Professional Documents
Culture Documents
Image Encryption by Using Gyrator Transform and Arnold Transform
Image Encryption by Using Gyrator Transform and Arnold Transform
Shutian Liu
Harbin Institute of Technology
Department of Physics
Harbin 150001 China
Abstract. We propose an optical image encryption algorithm based the original image. The pixel sequence of digital image28, 29
on Arnold transform and gyrator transform. The amplitude and phase, can be regarded as the key of the algorithm except the ran-
which are the outputs of gyrator transform, are separated into several dom phase mask mentioned above. In Refs. 28 and 29, the
sub-images. Arnold transform is introduced for scrambling the data of random pixel shifting operation is introduced and serves as
the sub-images. The random spectrum composed of the scrambled
sub-images is transformed by gyrator transform. An iterative structure
key.
of the algorithm is designed for enhancing the security of the encryp- As a motivation of this article, the random pixel scram-
tion algorithm. The parameters of gyrator transforms and separating bling method is developed for hiding secret information. In
scheme serve as the key of the encryption method. The encryption this paper, Arnold transform and separating scheme are intro-
process can be implemented by an electro-optical setup. Some nu- duced into optical image encryption to change the sequence
merical simulations have been given to demonstrate the security and
validity of this algorithm. © 2011 SPIE and IS&T. [DOI: 10.1117/1.3557790] of image pixels in order to generate the key of the algorithm.
Compared to other scrambling methods, Arnold transform
can obtain a noise-like image with a single parameter (total
iterative time), which can reduce the space of key for stor-
1 Introduction age and transmission in a practical application. An electro-
In recent years, the research on an image encryption algo- optical setup is designed, based on GT and Arnold transform,
rithm has become a focused topic in optical information to implement the proposed encryption scheme. The data of
processing. Some algorithms have been proposed by us- GT spectrum is transformed by using Arnold transform for
ing optical transform or some optical processes,1–25 such scrambling pixel sequence. The final encrypted image is re-
as Fourier transform, fractional Fourier transform, gyrator ceived from the GT output of the scrambled image. The
transform (GT), Fresnel diffraction, interference, and so on. position sequence of the image pixel is randomized in this
The classical one is double random phase encoding (DRPE) algorithm, which is similar to Refs. 28 and 29. An iterative
technology1 proposed by Réfrégier and Javidi in 1995. Sub- operation is utilized in this algorithm for introducing more
sequently, the DRPE has also been developed in the domains parameters of Arnold transform. The random shifting se-
of fractional Fourier transform and Fresnel transform.26, 27 quence of image pixels is regarded as the key of the proposed
In many encryption schemes, random phase mask is em- encryption method. Moreover, the random phase encoding
ployed as the main way to obtain high security. The storage technology is not employed as the key of this encryption
space of random phase mask regarded as key is close to scheme. The corresponding numerical simulation is given
to validate the security and performance of the encryption
algorithm.
The rest of this article is organized in the following se-
Paper 09210RRRR received Nov. 3, 2009; revised manuscript received Dec. quence. In Sec. 2, the algorithm of image encryption is de-
21, 2010; accepted for publication Jan. 31, 2011; published online Mar. 28, scribed in detail. In Sec. 3, some numerical simulations are
2011.
shown to demonstrate the validity of the algorithm. Conclud-
1017-9909/2011/20(1)/013020/6/$25.00
C 2011 SPIE and IS&T ing remarks are summarized in Sec. 4.
a b
M M
1 m
N
A1 x1, y1 exp i 1 x1, y1 A1 x1, y1 exp i 1 x1, y1 d c
M M
Iterative body C2 x2 , y2 p n
N N
(c)
CN (a) (b)
Fig. 1 The proposed encryption scheme: (a) the electro-optical sys- Fig. 2 The blocking schemes for Arnold transform: (a) the scheme
tem implementing this algorithm, (b) encryption process, and (c) de- used in image encryption, and (b) square distribution composed of
cryption process. sub-images.
Fig. 3 The result of encryption and decryption with the proposed algorithm: (a) Lena, (b) encrypted
image for Lena, (c) decrypted image with correct key from (b), (d) Mandrill, (e) encrypted image for
Mandrill, and (f) decrypted image with correct key from (e).
MSE
4
original image I0 . The distribution of energy is more uniform 3
than the case without random phase encoding. Moreover, the 2
random phase function is not required for image decryption. 2 = 1.199 = 1.201
0
The decryption operation shown in Fig. 3(c), which can be 1.198 1.199 1.2 1.201 1.202
derived from Eq. (3), is the inverse process of the image 1
encryption. 0
In this paper the blocking scheme and the parameter of the 1.1 1.15 1.2 1.25 1.3 1.35 1.4 1.45 1.5
gyrator transform serve as the keys of the encryption algo-
(a)
rithm. To increase the security of the encryption method, the
different parameter values of the transforms can be adopted in 103
every iteration, in which the blocking scheme is also fixed at 7
various formats. The blocking scheme can be expressed that 6
every sub-image can be defined by the position of the corner
103
point at its left-top region and size. The blocking scheme and 5
6
the parameters of Arnold transform should be obtained and MSE=5.81 103 MSE=5.79 103
4
controlled by a computer in the application. The parameter
MSE
4
MSE
0
1.1 1.15 1.2 1.25 1.3 1.35 1.4 1.45 1.5
3 Numerical Simulation
(b)
Now we give the numerical simulations of the algorithm. The
two gray-level images31 with 256×256 pixels are shown in Fig. 4 The MSE curves with various values of the angle α in GT: (a)
Figs. 3(a) and 3(d). The angle α of GT is fixed at 1.2 for the Lena and (b) Mandrill. Here all the parameters of Arnold transform
transform during the implementation of image encryption are correct in the decryption process.
q m
p n
(a)
(a) (b)
(b) (c)
6200
6100
6000
MSE
Lena
Mandrill
5900
5800
5700
20 40 60 80 100 120 140 160 180
j
(a)
(b) (c)
Fig. 8 The result against blind decryption: (a) MSE curves, (b) for Lena, MSE=6.07×103 , and (c) for Mandrill, MSE=5.79×103 .
We pay attention to the effect of the blocking scheme on Arnold transform are equal to 56 and 73 for Figs. 8(b) and
the security. An error blocking scheme is adopted and illus- 8(c), respectively.
trated in Fig. 6(a). Here the parameter q in Arnold transform Recently known/chosen plain-text attacks have been con-
is calculated as the following equation sidered for DRPE.16–19 For chosen plaintext attacks, its
premise condition is that the encryption system (or process)
a(k) + b(k) + c(k) + d(k) and some ciphers are known or controlled by an illegal user.
q(k) = round , k = 1, 2, ..., N .
4 For a known plain-text attack, the condition is that a pair of
cipher and plain-text is obtained by an attacker. Moreover,
(6) some ciphers are made by using the same keys for the two
The parameter q(k) will be used in a decryption test for the attacks, namely the obtained key in the attacks is effective for
sub-image at the left-top corner of the image. The values of the encrypted images made with itself. If every set of keys is
{m(k), n(k) and p(k)} and α are correct in calculation. The utilized for generating a cipher only once, an attacker cannot
total iterative number is taken at 8 in the process of image de- recover a secret image with the two attack methods. There-
cryption. The corresponding decrypted images are displayed fore the proposed encryption scheme should change keys for
in Figs. 6(b) and 6(c). The recovered results are random im- a different original image against the potential known/chosen
ages. It is hard to recognize the two original images from plain-text attacks in a practical application. Some different
Fig. 6. If an error blocking scheme is utilized in image de- data regarded as keys can be generated by a program from a
cryption, the original image cannot be obtained. computer.
We validate the retrieval result of the encrypted image
against blind decryption. The attacker knows nothing but GT 4 Conclusion
and Arnold transform, which are used in the image encryp- We have presented a type of optical image encryption algo-
tion. Because the blocking scheme is unknown, the separat- rithm based on Arnold transform and gyrator transform. The
ing operation is not adopted in the recovering process. The algorithm can be implemented by the electro-optical setup
whole spectrum of GT is transformed by Arnold transform. composed of lenses and a computer, which perform two kinds
Moreover, the iterative process is not employed for image de- of transforms. The parameters of two transforms can be re-
cryption. The corresponding decryption flowchart is shown garded as the key of encryption. Moreover, the amplitude
in Fig. 7, in which α is fixed at 1.2. The period of Arnold part and phase part of the gyrator spectrum are separated into
j
transform A256 is equal to 192. Changing the parameter j of many sub-images before achieving Arnold transform. The
j
Arnold transform A256 , the MSE curves are calculated and blocking scheme can serve as the key of algorithm to avoid
plotted in Fig. 8(a). The curves, the values of which exceed the period property of Arnold transform and to enhance the
5×103 , imply that the original image cannot be decrypted in security of the algorithm. An iterative structure is also in-
the case of blind decryption. As an example, the recovered troduced for increasing the security of this algorithm. The
result of two encrypted images, which have the minimum of numerical simulations have demonstrated the security and
MSE, is illustrated in Figs. 8(b) and 8(c). The parameters of performance of the proposed algorithm.