1. Introduction
As network and information technologies advance, digital image security faces considerable risks during storage., transmission, and reception, prompting cryptography to emerge as an effective means of safeguarding images [
1,
2]. In comparison to grayscale images, color images offer richer information. Optical image encryption, with its benefits of parallelism and flexibility, enables concurrent encryption of the R, G, B of color images, drawing growing interest from researchers [
3,
4].
In the realm of optical image encryption, various optical encryption techniques have been proposed, including full-phase encryption [
5], amplitude-based encryption [
6], and polarization encoding encryption [
7,
8].Among various techniques, the Fractional Fourier Transform (FrFT) is frequently used to manipulate polarization information in the time domain [
9,
10,
11], whereas the Optical Fourier Transform (OFT) finds application in the encoding process [
12,
13]. OFT typically consists of two cascaded lenses, and cascaded phase structures are one of the most commonly used optical structures in light field modulation. This structure was first applied to the Double Random Phase Encoding (DRPE) system by Javidi et al. in 1996. DRPE modulates waves by introducing two random phase masks to scramble both spatial and frequency domains, resulting in ciphertext without white noise [
14,
15]. Currently, DRPE has become one of the most commonly used and effective optical encryption schemes [
16,
17].
Thanks to the parallelism inherent in DRPE, the three components of R, G, and B can all be encrypted concurrently. Faragallah O’s proposed algorithm involves encrypting the R, G, B of a color image three times independently [
18]. Nonetheless, because of the strong correlation among the R, G, B, the color image remains susceptible to potential attacks. [
19]. Wang Yonghui put forth an optical single-channel color image encryption approach rooted in chaotic fingerprint phase masks and diffraction imaging. Here, the fingerprint, which produces random phase masks, doubles as the encryption key.dividing the color pure image into equal blocks using lasers and then converting the electrical signals into optical signals using an optical transmitter (light source) [
20].Independently encrypting the R, G, B three times in color images does not provide adequate defense against attacks, as stated in the existing literature [
15,
18], color encryption systems based on DRPE have exposed the following two key issues.
Issue 1: Ignoring the correlation of R, G, B will lead to decreased robustness of the encrypted image. It has been demonstrated that reducing the correlation values between R, G, B can effectively decrease the correlation of DRPE images, thereby enhancing the robustness of the encryption system [
21,
22].
Issue 2: The DRPE system itself is susceptible to linear analysis attacks. This linear transformation allows two random phase masks (RPMs) to be guessed through Known Plaintext Attack (KPA)/Chosen Plaintext Attack (CPA)/Ciphertext-Only Attack (COA), consuming significantly fewer resources compared to brute force attacks [
21,
22].
To tackle Issue 1, Yildirim M proposed a DRPE scheme based on chaotic system-based sub-block image swapping [
23], and another DRPE scheme based on chaotic system ,DNA encoding algorithm [
24]. These schemes [
23,
24] reduce the the correlation of R, G, B and have been experimentally demonstrated to possess good robustness. However, they overlook the issue of weak linear analysis capability of DRPE,result Issue 2. Further analysis [
23,
24] reveals that while these schemes demonstrate a significant improvement in robustness by reducing the correlation of R, G, B, they do not conduct in-depth analysis. Lowering the correlation of R, G, B effectively disrupts the {0, 1} bit sequence values of the pixel’s three categorized R, G, B. This paper hypothesizes that directly scrambling the bits of a color image would disrupt the {0, 1} sequence values and reduce the correlation at the bit level, thereby potentially enhancing the image’s robustness. The experiments conducted in this paper ultimately validate this hypothesis.
To tackle Issue 2, numerous scholars have explored nonlinear optical image encryption methods. Qin W and colleagues introduced a cutting-edge secure nonlinear cryptosystem in the Fourier transform domain, leveraging phase truncation techniques. This effectively addressed the linear vulnerabilities present in the DRPE system [
25], but it was later deciphered by Wang X et al. [
26].In addition, Li Ming put forth an attack scheme targeting a specific type of DRPE encryption systems that rely on scrambling and diffusion. This scheme can efficiently breach DRPE encryption systems employing scrambling and diffusion mechanisms [
27].Zhou Qingming and colleagues presented a novel optical image encryption method that relies on dual-channel detection and deep learning. This approach involves training neural networks to establish the mapping relationship between RM images and their corresponding plaintext saliency images, aiming to identify the optimal RM. While this scheme demonstrates good performance, it demands a significant amount of time [
28].Singh P and team strengthened the DRPE system’s resilience against statistical analysis attacks by incorporating nonlinear terms [
29].
This paper draws inspiration from the theories of nonlinear chaotic systems and nonlinear S-boxes, exploring the possibility of incorporating nonlinear correlation algorithms into DRPE to enhance its resistance against linear attacks.Consequently, the OCT (Optical Color Image Encryption) scheme was put forth, with an improved DRPE serving as the core encryption algorithm. Two-dimensional quantum walk is employed to optimize the optical encryption algorithm, further enhancing the encryption effectiveness and security. Experimental results indicate that the proposed scheme not only lowers the correlation among the R, G, and B components but also reinforces the DRPE system’s immunity to linear attacks, specifically CPA and KPA.
The main contributions of this paper are as follows:
(I) The analysis reveals that the increased robustness of encrypted images after reducing the correlation of R, G, B stems from the enhanced robustness achieved by lowering the correlation between the 24-bit plane layers. Therefore, the paper proposes a scheme utilizing 24-bit plane permutation to reduce the correlation of R, G, B in color images.
(II) The paper introduces the generalized Arnold transformation to independently permute the real and imaginary parts of the complex matrix obtained after DRPE encryption. Experimental results demonstrate that this approach effectively enhances resistance against linear analysis attacks such as CPA and KPA.
(III) The incorporation of two-dimensional quantum walk into the optical image encryption scheme is presented.It is noted that two-dimensional quantum walk exhibits better randomness compared to chaotic systems.
The subsequent sections of this paper are structured as follows: In
Section 2, author introduce Two-Dimensional Quantum Walk (TDQW) and Double Random Phase Encoding (DRPE) image encryption.
Section 3 offers comprehensive details about the various components and experimental steps of the image encryption system.
Section 4 showcases simulation results, evaluates security performance, and conducts a comparative analysis. Lastly,
Section 5 summarizes the entire paper.
Figure 1.
Double random phase encoding(DREP) .
Figure 1.
Double random phase encoding(DREP) .
Figure 2.
Two-dimensional quantum walk.(a) continuous probability distribution;(b) three-dimensional discrete probability distribution.
Figure 2.
Two-dimensional quantum walk.(a) continuous probability distribution;(b) three-dimensional discrete probability distribution.
Figure 3.
Histogram analysis.(a)"Lena" Original RGB three-plane histogram analysis,(b)RGB three-plane scrambling histogram analysis,(c)24bit layer scrambling three-plane histogram analysis.
Figure 3.
Histogram analysis.(a)"Lena" Original RGB three-plane histogram analysis,(b)RGB three-plane scrambling histogram analysis,(c)24bit layer scrambling three-plane histogram analysis.
Figure 4.
Overall encryption flow chart.
Figure 4.
Overall encryption flow chart.
Figure 6.
Schematic diagram of encrypted and decrypted images;(a),(e), and (f) are plaintext images of "Lena","Mandril", and "Papper";(b),(f),(j) are encrypted images after 24-bit plane permutation;(c),(g),(k) are encrypted images after OCT;(d)(h)(r) are decrypted images of "Lena","Mandril","Papper".
Figure 6.
Schematic diagram of encrypted and decrypted images;(a),(e), and (f) are plaintext images of "Lena","Mandril", and "Papper";(b),(f),(j) are encrypted images after 24-bit plane permutation;(c),(g),(k) are encrypted images after OCT;(d)(h)(r) are decrypted images of "Lena","Mandril","Papper".
Figure 9.
Effect of decryption of images with different keys "Lena".(a) is the correct key decryption diagram, and (b)(c)(d)(e)(f)(g)(h) are the images decrypted with the wrong keys.
Figure 9.
Effect of decryption of images with different keys "Lena".(a) is the correct key decryption diagram, and (b)(c)(d)(e)(f)(g)(h) are the images decrypted with the wrong keys.
Figure 10.
Known plaintext attack (KPA analysis):(a) Encrypt images using DRPE scheme;(b)KPA algorithm decrypts image;(c) OCT scheme encrypts image;(d) KPA algorithm OCT decrypts image.
Figure 10.
Known plaintext attack (KPA analysis):(a) Encrypt images using DRPE scheme;(b)KPA algorithm decrypts image;(c) OCT scheme encrypts image;(d) KPA algorithm OCT decrypts image.
Figure 11.
Chosen plaintext attack (CPA attack).(a)Dirac delta function;(b) Dirac delta function of three-dimensional map;(c) encrypting DREP image with CPA;(d) decrypting DREP image with CPA;(e) encrypting OCT image with CPA algorithm;(f) decrypting OCT image with CPA method.
Figure 11.
Chosen plaintext attack (CPA attack).(a)Dirac delta function;(b) Dirac delta function of three-dimensional map;(c) encrypting DREP image with CPA;(d) decrypting DREP image with CPA;(e) encrypting OCT image with CPA algorithm;(f) decrypting OCT image with CPA method.
Figure 12.
Noise attack;(a)GN=0.01;(b)GN=0.1;(c)GN=0.2;(d)GN=0.5;(e)SPN= 0.01;(f)SPN=0.1;.
Figure 12.
Noise attack;(a)GN=0.01;(b)GN=0.1;(c)GN=0.2;(d)GN=0.5;(e)SPN= 0.01;(f)SPN=0.1;.
Table 1.
Improved DRPE Algorithm.
Table 1.
Improved DRPE Algorithm.
Table 3.
Correlation analysis.
Table 3.
Correlation analysis.
Fig |
Correlation.R |
Correlation.G |
Correlation.B |
H |
V |
D |
H |
V |
D |
H |
V |
D |
Figure 6(a) |
0.9811 |
0.9811 |
0.9677 |
0.9830 |
0.9703 |
0.9516 |
0.9592 |
0.9362 |
0.8999 |
Figure 6(b) |
-0.0075 |
-0.0083 |
0.0036 |
-0.0050 |
0.0003 |
-0.0052 |
-0.0016 |
0.0020 |
-0.0140 |
Figure 6(c) |
0.0006 |
-0.0023 |
-0.0016 |
-0.0004 |
-0.0017 |
-0.0019 |
-0.0003 |
0.0009 |
0.0020 |
Figure 6(e) |
0.7707 |
0.8563 |
0.7524 |
0.7465 |
0.8443 |
0.7311 |
0.8567 |
0.9081 |
0.8369 |
Figure 6(f) |
-0.0097 |
0.0236 |
-0.0036 |
0.0086 |
-0.0125 |
0.0015 |
0.0051 |
-0.0084 |
-0.0230 |
Figure 6(g) |
0.0025 |
0.0074 |
0.0019 |
0.0026 |
-0.0014 |
0.0070 |
0.0275 |
0.0036 |
-0.0025 |
Figure 6(i) |
0.9772 |
0.9738 |
0.9587 |
0.9920 |
0.9892 |
0.9800 |
0.9749 |
0.9691 |
0.9427 |
Figure 6(j) |
0.0013 |
-0.0037 |
0.0045 |
0.0191 |
0.0066 |
-0.002 |
-0.0036 |
0.0200 |
-0.0058 |
Figure 6(k) |
-0.0101 |
0.0055 |
-0.0030 |
-0.0320 |
0.0003 |
0.0040 |
-0.0059 |
0.0016 |
0.0248 |
Table 4.
Average information entropy.
Table 4.
Average information entropy.
Table 5.
The value of NPCR and UACI.
Table 5.
The value of NPCR and UACI.
Numble |
Lena |
Mandril |
Papper |
|
R |
G |
B |
R |
G |
B |
R |
G |
B |
UACI |
99.6217 |
99.6016 |
99.5987 |
99.6033 |
99.5867 |
99.5865 |
99.5986 |
99.5879 |
99.5942 |
NPCR |
33.6643 |
33.3611 |
33.3695 |
33.5258 |
33.3890 |
33.3780 |
33.4928 |
33.3977 |
33.4915 |