Optical cryptosystem scheme for hyperspectral image based on random spiral transform in gyrator domains

https://doi.org/10.1016/j.optlaseng.2020.106375Get rights and content

Highlights

  • An improved random spiral phase transform is introduced for multidimensional image encryption in gyrator domains.

  • The proposed algorithm performs well against with various types of attacks.

  • Some high sensitive parameters generated during the encryption process will be regarded as the additional keys to enhancing the security of the encryption algorithms.

Abstract

A novel chaotic cryptosystem for hyperspectral image, in this paper, is proposed by using a 4D hyperchaotic system in gyrator transform domains. In encryption process, a random spiral phase function (RSPF) is designed to generate variable spiral phase mask, which can be used for phase encoding with the hyperspectral image. Subsequently, the 4D hyperchaotic system is utilized to generate the chaotic sequences and these chaotic data is employed in designing RSPF, scrambling the hyperspectral image and synthesizing complex ciphertext, respectively. Finally, an improved spiral phase transform (SPT) in gyrator domains is implemented to obtain the ciphertext. To enhance the security of the encryption scheme, the ciphertext is reorganized according to the hyperchaotic attractor. Theoretical simulation analysis is given to demonstrate the validity and robustness of the proposed cryptosystem.

Introduction

In the past decades, the information security technology has attracted more and more attention both in civil and military fields. As the most famous and traditional encryption schemes, the advance encryption standard (AES) and Data encryption standard (DES) are widely used in secret data storage and transmission. However, these traditional encryption algorithm were reported may be vulnerable when resisting some differential cryptanalysis using parallel process and exhaustive attack due to the short key length [1], [2], [1], [2]. Also, the key of AES can be retrieved by some side channel attack in hardware. The highly unpredictable and extremely sensitive to initial conditions feature of the chaotic system are suitable in designing the encryption scheme. Various cryptosystem based on chaotic and hyperchaotic systems have been proposed [3], [4], [5], [6], [7], [8], [9], [10], [11], [12], [13], [14], [15], [16]. In these reported encryption algorithm, the nonlinear feature of the chaotic and hyperchaotic data are deeply researched to break the algebraic dependency. In Ref. [11], Zhu proposed an image encryption scheme using improved hyperchaotic sequences. However, Özkaynak and his colleagues report the existing algebraic dependencies and break the encryption scheme using only a few pair of plaintext/ciphertext [12]. Zhao proposed an image encryption scheme based on an improper fractional-order chaotic system and claimed the key length is large enough to against any attacks [13]. Unfortunately, Norouzi soon reported a break method for this encryption algorithm since the keystream is generated independently and the whole algorithm is using the same key, which make it easy to break by employing plaintext attack [14]. Therefore, the issues of algebraic dependencies and key designing are worth paying attention in chaotic based cryptosystem.

In [12], [13], [14], [15], [16], [17], [18], [19], [20], some chaotic-based encryption algorithms in optical transform domains are presented. In fact, some inherent properties of optical information security techniques have significant potential for image encryption [23]. For instance, the properties of fast computing of high parallel processing and multiple complex degrees of freedom processing such as polarization, diffraction, interference, wavelength, amplitude and phase [24]. Optical techniques in information security have been deeply explored soon after the classical double random phase encoding (DRPE) was first proposed by Refregier and Javidi in 1995 [25]. In some of these chaotic-based optical encryption schemes [12], [13], [14], [15], [16], [17], [18], [19], [20], [21], [22], the random data produced by the chaotic system are modulated as the phase mask and placed in the light path to complete the encryption system. To enhance the security of the cryptosystem, some parameters in designing the electro-optical hardware setup or optical transform, such as fractional Fourier transform (FrFT) [19], gyrator transform [20] and Hartley transform [21], are considered as the extra key to protect secret images. Kumar and his colleagues proposed an encryption algorithm using spiral phase transform (SPT) with Fresnel propagations [26]. In [27], an optical color image cryptosystem based on spiral phase transform is reported, in which the chaotic data is utilized to scramble the image pixels. However, to our best knowledge, the spiral phase transform has not been explored in cryptosystem for hyperspectral image. As one of the most important image form, the hyperspectral image has been widely used in geological exploration remote sensing, military target recognition. In the previously presented encryption for hyperspectral image [26], [27], the parameters used for each band of the hyperspectral image are the same or similar one, which make the intact encryption system vulnerable even only one of the bands is cracked by the illegal attacker. The different hyperchaotic data are considered to be employed in different bands of the hyperspectral image to improve the security of the cryptosystem.

In this paper, a novel hyperchaotic-based encryption algorithm in optical gyrator domains is presented. This proposed encryption system protect each band of the hyperspectral image by using different spiral phase function and different keys. The input hyperspectral image is considered as a three-dimensional data having dozens components. Firstly, the independent components of hyperspectral image are modulated with the different spiral phase masks, which generated by RSPF with hyperchaotic data. Simultaneously, the 4D hyperchaotic system is implemented to produce the hyperchaotic sequences. Then part of the chaotic sequences is converted into image format and considered as position matrix for scrambling the two-dimensional image. Finally, an improved spiral phase transform (SPT) in gyrator domains is designed and employed to obtain the ciphertext. In this encryption system, the hyperchaotic data can be regarded as the main keys, the parameters in gyrator transform and RSPF is the additional keys to enhance the security. Various attack experiments are made and discussed to verify the feasibility and robustness of the proposed cryptosystem.

The rest of the paper is arranged in the following sequence. In Section 2, the intact methodology is introduced in detail. In Section 3, various numerical simulation and attack experiments are made to support the capability of the algorithm. In the final section, concluding remarks are summarized.

Section snippets

The hyperchaotic-based cryptosystem

In this section, the 4D hyperchaotic system, the improved SPT and gyrator transform are brief introduced and discussed, respectively. Further, the intact encryption scheme based on gyrator transform is presented in detail.

Numerical simulation

A series of numerical experiments are performed based on the optical setup illustrated in Fig. 4 to verify the feasibility and effectiveness of the proposed optical information encryption scheme. In numerical experiments, a hyperspectral image ‘Sandiego’ from AVIRIS having 256 × 256 × 60 pixels is considered as the secret information needs to be encrypted in the following experiments. A color composites combined of red, green and blue wavelength band and the corresponding spiral phase with

Conclusion

In summary, a novel method for optical image encryption based on improved spiral phase in gyrator transform domain is presented, where the hyperspectral data can be hidden in the light field. In encryption process, a random spiral phase function is designed to generate variable spiral phase mask, which can be used for phase encoding with the hyperspectral image. The independent components of hyperspectral image are modulated with the different spiral phase masks, which generated by RSPF with

Authorship Contributions

Conception and design of study: Hang Chen, Zhengjun Liu, Camel Tanougast; acquisition of data: Hang Chen, Zhengjun Liu; analysis and/or interpretation of data:. Hang Chen, Zhengjun Liu, Walter Blondel. Drafting the manuscript: Hang Chen, Zheng Liu; revising the manuscript critically for important intellectual content: Hang Chen, Feifei Liu. Approval of the version of the manuscript to be published: Hang Chen, Zhengjun Liu, Camel Tanougast, Feifei Liu, Walter Blondel.

Declaration of Competing Interest

We declare that we have no financial and personal relationships with other people or organizations that can inappropriately influence our work, there is no professional or other personal interest of any nature or kind in any product, service and/or company that could be construed as influencing the position presented in, or the review of, the manuscript entitled, “Optical cryptosystem scheme for hyperspectral image based on random spiral transform in gyrator domain”.

Acknowledgments

This work was supported by the National Natural Science Foundation of China (Grant 62005320), the Program for New Century Excellent Talents in University (NCET-12-0148), and SpectroLive Project form CNRS foundation. The authors are indebted for the two anonymous reviewers for their helpful suggestions. The authors are grateful for the valuable discussion from Dr. Ravi Kumar.

References (37)

  • W Shan et al.

    Machine learning based side-channel-attack countermeasure with hamming-distance redistribution and its application on advanced encryption standard

    Electron Lett

    (2017)
  • Céline Blondeau et al.

    Differential-linear cryptanalysis revisited

    J Cryptol

    (2017)
  • S Som et al.

    Confusion and diffusion of color images with multiple chaotic maps and chaos-based pseudorandom binary number generator

    Nonlinear Dyn

    (2015)
  • X Wang et al.

    A chaotic image encryption algorithm based on perceptron model

    Nonlinear Dyn

    (2010)
  • G Ye et al.

    An efficient chaotic image encryption algorithm based on a generalized Arnold map

    Nonlinear Dyn

    (2012)
  • G Ye et al.

    Chaotic image encryption algorithm using wave-line permutation and block diffusion

    Nonlinear Dyn

    (2016)
  • ML Sahari et al.

    A pseudo-random numbers generator based on a novel 3D chaotic map with an application to color image encryption

    Nonlinear Dyn

    (2018)
  • Y Luo et al.

    A parallel image encryption algorithm based on the piecewise linear chaotic map and hyper-chaotic map

    Nonlinear Dyn

    (2018)
  • Cited by (15)

    • Direct generation of 2D arrays of random numbers for high-fidelity optical ghost diffraction and information transmission through scattering media

      2022, Optics and Lasers in Engineering
      Citation Excerpt :

      Later, ghost diffraction was further proved to be feasible with classical thermal light [7,8]. Ghost diffraction can be applied in different areas [9–19], e.g., three-dimensional reconstruction [9,10], phase object recovery [11,12], Terahertz [13,14], and X-ray imaging [18,19]. In ghost diffraction process with only one single-pixel bucket detector, a number of 2D patterns [20–23] need to be generated and sequentially embedded into a spatial light modulator (SLM).

    • Multiple color image fusion, compression, and encryption using compressive sensing, chaotic-biometric keys, and optical fractional Fourier transform

      2022, Optics and Laser Technology
      Citation Excerpt :

      However, it has also been found susceptible to an iterative phase-retrieval algorithm-based special attack [15]. To avoid this attack, enhanced optical security approaches have been introduced [16–21]. With the advance of the big data era, the demand of multiple information/data/image encryption increased.

    • Security-enhanced multiple-image encryption based on modified iterative phase retrieval algorithm with structured phase mask in Fresnel domain

      2022, Optik
      Citation Excerpt :

      The most classical optical image encryption method is double random phase encoding (DRPE) based on 4F system, where the plaintext can be encrypted to the noise-like ciphertext [6]. Thereafter, the DRPE method has been gradually extended into Fresnel transform domain [7], fractional Fourier transform domain [8], gyrator transform domain [9], and other domains [10–13], where several additional optical parameters can be considered as the secret keys to expand the key space. In addition, many optical image encryption methods based on other principles also have been widely proposed and investigated, such as interference encryption [14], joint transform correlator [15], quantum cryptography [16,17], metasurface encryption [18,19], ghost imaging [20,21], digital holography [22,23], computer-generated holography [24,25], iterative phase retrieval algorithm [26,27], compressive sensing [28,29], and quick response codes [30,31].

    • Optical encryption technology based on spiral phase coherent superposition and vector beam generation system

      2022, Optik
      Citation Excerpt :

      Optical encryption technology has attracted the attention of many researchers due to its advantages of multiple key dimensions and high-speed parallel processing of data [1–12]. In recent years, the rapid development of spiral phase correlation characteristics has made it a certain progress in the field of optical encryption [13–20]. In 2016, Sui et al. proposed an optical multiple-image encryption method based on the chaotic structured phase masks under the illumination of a vortex beam in the gyrator domain [13].

    • Securing multiple-single-channel color image using unequal spectrum decomposition and 2D-SLIM biometric keys

      2021, Optics Communications
      Citation Excerpt :

      A classic optical image encryption system based on double-random phase encoding using Fourier transform has been introduced [4] and extended to other optical transform domains [5–12]. A number of optical information security methods have also been proposed [13–20]. Moreover, a simple optical interference-based cryptosystem has been introduced to eliminate the inherent time-consuming problem of iterative algorithms [21].

    View all citing articles on Scopus
    View full text