Professional Documents
Culture Documents
art ic l e i nf o a b s t r a c t
Article history: The existing ways to encrypt images based on compressive sensing usually treat the whole measurement
Received 16 January 2014 matrix as the key, which renders the key too large to distribute and memorize or store. To solve this
Received in revised form problem, a new image compression–encryption hybrid algorithm is proposed to realize compression and
21 February 2014
encryption simultaneously, where the key is easily distributed, stored or memorized. The input image is
Accepted 25 February 2014
divided into 4 blocks to compress and encrypt, then the pixels of the two adjacent blocks are exchanged
Available online 31 March 2014
randomly by random matrices. The measurement matrices in compressive sensing are constructed by
Keywords: utilizing the circulant matrices and controlling the original row vectors of the circulant matrices with
Image encryption logistic map. And the random matrices used in random pixel exchanging are bound with the
Image compression
measurement matrices. Simulation results verify the effectiveness, security of the proposed algorithm
Compressive sensing
and the acceptable compression performance.
& 2014 Elsevier Ltd. All rights reserved.
1. Introduction scheme was proposed based on the phase retrieval process and
phase mask multiplexing in the fractional Fourier transform domain
With the development of multimedia technology, more and by Sui [5], where each original image was encoded into a phase-only
more information comes from images. The security of images function by using the proposed phase retrieval process and all the
becomes a serious issue and hence a number of image encryption obtained phase functions were modulated into an interim, which
algorithms were proposed [1–10]. For example, Chen et al. pro- was encrypted into the final ciphertext by using the fractional
posed a new phase retrieval algorithm for optical image encryp- Fourier transform. Lu presented a novel method for optical image
tion in three-dimensional space [1], where the two-dimensional encryption based on a modified radial shearing interferometer [6],
plaintext was considered as a series of particles distributed in 3D where the plaintext image was first encoded into a phase-only mask
space, and an iterative phase retrieval algorithm was developed to and then modulated by a random phase mask; the result was
encrypt the series of particles into phase-only masks. Later, they regarded as the input of the radial shearing interferometer and was
proposed a new optical image encryption method based on divided into two coherent lights, which interfered with each other,
multiple-region plaintext and phase retrieval in 3D space [2], leading to an interferogram. An optical authentication technique
where the plaintext was divided into multiple regions and each based on interference image hiding system and phase-only correla-
region was encrypted into one phase-only mask based on phase tion was proposed by Yuan [7], where some predefined complex
retrieval in 3D space. An optical image encryption based on images with different amplitudes and the same phase were respec-
coherent diffractive imaging using multiple wavelengths was tively encoded into two phase-only masks according to the inter-
proposed [3], where the coherent diffractive imaging with multiple ference principle. Their proposed technique can easily generate
wavelengths was applied into optical image encryption. He et al. different verification keys for different users, so it brought conve-
analyzed the collision property of the optical image encryption nience for multi-user application. A flexible multiple-image encryp-
technique based on interference [4] and found that various distinct tion algorithm based on log-polar transform and double random
pairs of phase-only masks yielded almost the same outputs by use of phase encoding technique was proposed [8], where images were
a modified phase retrieval algorithm. A multiple-image encryption transformed by log-polar transform and compounded, and then
encrypted by double random phase encoding. A color image
n
encryption algorithm was designed with the affine transform in
Corresponding author at: Department of Electronic Information Engineering,
the gyrator transform domains [9], where the RGB components of
Nanchang University, No. 999, Xuefu Avenue, Honggutan Xinqu, Nanchang 330031,
China. Tel.: þ86 791 83969670. the color image were converted into the real part and the imaginary
E-mail address: nrzhou@ncu.edu.cn (N. Zhou). part of a complex function by employing the affine transform and
http://dx.doi.org/10.1016/j.optlastec.2014.02.015
0030-3992/& 2014 Elsevier Ltd. All rights reserved.
N. Zhou et al. / Optics & Laser Technology 62 (2014) 152–160 153
subsequently the complex function was encoded and transformed not sample so many redundancy data. CS theory shows that a
in the gyrator domain. And Liu et al. proposed a double image signal x with length N has the representation in the Ψ domain:
encryption scheme by using random phase encoding and pixel
α ¼ ΨTx ð1Þ
exchanging in the gyrator transform domains, where the random
pixel exchanging (RPE) was introduced [10]. Projecting α onto a measurement matrix Φ of size M N, one
Compressive sensing (CS) [11,12] is a newly sampling–recon- can obtain an M 1 vector y, where M is the number of
struction technique which can complete the sampling and com- measurements, and M⪡N, i.e.,
pressing simultaneously. Some researchers investigated the y ¼ Φx ¼ ΦΨ α ¼ Θα; ð2Þ
security of image encryption algorithms with CS. Rachlin and
Baron investigated the security when eavesdroppers had no idea where the sensor matrix Θ is the product of Φ and Ψ , which
of the measurement matrix and demonstrated a computational satisfies restricted isometry property (RIP) [11].
notion of secrecy [13]. Orsdemir and Altun examined the security Definition of RIP: for each integer k ¼ 1; 2; …, define the
and robustness of a compressive sensing based encryption algo- isometry constant δk of a matrix Φ as the smallest number such
rithm and indicated that the CS based encryption is computation- that
ally secure [14]. Abdulghani and Rodriguze-Villegas showed the ð1 δk Þ J f J 22 r J Φf J 22 r ð1 þ δk Þ J f J 22 ð3Þ
additional benefits of compressive sensing in preserving data n
privacy and indicated that the inherent multidimensional projec- holds for all vectors f A R .
tion perturbation feature made it hard to breach the privacy [15]. It is clear that the substance of RIP is that matrix Θ satisfied RIP
And several image encryption algorithms based on CS have been can keep the approximate Euclidean distance of k-sparse signal,
proposed. For example, compressive sensing was introduced in an which ensures the k-sparse signal is not in the null space of Θ so
image encryption method based on double random-phase encod- that it is possible to reconstruct the signal.
ing [16] to lower the encryption data volume due to the dimen- It is required to estimate the sparest solution to y ¼ Θα to
sional decrease properties of CS [17]. Based on the method in [17], recover the signal x. The problem of estimating the sparse solution
the Arnold transforming was introduced later to enhance the can be expressed as
security [18]. Huang and Sakurai divided the original image to min J α J 0 subject to y ¼ Θα: ð4Þ
blocks and vectorized each block to one-dimensional vectors, and
then encrypted and compressed these vectors with CS and block
The above problem may be solved by exhaustive combinatorial
Arnold scrambling [19]. Zhang and Ren proposed a scheme of
search. But it will become an NP-hard problem [25] for large N. To
compressing and decompressing encrypted image based on CS
overcome this problem, some reconstruction algorithms such as
where the original image was encrypted by a secret orthogonal
matching pursuit (MP) [26], orthogonal matching pursuit (OMP)
transform and then compressed by CS with a pseudo-random
[27] and smooth l0 algorithm (SL0) [28] and so on, have been
measurement matrix, and stated that the smoother the original
developed. SL0 is adopted in our proposed algorithm.
image, the better the quality of the reconstructed image [20]. To
overcome the problem that the measurement data from linear
2.2. Random pixel exchanging
dimension reduction projection directly serving as the encrypted
image failed to resist against the chosen-plaintext attack [21],
The random pixel exchanging process is shown in Fig. 1 [10].
Huang et al. proposed a parallel image encryption method based
I 1 and I 2 are two matrices. The variables m and n are the indices of
on CS, where block cipher structure consisting of scrambling,
the matrices. R is a random matrix whose elements are all limited
mixing, S-box and chaotic lattice XOR is designed to further
in the interval ½0; 1. The symbol is defined to swap the pixels
encrypt the quantized measurement data [22]. Sreedhanya and 0 0
at the left side and the right one. I 1 and I 2 are the outputs of the
Soman employed both compressive sensing and Arnold scram-
pixel exchanging operation. The new position ðm0 ; n0 Þ is computed
bling to encrypt color image [23]. Athira et al. proposed a novel
as [10]
image encryption algorithm based on CS, which generates the key (
by linear feedback shift register [24]. m0 ¼ f 1 ðm; nÞ ¼ 1 þ round fðM 1Þ sin ½πRðm; nÞg
; 1 r mr M; 1 r n r N
While all the above CS-based encryption algorithms adopted n0 ¼ f 2 ðm; nÞ ¼ 1 þ round ½ðN 1ÞRðm; nÞ
the whole measurement matrix as key, which renders the key too ð5Þ
large to distribute and memorize. The compression and the
encryption in some schemes cannot perform simultaneously. To where M and N are the sizes of the random matrix R. The matrices
overcome these shortcomings, we explore a new hybrid compres- I 1 and I 2 have M N pixels. The round function is toward nearest
sion–encryption algorithm where the measurement matrix is integer for input number. The mean value R of random matrix R
controlled by keys and constructed as a circulant matrix. The plain
image is divided into 4 blocks to compress and encrypt, and then
the 4 compressed and encrypted blocks are scrambled by random
pixel exchanging with the random matrices.
The outline of this paper is as follows: some fundamental
knowledge is introduced in Section 2, the proposed algorithm is
described in Section 3, experimental results and discussion are
given in Section 4, and a brief conclusion is arrived at in Section 5.
2. Fundamental knowledge
is [10]
1
R¼ ∑ Rðm; nÞ ð6Þ
M N 8 m;n
Fig. 4. (a) Lena; (b) encrypted image; and (c) correct decrypted image.
Fig. 5. Histogram: (a1) Lena; (a2) encrypted Lena; (b1) Cameraman; (b2) encrypted Cameraman; (c1) Peppers; and (c2) encrypted Peppers.
156 N. Zhou et al. / Optics & Laser Technology 62 (2014) 152–160
Fig. 6. Correlation distribution of two horizontally adjacent pixels in (a1) original Lena; (a2) encrypted Lena; (b1) original Cameraman; (b2) encrypted Cameraman;
(c1) original Peppers; and (c2) encrypted Peppers.
Table 1 there are 768 256 times float number multiply operations and
Correlation coefficients of adjacent pixels. 384 256 times float number add operations to generate two
random phase masks. One can see that the amount of computation
Correlation coefficient Horizontal Vertical Diagonal
of the proposed algorithm is much less.
Original Lena 0.9590 0.9217 0.9071
Encrypted Lena 0.0846 0.0583 0.0931 4.1. Histogram
Original Cameraman 0.9585 0.9346 0.9063
Encrypted Cameraman 0.0639 0.0539 0.0848 The image histogram is often used to analyze the performance of
Original Peppers 0.9529 0.9465 0.9150
Encrypted Peppers 0.0787 0.0582 0.0873
the image encryption algorithm. It is the best when the values in the
histogram of the encrypted image are fairly uniform in distribution,
N. Zhou et al. / Optics & Laser Technology 62 (2014) 152–160 157
or the second best when the histograms of different original images horizontal, vertical and diagonal directions, 16,000 adjacent pixel
are similar to each other. Fig. 5(a1), (b1) and (c1) are the histograms pairs are selected randomly from original image and encrypted image,
of Lena, Cameraman and Peppers, respectively. And Fig. 5(a2), (b2) correspondingly. As shown in Fig. 6, the regular distribution reflects
and (c2) are the histograms of their encrypted images, correspond- the high correlation between two adjacent pixels in original image
ingly. The histograms of the three original images are obviously and the disordered distribution reflects the weak correlation between
different from each other, while their encrypted images have similar two adjacent pixels in the encrypted image. And the distributions of
histograms. After a large number of parallel experiments, we found vertical and diagonal directions share the similar modality.
that the histograms of the ciphertexts of different original images are The correlation coefficient is
similar to Fig. 5(a2), (b2) and (c2). That is to say, the proposed
algorithm can frustrate the statistical analysis attack. ∑N i ¼ 1 ðxi xÞðyi yÞ
ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
C ¼ s ð9Þ
2 2
i ¼ 1 ðxi xÞ
∑N ∑N
i ¼ 1 ðyi yÞ ;
4.2. Correlation of two adjacent pixels
The correlation of two adjacent pixels in a meaningful image is where x ¼ 1=N ∑N i ¼ 1 xi and y ¼ 1=N ∑i ¼ 1 yi . The quantitative eva-
N
usually close to 1, while that of the encrypted image should be close to luation on correlation is compiled in Table 1. The correlation of the
0. To measure the correlations between two adjacent pixels in the plaintext is close to 1 in each direction, while the correlation of the
Fig. 7. Decrypted image with (a) Δ1 ¼ 10 16 ; (b) Δ2 ¼ 10 16 ; and MSE curves versus (c) x01 þ Δ1 ; and (d) x02 þ Δ2 .
Fig. 8. (a) Encrypted Lena using x01 ¼ 0:11 and x02 ¼ 0:23; (b) encrypted Lena using x01 þ Δ1 ¼ 0:11þ 10 16 and x02 ¼ 0:23; and (c) difference between two encrypted images
(a) and (b).
158 N. Zhou et al. / Optics & Laser Technology 62 (2014) 152–160
Fig. 9. The results of noise attacks with different noise strengths: (a) k ¼ 4; (b) k ¼ 8; (c) k ¼ 16; (d) k ¼ 32; and (e) MSE curve versus noise strength.
encrypted image is close to 0 in each direction. That is to say, demonstrate that the attackers cannot obtain useful information
the proposed algorithm removes the tight relationship between by statistical analysis and the proposed algorithm can resist statistical
adjacent pixels of the original image successfully. The results analysis.
N. Zhou et al. / Optics & Laser Technology 62 (2014) 152–160 159
The key space for x01 is equal to ð1=Δ0 Þ, where Δ0 is the value of
Δ for MAE ¼ 0. The simulation results show that Δ0 comes out to be 4:1 25.93
1 10 17 , i.e., the key space of x01 is 1 1017 . Similarly, the key
space of x02 is 1 1017 . Thus, the total key space is as large as 1034 .
If one wants to construct the correct measurement matrix by
exhausting the keys, she must calculate 1034 times which would 4:3 30.85
take much time. Thus the proposed algorithm is secure against
brute-force attack.
introduced to scramble the compressed and encrypted blocks. [8] Gong LH, Liu XB, Zheng F, Zhou NR. Flexible multiple-image encryption
Compared with the methods adopting the whole measurement algorithm based on log-polar transform and double random phase encoding
technique. J Mod Opt 2013;60:1074–82.
matrix as key, the proposed algorithm shortens the key greatly, [9] Chen H, Du XP, Liu ZJ, Yang CW. Color image encryption based on affine
which is of importance for a practical encryption algorithm. By transform and gyrator transform. Opt Lasers Eng 2013;51:768–75.
utilizing the circulant matrix to construct the measurement matrix [10] Liu ZJ, Zhang Y, Li S, Liu W, Liu WY, Wang YH, et al. Double image encryption
scheme by using random phase encoding and pixel exchanging in the gyrator
in CS and controlling the original row vector of circulant matrix transform domains. Opt Laser Technol 2013;47:152–8.
with chaos system, the proposed algorithm is secure. By introdu- [11] Donoho DL. Compressed sensing. IEEE Trans Inf Theory 2006;52:1289–360.
cing the random pixel exchanging and binding the random [12] Candès EJ. Compressive sampling. Int Congr Math 2006;3:1433–52.
[13] Rachlin Y, Baron D. The secrecy of compressed sensing measurements. In:
matrices with the measurement matrices, the security is enhanced Proceedings of the 46th annual allerton conference on communication,
further. The simulation results show that this image compression– control, and computing; 2008. p. 813–17.
encryption hybrid algorithm can provide good security and nice [14] Orsdemir A, Altun HO, Sharma G., et al. On the security and robustness of
encryption via compressed sensing. In: Proceedings of the IEEE military
compression performance.
communications conference MILCOM; 2008.
[15] Abdulghani AM, Rodriguze-Villegas E. Compressive sensing: from “compres-
sing while sampling” to “compressing and securing while sampling”. In:
Proceedings of the 32nd annual international conference of the IEEE engineer-
Acknowledgments ing in medicine and biology society, EMBS'10; 2010. p. 1127–30.
[16] Philippe R, Bahram J. Optical image encryption based on input plane and
Fourier plane random encoding. Opt Lett 1995;20:767–9.
The authors would like to thank the editor and the anonymous
[17] Lu P, Xu ZY, Lu X, Liu XY. Digital image information encryption based on
reviewers for their valuable suggestions and comments which compressive sensing and double random-phase encoding technique. Optik-Int
have led to a much improved paper. This work was supported by J Light Electron Opt 2013;124:2514–8.
[18] Liu XY, Cao YP, Lu P, Lu X, Li Y. Optical image encryption technique based on
the National Natural Science Foundation of China (Grant nos.
compressed sensing and Arnold transformation. Optik-Int J Light Electron Opt
61262084 and 61141007); the Foundation for Young Scientists of 2013;124:6590–3.
Jiangxi Province (Jinggang Star) (Grant no. 20122BCB23002), the [19] Huang R, Sakurai K. A robust and compression-combined digital image
Natural Science Foundation of Jiangxi Province (Grant nos. encryption method based on compressive sensing. In: Proceedings of the
7th international conference on intelligent information hiding and multimedia
20114BAB201018 and 20132BAB201019); and the Opening Project signal processing, IIHMSP; 2011. p. 105–8.
of Key Laboratory of Image Processing and Pattern Recognition [20] Zhang XP, Ren YL, Feng GR, Qian ZX. Compressing encrypted image using
(Nanchang Hangkong University), Jiangxi Province (Grant no. compressive sensing. In: Proceedings of the 7th international conference on
intelligent information hiding and multimedias signal processing, IIHMSP;
TX201204002). 2011. p. 222–5.
[21] Yann F, Albertina C, Thomas JN, Bahram J. Resistance of the double random
phase encryption against various attacks. Opt Exp 2007;15:10253–65.
References [22] Huang R, Rhee KH, Uchida S. A parallel image encryption method based on
compressive sensing. Multimed Tools Appl 2012:1–23.
[23] Sreedhanya AV, Soman KP. Secrecy of cryptography with compressed sensing.
[1] Chen W, Chen XD, Sheppard Colin JR. Optical image encryption based on In: Proceedings of the 2012 international conference on advances in comput-
phase retrieval combined with three-dimensional particle-like distribution. ing and communications, ICACC; 2012. p. 207–10.
J Opt 2012;14:075402. [24] Athira V, George SN, Deepthi PP. A novel encryption method based on
[2] Chen W, Chen XD. Optical image encryption based on multiple-region compressive sensing. In: Proceedings of the 2013 IEEE international multi
plaintext and phase retrieval in three-dimensional. Opt Lasers Eng conference on automation, computing, control, communication and com-
2013;51:128–33. pressed sensing, iMac4s; 2013. p. 271–5.
[3] Chen W, Chen XD, Sheppard Colin JR. Optical image encryption based on [25] Natarajan BK. Sparse approximate solutions to linear systems. SIAM J Comput
coherent diffractive imaging using multiple wavelengths. Opt Commun 1995;24:227–34.
2012;285:225–8. [26] Mallat SG, Zhang Z. Matching pursuits with time-frequency dictionaries. IEEE
[4] He WQ, Peng X, Meng XF. Collision in optical image encryption based on Trans Signal Process 1993;41:3397–415.
interference and a method avoiding this security leak. Opt Lasers Technol [27] Liu E, Temlyakov VN. The orthogonal super greedy algorithm and application
2013;47:31–6. in compressed sensing. IEEE Trans Inf Theory 2012;58:2040–7.
[5] Sui LS, Xin MT, Tian AL. Multiple-image encryption based on phase mask [28] Mohimani H, Babaie-Zadeh M, Jutten C. A fast approach for overcomplete
multiplexing in fractional Fourier transform domain. Opt Lett 2013;38:1996–8. sparse decomposition based on smoothed l0 norm. IEEE Trans Signal Process
[6] Lu DJ, He WQ, Peng X. Optical image encryption based on a radial shearing 2009;57:289–301.
interferometer. J Opt 2013;15:105405. [29] Hennelly BM, Sheridan JT. Image encryption and the fractional Fourier trans-
[7] Yuan S, Zhang T, Zhou X, Liu XM, Liu MT. Optical authentication technique form. Proc SPIE – Int Soc Opt Eng 2003;5202:76–87.
based on interference image hiding system and phase-only correlation. Opt [30] Takanori N, Bahram J. Optical encryption system with a binary key code. Appl
Commun 2013;304:129–35. Opt 2000;39:4783–7.