Professional Documents
Culture Documents
Farah 2020
Farah 2020
Research Note
H I GH L IG H T S
• We propose a new method for optical image encryption using fractional Fourier transform.
• Our algorithm is based on Shannon’s property of confusion and diffusion.
• The confusion process is based on DNA encoding and on using DNA XOR to scramble the pixel values of the image.
A R T I C LE I N FO A B S T R A C T
Keywords: In this paper, we propose a new method for optical image encryption using fractional Fourier transform, DNA
Optical image encryption sequence operation and chaos theory. Random phase masks are generated using iterative Lorenz map and the
Fractional Fourier transform plain image is transformed to a DNA matrix. This matrix is combined with the random phase mask and then
Chaos transformed three times using the fractional Fourier transform. An Optical implementation of the encryption
DNA sequence operation
algorithm is proposed in our work. According to the experiment results and security analysis, we find that our
algorithm has good encryption effect, larger secret key space and high sensitivity to the secret key. It can resist to
most known attacks, such as statistical analysis and exhaustive attacks. All these features show that our en-
cryption algorithm is very suitable for digital image encryption.
⁎
Corresponding author.
E-mail addresses: med.farah@yahoo.fr (M.A.B. Farah), ramzi.guesmi@gmail.com (R. Guesmi), abdennaceur.kachouri@enis.rnu.tn (A. Kachouri),
mounir.samet@enis.rnu.tn (M. Samet).
https://doi.org/10.1016/j.optlastec.2019.105777
Received 10 April 2019; Accepted 16 August 2019
0030-3992/ © 2019 Elsevier Ltd. All rights reserved.
M.A.B. Farah, et al. Optics and Laser Technology 121 (2020) 105777
3.1. DNA encoding and decoding for image (k12 ⊕ k13 ⊕ k14 ⊕…⊕ k22)
y0 = y0′ +
256 (5)
We present in this section the coding method based on DNA. We
(k23 ⊕ k24 ⊕ k25 ⊕…⊕ k32)
know that DNA sequence contains four nucleic acid bases A(adenine), z 0 = z 0′ +
256 (6)
C(cytosine), G(guanine), T(thymine): (A and T) and(G and C) are
complementary. If we apply this idea in binary base, so 00 and 11 are Where x 0′, y0′ and z 0′ are the initial given values.
complementary, 01 and 10 are also complementary. Table 1 show the The process of this first part is given as follows in detail:
24 kinds of coding schemes, there are only 8 kinds of coding schemes
satisfy the Watson–Crick complement rule [33]. Step 1: Input the plain image P(m,n), where m and n are the image
dimensions of rows and columns, respectively.
Table 1 Step 2: Generate the key sequence K and the initial values ( x 0′, y0′ , z 0′) of
8 kinds of DNA map rules. the Lorenz system.
1 2 3 4 5 6 7 8
Step 3: Transform the matrix of P to a binary matrix Pbin (m , n × 8) ,
then encode it in accordance with the chosen DNA encoding
A 00 00 01 01 10 10 11 11 rule ruleenc and get a DNA sequence matrix Pdna (m , n × 4) .
T 11 11 10 10 01 01 00 00 Step 4: Transform K to binary sequence Kb , then generate the matrix
G 01 10 00 11 00 11 01 10 m×n×8
Mk (m , n × 8) by repeating Kb , t times, where t = .
C 10 01 11 00 11 00 10 01 32
Encode Mk with the same encoding rule and get Mke .
2
M.A.B. Farah, et al. Optics and Laser Technology 121 (2020) 105777
4.1.3. Part 3
In this part, we will use the FRFT three times and the chaotic ma-
trices X,Y and Z (step 3, part 2) to produce the ciphered image.
Step 1: The first FRFT operation of order q1 is applied over the obtained
matrix P1 (step 6, part 1) to get a first transformed image I1:
I 1 = Fq1 {P1} (10)
yi = mod (floor (yi ·1014), 256) 5. Simulation result and security analysis
(8)
3
M.A.B. Farah, et al. Optics and Laser Technology 121 (2020) 105777
Table 3
Entropy values of ciphered images after each step.
Entropy DNA step First FRFT step Second FRFT step Third FRFT step
Table 4
The mean NPCR and UACI of ciphered images when changing one pixel.
Images NPCR (%) UACI (%)
R G B R G B
4
M.A.B. Farah, et al. Optics and Laser Technology 121 (2020) 105777
Table 5
Comparative study of NPCR, UACI and Entropy of the proposed algorithm to some existing algorithms.
Images NPCR (%) UACI (%) Entropy
R G B R G B
Fig. 6. Histograms of the color plain-image in the red, green and blue components. (For interpretation of the references to colour in this figure legend, the reader is
referred to the web version of this article.)
5
M.A.B. Farah, et al. Optics and Laser Technology 121 (2020) 105777
Fig. 7. Correlation of two adjacent pixels: Frames (a) and (b) respectively, show the distribution of two horizontally adjacent pixels in the plain and encrypted images
of Lena. Frames (c) and (d) respectively, show the distribution of two vertically adjacent pixels in the plain and encrypted images of Lena. Frames (e) and (f)
respectively, show the distribution of two diagonally adjacent pixels in the plain and encrypted images of Lena.
2n − 1
The encrypted images after each step are shown in Fig. 3. It can be seen 1
H (m) = ∑ p (mi )log 2
p (mi )
.
from the images that there are no relation between the original image i=0 (16)
and the encrypted images. Table 3 shows that cryptographic properties
increase after each step. Therefore, our algorithm can get good en- where p (m) represents the probability of symbol m. The closer it gets to
cryption effect.The encryption algorithm should be sensitive to the se- 8, the less possible for the cryptosystem to divulge information. We
cret keys. In this section, we will discuss the security analysis on the calculate the information entropy of the ciphered images of Figs. 3(a),
proposed encryption scheme. A comparative study of NPCR, UACI and 4(a) and (b). Table 3 shows that the values of entropy are all very close
entropy of our proposed algorithm to some existing algorithms is to the ideal value 8 (see Fig. 5).
6
M.A.B. Farah, et al. Optics and Laser Technology 121 (2020) 105777
5.2. Differential attack show that the correlation coefficients of the plain image are close to 1
while those of the cipher-image are nearly 0.
The difference between original image and ciphered image can be
measured by means of two criteria namely, the NPCR (Number of Pixel 6. Conclusions
Change Rate) and the UACI (Unified Average Changing Intensity).
Attackers often make a tiny change in the original image, then use the We have proposed a new approach to encrypt the image using FRFT,
proposed algorithm to encrypt the original image before and after chaos and DNA sequence operation. This is the first time, DNA sequence
changing, to find out the relation between the original image and the operation has been used with an optical transform for image encryp-
ciphered image, that is the differential attack. The criterions of NPCR tion. In our algorithm, the positions of pixels are permuted by Lorenz
and UACI are usually applied to examine the performance of resisting system and the pixel values of the original image are scrambled by DNA
differential attack. the formulas to calculate NPCRR, G, B and UACIR, G, B : sequence XOR operation with the key matrix. The FRFT was applied
three times. Hence, the fractional order serve as a robust key in terms of
∑i, j DR, G, B (i, j )
NPCRR, G, B = × 100% blind decryption. Through the experiment result and security analysis,
L (17) we find that our algorithm has good encryption effect, larger secret key
space and high sensitive to the secret key. Furthermore, the proposed
1⎡ |CR, G, B (i, j ) − CR′ , G, B (i, j )| ⎤
UACIR, G, B = ∑ ⎥ × 100% algorithm also can resist most known attacks, such as statistical analysis
L ⎢ i, j 255 (18) and exhaustive attacks. All these features show that our algorithm is
⎣ ⎦
very suitable for digital image encryption.
where L is the total number of pixels in the image. CR, G, B and CR′ , G, B are
respectively the ciphered images before and after one pixel of the plain References
image is changed. DR, G, B (i, j ) can be defined by:
1, if CR, G, B (i, j ) ≠ CR′ , G, B (i, j ) [1] Philippe Refregier, Bahram Javidi, Optical image encryption based on input plane
DR, G, B (i, j ) = ⎧ and fourier plane random encoding, Opt. Lett. 20 (7) (1995) 767–769.
⎨ 0, if CR, G, B (i, j ) = CR′ , G, B (i, j ) (19) [2] G. Unnikrishnan, J. Joseph, Kehar Singh, Optical encryption by double-random
⎩
phase encoding in the fractional fourier domain, Opt. Lett. 25 (12) (2000) 887–889.
Table 4 shows the results according to the proposed algorithm of [3] Banghe Zhu, Shutian Liu, Qiwen Ran, Optical image encryption based on multi-
fractional fourier transforms, Opt. Lett. 25 (16) (2000) 1159–1161.
NPCRR, G, B and UACIR, G, B . We have found that the NPCR is over 99% and
[4] Shutian Liu, Yu. Li, Banghe Zhu, Optical image encryption by cascaded fractional
the UACI is over 33%,These results show that encryption scheme is fourier transforms with random phase filtering, Opt. Commun. 187 (1) (2001)
sensitive with small change in the original image, even if there is only 57–63.
one difference bit between them, the proposed cryptosystem can give [5] B. Hennelly, John T. Sheridan, Optical image encryption by random shifting in
fractional fourier domains, Opt. Lett. 28 (4) (2003) 269–271.
two ciphered images different. [6] Liansheng Sui, Meiting Xin, Ailing Tian, Haiyan Jin, Single-channel color image
encryption using phase retrieve algorithm in fractional fourier domain, Opt. Lasers
5.3. Statistical attack Eng. 51 (12) (2013) 1297–1309.
[7] Zhengjun Liu, She Li, Wei Liu, Shutian Liu, Opto-digital image encryption by using
baker mapping and 1-d fractional fourier transform, Opt. Lasers Eng. 51 (3) (2013)
5.3.1. The histogram analysis 224–229.
The most significant characteristic of an image is histogram: we can [8] Zhengjun Liu, She Li, Wei Liu, Yanhua Wang, Shutian Liu, Image encryption al-
gorithm by using fractional fourier transform and pixel scrambling operation based
see the frequency of each gray level, which can exposure image in- on double random phase encoding, Opt. Lasers Eng. 51 (1) (2013) 8–14.
formation. Fig. 6 displays the histograms of RGB colors for the original [9] Huijuan Li, Yurong Wang, Information security system based on iterative multiple-
image in Fig. 3(a) and the encrypted one in Fig. 3, respectively. It is phase retrieval in gyrator domain, Opt. Laser Technol. 40 (7) (2008) 962–966.
[10] Muhammad Rafiq Abuturab, Color information security system using discrete co-
clear from these figures that the histograms of the encrypted image are sine transform in gyrator transform domain radial-hilbert phase encoding, Opt.
uniform and different from those of the original image (see Fig. 7). Lasers Eng. 50 (9) (2012) 1209–1216.
[11] Muhammad Rafiq Abuturab, Securing color image using discrete cosine transform
in gyrator transform domain structured-phase encoding, Opt. Lasers Eng. 50 (10)
5.3.2. Correlation coefficient analysis (2012) 1383–1390.
We selected randomly 2000 adjacent pixel (in vertical, horizontal [12] Muhammad Rafiq Abuturab, Securing color information using arnold transform in
and diagonal directions) from the plain image and encrypted image. gyrator transform domain, Opt. Lasers Eng. 50 (5) (2012) 772–779.
[13] Wen Chen, Xudong Chen, Colin JR Sheppard, Optical image encryption based on
The following formula calculate the correlation coefficients of two ad-
diffractive imaging, Opt. Lett. 35 (22) (2010) 3817–3819.
jacent pixels: [14] Wen Chen, Xudong Chen, Space-based optical image encryption, Opt. Express 18
(26) (2010) 27095–27104.
cov (x , y ) [15] Wen Chen, Xudong Chen, Colin J.R. Sheppard, Optical color-image encryption and
rxy = ,
D (x ) D (y ) (20) synthesis using coherent diffractive imaging in the fresnel domain, Opt. Express 20
(4) (2012) 3853–3865.
where [16] Narendra K. Pareek, Vinod Patidar, Krishan K. Sud, Image encryption using chaotic
logistic map, Image Vis. Comput. 24 (9) (2006) 926–934.
N [17] Kwok-Wo Wong, Bernie Sin-Hung Kwok, Wing-Shing Law, A fast image encryption
1
cov (x , y ) =
N
∑ (x i − E (x ))(yi − E (y )), scheme based on chaotic standard map, Phys. Lett. A 372 (15) (2008) 2645–2652.
i=1 (21) [18] Xing-Yuan Wang, Lei Yang, Rong Liu, Abdurahman Kadir, A chaotic image en-
cryption algorithm based on perceptron model, Nonlinear Dyn. 62 (3) (2010)
N 615–621.
1
E (x ) =
N
∑ xi , [19] Yang Tang, Zidong Wang, Jian-an Fang, Image encryption using chaotic coupled
i=1 (22) map lattices with time-varying delays, Commun. Nonlinear Sci. Numer. Simul. 15
(9) (2010) 2456–2468.
N [20] Omid Mirzaei, Mahdi Yaghoobi, Hassan Irani, A new image encryption method:
1
D (x ) =
N
∑ (x i − E (x ))2. parallel sub-image encryption with hyper chaos, Nonlinear Dyn. 67 (1) (2012)
i=1 (23) 557–566.
[21] A. Kanso, M. Ghebleh, A novel image encryption algorithm based on a 3d chaotic
where x and y are gray level values of two adjacent pixels in the image, map, Commun. Nonlinear Sci. Numer. Simul. 17 (7) (2012) 2943–2959.
[22] Ramzi Guesmi, Mohamed Amine Ben Farah, Abdennaceur Kachouri, Mounir Samet,
N is the total number of pixels selected from the image, E (x ) and E (y ) Hash key-based image encryption using crossover operator and chaos, Multimedia
are the mean values of x i and yi , respectively. The detailed results of Tools Appl. (2015) 1–17.
correlation coefficients for two horizontally (vertically and diagonally) [23] Narendra Singh, Aloka Sinha, Optical image encryption using fractional fourier
transform and chaos, Opt. Lasers Eng. 46 (2) (2008) 117–123.
adjacent pixels in the red, green and blue components of the original
[24] Narendra Singh, Aloka Sinha, Gyrator transform-based optical image encryption,
plain-image and the encrypted one are given in Table 6. These results
7
M.A.B. Farah, et al. Optics and Laser Technology 121 (2020) 105777
using chaos, Opt. Lasers Eng. 47 (5) (2009) 539–546. [33] J.D. Watson, F.H.C. Crick, A structure for deoxyribose nucleic acid, Nature 421
[25] Huijuan Li, Yurong Wang, Double-image encryption based on discrete fractional (6921) (1953) 397–3988.
random transform and chaotic maps, Opt. Lasers Eng. 49 (7) (2011) 753–757. [34] Xiaopeng Wei, Ling Guo, Qiang Zhang, Jianxin Zhang, Shiguo Lian, A novel color
[26] Jun Lang, Ran Tao, Yue Wang, Image encryption based on the multiple-parameter image encryption algorithm based on dna sequence operation and hyper-chaotic
discrete fractional fourier transform and chaos function, Opt. Commun. 283 (10) system, J. Syst. Softw. 85 (2) (2012) 290–299.
(2010) 2092–2096. [35] Adolf W. Lohmann, Image rotation, wigner rotation, and the fractional fourier
[27] Nanrun Zhou, Yixian Wang, Lihua Gong, Hong He, Wu. Jianhua, Novel single- transform, JOSA A 10 (10) (1993) 2181–2186.
channel color image encryption algorithm based on chaos and fractional fourier [36] Hongjun Liu, Xingyuan Wang, Color image encryption based on one-time keys and
transform, Opt. Commun. 284 (12) (2011) 2789–2796. robust chaotic maps, Comput. Math. Appl. 59 (10) (2010) 3320–3327.
[28] Jun Lang, Image encryption based on the reality-preserving multiple-parameter [37] Qiang Zhang, Xiaopeng Wei, A novel couple images encryption algorithm based on
fractional fourier transform and chaos permutation, Opt. Lasers Eng. 50 (7) (2012) dna subsequence operation and chaotic system, Optik-Int. J. Light Electron Opt. 124
929–937. (23) (2013) 6276–6281.
[29] Zhengjun Liu, Xu. Lie, Ting Liu, Hang Chen, Pengfei Li, Chuang Lin, Shutian Liu, [38] Qiang Zhang, Lili Liu, Xiaopeng Wei, Improved algorithm for image encryption
Color image encryption by using arnold transform and color-blend operation in based on dna encoding and multi-chaotic maps, AEU-Int. J. Electron. Commun. 68
discrete cosine transform domains, Opt. Commun. 284 (1) (2011) 123–128. (3) (2014) 186–192.
[30] Zhengjun Liu, Min Gong, Yongkang Dou, Feng Liu, Shen Lin, Muhammad [39] Lili Liu, Qiang Zhang, Xiaopeng Wei, A rgb image encryption algorithm based on
Ashfaq Ahmad, Jingmin Dai, Shutian Liu, Double image encryption by using arnold dna encoding and chaos map, Comput. Electric. Eng. 38 (5) (2012) 1240–1248.
transform and discrete fractional angular transform, Opt. Lasers Eng. 50 (2) (2012) [40] Qiang Zhang, Ling Guo, Xiaopeng Wei, Image encryption using dna addition
248–255. combining with chaotic maps, Math. Comput. Modell. 52 (11) (2010) 2028–2035.
[31] W. Chen, C. Quan, C.J. Tay, Optical color image encryption based on arnold [41] R. Guesmi, M.A.B. Farah, A. Kachouri, M. Samet, A novel chaos-based image en-
transform and interference method, Opt. Commun. 282 (18) (2009) 3680–3685. cryption using dna sequence operation and secure hash algorithm sha-2, Nonlinear
[32] Haldun M. Ozaktas, Zeev Zalevsky, M. Alper Kutay, The fractional fourier transform Dyn. (2015) 1–14.
with applications in optics and signal processing, 2001.