Abstract

We introduce an image encryption method based on computer-generated hologram (CGH) and two-dimensional Sine Logistic modulation map (2D-SLMM). We combine CGH and 2D-SLMM to improve encryption security. During the encryption process, the hologram needs to be logistically modulated by 2D-SLMM. This logistic modulation technique can avoid complex algorithms. Simulation results and security analysis demonstrate that the proposed approach has a high security level, good invisibility of image information in ciphertext, large key space, and strong robustness.

1. Introduction

Since Refregier and Javidi proposed a double random-phase encryption technique in 1995 [1], various improved optical image encryption methods have been presented [26]. However, data information of optical encryption is difficult to be transmitted through the network. And without the digital processing or conversion, the information must be reconstructed with an optical method. The digitization of encryption information favors the preservation and transmission of information. One of the most effective methods of the digitization of encrypted information is CGH [710]. Besides the fact that the virtual object, which does not yet exist in nature, can be recorded, CGH also permits any wavelength to be selected and system parameters to be adjusted arbitrarily, which offers more flexibility. Since this encryption method has only two secret keys of wavelength and diffraction distance, it is necessary to expand the key space of cipher system.

In the field of image encryption, many encryption methods involved chaos theory [1116]. Chaotic maps have the properties of unpredictability and sensitivity to their parameters and initial values. They can generate different random sequences with different settings of parameters or initial values. Existing chaotic maps can be classified into two categories: one-dimensional (1D) chaotic maps and high-dimensional (HD) chaotic maps. 1D chaotic maps usually contain one variable and a few parameters. However, the structures and chaotic orbits of 1D chaotic maps are rather simple and may be estimated. And parameters or/and initial values of them may be predicted, too. Compared with 1D chaotic maps, HD chaotic maps usually have more complex structures and better chaotic performance. These make their chaotic orbits much difficult to predict [17, 18]. 2D Sine Logistic modulation map (2D-SLMM) which belongs to a kind of HD chaotic map has been proposed [17]. Performance analysis is provided to show that 2D-SLMM has wider chaotic range, better ergodicity, and hyperchaotic properties than the existing chaotic maps. If only 2D-SLMM is used in logistic modulation, the encrypted information cannot be completely hidden. Therefore, it is desired to increase the invisibility of image information in ciphertext.

In order to expand secret key space further and make the encrypted information totally invisible, we proposed an encryption method combining CGH and 2D-SLMM in this paper. Firstly, the mathematical model of CGH is built to get the hologram of original image. Then, the various parameters and initial values of the chaotic system are determined to acquire 2D-SLMM by them. Lastly, 2D-SLMM is modulated by the obtained hologram with a very simple way to get the encrypted image. This modulation technique is logistic modulation, which can be implemented in not only software but hardware. Therefore, it is beneficial to greatly expand the application scope of this method. Simulation and security analysis verify the feasibility and security of this method.

2. Proposed Encryption Method

The proposed encryption process is shown in Figure 1. At the beginning, we get the hologram marked with . Then, acquire 2D-SLMM marked with by setting parameters and initial values. In the end, the obtained hologram is modulated logistically by 2D-SLMM to get the encrypted image marked with . It should be emphasized that because the decryption is the inverse progress of encryption, the detailed description of decryption is omitted.

First, we need to obtain the hologram of the original image. The schematic diagram of the generation of a hologram can be referenced in [19], where wave of object and reference beam interference with each other. And the interference pattern as a hologram is to be recorded on the observation plane.

Next, 2D-SLMM is acquired with different settings of parameters and initial values. It is defined bywhere and are control parameters. and .

2D-SLMM is derived from two 1D chaotic maps, the Logistic and Sine maps. A combination of the Sine map and parameter is used to modulate the output of the Logistic map to enhance its nonlinearity and randomness. The result is then extended from one-dimension to two-dimension to obtain 2D-SLMM. Two output values of 2D-SLMM and intertwine each other. Thus, its orbits and iteration values are difficult to predict. When parameter is close to 3, 2D-SLMM shows good chaotic performance. For simplicity, we set in the rest of this paper [17]. In addition to control parameters, the initial values and can also be used as secret keys, which can expand the key space significantly.

Finally, the obtained hologram is logistically modulated by 2D-SLMM to get encrypted image . The process is shown in Figure 2, where and represent number pixel of and , respectively. The numbers in the figure are the binary representation of pixel values. It should be emphasized that, to achieve better effect, we can also make twice logistic modulation and the detailed analysis is depicted in Section 3.

3. Simulated Results and Security Analysis

The object to be encrypted is a gray image of “Flowers” with 512 × 512 pixels as shown in Figure 3(a) and 2D-SLMM is shown in Figure 3(b). After the first round of logistic modulation, as can be seen from Figure 3(c), there is still a little bit of effective information. Therefore, we make the second round of modulation to complete the encryption. Then the encrypted image is shown in Figure 3(d). Obviously, all the information is hidden in the noise-like image. Finally, the decrypted image is in Figure 3(e). The rest of images of Figure 3 show their corresponding autocorrelation images and histograms.

The proposed method can apply to many other types of images. There are two sets of comparison experiment, “Camera man” and “Chess,” respectively, in Figures 4 and 5. In addition to proposed method as shown in Figure 4(a), there are three other encryption methods as shown in Figures 4(c), 4(d), and 4(e). They are SBE-LBP [20], BPE-XOR [21], and the method of using 2D-SLMM to modulate original image instead of hologram. The rest images of Figure 4 show their corresponding histograms and autocorrelation images. By comparison, we can find that the encryption effect of the proposed method is the best. It needs to be emphasized that we just take only 1st round XOR operation to ensure fairness. The analysis of Figure 5 is the same as that of Figure 4.

3.1. Robustness Test

Figure 6 shows experimental results of noise and data loss attacks to the cipher-images. Some attacked on holograms with noise are shown in Figures 6(a)6(c) and their corresponding decrypted images are shown in Figures 6(g)6(i). The image quality assessment, structural similarity (SSIM) index, can assess the similarity between two images [22]. So we calculate the SSIM indexes between decrypted images Figures 6(g)6(i) and original image Figure 3(a). When SIMM index is 1, it means that the two images are exactly the same. Less than 1, it means that the similarity between the two images is weak. By calculation, the SIMM index between Figures 6(g) and 3(a) is 0.44 rather than 1. It is because that there still exists the error of algorithm even without noise interference. Through these SSIM indexes, we can draw a conclusion that this method can resist noise attack when the noise level is not too high.

Then, the situation of data loss in public media transmission is simulated. Some encrypted images of data loss are shown in Figures 6(d)6(f) and their corresponding decrypted images are shown in Figures 6(j)6(l). At the same time, the SSIM indexes between decrypted images and original image Figure 3(a) are on the top of the decrypted images. It can be seen from SSIM indexes of Figures 6(j)6(l) that this method can tolerant a certain degree of data loss.

3.2. Key Space and Sensitivity Analysis

The high sensitive to initial conditions is inherent in any chaotic system. To provide an encryption algorithm with high security, the key space should be large enough to make any brute force attack ineffective. When wavelength and diffraction distance are given certain values, control parameter and and initial values and can also be used as encryption keys. The dependence of MSE (Mean Square Error) on the change of decryption keys , , and is shown in Figures 7(a), 7(b), and 7(c), respectively. On the -axis, the unit of , , and is 9.0 × 10−17, 1.0 × 10–16, and 1.0 × 10−15. Only when the values of , , and are the same as , , and do the MSE reach a very small value. In the case of small derivations, the MSE increases quickly and there is a failure to recognize the original image visually. The high sensitivity results in great difficulty in duplicating the decryption system.

4. Conclusion

We proposed an encryption method based on CGH and 2D-SLMM. It has better encryption performance than the compared methods. The experiments also verify the resistance to multiple attacks: noise, occlusion, and the tiny change of keys. Furthermore, beside keys of and , the other parameters of , , and are used as additional secret keys to provide a larger key space. Therefore, the security of the system has been greatly improved. Hologram can be realized in computer or optical setup. Moreover, the algorithm of logistic modulation is very simple to implement in software, hardware, and all-optical XOR logic gate. Therefore, the proposed encryption method is not only effective but also flexible. In the future, it could be applied in the field of national defense science and technology or other places requiring a higher level of image security and system flexibility.

Conflicts of Interest

The authors declare that they have no conflicts of interest.