Image Encryption by Using Gyrator Transform and Arnold Transform
Image Encryption by Using Gyrator Transform and Arnold Transform
                                                                                    Shutian Liu
                                                                           Harbin Institute of Technology
                                                                              Department of Physics
                                                                               Harbin 150001 China
               Abstract. We propose an optical image encryption algorithm based               the original image. The pixel sequence of digital image28, 29
               on Arnold transform and gyrator transform. The amplitude and phase,            can be regarded as the key of the algorithm except the ran-
               which are the outputs of gyrator transform, are separated into several         dom phase mask mentioned above. In Refs. 28 and 29, the
               sub-images. Arnold transform is introduced for scrambling the data of          random pixel shifting operation is introduced and serves as
               the sub-images. The random spectrum composed of the scrambled
               sub-images is transformed by gyrator transform. An iterative structure
                                                                                              key.
               of the algorithm is designed for enhancing the security of the encryp-             As a motivation of this article, the random pixel scram-
               tion algorithm. The parameters of gyrator transforms and separating            bling method is developed for hiding secret information. In
               scheme serve as the key of the encryption method. The encryption               this paper, Arnold transform and separating scheme are intro-
               process can be implemented by an electro-optical setup. Some nu-               duced into optical image encryption to change the sequence
               merical simulations have been given to demonstrate the security and
               validity of this algorithm. © 2011 SPIE and IS&T. [DOI: 10.1117/1.3557790]     of image pixels in order to generate the key of the algorithm.
                                                                                              Compared to other scrambling methods, Arnold transform
                                                                                              can obtain a noise-like image with a single parameter (total
                                                                                              iterative time), which can reduce the space of key for stor-
               1 Introduction                                                                 age and transmission in a practical application. An electro-
               In recent years, the research on an image encryption algo-                     optical setup is designed, based on GT and Arnold transform,
               rithm has become a focused topic in optical information                        to implement the proposed encryption scheme. The data of
               processing. Some algorithms have been proposed by us-                          GT spectrum is transformed by using Arnold transform for
               ing optical transform or some optical processes,1–25 such                      scrambling pixel sequence. The final encrypted image is re-
               as Fourier transform, fractional Fourier transform, gyrator                    ceived from the GT output of the scrambled image. The
               transform (GT), Fresnel diffraction, interference, and so on.                  position sequence of the image pixel is randomized in this
               The classical one is double random phase encoding (DRPE)                       algorithm, which is similar to Refs. 28 and 29. An iterative
               technology1 proposed by Réfrégier and Javidi in 1995. Sub-                   operation is utilized in this algorithm for introducing more
               sequently, the DRPE has also been developed in the domains                     parameters of Arnold transform. The random shifting se-
               of fractional Fourier transform and Fresnel transform.26, 27                   quence of image pixels is regarded as the key of the proposed
               In many encryption schemes, random phase mask is em-                           encryption method. Moreover, the random phase encoding
               ployed as the main way to obtain high security. The storage                    technology is not employed as the key of this encryption
               space of random phase mask regarded as key is close to                         scheme. The corresponding numerical simulation is given
                                                                                              to validate the security and performance of the encryption
                                                                                              algorithm.
                                                                                                  The rest of this article is organized in the following se-
               Paper 09210RRRR received Nov. 3, 2009; revised manuscript received Dec.        quence. In Sec. 2, the algorithm of image encryption is de-
               21, 2010; accepted for publication Jan. 31, 2011; published online Mar. 28,    scribed in detail. In Sec. 3, some numerical simulations are
               2011.
                                                                                              shown to demonstrate the validity of the algorithm. Conclud-
               1017-9909/2011/20(1)/013020/6/$25.00 
                                                    C 2011 SPIE and IS&T                      ing remarks are summarized in Sec. 4.
                                                                                                                             a       b
                                                                                                                             M       M
                                                              1                                                                                 m
                                                                                                                                                N
                          A1 x1, y1 exp i   1   x1, y1            A1 x1, y1 exp i   1   x1, y1                               d       c
                                                                                                                             M       M
                            Iterative body                               C2 x2 , y2                                              p              n
                                                                                                                                 N              N
                 (c)
                                                                                        CN                             (a)                            (b)
               Fig. 1 The proposed encryption scheme: (a) the electro-optical sys-                            Fig. 2 The blocking schemes for Arnold transform: (a) the scheme
               tem implementing this algorithm, (b) encryption process, and (c) de-                           used in image encryption, and (b) square distribution composed of
               cryption process.                                                                              sub-images.
                                    Fig. 3 The result of encryption and decryption with the proposed algorithm: (a) Lena, (b) encrypted
                                    image for Lena, (c) decrypted image with correct key from (b), (d) Mandrill, (e) encrypted image for
                                    Mandrill, and (f) decrypted image with correct key from (e).
MSE
                                                                                                                                  4
               original image I0 . The distribution of energy is more uniform                     3
               than the case without random phase encoding. Moreover, the                                                         2
               random phase function is not required for image decryption.                        2                                           = 1.199                  = 1.201
                                                                                                                                   0
               The decryption operation shown in Fig. 3(c), which can be                                                          1.198       1.199           1.2      1.201           1.202
               derived from Eq. (3), is the inverse process of the image                          1
               encryption.                                                                        0
                   In this paper the blocking scheme and the parameter of the                      1.1         1.15   1.2         1.25        1.3           1.35    1.4        1.45            1.5
               gyrator transform serve as the keys of the encryption algo-
                                                                                            (a)
               rithm. To increase the security of the encryption method, the
               different parameter values of the transforms can be adopted in                            103
               every iteration, in which the blocking scheme is also fixed at                     7
               various formats. The blocking scheme can be expressed that                         6
               every sub-image can be defined by the position of the corner
                                                                                                                                      103
               point at its left-top region and size. The blocking scheme and                     5
                                                                                                                                  6
               the parameters of Arnold transform should be obtained and                                                                  MSE=5.81 103              MSE=5.79 103
                                                                                                  4
               controlled by a computer in the application. The parameter
                                                                                            MSE
                                                                                                                                  4
                                                                                                                            MSE
                                                                                                  0
                                                                                                  1.1          1.15   1.2         1.25        1.3           1.35    1.4        1.45        1.5
               3 Numerical Simulation
                                                                                            (b)
               Now we give the numerical simulations of the algorithm. The
               two gray-level images31 with 256×256 pixels are shown in                     Fig. 4 The MSE curves with various values of the angle α in GT: (a)
               Figs. 3(a) and 3(d). The angle α of GT is fixed at 1.2 for the               Lena and (b) Mandrill. Here all the parameters of Arnold transform
               transform during the implementation of image encryption                      are correct in the decryption process.
q m
p n
(a)
(a) (b)
(b) (c)
6200
6100
6000
                                             MSE
                                                                     Lena
                                                                     Mandrill
                                                   5900
5800
                                                   5700
                                                              20     40         60         80   100     120    140    160     180
                                                                                                j
                                             (a)
(b) (c)
Fig. 8 The result against blind decryption: (a) MSE curves, (b) for Lena, MSE=6.07×103 , and (c) for Mandrill, MSE=5.79×103 .
                   We pay attention to the effect of the blocking scheme on                     Arnold transform are equal to 56 and 73 for Figs. 8(b) and
               the security. An error blocking scheme is adopted and illus-                     8(c), respectively.
               trated in Fig. 6(a). Here the parameter q in Arnold transform                        Recently known/chosen plain-text attacks have been con-
               is calculated as the following equation                                          sidered for DRPE.16–19 For chosen plaintext attacks, its
                                                                                              premise condition is that the encryption system (or process)
                                a(k) + b(k) + c(k) + d(k)                                       and some ciphers are known or controlled by an illegal user.
               q(k) = round                                 , k = 1, 2, ..., N .
                                             4                                                  For a known plain-text attack, the condition is that a pair of
                                                                                                cipher and plain-text is obtained by an attacker. Moreover,
                                                                                     (6)        some ciphers are made by using the same keys for the two
               The parameter q(k) will be used in a decryption test for the                     attacks, namely the obtained key in the attacks is effective for
               sub-image at the left-top corner of the image. The values of                     the encrypted images made with itself. If every set of keys is
               {m(k), n(k) and p(k)} and α are correct in calculation. The                      utilized for generating a cipher only once, an attacker cannot
               total iterative number is taken at 8 in the process of image de-                 recover a secret image with the two attack methods. There-
               cryption. The corresponding decrypted images are displayed                       fore the proposed encryption scheme should change keys for
               in Figs. 6(b) and 6(c). The recovered results are random im-                     a different original image against the potential known/chosen
               ages. It is hard to recognize the two original images from                       plain-text attacks in a practical application. Some different
               Fig. 6. If an error blocking scheme is utilized in image de-                     data regarded as keys can be generated by a program from a
               cryption, the original image cannot be obtained.                                 computer.
                  We validate the retrieval result of the encrypted image
               against blind decryption. The attacker knows nothing but GT                      4 Conclusion
               and Arnold transform, which are used in the image encryp-                        We have presented a type of optical image encryption algo-
               tion. Because the blocking scheme is unknown, the separat-                       rithm based on Arnold transform and gyrator transform. The
               ing operation is not adopted in the recovering process. The                      algorithm can be implemented by the electro-optical setup
               whole spectrum of GT is transformed by Arnold transform.                         composed of lenses and a computer, which perform two kinds
               Moreover, the iterative process is not employed for image de-                    of transforms. The parameters of two transforms can be re-
               cryption. The corresponding decryption flowchart is shown                        garded as the key of encryption. Moreover, the amplitude
               in Fig. 7, in which α is fixed at 1.2. The period of Arnold                      part and phase part of the gyrator spectrum are separated into
                              j
               transform A256 is equal to 192. Changing the parameter j of                      many sub-images before achieving Arnold transform. The
                                     j
               Arnold transform A256 , the MSE curves are calculated and                        blocking scheme can serve as the key of algorithm to avoid
               plotted in Fig. 8(a). The curves, the values of which exceed                     the period property of Arnold transform and to enhance the
               5×103 , imply that the original image cannot be decrypted in                     security of the algorithm. An iterative structure is also in-
               the case of blind decryption. As an example, the recovered                       troduced for increasing the security of this algorithm. The
               result of two encrypted images, which have the minimum of                        numerical simulations have demonstrated the security and
               MSE, is illustrated in Figs. 8(b) and 8(c). The parameters of                    performance of the proposed algorithm.