This paper describes a new opto-hybrid technique of two-stage encryption for the secure transmission and reception of sensitive information contained in the form of images and data. An advanced encryption–decryption technique based on optical scanning holography (optical scanning cryptography) and Fibonacci–Lucas transformation is proposed. The first stage of this hybrid system includes a point spread function engineered optical scanning cryptographic system. A new key based on fused biometric array is used in this stage. A digital encryption strategy follows this stage. This hybrid encryption scheme can be used for the secure transfer and storage of medical images in the Internet, especially in cloud-based services. The quantitative analysis is performed using different figure of merits. The quantitative investigations have been conducted through computer simulations. The parameters analyzed for establishing the performance characteristics of this system are Structural Similarity Index, Correlation Coefficient, Maximum Absolute Deviation, etc. This system shows a remarkable performance improvement during encryption. The method can be explicitly used in the radiograph image transfer over the Internet for telemedicine applications.
I. INTRODUCTION
The whole digital world today enforces an extended demand for information security and confidentiality at various levels of communication. The current field of interest includes secret transfer of personal data, medical data, and radiograph records of patients, restricted defense and intelligence information of countries, data related to examinations, etc. Medical images are regarded as important and sensitive data in the medical informatics systems. The confidentiality of health records are of primary concern while dealing with telemedicine or tele-health platforms. Medical image security in both intranet and Internet faces severe threats. Except for the intranet environment, medical image transmission over wired or wireless networks has elevated in demand. Cryptographic methods and encryption standards are revolutionary methods of securing information that transforms the original information to an unreadable format. To retrieve the original information, knowledge about encryption keys and encryption methods is required. As an advancement of the primary image encryption, optical image encryption methods have been developed. The optical means of encryption has the advantage of high speed and many degrees of freedom. Coherent optical systems are used for implementing most investigated optical encryption techniques. Refregier and Javidi first proposed and implemented this optical image encryption.1 The above optical encryption uses the Double Random Phase Encoding (DRPE). This is the most established and well implemented optical encryption methodology.2–9 Rajput and Nishchal introduced another implementation of DRPE with fractional Fourier transform.10 Instead of using random phase mask, Zamran et al. proposed11 a scheme that uses deterministic phase masks. Others also developed various optical image encryption schemes.12–19 References 20 and 21 employ the technique of compressive sensing for image encryption. Multiple image encryption based on optical methods is also implemented.22,23
The aforementioned optical encryption uses coherent techniques. However, there are only a few incoherent optical encryption techniques implemented until now. These offer better Signal-to-Noise ratio (S/N) compared with the coherent systems. In conventional incoherent optical systems, the intensity of the object is manipulated by real and positive Point Spread Functions (PSFs). This gives an extra bonus that limits the way one can access the information. Optical scanning holography is one such example.24–27 Advances in OSH and OSC are implemented in Refs. 28–30. The OSC, by using biometric key, was proposed by Tang and Zhang.31 Applying this principle, OSC for multidepth objects is discussed in Ref. 32. More sophisticated digital encryptions are done with the help of chaotic maps, and other diffusion models are also implemented.33–41 Recently, several research studies on encryption schemes based on optical, chaotic, or both have been implemented.42–57
A hybrid encryption scheme that uses incoherent holography followed by Fibonacci–Lucas transform58 is proposed here. The first stage encryption uses OSC with Fused Biometric Array (FBA) key. The second high-security level is provided by the application of a post-processing step on the encrypted hologram. Fibonacci–Lucas transformation provides the second stage encryption. The technique finds applications in securing large sized e-documents or medical documents safe.
This paper is arranged as follows. Section II explains the basic theory behind the cryptographic system design. The succeeding subsections of Sec. II deal with the Optical Scanning Cryptography with enhanced security. Section III contains the results of the proposed method. For effective evaluation of the proposed methodology, various figure of merits like Correlation Coefficient (CC) analysis, Structural Similarity Index Measure (SSIM), maximum deviation analysis, etc. are taken into account. The proposed system is tested against differential attacks also.
II. THE SYSTEM DESIGN
Due to the recent progress in the development of optical components and their improved and reliable performance, and the effectiveness of chaotic maps in scrambling the information randomly, a two-layer encryption–decryption system using these concepts is designed.
A. Cryptographic system through optical scanning (OSC)
The section deals with the basic theory of optical scanning cryp-tography. Figure 1 shows the optical setup of encryption and decry-ption. Here, the traditional pupil set is used. Figure 2 represents the flowchart for the simulation of the optical setup of OSC.
1. Encryption
A terahertz optical source, such as laser or visible light, acts as the light source. A beam splitter divides the light into two, and one of its frequencies is slightly shifted and passed to two pupils. These two pupils, p1(x, y) and q1(x, y), are illuminated by the laser beam of angular frequencies Ω and Ω + ω. The beam combiner combines two beams. The combined beam passes through a lens, and it is the scanning beam, which is used for 2D scanning of the object or image to be encrypted. The amplitude of object to be encrypted is denoted by U0(x, y, zc). Here, zc (coding distance) represents the distance of object from the back focal plane of the lens. The X–Y scanner performs 2D scanning over the object.
The photodetector collects all the light transmitted from the object. The subsequent step is the electronic processing. In electronic processing stage, the current from the photodetector is given to a narrow Band Pass Filter (BPF) tuned at frequency ω, which delivers a heterodyne current iω(x, y, zc). This current is demodulated by an electronic multiplier and a Low Pass Filter (LPF), which forms a lock-in amplifier. By multiplying the incoming signal iω (x, y, zc) by cos(ωt) and sin(ωt) and through low-pass filtering, we obtain two signals, icos(x, y, zc) and isin(x, y, zc), respectively, which can be added in a complex way with the aid of a computer to give a final encrypted image, i(x, y, zc),
The optical transfer function of the encryption stage at coding distance zc is
where k0 is the wave number. Here, only the intensity of the input pattern is processed and hence called incoherent system. OTF is determined by pupil function p1(x, y) and q1(x, y). Set q1(x, y) as a pinhole and p1(x, y) as a delta function. The derived OTF is
2. Decryption
For decryption, the optical system is the same and the laser beams are now scanning pinhole. This helps in retrieving the key for the transmission section. Through electronic processing circuitry, the output of the photodetector will then be processed. The process can be repeated but by replacing zc with zd. Here, choose p1(x, y) as a pinhole and keep q1(x, y) as is,
This is the output generated at the decryption stage, where the decryption key has been inserted into the stage. The information is now stored in the digital computer to be used later to decrypt the information.
B. Fibonacci–Lucas transformation
Fibonacci–Lucas transformation58 is a 2D transformation that is specially meant for the encryption of images. The Lucas series is a Fibonacci series’ special case.
Several special cases of the Fibonacci series can be constructed by changing the seed values. By choosing an appropriate seed value for the Fibonacci series and selecting the same seed value for the Lucas series, a new transformation can be achieved. The Fibonacci–Lucas transformation is described as follows:
Here, Fn is given by
Here, Ln is given by
where N is the size of the input and n is the seed or initial point of Fibonacci or Lucas transformation. This is similar to the modified Arnold transform. FLT is periodic in nature with a maximum possible periodicity of N2 − 1. Since this can produce different scrambling patterns with different periodicities, FLT will provide a more secure encryption compared to basic Arnold transform and modified Arnold transform.
Let mi represent elements of a plain text in which i varies from 1 to 64. Table I represents elements of the plain text. Table II shows the elements of the transformed text using the FLT.
Coefficients of plain text.
m1 | m2 | m3 | m4 | m5 | m6 | m7 | m8 |
m9 | m10 | m11 | m12 | m13 | m14 | m15 | m16 |
m17 | m18 | m19 | m20 | m21 | m22 | m23 | m24 |
m25 | m26 | m27 | m28 | m29 | m30 | m31 | m32 |
m33 | m34 | m35 | m36 | m37 | m38 | m39 | m40 |
m41 | m42 | m43 | m44 | m45 | m46 | m47 | m48 |
m49 | m50 | m51 | m52 | m53 | m54 | m55 | m56 |
m57 | m58 | m59 | m60 | m61 | m62 | m63 | m64 |
m65 | m66 | m67 | m68 | m69 | m70 | m71 | m72 |
m73 | m74 | m75 | m76 | m77 | m78 | m79 | m80 |
m1 | m2 | m3 | m4 | m5 | m6 | m7 | m8 |
m9 | m10 | m11 | m12 | m13 | m14 | m15 | m16 |
m17 | m18 | m19 | m20 | m21 | m22 | m23 | m24 |
m25 | m26 | m27 | m28 | m29 | m30 | m31 | m32 |
m33 | m34 | m35 | m36 | m37 | m38 | m39 | m40 |
m41 | m42 | m43 | m44 | m45 | m46 | m47 | m48 |
m49 | m50 | m51 | m52 | m53 | m54 | m55 | m56 |
m57 | m58 | m59 | m60 | m61 | m62 | m63 | m64 |
m65 | m66 | m67 | m68 | m69 | m70 | m71 | m72 |
m73 | m74 | m75 | m76 | m77 | m78 | m79 | m80 |
Coefficients of transformed pixels after FLT.
m14 | m40 | m58 | m4 | m30 | m56 | m74 | m20 |
m73 | m19 | m45 | m71 | m9 | m35 | m61 | m7 |
m60 | m6 | m32 | m50 | m76 | m22 | m48 | m66 |
m47 | m65 | m11 | m37 | m63 | m1 | m27 | m53 |
m26 | m52 | m78 | m24 | m42 | m68 | m14 | m40 |
m13 | m39 | m57 | m3 | m29 | m55 | m73 | m19 |
m80 | m18 | m44 | m70 | m16 | m34 | m60 | m6 |
m59 | m5 | m31 | m49 | m75 | m21 | m47 | m65 |
m46 | m72 | m10 | m36 | m62 | m8 | m26 | m52 |
m25 | m51 | m77 | m23 | m41 | m67 | m13 | m39 |
m14 | m40 | m58 | m4 | m30 | m56 | m74 | m20 |
m73 | m19 | m45 | m71 | m9 | m35 | m61 | m7 |
m60 | m6 | m32 | m50 | m76 | m22 | m48 | m66 |
m47 | m65 | m11 | m37 | m63 | m1 | m27 | m53 |
m26 | m52 | m78 | m24 | m42 | m68 | m14 | m40 |
m13 | m39 | m57 | m3 | m29 | m55 | m73 | m19 |
m80 | m18 | m44 | m70 | m16 | m34 | m60 | m6 |
m59 | m5 | m31 | m49 | m75 | m21 | m47 | m65 |
m46 | m72 | m10 | m36 | m62 | m8 | m26 | m52 |
m25 | m51 | m77 | m23 | m41 | m67 | m13 | m39 |
C. Proposed cryptosystem
An optical cryptographic system based on optical scanning holography is proposed. In this system, the encryption stage consists of two levels. In the first stage, the encryption using incoherent holography (OSC) is performed at a coding distance of zc. The second level of encryption consists of Fibonacci–Lucas transformation. The applied Fibonacci–Lucas transformation converts the pixels of the sine hologram image and cosine hologram image in the order given in Table II. The traditional pupils or any other pupils can be for this experiment are a pinhole and a unity function. The key used for encryption can also be varied.
D. OSC and FLT based cryptographic system with FBA
The simulation experiment is conducted on a two-dimensional grayscale object. The two keys used for this Optical Scanning Holography (OSC) based encryption are a random phase key and a Fused Biometric Array (FBA) key.57
Figures 3 and 4 show the biometric keys used for the proposed system.58 Figure 5 shows the fused biometric array, which is created by fusing Figs. 3 and 4. The FBA is an array of iris images of the sender arranged in a specific order and then combined with the fingerprint of the sender. Each element of iris array corresponds to various eye movements of the same person (sender). The array used in the system consists of nine elements. In order to achieve PSF engineering, the pupils used for optical scanning are 2D rectangular function and 2D Gaussian function. The change in pupil functions in the OSC system finally results in a different pattern of light distribution for the encryption. From the optical encryption section, the encrypted hologram image is digitally encrypted once again. The second encryption is done separately for the real and imaginary parts of the OSC encrypted image. After the second level of encryption, the real and imaginary parts are combined to form a complex hologram image. The flow diagram of the encryption system is shown in Fig. 6. The optical stage in this experiment is conducted by taking into account the mathematical equivalents of components used in the optical system. The appropriate optical system transfer function for OSC (while taking the new pupil set into consideration) is implemented. Then, the second level of encryption is experimentally conducted by the mathematical modeling of the FLT. The optical decryption is done with the same fused biometric array and random phase key. The pupil set used is the same as that of the encryption side. The actual result will be reproduced only at a decoding distance, which is equal to the coding distance, exactly the same seed point for FLT that is used in the encryption. Figure 7 shows the implemented block diagram representation for the simulation experiment of the PSF engineered optical scanning cryptosystem. The amplitude distribution corresponding to the new pupil set is shown in this block.
In the decryption side, the inverse transformation is applied to the encrypted hologram to get back the original complex hologram image. After that, an optical decryption is done with the same fused biometric array and random phase key. The actual result will be obtained only at a decoding distance, which is equal to the coding distance. The flowchart for decryption is shown in Fig. 8.
1. Pupils used for optical scanning cryptography
The experiment is conducted with two sets of pupils. First, the experiment is carried out with a traditional pupil set, i.e., the pinhole and the unity. Since this experiment has resulted in poor encryption in the first stage, a new set of pupils is used for the implementation of the OSC system. p1(x, y) is chosen as a Gaussian function, and q1(x, y) is chosen as a rectangular function. The encryption and decryption keys are the same as in Sec. II D. The theoretical expressions for the used pupil pair and the corresponding OTF are shown as follows:
where γ is a constant in Eq. (10). With these pupils, the transfer function becomes
where kx=, ky= and k0 is the wave number, and G(kx, ky) and R(kx, ky) are the spectral domain representations of p1(x, y) and q1(x, y), respectively. While decryption, the following condition is to satisfied:
E. FLT based encryption of the encrypted hologram
Here, HT is the transformed hologram and H is the encrypted hologram.
III. RESULTS AND DISCUSSION
The following figures show the simulation results of the proposed system. Simulations are done with Matlab R2016a. These are done with the help of a personal computer (i3 processor and 4 GB RAM). Many Matlab experiments have been carried out to test the proposed technique. A total of 10 images is used in experiments. Visual results for an ultra sound medical image are shown in this paper, and the results for all other images are tabulated. Figure 9 shows the sample ultrasound image taken from the database56 for doing the simulation experiment. Figures 10 and 11 show the results obtained from the proposed technique with the traditional pupil set. These figures help in the qualitative evaluation of the technique.
Intensity of the encrypted hologram image using OSC (traditional pupil set).
Figures 12 and 13 represent the encrypted hologram images obtained for the first stage (engineered pupil) and the proposed hybrid scheme, respectively. Figures 14 and 15 show the decrypted results for correct key and wrong key (mismatched decoding distance for OSC), respectively. Qualitative analysis shows that the PSF engineering in the proposed method outweighs the traditional pupil based OSC. This can be justified by the tabulated results in the tables.
Intensity of encrypted hologram image with PSF engineered OSC and FLT.
Decrypted image with mismatched key and decoding distance zd = 2.5zc.
The sample data images are tested for this proposed crypto system. The parameters used for the verification of the quality of encryption are structural similarity index (SSIM), correlation (CC) between the original and encrypted images, and Maximum Absolute Deviation (MAD), a parameter that indicates the absolute deviation between pixel values of original and encrypted images. Next two parameters considered for the quantitative analysis of the proposed method are Maximum Deviation Analysis (Max Dev), a parameter that shows the area under graph of the absolute difference or deviation between the histogram curves of the original and encrypted images, and Irregular Deviation (Irr. Dev) Analysis, a measure that is calculated on each individual pixel value and its input image before getting the histogram. It does not preserve any information about the positions of the pixels. Tables III and IV indicate the values of different quality metrics calculated between the original image and the encrypted hologram image when the first stage of the proposed hybrid method uses traditional pupil pair and point spread function engineered pupil pair, respectively. SSIM and CC for all the sample sets are remarkably low, which indicates that the signal dependency for the test and reference image is very weak. The metric maximum deviation is more, and irregular deviation is less, which is an essential requirement of good encryption. The analysis reveals that the modified pupil with double encryption gives steady values so that this method could be more advisable for implementations. Another set of results between the encrypted and decrypted images for the proposed technique with unity and delta function pupil is shown in Table V. Tables VI and VII show a quantitative comparison between the proposed PSF engineered method and traditional OSC based encryption. The tables clearly indicate a visible hike in the SSIM (66.6%), MAD (8.67%) for the double encryption using PSFE-OSC, and FLT compared to the encryption based on PSFE-OSC only. Considering the quantitative analysis of single encryption based on traditional optical scanning cryptography only and proposed encryption system, the performance measures are superior in terms of SSIM (23.4%), CC (53.94%), and MAD (7.5%). It is clear that the proposed hybrid method provides good quality results.
The results obtained between the original image and the intensity of the encrypted hologram image with traditional optical scanning cryptography and FLT.
Image . | SSIM . | CC . | MAD . | Max dev . | Irr dev . |
---|---|---|---|---|---|
Cameraman.tif | 0.0303 | 0.001 4 | 82.984 | 91 863 | 49 609 |
MRI Image.jpg | 0.0384 | 0.000 19 | 82.984 | 59 543 | 45 377 |
Boat.png | 0.0338 | 0.000 5 | 79.3437 | 214 600 | 49 465 |
Hestain.png | 0.0317 | 0.003 5 | 87.308 | 103 455 | 48 967 |
ColoredChips.png | 0.0347 | −0.001 4 | 118.2081 | 216 250 | 50 734 |
Lena.jpg | 0.0414 | 0.002 7 | 73.4354 | 61 962 | 48 420 |
MR1.png | 0.057 | −0.001 2 | 30.9953 | 59 981 | 45 125 |
Autumn.tif | 0.0405 | 0.002 6 | 81.4525 | 60 118 | 45 003 |
Tissue.png | 0.0166 | −0.001 4 | 110.2389 | 386 150 | 48 984 |
Football.jpg | 0.0707 | −0.002 4 | 43.0346 | 82 708 | 45 129 |
Image . | SSIM . | CC . | MAD . | Max dev . | Irr dev . |
---|---|---|---|---|---|
Cameraman.tif | 0.0303 | 0.001 4 | 82.984 | 91 863 | 49 609 |
MRI Image.jpg | 0.0384 | 0.000 19 | 82.984 | 59 543 | 45 377 |
Boat.png | 0.0338 | 0.000 5 | 79.3437 | 214 600 | 49 465 |
Hestain.png | 0.0317 | 0.003 5 | 87.308 | 103 455 | 48 967 |
ColoredChips.png | 0.0347 | −0.001 4 | 118.2081 | 216 250 | 50 734 |
Lena.jpg | 0.0414 | 0.002 7 | 73.4354 | 61 962 | 48 420 |
MR1.png | 0.057 | −0.001 2 | 30.9953 | 59 981 | 45 125 |
Autumn.tif | 0.0405 | 0.002 6 | 81.4525 | 60 118 | 45 003 |
Tissue.png | 0.0166 | −0.001 4 | 110.2389 | 386 150 | 48 984 |
Football.jpg | 0.0707 | −0.002 4 | 43.0346 | 82 708 | 45 129 |
The results obtained between the original image and the intensity of the encrypted hologram image with the proposed hybrid encryption.
Image . | SSIM . | CC . | MAD . | Max dev . | Irr dev . |
---|---|---|---|---|---|
Cameraman.tif | 0.0252 | −0.0031 | 81.847 | 90 627 | 49 297 |
MRI Image.jpg | 0.0372 | 0.0038 | 60.4774 | 65 821 | 45 351 |
Boat.png | 0.032 | 0.0013 | 77.8739 | 876 559 | 49 345 |
Hestain.png | 0.0264 | −0.0071 | 120.6097 | 109 480 | 50 139 |
ColoredChips.png | 0.0234 | 0.0011 | 130.4007 | 116 105 | 50 564 |
Lena.jpg | 0.0371 | 0.0007 | 73.5815 | 76 827 | 48 203 |
MR1.png | 0.0164 | 0.0004 | 36.719 | 73 615 | 45 706 |
Autumn.tif | 0.0343 | −0.0018 | 86.4032 | 60 044 | 45 333 |
Tissue.png | 0.019 | 0.0026 | 110.6488 | 103 705 | 49 060 |
Football.jpg | 0.0555 | −0.0014 | 51.858 | 73 922 | 44 722 |
Image . | SSIM . | CC . | MAD . | Max dev . | Irr dev . |
---|---|---|---|---|---|
Cameraman.tif | 0.0252 | −0.0031 | 81.847 | 90 627 | 49 297 |
MRI Image.jpg | 0.0372 | 0.0038 | 60.4774 | 65 821 | 45 351 |
Boat.png | 0.032 | 0.0013 | 77.8739 | 876 559 | 49 345 |
Hestain.png | 0.0264 | −0.0071 | 120.6097 | 109 480 | 50 139 |
ColoredChips.png | 0.0234 | 0.0011 | 130.4007 | 116 105 | 50 564 |
Lena.jpg | 0.0371 | 0.0007 | 73.5815 | 76 827 | 48 203 |
MR1.png | 0.0164 | 0.0004 | 36.719 | 73 615 | 45 706 |
Autumn.tif | 0.0343 | −0.0018 | 86.4032 | 60 044 | 45 333 |
Tissue.png | 0.019 | 0.0026 | 110.6488 | 103 705 | 49 060 |
Football.jpg | 0.0555 | −0.0014 | 51.858 | 73 922 | 44 722 |
The results obtained between the intensity of the encrypted hologram image and decrypted image with the proposed method for traditional pupil.
Image . | SSIM . | CC . | MAD . |
---|---|---|---|
Cameraman.tif | 0.962 | 0.9922 | 3.4079 |
MRI Image.jpg | 0.9668 | 0.9944 | 4.0596 |
Boat.png | 0.9114 | 0.9822 | 6.7434 |
Hestain.png | 0.9655 | 0.9911 | 3.5579 |
ColoredChips.png | 0.9644 | 0.9971 | 6.7892 |
Lena.jpg | 0.9802 | 0.9959 | 6.1257 |
MR1.png | 0.9653 | 0.9898 | 4.3661 |
Autumn.tif | 0.9581 | 0.9973 | 9.1287 |
Tissue.png | 0.8695 | 0.9278 | 14.36 |
Football.jpg | 0.9291 | 0.9916 | 2.8905 |
Image . | SSIM . | CC . | MAD . |
---|---|---|---|
Cameraman.tif | 0.962 | 0.9922 | 3.4079 |
MRI Image.jpg | 0.9668 | 0.9944 | 4.0596 |
Boat.png | 0.9114 | 0.9822 | 6.7434 |
Hestain.png | 0.9655 | 0.9911 | 3.5579 |
ColoredChips.png | 0.9644 | 0.9971 | 6.7892 |
Lena.jpg | 0.9802 | 0.9959 | 6.1257 |
MR1.png | 0.9653 | 0.9898 | 4.3661 |
Autumn.tif | 0.9581 | 0.9973 | 9.1287 |
Tissue.png | 0.8695 | 0.9278 | 14.36 |
Football.jpg | 0.9291 | 0.9916 | 2.8905 |
The results obtained between original and encrypted hologram images for OSC (unity and delta function pupil) only with FBA key.
Image . | SSIM . | CC . | MAD . | Max dev . | Irr dev . |
---|---|---|---|---|---|
Cameraman.tif | 0.052 | 0.3406 | 71.1724 | 91 368 | 48 963 |
MRI Image.jpg | 0.0555 | 0.3956 | 50.82 | 58 055 | 44 700 |
Boat.png | 0.0391 | 0.1907 | 74.1735 | 213 036 | 49 285 |
Hestain.png | 0.0283 | 0.0646 | 88.1129 | 104 730 | 48 956 |
ColoredChips.png | 0.0344 | 0.1748 | 111.2047 | 208 158 | 50 348 |
Lena.jpg | 0.0419 | 0.1859 | 68.9388 | 60 331 | 48 045 |
MR1.png | 0.0267 | 0.5877 | 26.902 | 68 060 | 44 534 |
Autumn.tif | 0.0931 | 0.565 | 71.6083 | 54 541 | 45 266 |
Tissue.png | 0.0193 | 0.0564 | 107.7852 | 393 649 | 49 005 |
Football.jpg | 0.1451 | 0.4844 | 44.1285 | 102 084 | 45 946 |
Image . | SSIM . | CC . | MAD . | Max dev . | Irr dev . |
---|---|---|---|---|---|
Cameraman.tif | 0.052 | 0.3406 | 71.1724 | 91 368 | 48 963 |
MRI Image.jpg | 0.0555 | 0.3956 | 50.82 | 58 055 | 44 700 |
Boat.png | 0.0391 | 0.1907 | 74.1735 | 213 036 | 49 285 |
Hestain.png | 0.0283 | 0.0646 | 88.1129 | 104 730 | 48 956 |
ColoredChips.png | 0.0344 | 0.1748 | 111.2047 | 208 158 | 50 348 |
Lena.jpg | 0.0419 | 0.1859 | 68.9388 | 60 331 | 48 045 |
MR1.png | 0.0267 | 0.5877 | 26.902 | 68 060 | 44 534 |
Autumn.tif | 0.0931 | 0.565 | 71.6083 | 54 541 | 45 266 |
Tissue.png | 0.0193 | 0.0564 | 107.7852 | 393 649 | 49 005 |
Football.jpg | 0.1451 | 0.4844 | 44.1285 | 102 084 | 45 946 |
The results obtained between original and encrypted hologram images for OSC (rectangular and Gaussian pupil) only with FBA key.
Image . | SSIM . | CC . | MAD . | Max dev . | Irr dev . |
---|---|---|---|---|---|
Cameraman.tif | 0.0965 | 0.443 | 73.1168 | 93 782 | 49 680 |
MRI Image.jpg | 0.1162 | 0.5531 | 46.5769 | 60 090 | 44 475 |
Boat.png | 0.0749 | 0.3098 | 74.967 | 90 610 | 49 559 |
Hestain.png | 0.0507 | 0.2094 | 117.68 | 108 110 | 49 600 |
ColoredChips.png | 0.0414 | 0.2591 | 129.7974 | 117 207 | 50 731 |
Lena.jpg | 0.081 | 0.3524 | 70.3894 | 79 251 | 48 405 |
MR1.png | 0.0588 | 0.7082 | 22.4303 | 72 871 | 44 906 |
Autumn.tif | 0.1105 | 0.6058 | 78.1772 | 62 906 | 45 681 |
Tissue.png | 0.0602 | 0.1464 | 107.7852 | 101 404 | 49 018 |
Football.jpg | 0.2208 | 0.7 | 37.3426 | 71 224 | 43 000 |
Image . | SSIM . | CC . | MAD . | Max dev . | Irr dev . |
---|---|---|---|---|---|
Cameraman.tif | 0.0965 | 0.443 | 73.1168 | 93 782 | 49 680 |
MRI Image.jpg | 0.1162 | 0.5531 | 46.5769 | 60 090 | 44 475 |
Boat.png | 0.0749 | 0.3098 | 74.967 | 90 610 | 49 559 |
Hestain.png | 0.0507 | 0.2094 | 117.68 | 108 110 | 49 600 |
ColoredChips.png | 0.0414 | 0.2591 | 129.7974 | 117 207 | 50 731 |
Lena.jpg | 0.081 | 0.3524 | 70.3894 | 79 251 | 48 405 |
MR1.png | 0.0588 | 0.7082 | 22.4303 | 72 871 | 44 906 |
Autumn.tif | 0.1105 | 0.6058 | 78.1772 | 62 906 | 45 681 |
Tissue.png | 0.0602 | 0.1464 | 107.7852 | 101 404 | 49 018 |
Football.jpg | 0.2208 | 0.7 | 37.3426 | 71 224 | 43 000 |
Table VIII represents the effect of differential attack analysis on this proposed system. The opto-digital encryption system is efficient in terms of correlation coefficient (CC) also (71%). The vertical coefficient (VCC) outweighs the existing works by about 88.27%. The diagonal correlation coefficient (DCC) is efficient by about 54.47% as compared with the mentioned existing works. The maximum deviation parameter is performing well about 50.49% in comparison with the shown existing research studies. These comparisons are based on Refs. 42–57 [Tables IX–X].
Differential attack analysis of the proposed work.
Name . | NPCR score . | UACI score . |
---|---|---|
Cameraman.tif | 0.9884 | 0.0576 |
Lena.bmp | 0.9896 | 0.06 |
Baboon.png | 0.9883 | 0.0754 |
MRI.tif | 0.9884 | 0.7072 |
Name . | NPCR score . | UACI score . |
---|---|---|
Cameraman.tif | 0.9884 | 0.0576 |
Lena.bmp | 0.9896 | 0.06 |
Baboon.png | 0.9883 | 0.0754 |
MRI.tif | 0.9884 | 0.7072 |
Comparison of variance analysis between the proposed hybrid encryption scheme and other similar works.
Reference . | Maximum deviation . | Irregular deviation . |
---|---|---|
(Lena)42 | 37 980 | 20 053 |
(Lena)42 | 21 786 | 40 904 |
(Lena)42 | 21 339 | 40 480 |
(Lena)42 | 37 630 | 29 327 |
Proposed* (Lena) | 76 827 | 48 203 |
(Cameraman)46 | 61 812 | 40 127 |
(Cameraman)47 | 41 256 | 57 987 |
(Cameraman)48 | 49 129 | 55 171 |
(Cameraman)49 | 38 912 | 58 173 |
(Cameraman)50 | … | 44 765 |
(Cameraman)43 | 63 199 | 33 038 |
Proposed*(Cameraman) | 90 627 | 49 277 |
Reference . | Maximum deviation . | Irregular deviation . |
---|---|---|
(Lena)42 | 37 980 | 20 053 |
(Lena)42 | 21 786 | 40 904 |
(Lena)42 | 21 339 | 40 480 |
(Lena)42 | 37 630 | 29 327 |
Proposed* (Lena) | 76 827 | 48 203 |
(Cameraman)46 | 61 812 | 40 127 |
(Cameraman)47 | 41 256 | 57 987 |
(Cameraman)48 | 49 129 | 55 171 |
(Cameraman)49 | 38 912 | 58 173 |
(Cameraman)50 | … | 44 765 |
(Cameraman)43 | 63 199 | 33 038 |
Proposed*(Cameraman) | 90 627 | 49 277 |
Comparison of statistical analysis parameters between the proposed hybrid encryption scheme and other similar works.
Reference . | CC . | HCC . | VCC . | DCC . |
---|---|---|---|---|
As reported in Ref. 45 | ||||
AES (Cameraman) | 0.014 | … | … | … |
(Cameraman)39 | 0.047 2 | … | … | … |
(Cameraman)40 | … | −0.0017 | −0.0035 | 0.0099 |
Proposed*(Cameraman) | −0.010 7 | −0.0009 | −0.0026 | −0.0027 |
As reported in Ref. 45 | ||||
AES (Baboon) | 0.011 2 | … | … | … |
(Baboon)39 | 0.031 5 | … | … | … |
(Baboon)46 | 0.006 2 | −0.0026 | −0.0015 | −0.0014 |
(Baboon)45 | … | 0.0059 | 0.0027 | 0.0007 |
Proposed*(Baboon) | 0.001 074 | 0.0001 | 0.0013 | 0.0017 |
(Lena)5 | … | 0.0358 | 0.0629 | −0.0046 |
(Lena)52 | … | 0.0214 | 0.0176 | 0.0066 |
53 | … | −0.003 | −0.0024 | −0.0034 |
54 | … | −0.0048 | −0.0112 | −0.0045 |
(Lena Color-B)43 | … | −0.0037 | 0.0095 | 0.0013 |
44 | … | 0.0693 | 0.0610 | −0.0242 |
Proposed*(Lena) | 0.007 549 | 0.0027 | 0.0028 | 0.0025 |
Reference . | CC . | HCC . | VCC . | DCC . |
---|---|---|---|---|
As reported in Ref. 45 | ||||
AES (Cameraman) | 0.014 | … | … | … |
(Cameraman)39 | 0.047 2 | … | … | … |
(Cameraman)40 | … | −0.0017 | −0.0035 | 0.0099 |
Proposed*(Cameraman) | −0.010 7 | −0.0009 | −0.0026 | −0.0027 |
As reported in Ref. 45 | ||||
AES (Baboon) | 0.011 2 | … | … | … |
(Baboon)39 | 0.031 5 | … | … | … |
(Baboon)46 | 0.006 2 | −0.0026 | −0.0015 | −0.0014 |
(Baboon)45 | … | 0.0059 | 0.0027 | 0.0007 |
Proposed*(Baboon) | 0.001 074 | 0.0001 | 0.0013 | 0.0017 |
(Lena)5 | … | 0.0358 | 0.0629 | −0.0046 |
(Lena)52 | … | 0.0214 | 0.0176 | 0.0066 |
53 | … | −0.003 | −0.0024 | −0.0034 |
54 | … | −0.0048 | −0.0112 | −0.0045 |
(Lena Color-B)43 | … | −0.0037 | 0.0095 | 0.0013 |
44 | … | 0.0693 | 0.0610 | −0.0242 |
Proposed*(Lena) | 0.007 549 | 0.0027 | 0.0028 | 0.0025 |
The number of arrangements possible with the iris array in the proposed system is ∼362 880. A single order change in the array will lead to a wrong key, thereby resulting in a different light distribution from the object side.
IV. CONCLUSION
An optical scanning cryptographic system, which uses double encryption and fused biometric array key, is proposed here. The second level of encryption is performed using a new chaotic like series called Fibonacci–Lucas transformation. The change of seed points of FLT allows many degrees of freedom for the keys. The number of arrangements in the biometric array is the next option for the key space. While implementing with an optical setup, each of the arrangements produces separate light distributions. This ensures the decryption of correct output with exactly the same order of biometric array that is used for encryption. Even a single change in position will not reproduce the input. Two variants of double encryption are proposed. The first cryptosystem is implemented with a traditional pupil set of OSH with FBA key. The second cryptosystem uses Gaussian and rectangular pupils with FBA key. Analysis reveals that the proposed cryptosystem with modified pupil based gives better performance or encryption–decryption system, resulting in a steady distribution of parameters. The proposed double encryption cryptosystem is compared with the traditional cryptosystem based on OSC. According to the tabulated results, the proposed cryptosystem’s performance is impressive.
To the best of our knowledge, this is the first time a post-encryption using a periodic chaotic like transformation is performed onto encrypted optical scanning hologram. This is a novel optical elucidation for the intruder problems that can affect medical image sharing. Current technology allows the sharing of these images using the cloud. In telemedicine, the current internal security gaps are lack of authentication and effectual encryption. By combining the proposed methodology with the existing digital cryptographic techniques, a system with more resistance to key based attacks can be achieved; simulation studies have been performed.
ACKNOWLEDGMENTS
We would like to acknowledge the support extended by Indian Institute of Space Science and Technology and Center for Development of Imaging Technology, Kerala, India; Group at the Center for Biometrics Security Research (CBSR); National Laboratory of Pattern Recognition (NLPR); and Institute of Automation, Chinese Academy of Sciences (CASIA). The ultrasound image used in this experiment has been taken from the database of The SP Lab research group, which is a part of the Brno University of Technology, Czech Republic.
The article receives no external funding.
The authors declare no conflicts of interest.
DATA AVAILABILITY
The data that support the findings of this study are available from the corresponding author upon reasonable request.