OSA's Digital Library

Optics Express

Optics Express

  • Editor: Andrew M. Weiner
  • Vol. 22, Iss. 9 — May. 5, 2014
  • pp: 10605–10621

Asymmetric double-image encryption based on cascaded discrete fractional random transform and logistic maps

Liansheng Sui, Kuaikuai Duan, Junli Liang, and Xinhong Hei  »View Author Affiliations

Optics Express, Vol. 22, Issue 9, pp. 10605-10621 (2014)

View Full Text Article

Enhanced HTML    Acrobat PDF (3636 KB)

Browse Journals / Lookup Meetings

Browse by Journal and Year


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools



A double-image encryption is proposed based on the discrete fractional random transform and logistic maps. First, an enlarged image is composited from two original images and scrambled in the confusion process which consists of a number of rounds. In each round, the pixel positions of the enlarged image are relocated by using cat maps which are generated based on two logistic maps. Then the scrambled enlarged image is decomposed into two components. Second, one of two components is directly separated into two phase masks and the other component is used to derive the ciphertext image with stationary white noise distribution by using the cascaded discrete fractional random transforms generated based on the logistic map. The cryptosystem is asymmetric and has high resistance against to the potential attacks such as chosen plaintext attack, in which the initial values of logistic maps and the fractional orders are considered as the encryption keys while two decryption keys are produced in the encryption process and directly related to the original images. Simulation results and security analysis verify the feasibility and effectiveness of the proposed encryption scheme.

© 2014 Optical Society of America

OCIS Codes
(060.4510) Fiber optics and optical communications : Optical communications
(100.2000) Image processing : Digital image processing

ToC Category:
Image Processing

Original Manuscript: March 26, 2014
Revised Manuscript: April 21, 2014
Manuscript Accepted: April 21, 2014
Published: April 24, 2014

Liansheng Sui, Kuaikuai Duan, Junli Liang, and Xinhong Hei, "Asymmetric double-image encryption based on cascaded discrete fractional random transform and logistic maps," Opt. Express 22, 10605-10621 (2014)

Sort:  Author  |  Year  |  Journal  |  Reset  


  1. P. Refregier, B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20(7), 767–769 (1995). [CrossRef] [PubMed]
  2. B. Javidi, “Securing information with optical technologies,” Phys. Today 50(3), 27–32 (1997). [CrossRef]
  3. G. Situ, J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29(14), 1584–1586 (2004). [CrossRef] [PubMed]
  4. L. Chen, D. Zhao, “Optical color image encryption by wavelength multiplexing and lensless Fresnel transform holograms,” Opt. Express 14(19), 8552–8560 (2006). [CrossRef] [PubMed]
  5. W. Chen, D. Chen, “Optical color image encryption based on an asymmetric cryptosystem in the Fresnel domain,” Opt. Commun. 284(16–17), 3913–3917 (2011). [CrossRef]
  6. G. Unnikrishnan, J. Joseph, K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25(12), 887–889 (2000). [CrossRef] [PubMed]
  7. B. Zhu, S. Liu, Q. Ran, “Optical image encryption based on multifractional Fourier transforms,” Opt. Lett. 25(16), 1159–1161 (2000). [CrossRef] [PubMed]
  8. B. Hennelly, J. T. Sheridan, “Optical image encryption by random shifting in fractional Fourier domains,” Opt. Lett. 28(4), 269–271 (2003). [CrossRef] [PubMed]
  9. Y. Sheng, Z. Xin, M. S. Alam, L. Xi, L. Xiao-Feng, “Information hiding based on double random-phase encoding and public-key cryptography,” Opt. Express 17(5), 3270–3284 (2009). [CrossRef] [PubMed]
  10. M. He, Q. Tan, L. Cao, Q. He, G. Jin, “Security enhanced optical encryption system by random phase key and permutation key,” Opt. Express 17(25), 22462–22473 (2009). [CrossRef] [PubMed]
  11. W. Chen, X. Chen, “Space-based optical image encryption,” Opt. Express 18(26), 27095–27104 (2010). [CrossRef] [PubMed]
  12. W. Chen, X. Chen, C. J. R. Sheppard, “Optical color-image encryption and synthesis using coherent diffractive imaging in the Fresnel domain,” Opt. Express 20(4), 3853–3865 (2012). [CrossRef] [PubMed]
  13. M. R. Abuturab, “Color image security system based on discrete Hartley transform in gyrator transform domain,” Opt. Lasers Eng. 51(3), 317–324 (2013). [CrossRef]
  14. M. R. Abuturab, “Noise-free recovery of color information using a joint-extended gyrator transform correlator,” Opt. Lasers Eng. 51(3), 230–239 (2013). [CrossRef]
  15. N. Zhou, Y. Wang, J. Wu, “Image encryption algorithm based on the multi-order discrete fractional Mellin transform,” Opt. Commun. 284(24), 5588–5597 (2011). [CrossRef]
  16. A. Alfalou, C. Brosseau, “Optical image compression and encryption methods,” Adv. Opt. Photonics 1(3), 589–636 (2009). [CrossRef]
  17. G. Situ, J. Zhang, “Multiple-image encryption by wavelength multiplexing,” Opt. Lett. 30(11), 1306–1308 (2005). [CrossRef] [PubMed]
  18. G. Situ, J. Zhang, “Position multiplexing for multiple-image encryption,” J. Opt. A, Pure Appl. Opt. 8(5), 391–397 (2006). [CrossRef]
  19. A. Alfalou, A. Mansour, “Double random phase encryption scheme to multiplex and simultaneous encode multiple images,” Appl. Opt. 48(31), 5933–5947 (2009). [CrossRef] [PubMed]
  20. A. Alfalou, C. Brosseau, N. Abdallah, M. Jridi, “Simultaneous fusion, compression, and encryption of multiple images,” Opt. Express 19(24), 24023–24029 (2011). [CrossRef] [PubMed]
  21. Z. Liu, Y. Zhang, H. Zhao, M. A. Ahmad, S. Liu, “Optical multi-image encryption based on frequency shift,” Optik (Stuttg.) 122(11), 1010–1013 (2011). [CrossRef]
  22. X. Wang, D. Zhao, “Multiple-image encryption based on nonlinear amplitude-truncation and phase-truncation in Fourier domain,” Opt. Commun. 284(1), 148–152 (2011). [CrossRef]
  23. X. Wang, D. Zhao, “Fully phase multiple-image encryption based on superposition principle and the digital holographic technique,” Opt. Commun. 285(21–22), 4280–4284 (2012). [CrossRef]
  24. H. E. Hwang, H. T. Chang, W. N. Lie, “Multiple-image encryption and multiplexing using a modified Gerchberg-Saxton algorithm and phase modulation in Fresnel-transform domain,” Opt. Lett. 34(24), 3917–3919 (2009). [CrossRef] [PubMed]
  25. H. T. Chang, H. E. Hwang, C. L. Lee, “Position multiplexing multiple-image encryption using cascaded phase-only masks in Fresnel transform domain,” Opt. Commun. 284(18), 4146–4151 (2011). [CrossRef]
  26. H. T. Chang, H. E. Hwang, C. L. Lee, M. T. Lee, “Wavelength multiplexing multiple-image encryption using cascaded phase-only masks in the Fresnel transform domain,” Appl. Opt. 50(5), 710–716 (2011). [CrossRef] [PubMed]
  27. J. J. Huang, H. E. Hwang, C. Y. Chen, C. M. Chen, “Optical multiple-image encryption based on phase encoding algorithm in the Fresnel transform domain,” Opt. Laser Technol. 44(7), 2238–2244 (2012). [CrossRef]
  28. X. Deng, D. Zhao, “Multiple-image encryption using phase retrieve algorithm and intermodulation in Fourier domain,” Opt. Laser Technol. 44(2), 374–377 (2012). [CrossRef]
  29. S. Liansheng, X. Meiting, T. Ailing, “Multiple-image encryption based on phase mask multiplexing in fractional Fourier transform domain,” Opt. Lett. 38(11), 1996–1998 (2013). [CrossRef] [PubMed]
  30. H. Li, Y. Wang, “Double-image encryption based on iterative gyrator transform,” Opt. Commun. 281(23), 5745–5749 (2008). [CrossRef]
  31. H. Li, Y. Wang, “Double-image encryption by iterative phase retrieval algorithm in fractional Fourier domain,” J. Mod. Opt. 55(21), 3601–3609 (2008). [CrossRef]
  32. Z. Liu, Q. Guo, L. Xu, M. A. Ahmad, S. Liu, “Double image encryption by using iterative random binary encoding in gyrator domains,” Opt. Express 18(11), 12033–12043 (2010). [CrossRef] [PubMed]
  33. Z. Liu, Y. Zhang, S. Li, W. Liu, W. Liu, Y. Wang, S. Liu, “Double image encryption scheme by using random phase encoding and pixel exchanging in the gyrator transform domains,” Opt. Laser Technol. 47, 152–158 (2013). [CrossRef]
  34. Z. Liu, M. Gong, Y. Dou, F. Liu, S. Lin, A. A. Muhammad, J. Dai, S. Liu, “Double image encryption by using Arnold transform and discrete fractional angular transform,” Opt. Lasers Eng. 50(2), 248–255 (2012). [CrossRef]
  35. Y. Zhang, D. Xiao, “Double optical image encryption using discrete Chirikov standard map and chaos-based fractional random transform,” Opt. Lasers Eng. 51(4), 472–480 (2013). [CrossRef]
  36. H. Li, Y. Wang, “Double-image encryption based on discrete fractional random transform and chaotic maps,” Opt. Lasers Eng. 49(7), 753–757 (2011). [CrossRef]
  37. L. Sui, H. Lu, Z. Wang, Q. Sun, “Double-image encryption using discrete fractional random transform and logistic maps,” Opt. Lasers Eng. 56, 1–12 (2014). [CrossRef]
  38. X. Wang, D. Zhao, “Double-image self-encoding and hiding based on phase-truncated Fourier transforms and phase retrieval,” Opt. Commun. 284(19), 4441–4445 (2011). [CrossRef]
  39. X. Wang, D. Zhao, “Double images encryption method with resistance against the specific attack based on an asymmetric algorithm,” Opt. Express 20(11), 11994–12003 (2012). [CrossRef] [PubMed]
  40. L. Sui, H. Lu, X. Ning, Y. Wang, “Asymmetric double-image encryption method by using iterative phase retrieve algorithm in fractional Fourier transform domain,” Opt. Eng. 53(2), 026108 (2014). [CrossRef]
  41. N. Singh, A. Sinha, “Optical image encryption using fractional Fourier transform and chaos,” Opt. Lasers Eng. 46(2), 117–123 (2008). [CrossRef]
  42. N. Singh, A. Sinha, “Gyrator transform-based optical image encryption, using chaos,” Opt. Lasers Eng. 47(5), 539–546 (2009). [CrossRef]
  43. N. Singh, A. Sinha, “Chaos based multiple image encryption using multiple canonical transforms,” Opt. Laser Technol. 42(5), 724–731 (2010). [CrossRef]
  44. H. Li, Y. Wang, H. Yan, L. Li, Q. Li, X. Zhao, “Double-image encryption by using chaos-based local pixel scrambling technique and gyrator transform,” Opt. Lasers Eng. 51(12), 1327–1331 (2013). [CrossRef]
  45. J. Wu, X. Luo, N. Zhou, “Four-image encryption method based on spectrum truncation, chaos and the MODFrFT,” Opt. Laser Technol. 45, 571–577 (2013). [CrossRef]
  46. Z. Liu, H. Zhao, S. Liu, “A discrete fractional random transform,” Opt. Commun. 255(4-6), 357–365 (2005). [CrossRef]
  47. Original images: http://sipi.use.edu/database/database.php .
  48. J. Lang, R. Tao, Y. Wang, “Image encryption based on the multiple-parameter discrete fractional Fourier transform and chaos function,” Opt. Commun. 283(10), 2092–2096 (2010). [CrossRef]
  49. A. Carnicer, M. Montes-Usategui, S. Arcos, I. Juvells, “Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys,” Opt. Lett. 30(13), 1644–1646 (2005). [CrossRef] [PubMed]
  50. X. Peng, H. Wei, P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31(22), 3261–3263 (2006). [CrossRef] [PubMed]
  51. W. Qin, X. Peng, “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35(2), 118–120 (2010). [CrossRef] [PubMed]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.

« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited