Abstract

An encryption system that combines compressive sensing (CS) and two-step parallel phase shifting digital holography (PPSDH) using double random phase encoding (DRPE) is presented in this paper. The two-step PPSDH is a linear inline holographic scheme and is much suitable for encrypting the 2D/3D information in a single exposure. The distribution of random phase mask (RPM) in the DRPE is implemented using circular harmonic key which increases the security of the encryption process. In this system, the keys used to encrypt are spatial positions of the planes, wavelength, and rotation of the circular harmonics in RPMs, and CS acts as an additional key that makes the system more secure than the conventional optical encryption methods. At the transmission end, two-step PPSDH is applied to encrypt the object information in single hologram. The digital mirror device (DMD) is placed between the object and a single-pixel detector for acquiring fewer hologram measurements. At the receiver end, the single digital hologram is numerically recovered by using a CS optimization problem. The original complex object field is decrypted from the CS recovered holograms by the inversion of two-step PPSDH process with the help of the correct keys. The numerical simulations are presented for complex 2D and 3D objects to test the feasibility of the proposed encryption and decryption system. The proposed method carried out intensity and phase reconstruction of the original object field using single-pixel compressive imaging. The computer simulation results demonstrated that the encrypted information is highly secured with the rotation of the circular harmonic key. The sensitivity of the decrypted intensity and phase images is also studied with variations of the encrypted keys. The obtained results show that the proposed encryption scheme is feasible and has better security performance and robustness.

1. Introduction

Digital holography [17] is a promising technique to sense and retrieve 3D object information such as amplitude and phase of the object. The optically generated and digitally sensed holograms are numerically reconstructed to obtain 3D object features. The sensed digital hologram is a real-valued digital image. The retrieved 3D information from the digital hologram is a 2D complex image that contains 3D information of the object in the form of intensity and phase. Thus, the existing 2D image processing algorithms can adapt to process 3D information from 2D digital complex images. The optically generated and digitally sensed holograms are numerically reconstructed to obtain the 3D object features. The sensed digital hologram is a real-valued digital image. Digital holography has been widely used in many applications in the areas of phase contrast imaging [8, 9], 3D microscopy [10, 11], 3D object recognition [6, 12], information security [13, 14], surface shape measurement [1517], interferometry [18, 19], etc.

The optoelectronic and computational imagining concepts involved in digital holography enable us to sense the compressed holographic data by digital sensors. Later on, it can be reconstructed with good accuracy using computational techniques. The compressive sensing (CS) techniques [2025] can adapt well to digital holography as the process involves the detection of holographic data in the transform domain. This opens up new avenues for combining compressive data sensing with information security or encryption. Thus, the sensing and computing modalities of digital holography have complemented the CS framework. It has emerged as a secured CS 3D information system with a high data transmission rate and less storage space. The CS [2025] is a paradigm shift in signal sampling theory that deals with reconstruction of the original signal from fewer samples than those of the Nyquist sampling rate. CS is an iterative procedure to reconstruct the original signal from the incomplete linear measurements by exploiting the sparsity of the signal. In the CS theory, the most commonly used sparse representations of the signal are FFT, DCT, Wavelet, etc. and help in accurate reconstruction of the original signal. CS framework is applied in holographic encryption for sampling and compression in order to reduce the hologram acquisition data and electronic data-processing load at sensors.

In conventional digital holographic encryption/decryption methods, the encrypted information is transmitted at the Nyquist sampling rate. The sender and receiver use a secret key to decrypt the encrypted information. The transmission of hologram requires a large amount of data storage, but the transmission channel bandwidth is limited. Traditionally, holographic encryption methods are implemented based on double random phase encoding (DRPE) [2631], joint transform correlator (JTC) [32, 33], and ghost imaging (GI) [34], along with the encryptions based on the Fresnel domain [27, 29, 35, 36], Fourier domain, or fractional Fourier domain [3740]. The CS based encryption methods have the additional advantage that the encryption depends on the measurement matrix (sampling mask) used for the sensing process which will enhance the security level and act as an additional key, which is not used in the conventional optical encryption systems. CS can be implemented in the optical domain using a digital micromirror device (DMD) and a single-pixel detector [41]. A DMD device is a reflective spatial light modulator introduced by Texas instruments that contain many micromirrors. The light incident on the DMD is modulated with the sampling matrix, and then a single-pixel detector records the measurements depending on the orientation of the mirrors [41, 42]. A single-pixel detector sequentially measures the light field that is reflected from the DMD device. The sensed information of a single-pixel detector ( measurements) is converted from analog to digital information using A/D convertor, and it transmits K random linear measurements of the object under recording. The encrypted information is numerically reconstructed using the CS optimization algorithm [2025] from fewer measurements. A single-pixel detector can reduce the size and complexity of the sensor at the transmitting end.

In recent years, CS-based optical encryption methods have been increasing the demand for many optical information processing applications [4153]. The idea of the single-pixel imaging was first proposed by Duarte et al. [41]. Bromberg et al. [43] have demonstrated a real-time pseudo-thermal GI using a combination of the DMD and single-pixel detector. Di et al. [44] have proposed multiple image encryption based on single-pixel compressive holography to encrypt the holograms. The decryption process of each image was carried out using total variation minimization problem. Clemente et al. [45] have adapted a phase shifting digital holography (PSDH) technique with a single-pixel detector to demonstrate the compressive holographic encryption. This method has experimentally reconstructed the amplitude of the ophthalmic lens by retaining only 20% of the hologram pixels. Li et al. [46, 47] have numerically presented a compressive optical image encryption method for inline PSDH by adopting the single-pixel imaging. In this work, the phase shifted digital holograms were acquired using single-pixel detector. In the reconstruction process, the encrypted holograms were reconstructed by retaining various hologram measurements (such as 60%, 80%, and 90%). Finally, the intensity of the original object wavefield was decrypted from the reconstructed holograms by the inversion of PSDH process. Leihong et al. [48] have experimentally presented compressive ghost imaging encryption based on PSDH. The simulation results have shown that the CS scheme improved the security and reconstruction quality of the intensity image. Wang et al. [49] have presented single-pixel compressive holographic encryption by modifying the Mach–Zehnder interferometer setup for multiple-3D-object imaging based on multiple interferences. The numerical simulation results have shown the accurate reconstruction of original 3D object intensity information from encrypted hologram measurements. It has been demonstrated that the cryptosystem provides high encryption capacity and robustness with multiple interferences. Recently, Du et al. [50] have proposed an efficient CS based optical image encryption system using single-pixel imaging. In this method, the input image is encrypted using one random phase mask (RPM) with various recording distances as one-dimensional vector key. It has been numerically presented that the one RPM key at different recording distances minimized the key storage requirement of data transmission and also enhanced the robustness of the encryption system. The encryption systems [4450] were proposed based on inline schemes such as four-step, three-step, or two-step PSDH. Moreover, the phase reconstruction of the encrypted object field is not presented in the single-pixel compressive holography. The strength of digital holography is the ability to reconstruct the phase information and has great applications in 3D imaging of moving objects. Although the phase reconstruction is accurate in classical PSDH, it is not suitable for moving objects because it involves multiple exposures. On the other hand, to acquire instantaneous 3D image of object wavefield, parallel phase shifting digital holography (PPSDH) [5456] was proposed. The PPSDH is a single exposure scheme that can be used for imaging moving objects or static objects. In the present work, single-pixel compressive imaging is demonstrated based on PPSDH and circular harmonic keys in DRPE scheme for improving the security level and storage efficiency of holographic data. The encrypted hologram measurements can be realized with much less criteria than those of the Nyquist sampling.

In this paper, a CS based encryption method to encrypt the complex object information by using linear two-step PPSDH and a circular harmonic key in DRPE is demonstrated. The holographic encryption system is implemented using a phase-only key with the random spatial distribution of circular harmonics in the Fresnel domain to improve the system security performance. The single-pixel compressive imaging is adapted with two-step PPSDH for compression of the encrypted holograms in the optical domain. During the encryption process, the two RPMs, the measurement matrix, the distance, and the wavelength of Fresnel transform are encryption keys. Compared with the traditional encryption scheme, the transmitted information can be significantly reduced with single-shot exposure method, and the circular harmonic key is associated with RPM, which improves the security of the system. In the proposed system, the quality of reconstructed hologram is guaranteed with much less rate than that of the Nyquist sampling. The proposed system is validated using computer simulations to show the proof of the concept. The robustness and key space security of the proposed encryption system have been verified with minimal pixel detection. The CS reconstruction framework was implemented using the Total Variation Minimization by Augmented Lagrangian and Alternating Direction Algorithm (TVAL3) [24]. The efficacy of the proposed cryptosystem has been analyzed using various performance metrics, and also the key space security and robustness of our method have been examined.

2. Proposed Encryption and Decryption Scheme Using a Circular Harmonic Key in DRPE

The schematic representation of the optical encryption arrangement of DRPE using the circular harmonic key in the Fresnel domain is shown in Figure 1(a). In this method, the RPM is expressed in terms of polar coordinates using a circular harmonic key [57, 58] to enhance the security of the optical system. To obtain the circular harmonic key, the Cartesian coordinates are converted to the polar coordinates using and . Thus, the RPM key can be expressed in the Fresnel domain aswhere contains the distribution of random values. The key can be decomposed into circular harmonics [56] with the position as the center, which is expressed as follows:where m is the order of circular harmonics and can be calculated as follows:

Now, the RPM using a circular harmonic key in the Fresnel domain is defined as follows:where is the real part of contains the distribution of random values and polar coordinates . The circular harmonic given in (4) is rotation-symmetric, and highly depends on the position . Now, the first is expressed as follows:and similarly, the second can be expressed as follows:

The inclusion of circular harmonic function [57, 58] in the random phase masks imparts additional degrees of freedom of encoding such as order of harmonics , radius , and rotation angle to strengthen the security level of the encryption system. Therefore, the proposed encryption scheme with keys in polar coordinates is a solution to the problem of variance in the decryption process. The degree of rotation angle and the order of the circular harmonic key in the RPMs increase the complexity of DRPE process, thus breaking the keys.

The encryption process involves three different planes, i.e., the input plane, the intermediate Fresnel transform plane, and the output plane. The optical system is illuminated with a plane wave of wavelength λ, and the encrypted complex object information is obtained at the output plane in the Fresnel domain. The object which is located in the input plane is bonded with RPM1. When the plane wave propagates through the system, the random phase mask distribution gets multiplied by which results in primary random phase encoding. The propagation of this field to the plane at a distance from the input plane and the resulting complex Fresnel field is denoted by as given in (7). At distance , the field gets multiplied by the second random phase mask resulting in second random phase encoding in the Fresnel plane. This field is further propagated to the output plane by a distance to obtain the Fresnel encrypted field as given in (8). The free space propagation corresponding to each plane is modeled by a Fresnel transform with the corresponding distance.

For simplicity, (7) and (8) can be written as follows:

Now, decryption process can be expressed as follows:where is forward Fresnel transform and is inverse Fresnel transform. The decryption process is the same as the encryption shown in (10), but in the reverse direction with complex conjugate of the random phase masks and inverse Fresnel transforms. The Fresnel transform is inverted using the correct keys to obtain the original complex object information.

The 3D complex object used in the encryption system is shown in Figure 1(b). The 3D object construction can be considered as the integration of different sections of complex planes with certain features separated by a small distance which is analogous to the depth information of the object. Computationally, this is realized by combining the front and back plane with features as shown in Figure 1(b) using the Fresnel transform between the planes corresponding to a distance . Then, 3D object optical encryption process can be expressed as follows:

Similarly, the 3D complex object decryption process is given in the following equations:where is the distance between two planes, and and are the decrypted 3D object fields at the front and back plane, respectively. Two important features have to be considered for optical encryption techniques. Firstly, the encrypted field must be resistant to attacks, and secondly, the end user has to decrypt the information without any difficulty at the receiver end. An authentic user with the knowledge of RPMs and their circular harmonic key distributions can only decrypt the encrypted information. Thus, circular harmonics improve the security of the optical encryption and decryption process. In this method, the decryption procedure significantly increases the key space security with the operating wavelength, and the spatial positions of the phase mask between the adjacent planes are additional keys for the robust decryption.

The proposed optical encryption system consists of a single-pixel compressive holographic imaging system based on two-step PPSDH that encrypts the complex object information using DRPE and circular harmonic keys. Figure 2 shows the schematic of the proposed optical setup using Mach–Zehnder interferometric recording geometry. The light beam from the laser is divided into two parts using a polarizing beam splitter (PBS). The half wave plates are used to control the intensity and polarization of the interfering light beams. In the object arm, the complex object information is encrypted using DRPE in the Fresnel domain using two RPMs and circular harmonic keys. A phase array device PSLM is used in the reference wave arm to give the required phase shifts to the reference wave in an interleaved manner as mentioned in Section 3. The interference field formed by the encrypted and reference beams is sampled using a DMD by modulating it with a chosen measurement matrix (i.e., sampling mask) for a specific sample ratio. The output of the DMD is coupled to a single-pixel photodetector using a convex lens. Thus, the incomplete measurements of the encrypted single digital Fresnel hologram on the photodetector are obtained. The mathematical model of the proposed encryption and decryption using PPSDH and single-pixel compressive imaging is presented in Section 3.

3. Two-Step PPSDH Approach for Proposed Encryption and Decryption Using Single-Pixel Compressive Imaging

In this section, we present mathematical framework for numerical demonstration of single-pixel digital holographic scheme based on two-step PPSDH and DRPE, in which the random phase masks use circular harmonic key in the Fresnel domain. The flow diagram of the proposed encryption and decryption procedure is shown in Figure 3. The optical encryption technique uses DRPE in the Fresnel domain based on circular harmonic key as explained in Section 2. Let us consider that the input object field of size to be encrypted is multiplied by RPM1. Then, Fresnel transform is performed through propagation distance and a complex Fresnel field is obtained as described in the following equation:where represents Fresnel transform. field is obtained after RPM1 is multiplied by RPM2. Then, another Fresnel transform is performed, and the obtained encrypted Fresnel field in the DMD plane can be expressed as in the following equation:

Here, RPM1 and RPM2 are two independent random phase masks. Now, linear two-step PPSDH [54, 55, 58, 59] is applied for obtaining single-shot inline hologram on the DMD plane, in which a phase array device such as spatial light modulator is used to give phase shifts to the reference wave in an interleaved manner with a periodic phase of . The complex encrypted field is interfered by the reference wave . The single-shot inline hologram generated on the DMD plane can be expressed as follows:where

Therefore, the digital hologram on the DMD plane is governed by the following equation:

Now, the measurement matrix in the DMD is modulated with single-shot hologram . The random measurement matrix is generated numerically using pseudorandom generator sequences of 0 and 1. Then, the modulated light field reflected from a DMD is measured by a single-pixel detector through computations of the measurement matrix, and linear measurements are obtained. The output of the single-pixel detector [41, 59] can be numerically obtained by computing the inner product of the interference filed and the computations of the random measurement matrix with various sample ratios in the DMD plane:where is incomplete measurement data, is random vector generated in the DMD, and is interference filed on the DMD plane.The encrypted incomplete linear measurements are transmitted through the channel and are decrypted at the receiver end. Both sender and receiver share secret keys to decrypt the encrypted information. In the encryption process, the linear measurements samples with nonzero entries are considered less than the Nyquist sampling rate. In the decryption process, first the CS framework is used to recover the original single-shot hologram from incomplete measurements by solving optimization problem [24].where denotes discrete gradient of the vector at position . Here, denotes the recovered single-shot hologram using CS method. Now, the individual phase shift holograms and are separated from single hologram with periodic loss of pixels, and then the separated holograms’ values of the vacant pixels are interpolated to obtain the new guess values. The complex Fresnel field on the DMD plane is obtained using Meng’s two-step PSDH formula [43, 60] as given in (21)–(24) and then inverts the encryption process to reconstruct the original object field.where

The retrieved complex field is inverse Fresnel propagated by a distance and multiplied by conjugate of RPM2 to obtain original field :

To reconstruct the original encrypted object filed, is inverse-Fresnel-transformed by the distance and then multiplied by the conjugate phase of the RPM1.

The sample ratio of the measurement matrix is calculated using the formula , where C is the sample size of compression and L is the size of the original object . We reduced the sample ratio parameter “C” to study the performance of the hologram compression. The higher the sample size “C,” the higher the image quality. To measure the quality of the decrypted complex images, we calculated mean square error (MSE) and relative error (RE) between the original object image and decrypted image, expressed as follows:where M and N are the size of the original object, is the decrypted complex object wave with compression, and is the original complex object wave. It can be seen from encryption and decryption system that five keys are used: RPM keys with angles and , distance between two adjacent planes and , measurement matrix , and wavelength , and the radii of circular harmonic and values stored in the encryption process act as the additional keys in the decryption process. Thus, the proposed system improves the security of the encryption effectively. In the proposed technique, the two-step PPSDH and circular harmonic key in DRPE are combined to improve the reconstruction accuracy and security performance of the decrypted information. The main idea of the digital holographic technique integrated with the single-pixel detector and CS theory is to obtain both the intensity and phase information of a complex 2D or 3D scene under recording.

4. Simulation Experiments and Discussion

To verify the proposed scheme, two numerical simulations were conducted. The parameters used in the simulations were the wavelength ; the order of circular harmonic key ; the rotation angles and radii of the two circular harmonic keys: , and , ; and the distance between two adjacent planes is from the DMD plane.

4.1. 2D Complex Object Encryption and Decryption Results

A binary 2D complex object field “E” of size 64 × 64 was used in the simulation. The intensity of the 2D object was taken as 0.5, and the corresponding phase was considered as . In order to visualize the quality of the phase in the reconstruction process, we have chosen constant phase value in the object function. The original complex object field is encrypted using (9) in the proposed system. The original intensity and the phase of the input complex object field are shown in Figures 4(a) and 4(b), respectively. The circular harmonic key of order was used in the random phase mask as shown in Figure 4(c). The encrypted Fresnel field at the DMD plane was produced by using Fresnel transform equations (7)-(8). The measurement matrix was used in the simulation with random sequences of 0 and 1. The encrypted complex Fresnel field from the object path was interfered with the retarded reference wave to obtain the interference filed and then modulated with the measurement matrix. The simulated single-shot inline digital Fresnel hologram on DMD plane is shown in Figure 4(d).

At the receiver end, the compressed single-shot digital hologram is recovered with correct matrix by solving the unconstrained CS optimization equation as given in (20). The recovered digital holograms from 50% measurements after interpolation are shown in Figures 4(e) and 4(f). The complex Fresnel field was retrieved from the recovered digital holograms using (21)–(24) and inverted the DRPE process as specified in (10). When one of RPM2 is incorrect, the decrypted intensity and phase distribution are shown in Figures 5(a) and 5(b), respectively. A small change in the decryption distance used in the reconstruction process results in noisy intensity and phase distribution as shown in Figures 5(c) and 5(d). Figures 5(e) and 5(f) show the intensity and phase of the incorrect measurement matrix which is replaced with the original matrix . The decrypted simulation results with correct keys are shown in Figures 6 and 7.

4.2. 3D Complex Object Encryption and Decryption Simulation Results

The encryption and decryption simulation procedure of the 3D complex object is explained in Section 2. To simulate the 3D complex object, we have considered two transparent objects, “D” and “H,” made of binary images. The light propagates through the first object plane and obtains the features of the first complex object “D.” Then, the obtained features of first object plane are propagated through a distance of using Fresnel propagation (Fresnel transform) and obtain another complex object features “H” in the second plane. Therefore, finally the 3D complex object information is obtained immediately after the second plane which contains depth information of the objects. The intensity and complex phase of the two objects are taken as 1.0 and , respectively. The simulation process of DRPE and compression of the interferograms are carried out as explained in Section 4.1. Finally, the 3D complex object scene at two different sections can be reconstructed back with single digital hologram using CS algorithm and then invert the two-step PPSDH process with original keys.

The decrypted results with incorrect keys are shown in Figure 8. The intensity and phase distribution of 3D complex object scene are decrypted at first plane with one of the incorrect RPM2 keys. The decrypted intensity and phase distribution are shown in Figures 8(a) and 8(b). Figures 8(c) and 8(d) shows the intensity and phase distribution of incorrect distance key, , was used for decrypting the complex object at first plane. When an incorrect is replaced with measurement matrix, the intensity and phase distribution of 3D object scene decrypted at first plane are shown in Figures 8(e) and8(f).

4.3. Compressive Ratio Performance

Figure 6 shows the relationship between MSE and sample ratio of the decrypted intensity and phase images for different sample ratios. From Figure 6, it can be seen that when the compression ratio is less than 30% measurements than its intensity, phase reconstruction accuracy is feasible for both the simulations, as shown in Figures 7(a)7(c) and Figures 9(a) and 9(b). Its corresponding phase images are shown in Figures 10(a)10(c) and Figures 11(a) and 11(b). When the sample ratio is between 30% and 40% measurements, then the decrypted intensity and phase images’ accuracy is acceptable, as shown in Figures 7(c), 10(c), 9(c) and 9(d), and 11(c) and 11(d), respectively.

When the sample ratio is greater than 40% measurements, then the intensity and phase reconstruction quality is similar to the original image, as shown in Figures 7(e) and 7(f), 10(e) and 10(f), 9(e) and 9(f), and 11(e) and 11(f), respectively. Figures 711 show the decrypted intensity and phase distribution of both 2D and 3D object simulation cases from various sample ratios. If the correct keys such as wavelength, propagation distance, RPMs, and measurement matrix are used, then the decrypted intensity and phase images for both 2D and 3D simulation cases are shown in Figures 711. If the different wrong keys are used in the decryption process, the quality of the decrypted intensity and phase images are affected and fail to reconstruct the originalobject wavefield as shown in Figures 1218.

4.4. Key Space Security and Sensitivity Analysis

Figures 1218 show the sensitivity of the keys with a small deviation when the correct keys fail to decrypt the original complex object and completely looks like a noisy image. It can be seen that the RE plot value reaches minimum only when the decrypted keys are the same as the encrypted keys; otherwise, the RE value is maximum. The quality of the decrypted complex object is high when RE value is minimum; otherwise, it appears like a noisy image. Figures 1218 show the RE plot of the decrypted complex object with deviation in the decrypted keys for both 2D and 3D simulation cases.

From Figures 12 and 13, it can be observed that the RE plot decreases to zero sharply only when the decrypted distance is the same as the simulation recording distance. Figures 12(b) and 13(b) show that the decrypted 2D complex object looks like a noisy image when a wrong distance key, , is used. On the other hand, Figures 12(c), 12(d), 13(c), and 13(d) show the decrypted complex object of the 3D object with wrong distance key, , at first plane and second plane, respectively.

It can be seen from Figures 14 and 15 that the RE plot value decreases to zero sharply with a small variation in the angle of for both simulation cases. When the wrong angle of the RPM1 key is used instead of the correct key value , the decrypted results are shown in Figure 14. Similarly, when the wrong angle of another RPM2 key is used to decrypt the complex object for both the simulation cases, it fails to reconstruct original object wave as shown in Figure 15.

It can be seen from Figures 16 and 17 that the RE plot value decreases to zero sharply with a small variation in the radius of for both 2D and 3D simulation cases. The decrypted results for the incorrect radius of the RPM1 key when are shown in Figure 16. Similarly, the wrong radius of the other mask RPM2 key, when , was used for decryption, and it failed to reconstruct the original object wave, as shown in Figure 17.

The sensitivity of the recording wavelength was also studied. The wrong wavelength of was used, and its corresponding decrypted complex object result is shown in Figure 18. Here, it can be seen that the RE plot of the wavelength decreases to zero sharply with a small deviation of 01 nm as shown in Figure 18(a). From the above results, it can be concluded that the proposed compressive digital Fresnel holographic encryption system is sensitive to the small variations in the decrypted keys such as measurement matrix, distance, wavelength, and rotation of the RPM using circular harmonic key. Therefore, the increase in the sensitivity of the keys results in the difficulty of duplicating the keys in the decryption process.

5. Conclusion

In this paper, an efficient 2D and 3D information security system is proposed using single-pixel compressive digital holography. The proposed system combines CS and digital holography for complex data encryption using minimal pixel detection. The hologram encryption process uses a DRPE scheme in the Fresnel domain using circular harmonic key, and this scheme enhances the security performance of the decryption process with the variation of the rotation key as presented in the simulation results. In addition, the measurement matrix and other digital holographic secret keys make the system more secure than the conventional method. The two-step PPSDH technique and CS based system are combined to improve the resolution of the reconstructed images. Due to the single-pixel imaging and PPSDH, the 3D information transmission and data storage are effectively reduced. The numerical simulation results show that the proposed cryptosystem has capability to decrypt the intensity and phase information of the object wave accurately from highly compressed digital Fresnel hologram. To quantify the reconstructed complex images, MSE and RE are analyzed for different compression ratios and different key attacks. A small deviation in the decrypted key leads to a considerable increase in the RE value and thus failure to reconstruct the original object information. It is verified from the results that the encryption system has high security and robustness and can be used in many information security applications.

Data Availability

The data used to support the findings of this study are included within the article.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

Acknowledgments

This work was supported by Science and Engineering Research Board (SERB), Department of Science and Technology, Government of India, under the sanction order no. CRG/2018/003906.