information through entropy analysis. The extremely small entropy perturbation confirms that our watermarking method effectively preserves the host image’s statistical properties while securely concealing the encrypted information.
Next, the decryption process is performed in order to check the effectiveness of keys. Figure 4 shows various decryption results by using all correct keys and only one wrong key. From the decrypted results shown in Figure 4, it can be seen that the original 3D plaintext image can be correctly reconstructed with high quality when all decryption keys are correct; however, any slight deviation in any one of the security keys will prevent the effective recovery of the original 3D plaintext image, resulting in a failed decryption, and these decryption results at this time generally exhibit noise-like distribution, and their CCs are also low to close to zero, making it impossible to identify any features or meaningful information related to the original 3D plaintext image from these decryption results. Consequently, it can be concluded that all keys used in the proposed method are effective and secure. Moreover, it is worth noting that the focal length key as well as the topological charge number key are newly added compared to the current method [34], contributing to an expanded key space.
Subsequently, several relationship curves between the mean of CCs for all layers (average CC) and the key deviations are plotted to describe the sensitivity of each key quantitatively, where the average CC as functions of error percentage of singular matrix U 2 , error percentage of singular matrix V 2 , initial value deviation, controlling parameter deviation Δ τ , wavelength deviation Δ λ , focal length deviation Δ f , topological charge number deviation Δ P , and distance deviation Δ z 0 , are shown in Figure 5a–h, respectively. From the sensitivity curves shown in Figure 5, it can be seen that the CC decreases sharply to close to zero when any one of the keys has a slight deviation, and the original 3D plaintext image cannot be correctly retrieved at this time, proving the high sensitivities of all keys. In particular, the sensitivities of two singular matrix keys ( U 2 and V 2 ) depicted in Figure 5a,b are about 1% error percentage, which are much better than those in the current method [34] because the decrypted 3D image can be easily recognizable with naked eyes when the error percentage of U 2 or V 2 reaches 50% in the current method [34]. Moreover, the sensitivity of the wavelength key shown in Figure 5e is near 1 nm, which is also significantly better than the one that is near 50 nm in the current method [34]. Consequently, it is sure that the proposed method exhibits an obvious sensitivity-enhanced effect compared with the current method [34], which is also beneficial for the expansion of key space and the improvement of security.
Afterwards, the key space data for each digital key can be obtained as shown in Table 1, where the sensitivity described in Table 1 is the digital key deviation when the average CC first drops below 0.1. Meanwhile, the decrypted 3D image exhibits a noise-like distribution without any visible 3D plaintext information, and the value range in Table 1 is obtained from the positive range of int-type data. Thus, the total key space for digital keys in the proposed 3D image hiding method is the product of the key space data of each individual digital key, which is approximately 2 200 . Compared with the current 3D image hiding method proposed by Ref. [34], the supplementary digital keys in our proposed method provide a higher degree of freedom in key space thanks to the introduction of structured light. Meanwhile, the sensitivities of the singular matrix keys and wavelength key are substantially enhanced. Therefore, the total key space in our proposed method is several ten orders of magnitude larger than that in the comparison method proposed by Ref. [34], leading to an apparent security-enhanced effect. It is worth noting that the current key space in our proposed method is still limited because the adopted ESPM is only composed of a Fresnel zone plate and a radial Hilbert mask. Of course, once an ESPM with more optical parameters is used in the future, the key space will naturally expand accordingly. Consequently, it is certain that the proposed 3D image hiding method has a high level of security with large key space and high key sensitivities, leading to strong protection for the 3D plaintext image.
Additionally, the robustness of the proposed 3D image hiding method against noise and occlusion attacks was tested. First, to evaluate its resistance to noise interference, the ciphertext was contaminated with varying levels of Gaussian noise, uniform noise, and salt-and-pepper noise. The ciphertext corrupted by Gaussian noise can be expressed as follows:
C G = C ( 1 + ε G N G )
where C and C G respectively denote the original ciphertext and the contaminated ciphertext, N G is the Gaussian noise with a mean of 0 and a standard deviation of 0.02, and the coefficient ε G is the noise strength. Figure 6 displays various noise-affected decrypted results by changing the noise strength. From the decrypted results displayed in Figure 6, it can be seen that although the quality of the decrypted results decreases as the noise strength increases, the contour of the original 3D plaintext image can still be easily recognized with the naked eyes even when the noise strength reaches its maximum, which indicates that the proposed method has good immunity to noise attack.
To further evaluate the scheme’s robustness against uniform noise, we conducted systematic tests by introducing varying intensities of uniform noise to the ciphertext. The noise-contaminated ciphertext can be mathematically modeled as follows:
C U = C ( 1 + ε U N U )
where C and C U respectively denote the original ciphertext and noise-contaminated ciphertext, N U represents uniform noise with amplitude range of [−0.03, 0.03], and the coefficient ε U indicates the noise intensity. As illustrated in Figure 7, a comparative analysis of decryption outcomes under varying noise intensities is presented. We observe that while the decrypted image quality progressively degrades with increasing noise intensities, the fundamental contours of the original 3D plaintext image remain clearly discernible to the naked eye, even at maximum noise intensity. This empirical evidence conclusively demonstrates our method’s robust resistance to uniform noise attacks.
For the salt-and-pepper noise resistance test, we introduced varying intensity levels of this noise type to the ciphertext, which can be mathematically represented as follows:
C S = C ( 1 + ε S N S )
where C and C S respectively represent the original ciphertext and noise-contaminated ciphertext, and N S denotes salt-and-pepper noise with a density of 0.001 and a balanced 1:1 pepper-to-salt ratio, while the coefficient ε S quantifies the noise intensity. Figure 8 presents a comparative analysis of decryption performance under varying noise intensities. The experimental results demonstrate that although increasing noise intensity progressively degrades the decrypted image quality, the fundamental contours of the original 3D plaintext remain clearly distinguishable through visual inspection, even at maximum noise intensity. This empirical evidence confirms our method’s superior robustness against salt-and-pepper noise attacks.
Next, in order to check the ability to resist an occlusion attack, the part-pixels of ciphertext are occluded. Figure 9 shows the partly occluded ciphertexts with different occlusion ratios and corresponding decrypted results. From the decrypted results depicted in Figure 9, it can be seen that although the quality of the decrypted results decreases with the increment of the occluded area, the contour of the original 3D plaintext image can still be easily distinguished with the naked eyes, which confirms that the proposed method has high robustness against occlusion attacks.
Thereafter, the robustness against a low-pass filtering attack of the proposed 3D image hiding method is also checked by taking mean filtering and frequency-domain smooth filtering for example. Figure 10 presents the ciphertexts after applying mean filtering attacks with different filter windows and corresponding decrypted results. From the decrypted results shown in Figure 10, it can be observed that although the decryption quality decreases as the filter window size increases, a considerable amount of useful information about the 3D plaintext image is still retained, which indicates that the proposed method exhibits good robustness against a mean filtering attack.
Figure 11 presents the ciphertexts after applying smoothing filter attacks with different filter radii and corresponding decrypted results. From the decrypted results shown in Figure 11, it can be observed that although the decryption quality decreases with the decrement of the filter radius, most useful information about 3D plaintext image is still easily recognized with the naked eyes, which proves that the proposed method exhibits strong robustness against a frequency-domain smooth filtering attack.
Hereafter, the resistance of the proposed 3D image encryption method against a chosen-plaintext attack is also examined. For the chosen-plaintext attack, a method based on multiple impulse functions [37] is referenced and applied to the proposed 3D image encryption method. First, by selecting an impulse function as the plaintext, the encrypted phase value corresponding to each pixel of the plaintext image is obtained through the encryption system with the assistance of ESPM and POHC. Subsequently, the encrypted phase is generated after traversing all pixels. Next, a normal POHC is generated by selecting a 3D image as the plaintext image and processing it through the encryption system with the help of ESPM. This 3D plaintext image and the corresponding POHC are then recorded as a plaintext-ciphertext pair. Following this, a phase key is deduced by combining the plaintext-ciphertext pair with the aforementioned encrypted phase, and its phase distribution is illustrated in Figure 12a. Finally, decryption is performed using the deduced phase key as DSPM with the assistance of POHC, and the decrypted results obtained from the POHC are shown in Figure 12b–d, respectively. As can be observed from Figure 12, the deduced phase key in Figure 12a, obtained through the chosen-plaintext attack, is significantly different from the ESPM shown in Figure 3c. Moreover, the corresponding decrypted results in Figure 12b–d contain no valid information related to the original 3D plaintext image, which demonstrates that the proposed method exhibits strong resistance against a chosen-plaintext attack.
Moreover, in order to further demonstrate the high security of the proposed 3D image hiding method, statistical attacks on histogram and correlation analyses are also performed. Figure 13a and Figure 13b show the histograms of the amplitude information of the 3D train image and corresponding ciphertext depicted in Figure 3j, respectively. Besides, a 3D dinosaur skeleton model is constructed and employed as another 3D plaintext image, and its amplitude map and depth map are displayed in Figure 13c and Figure 13d, respectively. Subsequently, the 3D dinosaur skeleton image is also hidden in the 2D host image (“Barbara”) by using the proposed method, and thus a new ciphertext is generated, which is depicted in Figure 13e. Figure 13f and Figure 13g show the histograms of the amplitude information of the 3D dinosaur skeleton image and corresponding ciphertext depicted in Figure 13e, respectively. By comparing the histograms shown in Figure 13a,b with those shown in Figure 13f,g, it can be seen that although the adopted 3D plaintext images in the 3D image hiding mentioned above are completely different, there is no significant difference between the histograms of these two ciphertexts. In such a way, any useful information about the original 3D plaintext image cannot be obtained from the histogram of the ciphertext, proving that the proposed method has good capability to resist a histogram attack.
In addition, correlation analysis is also carried out, in which 25,000 and 5000 pairs of adjacent pixels in horizontal, vertical, and diagonal directions are randomly selected from the amplitude information of the 3D train plaintext image and corresponding ciphertext, respectively. Figure 14(a1–a3) shows the horizontal, vertical, and diagonal correlations of adjacent pixels in the amplitude information of the 3D train plaintext image, respectively. Figure 14(b1–b3) shows the horizontal, vertical, and diagonal correlations of adjacent pixels in the ciphertext depicted in Figure 3j, respectively. From the correlation distributions shown in Figure 14, it can be seen that both plaintext and ciphertext exhibit a strong correlation in all directions, which demonstrates the high imperceptibility of ciphertext with visible image distribution, rather than noise-like distribution with extremely weak correlation in all directions. Consequently, it can be concluded that the proposed method can effectively resist the correlation analysis attack.
Finally, the computational time of the proposed 3D image hiding method is also analyzed in detail. Table 2 lists the used parameters in the simulation and the adopted configuration of computational platform. Under this computational condition, 100 time iterations are performed in sequence.
Figure 15a shows the mapping relationship between the number of iterations and the time consumption, and it can be easily seen from Figure 15a that the time consumption almost linearly increases as the number of iterations increases. However, there is no need to be too high for the number of iterations as well as the time consumption during the actual simulation because the decrypted 3D image has exhibited high quality after a few number of iterations. Figure 15b shows the mapping relationship between the number of iterations and the average CC, and it can be observed that the average CC tends to converge as the number of iterations gradually increases. In particular, when the number of iterations reaches seven, the average CC is calculated as 0.9501, which has reached the predefined threshold, indicating that the decryption quality is already good, and then the average CC will almost be unchanged with more iterations, and the total computational time at this time is only about 2.6 s. Such a short time consumption and a high decryption quality contribute to a low complexity of the proposed method in time consumption. Consequently, it can be concluded that the proposed method has good performance in the aspect of computational time.

4. Discussion and Conclusions

In this paper, we propose a 3D image hiding method with high security and concealment, which combines the layer-based POH under structured light illumination, the CRPM generated through PWLCM, and the DWT-SVD-based digital image watermarking. In the hiding process of the proposed method, a 3D image serving as original plaintext is first encrypted into a layer-based POH by using the iterative layer-oriented angular-spectrum algorithm with structured light illumination, where the calculation error caused by paraxial approximation is avoided owing to the adoption of an angular-spectrum diffraction algorithm, and the iterative calculation is beneficial to the suppression of speckle noise and the improvement of decryption quality. Most importantly, the structured light carrying many optical parameters is introduced into the encoding process of the layer-based POH, leading to a substantial increment of security keys and an apparent expansion of key space, which is helpful for improving the level of security. Afterwards, the layer-based POH is further encrypted into an encrypted phase by using a CRPM generated through PWLCM, in which the initial value and the controlling parameter adopted in PWLCM are used as two digital keys with ultrahigh sensitivities to support a large key space. Finally, the encrypted phase is embedded into a 2D host image by using a DWT-SVD-based digital image watermarking technology. In such a way, the final ciphertext is generated, which has a visible image distribution, ensuring a high concealment of 3D plaintext information. Furthermore, the sensitivities of singular matrix keys and the wavelength key are substantially enhanced due to the introduction of structured light, also contributing to the improvement of the level of security. In the decryption process of the proposed method, the original 3D plaintext image can be easily reconstructed with high quality by using all correct keys, while the decrypted result exhibits noise-like distribution when any one key has a slight deviation, from which any feature related to the original 3D plaintext image cannot be recognized at this time, indicating the necessities of all keys used in the proposed method. This is quite different from the method [34] without structured light because the decrypted POH in this method [34] has an obvious silhouette that exposes the information of the 3D plaintext image directly when the wavelength key and Fresnel distance key have not been used yet, which is a challenge for the necessities of the wavelength key and Fresnel distance key in this method [34]. Fortunately, the silhouette problem is free in the proposed method, which should also be attributed to the structured light. In order to demonstrate the feasibility of the proposed security-enhanced 3D image hiding method, a series of computational simulations are performed, and the simulation results show that the proposed method exhibits high feasibility and concealment as well as an apparent security-enhanced effect, where the security-enhanced effect is mainly reflected in the expansion of key space and the improvement of several key sensitivities. Besides, the capabilities of the proposed 3D image hiding method to resist attacks in different aspects are also tested, and it is confirmed that the proposed method has strong robustness against various attacks such as noise, occlusion, low-pass filtering, histogram, and correlation analysis.
Moreover, the structured light used in the proposed method can be designed with more optical parameters such that the types and quantities of digital keys could be further increased, which is helpful for the expansion of key space and the enhancement of security. Furthermore, a higher-dimensional chaotic system [38,39] can also be adopted for further improving the level of security. In addition, a color 3D image hiding method will also be studied in the future under the framework of the proposed method.

Author Contributions

Conceptualization, B.Z.; methodology, B.Z., E.C. and Y.W.; software, B.Z.; validation, B.Z.; formal analysis, B.Z.; investigation, E.C. and Y.W.; resources, Y.S.; data curation, E.C. and Y.W.; writing—original draft preparation, B.Z.; writing—review and editing, B.Z. and Y.S.; supervision, Y.S.; project administration, Y.S.; funding acquisition, Y.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Natural Science Foundation of Zhejiang Province, grant number LQ22F050005, and Fundamental Research Funds for the Provincial Universities of Zhejiang, grant number 2022YW53.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data underlying the results presented in this paper are not publicly available at this time but may be obtained from the authors upon reasonable request.

Conflicts of Interest

Author Biao Zhu was employed by the company Aviation Industry Crop Huadong Photoelectric Company Limited. The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

References

  1. Refregier, P.; Javidi, B. Optical image encryption based on input plane and Fourier plane random encoding. Opt. Express 1995, 20, 767–769. [Google Scholar] [CrossRef] [PubMed]
  2. Kaur, M.; Kumar, V. A comprehensive review on image encryption techniques. Arch. Comput. Methods Eng. 2020, 27, 15–43. [Google Scholar] [CrossRef]
  3. Hazer, A.; Yildirim, R. A review of single and multiple optical image encryption techniques. J. Opt. 2021, 23, 113501. [Google Scholar] [CrossRef]
  4. Gong, L.; Qiu, K.; Deng, C.; Zhou, N. An optical image compression and encryption scheme based on compressive sensing and RSA algorithm. Opt. Lasers Eng. 2019, 121, 169–180. [Google Scholar] [CrossRef]
  5. Brahim, A.H.; Pacha, A.A.; Said, N.H. Image encryption based on compressive sensing and chaos systems. Opt. Lasers Eng. 2020, 134, 106178. [Google Scholar]
  6. Abuturab, M.R.; Alfalou, A. Multiple color image fusion, compression, and encryption using compressive sensing, chaotic-biometric keys, and optical fractional Fourier transform. Opt. Laser Technol. 2022, 151, 108071. [Google Scholar] [CrossRef]
  7. Qu, G.; Yang, W.; Song, Q.; Liu, Y.; Qiu, C.W.; Han, J.; Tsai, D.P.; Xiao, S. Reprogrammable meta-hologram for optical encryption. Nat. Commun. 2020, 11, 5484. [Google Scholar] [CrossRef] [PubMed]
  8. Zheng, P.; Dai, Q.; Li, Z.; Ye, Z.; Xiong, J.; Liu, H.C.; Zheng, G.; Zhang, S. Metasurface-based key for computational imaging encryption. Sci. Adv. 2021, 7, eabg0363. [Google Scholar] [CrossRef] [PubMed]
  9. Yang, H.; Ou, K.; Wan, H.; Hu, Y.; Wei, Z.; Jia, H.; Cheng, X.; Liu, N.; Duan, H. Metasurface-empowered optical cryptography. Mater. Today 2023, 67, 424–425. [Google Scholar] [CrossRef]
  10. Yu, Z.; Li, H.; Zhao, W.; Huang, P.S.; Lin, Y.T.; Yao, J.; Li, W.; Zhao, Q.; Wu, P.C.; Li, B.; et al. High-security learning-based optical encryption assisted by disordered metasurface. Nat. Commun. 2024, 15, 2607. [Google Scholar] [CrossRef] [PubMed]
  11. Abd-El-Atty, B.; Iliyasu, A.M.; Alanezi, A.; El-Latif, A.A.A. Optical image encryption based on quantum walks. Opt. Lasers Eng. 2021, 138, 106403. [Google Scholar] [CrossRef]
  12. Ma, Y.; Li, N.; Zhang, W.; Wang, S.; Ma, H. Image encryption scheme based on alternate quantum walks and discrete cosine transform. Opt. Express 2021, 29, 28338–28351. [Google Scholar] [CrossRef] [PubMed]
  13. Sui, L.; Pang, Z.; Cheng, Y.; Cheng, Y.; Xiao, Z.; Tian, A.; Qian, K.; Anand, A. An optical image encryption based on computational ghost imaging with sparse reconstruction. Opt. Lasers Eng. 2021, 143, 106627. [Google Scholar] [CrossRef]
  14. Huang, H.; Han, Z. Computational ghost imaging encryption using RSA algorithm and discrete wavelet transform. Results Phys. 2024, 56, 107282. [Google Scholar] [CrossRef]
  15. Guan, Q.; Deng, H.; Liang, W.; Zhong, X.; Ma, M. Multi-images encryption and watermarking with small number of keys via computational ghost imaging. Opt. Laser Technol. 2024, 168, 109957. [Google Scholar] [CrossRef]
  16. Mehra, I.; Singh, K.; Agarwal, A.K.; Gopinathan, U.; Nishchal, N.K. Encrypting digital hologram of three-dimensional object using diffractive imaging. J. Opt. 2015, 17, 035707. [Google Scholar] [CrossRef]
  17. Li, X.; Zhao, M.; Xing, Y.; Zhang, H.L.; Li, L.; Kim, S.T.; Zhou, X.; Wang, Q.H. Designing optical 3D images encryption and reconstruction using monospectral synthetic aperture integral imaging. Opt. Express 2018, 26, 11084–11099. [Google Scholar] [CrossRef] [PubMed]
  18. Wang, Y.; Ren, Z.; Zhang, L.; Li, D.; Li, X. 3D image hiding using deep demosaicking and computational integral imaging. Opt. Lasers Eng. 2022, 148, 106772. [Google Scholar] [CrossRef]
  19. Li, X.; Wang, Y.; Li, Q.; Wang, Q.H.; Li, J.; Kim, S.T.; Zhou, X. Optical 3D object security and reconstruction using pixel-evaluated integral imaging algorithm. Opt. Express 2019, 27, 20720–20733. [Google Scholar] [CrossRef] [PubMed]
  20. Yan, A.; Wei, Y.; Hu, Z.; Zhang, J.; Tsang, P.W.M.; Poon, T.C. Optical cryptography with biometrics for multi-depth objects. Sci. Rep. 2017, 7, 12933. [Google Scholar] [CrossRef] [PubMed]
  21. Yang, L.; Yang, J.; Huang, T.; Li, J.; Zhang, Q.; Di, J.; Zhong, L. Optical 3D information encryption and rapid decryption via interferenceless coded aperture correlation holography. Opt. Lasers Eng. 2024, 169, 110096. [Google Scholar] [CrossRef]
  22. Alfalou, A.; Brosseau, C. Implementing compression and encryption of phase-shifting digital holograms for three-dimensional object reconstruction. Opt. Commun. 2014, 307, 67–72. [Google Scholar] [CrossRef]
  23. Shiu, M.-T.; Chew, Y.-K.; Chan, H.-T.; Wong, X.-Y.; Chang, C.-C. Three-dimensional information encryption and anticounterfeiting using digital holography. Appl. Opt. 2015, 54, A84–A88. [Google Scholar] [CrossRef] [PubMed]
  24. Wang, Y.; Liu, Q.; Wang, J.; Wang, Q.H. Optical encryption of multiple three-dimensional objects based on multiple interferences and single-pixel digital holography. Chin. Phys. B 2018, 27, 034202. [Google Scholar] [CrossRef]
  25. Kong, D.; Cai, L.; Jin, G.; Javidi, B. Three-dimensional scene encryption and display based on computer-generated holograms. Appl. Opt. 2016, 55, 8296–8300. [Google Scholar] [CrossRef] [PubMed]
  26. Kong, D.; Shen, X.; Cai, L.; Zhang, H.; Zong, S.; Jin, G. Three-dimensional information hierarchical encryption based on computer-generated holograms. Opt. Commun. 2016, 380, 387–393. [Google Scholar] [CrossRef]
  27. Han, C.; Shen, Y. Three-dimensional scene encryption algorithm based on phase iteration algorithm of the angular-spectral domain. IEEE/CAA J. Autom. 2020, 7, 1074–1080. [Google Scholar] [CrossRef]
  28. Piao, M.-L.; Liu, Z.-X.; Piao, Y.-L.; Wu, H.-Y.; Yu, Z.; Kim, N. Multi-depth three-dimensional image encryption based on the phase retrieval algorithm in the Fresnel and fractional Fourier transform domains. Appl. Opt. 2018, 57, 7609–7617. [Google Scholar] [CrossRef] [PubMed]
  29. Piao, M.-L.; Wang, S.-G.; Zhao, Y.; Wei, J.; Zhao, Y.; Kim, N. Robust multi-depth object encryption based on a computer-generated hologram with a cascaded structure. Appl. Opt. 2019, 58, 9921–9930. [Google Scholar] [CrossRef] [PubMed]
  30. Wang, X.; Chang, K.; Chen, C.; Wang, J.; Hu, Y. Low-noise and fast three-dimensional information encryption based on the double-phase method. Opt. Rev. 2021, 28, 190–198. [Google Scholar] [CrossRef]
  31. Wang, Y.; Su, Y.; Xue, L.; Wang, Z.; Xue, R.; Zhong, W.; Li, J.; Cai, Z.; Wan, W. Three-dimensional image encryption based on structured light illumination and an iterative layer-oriented angular-spectrum algorithm. Appl. Opt. 2024, 63, 6353–6363. [Google Scholar] [CrossRef]
  32. Kang, W.; Zheng, Z.; Huang, H. Advancements in Digital Holography for Crystalline Material Characterization: A Review (Invited). Cryst. Res. Technol. 2025, 60, 2400264. [Google Scholar] [CrossRef]
  33. Huang, H.; Huang, H.; Zheng, Z.; Gao, L. Insights into Infrared Crystal Phase Characteristics Based on Deep Learning Holography with Attention Residual Network. J. Mater. Chem. A 2025, 13, 6009–6019. [Google Scholar] [CrossRef]
  34. Ji, X.; Xi, S.; Yu, N.; Liu, S.; Yuan, H.; Wang, X.; Lang, L. An encrypted hiding scheme for 3D objects based on CGH and Henon mapping. Laser Phys. Lett. 2024, 21, 065204. [Google Scholar] [CrossRef]
  35. Sui, L.; Zhou, B.; Ning, X.; Tian, A. Optical multiple-image encryption based on the chaotic structured phase masks under the illumination of a vortex beam in the gyrator domain. Opt. Express 2016, 24, 499–515. [Google Scholar] [CrossRef] [PubMed]
  36. Wang, Y.; Jin, C. Image encryption using game of life permutation and PWLCM chaotic system. Opt. Commun. 2012, 258, 412–417. [Google Scholar] [CrossRef]
  37. Peng, X.; Wei, H.; Zhang, P. Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain. Opt. Lett. 2006, 31, 3261–3263. [Google Scholar] [CrossRef] [PubMed]
  38. Li, L.; Wang, W.; Li, J. A novel image encryption algorithm based on high-dimensional compound chaotic systems. J. Chongqing Univ. Posts Telecommun. (Nat. Sci. Ed.) 2012, 24, 385–390. [Google Scholar]
  39. Pi, L.; Wang, X.; Fu, H.; Xu, D.; Wang, X. A new color image encryption based on high-dimensional chaotic systems. Int. J. Mod. Phys. B 2014, 28, 1450024. [Google Scholar] [CrossRef]
Figure 1. The 3D image hiding process of the proposed method, where ESPM and CRPM respectively represent encryption structured phase mask and chaotic random phase mask, and AE, PE, AC, PD, PU, CMG, ASD, IASD, DWT, IDWT, SVD, and ISVD respectively denote the operations of amplitude extraction, phase extraction, amplitude constraint, phase derivation, phase updating, chaotic mask generation, angular spectrum diffraction, inverse angular spectrum diffraction discrete wavelet transform, inverse discrete wavelet transform, singular value decomposition, and inverse singular value decomposition.
Figure 1. The 3D image hiding process of the proposed method, where ESPM and CRPM respectively represent encryption structured phase mask and chaotic random phase mask, and AE, PE, AC, PD, PU, CMG, ASD, IASD, DWT, IDWT, SVD, and ISVD respectively denote the operations of amplitude extraction, phase extraction, amplitude constraint, phase derivation, phase updating, chaotic mask generation, angular spectrum diffraction, inverse angular spectrum diffraction discrete wavelet transform, inverse discrete wavelet transform, singular value decomposition, and inverse singular value decomposition.
Photonics 12 00756 g001
Figure 2. The 3D image decryption process of the proposed method, where DSPM and CRPM respectively represent decryption structured phase mask and decryption chaotic random phase mask, and CONJ denotes the operation of taking conjugation.
Figure 2. The 3D image decryption process of the proposed method, where DSPM and CRPM respectively represent decryption structured phase mask and decryption chaotic random phase mask, and CONJ denotes the operation of taking conjugation.
Photonics 12 00756 g002
Figure 3. (a) Amplitude map and (b) depth map of the 3D train image, (c) ESPM, (d) POH, (e) CRPM, (f) the 2D host image, (g) the DWT result of the host image, (h) singular matrix U 2 , (i) singular matrix V 2 , (j) ciphertext.
Figure 3. (a) Amplitude map and (b) depth map of the 3D train image, (c) ESPM, (d) POH, (e) CRPM, (f) the 2D host image, (g) the DWT result of the host image, (h) singular matrix U 2 , (i) singular matrix V 2 , (j) ciphertext.
Photonics 12 00756 g003
Figure 4. Decryption results at 800 mm, 805 mm, 810 mm from the P O H : (a1a3) using all correct keys; (b1b3) with 1% error in the singular matrix V 2 as well as other correct keys; (c1c3) with 1% error in the singular matrix V 2 as well as other correct keys; (d1d3) with initial value deviation Δ ζ of 10 15 as well as other correct keys; (e1e3) with controlling parameter deviation Δ τ of 10 15 as well as other correct keys; (f1f3) with wavelength deviation Δ λ of 1 nm as well as other correct keys; (g1g3) with focal length deviation Δ f of 1 mm as well as other correct keys; (h1h3) with topological charge number deviation Δ P of 1 as well as other correct keys; (i1i3) with distance deviation Δ z 0 of 1 mm as well as other correct keys.
Figure 4. Decryption results at 800 mm, 805 mm, 810 mm from the P O H : (a1a3) using all correct keys; (b1b3) with 1% error in the singular matrix V 2 as well as other correct keys; (c1c3) with 1% error in the singular matrix V 2 as well as other correct keys; (d1d3) with initial value deviation Δ ζ of 10 15 as well as other correct keys; (e1e3) with controlling parameter deviation Δ τ of 10 15 as well as other correct keys; (f1f3) with wavelength deviation Δ λ of 1 nm as well as other correct keys; (g1g3) with focal length deviation Δ f of 1 mm as well as other correct keys; (h1h3) with topological charge number deviation Δ P of 1 as well as other correct keys; (i1i3) with distance deviation Δ z 0 of 1 mm as well as other correct keys.
Photonics 12 00756 g004
Figure 5. Average CC as functions of (a) error percentage of singular matrix U 2 , (b) error percentage of singular matrix V 2 , (c) initial value deviation Δ ζ , (d) controlling parameter deviation Δ τ , (e) wavelength deviation Δ λ , (f) focal length deviation Δ f , (g) topological charge number deviation Δ P , (h) distance deviation Δ z 0 , respectively.
Figure 5. Average CC as functions of (a) error percentage of singular matrix U 2 , (b) error percentage of singular matrix V 2 , (c) initial value deviation Δ ζ , (d) controlling parameter deviation Δ τ , (e) wavelength deviation Δ λ , (f) focal length deviation Δ f , (g) topological charge number deviation Δ P , (h) distance deviation Δ z 0 , respectively.
Photonics 12 00756 g005
Figure 6. The Gaussian noise-affected decrypted results at 800 mm, 805 mm, 810 mm from the P O H corresponding to the contaminated ciphertext when (a1a3) the noise strength ε G is 0.2 , (b1b3) the noise strength ε G is 0.4 , (c1c3) the noise strength ε G is 0.6 , (d1d3) the noise strength ε G is 0.8 , and (e1e3) the noise strength ε G is 1.0 .
Figure 6. The Gaussian noise-affected decrypted results at 800 mm, 805 mm, 810 mm from the P O H corresponding to the contaminated ciphertext when (a1a3) the noise strength ε G is 0.2 , (b1b3) the noise strength ε G is 0.4 , (c1c3) the noise strength ε G is 0.6 , (d1d3) the noise strength ε G is 0.8 , and (e1e3) the noise strength ε G is 1.0 .
Photonics 12 00756 g006
Figure 7. The uniform noise-affected decrypted results at 800 mm, 805 mm, 810 mm from the P O H corresponding to the contaminated ciphertext when (a1a3) the noise strength ε U is 0.2, (b1b3) the noise strength ε U is 0.4, (c1c3) the noise strength ε U is 0.6, (d1d3) the noise strength ε U is 0.8, (e1e3) the noise strength ε U is 1.0.
Figure 7. The uniform noise-affected decrypted results at 800 mm, 805 mm, 810 mm from the P O H corresponding to the contaminated ciphertext when (a1a3) the noise strength ε U is 0.2, (b1b3) the noise strength ε U is 0.4, (c1c3) the noise strength ε U is 0.6, (d1d3) the noise strength ε U is 0.8, (e1e3) the noise strength ε U is 1.0.
Photonics 12 00756 g007
Figure 8. The salt-and-pepper noise-affected decrypted results at 800 mm, 805 mm, 810 mm from the P O H corresponding to the contaminated ciphertext when (a1a3) the noise strength ε S is 0.2, (b1b3) the noise strength ε S is 0.4, (c1c3) the noise strength ε S is 0.6, (d1d3) the noise strength ε S is 0.8, and (e1e3) the noise strength ε S is 1.0.
Figure 8. The salt-and-pepper noise-affected decrypted results at 800 mm, 805 mm, 810 mm from the P O H corresponding to the contaminated ciphertext when (a1a3) the noise strength ε S is 0.2, (b1b3) the noise strength ε S is 0.4, (c1c3) the noise strength ε S is 0.6, (d1d3) the noise strength ε S is 0.8, and (e1e3) the noise strength ε S is 1.0.
Photonics 12 00756 g008
Figure 9. The partly occluded ciphertexts with (a1) 6.25 % occlusion, (b1) 12.5 % occlusion, (c1) 25 % occlusion, (d1) 50 % occlusion; the occlusion-affected decrypted results at 800 mm, 805 mm, 810 mm from the P O H when the ciphertext is subjected to: (a2a4) 6.25 % occlusion as shown in (a1), (b2b4) 12.5 % occlusion as shown in (b1), (c2c4) 25 % occlusion as shown in (c1), and (d2d4) 50 % occlusion as shown in (d1).
Figure 9. The partly occluded ciphertexts with (a1) 6.25 % occlusion, (b1) 12.5 % occlusion, (c1) 25 % occlusion, (d1) 50 % occlusion; the occlusion-affected decrypted results at 800 mm, 805 mm, 810 mm from the P O H when the ciphertext is subjected to: (a2a4) 6.25 % occlusion as shown in (a1), (b2b4) 12.5 % occlusion as shown in (b1), (c2c4) 25 % occlusion as shown in (c1), and (d2d4) 50 % occlusion as shown in (d1).
Photonics 12 00756 g009
Figure 10. Ciphertexts after mean filtering with the filter window size of (a1) 2 × 2 pixels, (b1) 3 × 3 pixels, (c1) 4 × 4 pixels; the mean-filtering-affected decrypted results at 800 mm, 805 mm, 810 mm from the P O H corresponding to the mean-filtered ciphertext with the filter window size of (a2a4) 2 × 2 pixels as shown in (a1), (b2b4) 3 × 3 pixels as shown in (b1), (c2c4) 4 × 4 pixels as shown in (c1).
Figure 10. Ciphertexts after mean filtering with the filter window size of (a1) 2 × 2 pixels, (b1) 3 × 3 pixels, (c1) 4 × 4 pixels; the mean-filtering-affected decrypted results at 800 mm, 805 mm, 810 mm from the P O H corresponding to the mean-filtered ciphertext with the filter window size of (a2a4) 2 × 2 pixels as shown in (a1), (b2b4) 3 × 3 pixels as shown in (b1), (c2c4) 4 × 4 pixels as shown in (c1).
Photonics 12 00756 g010
Figure 11. Ciphertexts after frequency-domain smooth filtering with a filter radius of (a1) 400 pixels, (b1) 350 pixels, (c1) 300 pixels, and (d1) 250 pixels; the smooth-filtering-affected decrypted results at 800 mm, 805 mm, 810 mm from the P O H corresponding to the smooth-filtered ciphertext with a filter radius of (a2a4) 400 pixels as shown in (a1), (b2b4) 350 pixels as shown in (b1), (c2c4) 300 pixels as shown in (c1), and (d2d4) 250 pixels as shown in (d1).
Figure 11. Ciphertexts after frequency-domain smooth filtering with a filter radius of (a1) 400 pixels, (b1) 350 pixels, (c1) 300 pixels, and (d1) 250 pixels; the smooth-filtering-affected decrypted results at 800 mm, 805 mm, 810 mm from the P O H corresponding to the smooth-filtered ciphertext with a filter radius of (a2a4) 400 pixels as shown in (a1), (b2b4) 350 pixels as shown in (b1), (c2c4) 300 pixels as shown in (c1), and (d2d4) 250 pixels as shown in (d1).
Photonics 12 00756 g011
Figure 12. (a) Structured phase mask key derived via chosen-plaintext attack; (bd) the decryption results at 800 mm, 805 mm, and 810 mm from the P O H , respectively, using this key as DSPM.
Figure 12. (a) Structured phase mask key derived via chosen-plaintext attack; (bd) the decryption results at 800 mm, 805 mm, and 810 mm from the P O H , respectively, using this key as DSPM.
Photonics 12 00756 g012
Figure 13. Histograms of (a) the amplitude information of 3D train image and (b) the ciphertext depicted in Figure 3j, (c) amplitude map and (d) depth map of the 3D dinosaur skeleton image, (e) ciphertext corresponding to the 3D dinosaur skeleton image, histograms of (f) the amplitude information of 3D dinosaur skeleton image and (g) the ciphertext depicted in (e).
Figure 13. Histograms of (a) the amplitude information of 3D train image and (b) the ciphertext depicted in Figure 3j, (c) amplitude map and (d) depth map of the 3D dinosaur skeleton image, (e) ciphertext corresponding to the 3D dinosaur skeleton image, histograms of (f) the amplitude information of 3D dinosaur skeleton image and (g) the ciphertext depicted in (e).
Photonics 12 00756 g013
Figure 14. (a1) Horizontal, (a2) vertical, and (a3) diagonal correlations of adjacent pixels in the amplitude information of 3D train plaintext image, (b1) horizontal, (b2) vertical, and (b3) diagonal correlations of adjacent pixels in the ciphertext depicted in Figure 3j.
Figure 14. (a1) Horizontal, (a2) vertical, and (a3) diagonal correlations of adjacent pixels in the amplitude information of 3D train plaintext image, (b1) horizontal, (b2) vertical, and (b3) diagonal correlations of adjacent pixels in the ciphertext depicted in Figure 3j.
Photonics 12 00756 g014
Figure 15. (a) The mapping relationship between the number of iterations and the time consumption; (b) the mapping relationship between the number of iterations and the average CC.
Figure 15. (a) The mapping relationship between the number of iterations and the time consumption; (b) the mapping relationship between the number of iterations and the average CC.
Photonics 12 00756 g015
Table 1. Key space data for each digital key in the proposed 3D image hiding method.
Table 1. Key space data for each digital key in the proposed 3D image hiding method.
KeySensitivityValue RangeKey Space
ζ 5.40 × 10 16 0~ 2 15 2 66
τ 3.00 × 10 17 0~ 2 15 2 70
λ 0.660~ 2 15 2 16
f 0.310~ 2 15 2 17
P 0.870~ 2 15 2 15
z 0 0.560~ 2 15 2 16
Table 2. The used parameters in the simulation and the adopted configuration of computational platform.
Table 2. The used parameters in the simulation and the adopted configuration of computational platform.
The used parameters in the simulationMaximum depth value of 3D plaintext image
Nearest distance between 3D plaintext image and POH
Farthest distance between 3D plaintext image and POH
Pixel number of each layer of 3D plaintext image
Pixel pitch of each layer of 3D plaintext image
Wavelength of light λ
Focal length f of ESPM
Topological charge number P of ESPM
Chaotic initial value ζ
Chaotic controlling parameter τ
Distance z 0 between ESPM and POH
Predefined threshold σ of CC
10 mm
800 mm
810 mm
1280 × 1280
8 μm
632.8 nm
30 mm
6
0.741
0.277
200 mm
0.95
The adopted configuration of computational platformCentral processing unit
Random access memory
General processing unit
I9-12900H
32GB
RTX 4070
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhu, B.; Chen, E.; Wang, Y.; Su, Y. Security-Enhanced Three-Dimensional Image Hiding Based on Layer-Based Phase-Only Hologram Under Structured Light Illumination. Photonics 2025, 12, 756. https://doi.org/10.3390/photonics12080756

AMA Style

Zhu B, Chen E, Wang Y, Su Y. Security-Enhanced Three-Dimensional Image Hiding Based on Layer-Based Phase-Only Hologram Under Structured Light Illumination. Photonics. 2025; 12(8):756. https://doi.org/10.3390/photonics12080756

Chicago/Turabian Style

Zhu, Biao, Enhong Chen, Yiwen Wang, and Yanfeng Su. 2025. "Security-Enhanced Three-Dimensional Image Hiding Based on Layer-Based Phase-Only Hologram Under Structured Light Illumination" Photonics 12, no. 8: 756. https://doi.org/10.3390/photonics12080756

APA Style

Zhu, B., Chen, E., Wang, Y., & Su, Y. (2025). Security-Enhanced Three-Dimensional Image Hiding Based on Layer-Based Phase-Only Hologram Under Structured Light Illumination. Photonics, 12(8), 756. https://doi.org/10.3390/photonics12080756

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop