Document Type : Research Article

Authors

Abstract

This study presents a new method based on the combination of cryptography and information hiding methods. Firstly, the image is encoded by the Double Random Phase Encoding (DRPE) technique. The real and imaginary parts of the encoded image are subsequently embedded into an enlarged normalized host image. DRPE demands two random phase mask keys to decode the decrypted image at the destination. The two random phase masks are regenerated by the chaos theory using a fractal image. To enhance its security, instead of sending the second phase mask directly, the initial conditions and the parameter of the chaotic map and the fractal image are transferred to the authorized user through a secure channel. Experimental results reveal that the proposed method not only enjoys high security but also resists the commonplace attacks.

Keywords

[1] B. Javidi, "Optical and digital techniques for information security," Advanced Science and Technologies for Security Applications, Springer, New York, Volume 1, 2005.
[2] Y. Sheng, X. Yan-hui, and L. Ming-tang, Y.Shuia and S. Xin-juani, "An improved method to enhance the security of double random-phase encoding in the Fresnel domain," Optics & Laser Technology, Volume 44, pp. 51-56, 2012.
[3] W. He, X. Peng, and X. Meng, "A hybrid strategy for cryptanalysis of optical encryption based on double-random phase-amplitude encoding," Optics & Laser Technology, Volume 44, pp. 1203-1206, 2012.
[4] J. Sang, H. Xiang, N. Sang, and L. Fu, "Increasing the data hiding capacity and improving the security of a double-random phase encoding technique based information hiding scheme," Optics Communications, Volume 282, pp. 2713-2721, 2009.
[5] J. Sang, H. Xiang, L. Fu, and N. Sang, "Security analysis and improvement on a double-random phase encoding technique based information hiding method," Optics Communications, Volume 282, pp. 2307-2317, 2009.
[6] P. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Optics Letters, Volume 20, pp. 767-769, 1995.
[7] G. Unnikrishnan, J. Joseph and K. Singh, "Optical encryption by double-random phase encoding in the fractional Fourier domain," Optics Letters, Volume 25, pp. 887-889, 2000.
[8] G. Situ and J. Zhang, "A cascaded iterative Fourier transform algorithm for optical security application," Optik-International Journal for Light and Electron Optics, Volume 114, pp. 473-477, 2003.
[9] F. Mosso, M. Tebaldi, R. Torroba, and N. Bolognini, "Double random phase encoding method using a key code generated by affine transformation," Optik-International Journal for Light and Electron Optics, Volume 122, pp. 529-534, 2011.
[10] N. Singh and A. Sinhai, "digital image water- marking using gyrator transform and chaotic maps," Optik-International Journal for Light and Electron Optics, Volume 121, pp. 1427-1437, 2010.
[11] N. Singh and A. Sinhai, "optical image encryption using fractional Fourier transform and chaos," Optics and Lasers in Engineering, Volume 46, pp. 117-123, 2008.
[12] Z. Xin, L. Dong, Y. Sheng, L. Da-hai, and H. Jian-Ping, "A method for hiding information utilizing double random phase encoding technique," Optic and Laser Technology, Volume 39, pp. 1360-1363, 2007.
[13] X. Zhou and J. G. Chen, \Information hiding based on double-random phase encoding technology," Journal of Modern Optics, Volume 53, Number 12, pp. 1777-1783, 2006.
[14] H. Zhang, L. Z. Cai, X. F. Meng, X. F. Xu, X. L. Yang, and X. X. Shen, "Image watermarking based on iterative phase retrieval algorithm and sine-cosine modulation in the discrete-cosine-transform domain," Optics Communications, Volume 278, pp. 257-263, 2007.
[15] Y. Sheng, Z. Xin, M. S. Alam, L. Xi, and L. Xiao-feng, "Information hiding based on double random-phase encoding and public-key cryptography," Optics Express, Volume 17, Number 5, pp. 3270-3284, 2009.
[16] W. Xing-yuan, L. Fan-ping and W. Shu-guo, "Fractal image compression based on spatial correlation and hybrid genetic algorithm," Journal of Visual Communication and Image Representation, Volume 20, pp. 505-510, 2009.
[17] M. Braverman, "Hyperbolic Julia Sets are Poly-Time Computable," Electronic Notes in Theoretical Computer Science, Volume 120, pp. 17-30, 2005.
[18] R. Valerij, "symmetry of the modified mandel-brot set," pi in the sky (9), pp. 20-21, 2005.
[19] http://www.eclectasy.com/Fractal-Explorer/
[20] Y Wang, K-W. Wong X. Liao, and G. Chen, "A chaos-based image encryption algorithm with variable control parameters," Chaos, Soliton and Fractals, Volume 41, Number 4, pp. 1773-1783, 2009.
[21] M. Taheri and S. Mozaffari, "A hybrid approach for double random phase encoding technique reinforcement," 20th Iranian Conference on Electrical Engineering, 2012.
[22] M. Taheri and S. Mozaffari, "Increasing security of double random phase encoding technique using chaos theory and hash function," 9th international isc conference on information security and cryptology, September 2012.
[23] J-B. Lee, H-H. Ko, and H-S. Koo, "Digital Image Encryption Method Using Interleaving and Random Shuffling," Proceedings of the 6th WSEAS international conference on Multimedia systems & signal processing, pp. 76-81, April 2006.