Skip to main content
Scientific Reports logoLink to Scientific Reports
. 2019 Oct 21;9:15071. doi: 10.1038/s41598-019-50263-4

Dual paths cryptosystem based on tilt Fresnel diffraction using non-spherical mirror and phase modulation in expanded fractional Fourier transform domain

Hang Chen 1,2,, Zhengjun Liu 3, Camel Tanougast 2, Feifei Liu 4, Walter Blondel 1,
PMCID: PMC6803697  PMID: 31636282

Abstract

In this paper, a dual optics paths optical image cryptosystem based on tilt Fresnel diffraction and a phase modulation in extend fractional Fourier transform (eFrFT) domain is presented. The tilt Fresnel is designed by using a non-spherical mirror. A part of data from the original image is modulated by the mirror, while the other part is encoded by an expanded fractional Fourier transform. Besides, the random data of the dual channels is combined for forming the encrypted image. The structure parameters in designing the optical hardware system and the random phase can be regarded as decryption keys. Various potential attack experiments are implemented to check the validity of the proposed cryptographic system.

Subject terms: Optics and photonics, Physics

Introduction

With the rapidly development of multimedia application, the issue of security in transmission and storage of the confidential image has becoming more and more importance. Optical technologies have become increasingly attractive and extensively developed on information securing since the double random phase encoding (DRPE) was first reported by Refregier and Javidi first proposed in 1995113. One of the motivations is that the characteristics of fast computing and parallelism of optics are significant in real-time applications. Besides, the various complex degrees of freedom offered by optics makes it possible to encode/decode data in secure way. In recent years, many optical image cryptosystem based on different optics information means, such as optical transform2, holography3, diffraction4,5, polarization6 and ptychography7 have been reported. In order to deal with the problem caused by distribution and management of secret keys, some asymmetric optical information cryptosystems have been proposed by using phase truncation9,10, Yang-Gu algorithm11 and equal modulus decomposition12,13. In addition, an information authentication system has been reported by using interference between two beams in gyrator domains14. In the ref. 14, the performance of the system in resisting some potential attacks has verified the robustness of the proposed algorithm. Recently, combing Fresnel diffraction and a phase modulation in FrFT domain, an novel optical encryption system for color image is presented15. However, in most of the optical cryptosystems mentioned above, including symmetric and asymmetric scheme, the beams are modulated by a single optics information mean in one beam path, one optical transform, for instance. To our best knowledge, the cryptosystem based on dual optics paths has not been reported yet.

In this paper, combing tilt Fresnel diffraction and a phase modulation in eFrFT domain, we present a security-enhanced encryption technique for optical image. The beam is split by a beam splitter into two optics paths after the secret image is encoded by spatial light modulator (SLM). A part of data from the secret image is encoded by an expanded fractional Fourier transform. The other part of the image is modulated by the non-spherical. Finally, two beam paths convergence at the output plane of the cryptosystem. The random data of the two channels is combined for forming the encrypted image. To verify the validity and capability of the proposed encryption technique, a series of experimental results are given in the following step.

The Cryptographic System

Our scheme begins with the concept of double optics paths encryption by using a beam splitter. In first path, the secret image is encoded in extended fractional Fourier transform16. The other path, the optical process can be expressed by employing phase modulation and tilt Fresnel diffraction alternately. With the help of the interference by a wave generated from one random mask, the secret signal propagated across the extended fractional Fourier transform lens is recorded and encrypted simultaneously. To simplify the expression, we use one-dimensional representation in the following explanation. Here, we suppose the random phase function is φ(x) and it distributed uniformly in the interval [0,2π]. Referring to16,17, the extended fractional Fourier transform can be expressed as follows:

F(u)=Kf(x)exp[iφ(x)]×exp[iπ(a2x2+b2u2)cosϕ2ab(xu)sinϕ]dx 1

where f(x) and F(u) represent the input and output function of the transform, respectively. The symbols a, b and φ are three parameters of extended fractional Fourier transform, while K is a complex constant. These parameters can be expressed by the physical parameter of the optical setup: wave length λ, focal length f of the lens and the propagate length before and after the lens l1 and l2. The mathematical definition can be described as follows:

a2=1λfl2fl11f2(fl1)(fl2) 2
b2=1λfl1fl21f2(fl1)(fl2) 3
φ=arccos(fl1fl2f) 4

For the other beam path, the half secret image is irradiated by a uniform beam and propagated with distance d1 into a random phase mask ϕ2(x,y). Thus, the left side light filed of the mask can be expressed as

L1=exp[iϕ(x,y)]Fd1.λ[I(x,y)] 5

where F denotes the operation of Fresnel diffraction and the parameter λ is the wavelength as mentioned above. Thereafter, with the help of a non-spherical mirror, the beam continues propagate with distance d2 and the finally tilted achive the CCD.

L2=Fd2.λ(L1.dp)dp=exp(i2πλ[n01]z)z=[xcos(α)+ysin(α)]tan(θ) 6

where dp represents the phase delay of tilt Fresnel diffraction. The symbols α and θ are the angle parameter in tilt diffraction as shown in Fig. 1.

Figure 1.

Figure 1

The model of tilt diffraction: (a) The tilt beam and normal incidence and (b) The spot shift at the output plane.

The corresponding electro-optical setup for the proposed cryptosystem is depicted in Fig. 2. By using the spatial light modulator (SLM) controlled by a PC, the secret image is modulated by a uniform beam. As we can see from Fig. 2, the beam propagates into two paths S1 and S2 and finally the beams reaches the output plane and recorded by CCD. The secret data is encoded by two optical paths and storage in different part of the plane, respectively. In the output plane of the cryptosystem, the off-line holography technique is implemented for recording the phase data. In the decryption approaches, the encrypted image can be retrieved by the inverse optical system composed by inverse extended fractional Fourier transform and inverse tilt Fresnel diffraction, while the phase mask is set in the light path. For the correct decryption, the conjugate phase make placed in the light path need to be exchanged due to the reverse calculation.

Figure 2.

Figure 2

The electro-optical setup of the proposed cryptosystem.

To avoid the cross-talk effect, the eFrFT and Fresnel diffraction are divided into different optical structures. As shown in Fig. 3, two sub-images are selected with a pupil by turning on and off to enter two encryption optical units. This sub-image hiding scheme is to make a multifarious optical encryption, since some encryption approaches were designed by single transform or several transforms in serial state.

Figure 3.

Figure 3

The control of sub-images for encrypting.

Numerical Simulations

In this section, the numerical simulations are given to verify the validity and security of the proposed cryptosystem. One grayscale image taken from Paris Eiffel Tower, which has a size of 256 × 256 pixels, is chosen to as the secret image. In the experiment, the wavelength of the beam is fixed in 632.3 nm. Besides, the focal length of the lens is set as 12 cm. By employing the parameters mentioned above, the secret image is encrypted by the proposed cryptosystem effectively and the image before and after encryption are illustrated in Fig. 4(a,b), respectively. Figure 4(c) shows the fail decrypted result using the fake keys. In calculation, the top part and the bottom part decryption approaches are performed by using fake propagation length and propagation wavelength, respectively. As shown in Fig. 4(c), the decryption result is almost a noise image and the secret information cannot be recognized by human eyes. By using the inverse optical system, the original image can be retrieved with all the correct parameters and the retrieved pattern is depicted in Fig. 4(d).

Figure 4.

Figure 4

(a) Original color image; (b) encrypted image; (c) fail decryption with fake keys; (d) decrypted image with correct keys.

For the robustness and security analysis, some numerical simulation of occlusion attack18 and known-plaintext attack19 are performed. Before the security analysis, the peak-signal-to-noise ratio (PSNR) is presented firstly to estimate the similarity between the plaintext and ciphertext of the proposed cryptosystem. The equation interpretation of PSNR can be written as follows

PSNR(Id,I0)=10log102552M×Nx,y[Id(x,y)I0(x,y)]2(dB). 7

where the symbol I0 and Id denote the secret image and decrypted data. The parameters M and N are the sizes of the function. In this experiment, the PSNR value between the original image and encrypted (correct decrypted) image are 5.9375 and 253.9735. Note that the value of PSNR large than 50 indicates that the difference between the two images is unrecognizable.

The correct decryption approach is employed with the partly occluded original image, which is depicted in Fig. 5(a). Here we emphasize that the occluded pixels of the data are filled with the number 0 in simulation and the corresponding result is displayed in Fig. 5(b). A worse situation is considered as larger part occluded attack, the occluded image and the corresponding attack result are given in Fig. 5(c,b), respectively. As shown in Fig. 5(c,d), the outline information of the original input image can be recognized in vision. Apparently, the decrypted data depicted in Fig. 5(b) has higher quality than the other one due to the smaller occluded area.

Figure 5.

Figure 5

The test of occlusion attack: (a) the occluded encrypted image; (b) the recovered image; (c) the second occluded encrypted image and (d) the retrieved image of (c).

The known-plaintext attack is also tested by using the phase retrieval algorithm in extend fractional Fourier transform domain. To simplify the calculation, we chose two secret images having 128 × 128 pixels in the attack experiment and the two images are encrypted by the algorithm proposed in this paper, respectively. The secret images and the corresponding encrypted data are shown in Fig. 6(a–d). In simulation, we suppose that the illegal user usurp the first secret image and its encrypted data. Subsequently, the encrypted data of the second image shown in Fig. 6(d) is attacked by the illegal user by using the known-plaintext attack. In the known plaintext attack experiment, the phase retrieval algorithm is implemented for 1000 iterations. Finally, the attack result is displayed in Fig. 6(e), which the detail information of the second secret image cannot be identified entirely and the attack result is almost a random pattern. Obviously, the known plaintext attack is invalid to our proposed encryption scheme.

Figure 6.

Figure 6

The test of known plaintext attack: (a) original image, (b) original image, (c) the encrypted data of (a,d) the encrypted data of (b,e) the result of known plaintext attack.

Conclusions

In conclusion, a cryptographic system composed by two independent beam paths is proposed. In this encryption scheme, half of the secret data is encoded by a phase modulation in extend fractional Fourier transform and the other half data is modulated by using tilt Fresnel diffraction. The physical structure parameters of the optical system and the phase delay in tilt Fresnel diffraction can be regarded as the keys of the proposed cryptosystem. Some numerical experiments have been performed to demonstrate the validity and robustness of the presented cryptosystem.

Acknowledgements

This work was supported by the National Natural Science Foundation of China (grant no. 61575053), SpectroLive Project form CNRS foundation and the Program for New Century Excellent Talents in University (NCET-12-0148). The authors appreciate for the useful discussions from Dr. Pierre Varis. The authors are indebted for the editor and two anonymous reviewers for their useful comments and suggestions.

Author contributions

H.C. and Z.L. conceived the method. H.C. and C.T. conducted the experiment. H.C. and W.B. arranged the data and prepared the manuscript. All authors reviewed the manuscript.

Competing interests

Prof. Liu and Dr Chen’s work has been funded by National Natural Science Foundation of China. Prof. Camel Tanougast and Prof. Walter Blondel declare no potential conflict of interest.

Footnotes

Publisher’s note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Contributor Information

Hang Chen, Email: hitchenhang@foxmail.com.

Walter Blondel, Email: walter.blondel@univ-lorraine.fr.

References

  • 1.Refregier P, Javidi B. Optical image encryption based on input plane and Fourier plane random encoding. Opt Lett. 1995;20:767–769. doi: 10.1364/OL.20.000767. [DOI] [PubMed] [Google Scholar]
  • 2.Chen W, Chen X, Sheppard CJR. Optical image encryption based on diffractive imaging. Opt Lett. 2010;35:3817–3819. doi: 10.1364/OL.35.003817. [DOI] [PubMed] [Google Scholar]
  • 3.Kishk S, Javidi B. Watermarking of three-dimensional objects by digital holography. Opt Lett. 2003;28:167–169. doi: 10.1364/OL.28.000167. [DOI] [PubMed] [Google Scholar]
  • 4.Situ G, Zhang J. Double random-phase encoding in the Fresnel domain. Opt Lett. 2004;29:1584–1586. doi: 10.1364/OL.29.001584. [DOI] [PubMed] [Google Scholar]
  • 5.Liu Z, Chen H, Blondel W, Shen Z, Liu S. Image security based on iterative random phase encoding in expanded fractional Fourier transform domains. Opt Lasers Eng. 2018;105:1–5. doi: 10.1016/j.optlaseng.2017.12.007. [DOI] [Google Scholar]
  • 6.Alfalou A, Brosseau C. Dual encryption scheme of images using polarized light. Opt Lett. 2010;35:2185–2187. doi: 10.1364/OL.35.002185. [DOI] [PubMed] [Google Scholar]
  • 7.Shi Y, et al. Optical image encryption via ptychography. Opt Lett. 2013;38:1425–1427. doi: 10.1364/OL.38.001425. [DOI] [PubMed] [Google Scholar]
  • 8.Qin Y, Wang Z, Pan Q, Gong Q. Optical color-image encryption in the diffractive-imaging scheme. Opt Lasers Eng. 2016;77:191–202. doi: 10.1016/j.optlaseng.2015.09.002. [DOI] [Google Scholar]
  • 9.Qin W, Peng X. Asymmetric cryptosystem based on phase-truncated Fourier transforms. Opt Lett. 2010;35(2):118–120. doi: 10.1364/OL.35.000118. [DOI] [PubMed] [Google Scholar]
  • 10.Rajput SK, Nishchal NK. Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform. App Opt. 2013;52:871–878. doi: 10.1364/AO.52.000871. [DOI] [PubMed] [Google Scholar]
  • 11.Liu W, Liu Z, Liu S. Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang-Gu algorithm. Opt Lett. 2013;38:1651–1653. doi: 10.1364/OL.38.001651. [DOI] [PubMed] [Google Scholar]
  • 12.Liansheng S, Meiting X, Ailing T. Multiple-image encryption based on phase mask multiplexing in fractional Fourier transform domain. Opt Lett. 2013;38:1996–1998. doi: 10.1364/OL.38.001996. [DOI] [PubMed] [Google Scholar]
  • 13.Chen H, Tanougast C, Liu Z, Sieler L. Asymmetric optical cryptosystem for color image based on equal modulus decomposition in gyrator transform domains. Opt Lasers Eng. 2017;93:1–8. doi: 10.1016/j.optlaseng.2017.01.005. [DOI] [Google Scholar]
  • 14.Abuturab MR. Information authentication system using interference of two beams in gyrator transform domain. Appl Opt. 2013;52:5133–5142. doi: 10.1364/AO.52.005133. [DOI] [PubMed] [Google Scholar]
  • 15.Chen H, Liu Z, Chen Q, Blondel W. Color image cryptosystem using Fresnel diffraction and phase modulation in an expanded fractional Fourier transform domain. Laser Phys. 2018;28:055402. doi: 10.1088/1555-6611/aab240. [DOI] [Google Scholar]
  • 16.Hua J, Liu L, Li G. Extended fractional Fourier transforms. JOSA A. 1997;14:3316–3322. doi: 10.1364/JOSAA.14.003316. [DOI] [Google Scholar]
  • 17.Wang X, Zhao D, Chen L. Image encryption based on extended fractional Fourier transform and digital holography technique. Opt Commun. 2006;260:449–453. doi: 10.1016/j.optcom.2005.11.006. [DOI] [Google Scholar]
  • 18.Chen H, Du X, Liu Z, Yang C. Color image encryption based on the affine transform and gyrator transform. Opt Lasers Eng. 2013;51:768–775. doi: 10.1016/j.optlaseng.2013.01.016. [DOI] [Google Scholar]
  • 19.Peng X, et al. Known-plaintext attack on optical encryption based on double random phase keys. Opt Lett. 2006;31:1044–1046. doi: 10.1364/OL.31.001044. [DOI] [PubMed] [Google Scholar]

Articles from Scientific Reports are provided here courtesy of Nature Publishing Group

RESOURCES