Skip to main content

REVIEW article

Front. Appl. Math. Stat., 28 October 2022
Sec. Dynamical Systems
This article is part of the Research Topic 2022 Applied Mathematics and Statistics – Editor’s Pick View all 15 articles

Image encryption using fractional integral transforms: Vulnerabilities, threats, and future scope

\nGurpreet Kaur&#x;Gurpreet Kaur1Rekha AgarwalRekha Agarwal1Vinod Patidar
&#x;Vinod Patidar2*
  • 1Amity Institute of Information Technology, Amity University, Noida, India
  • 2Sir Padampat Singhania University, Udaipur, Rajasthan, India

With the enormous usage of digital media in almost every sphere from education to entertainment, the security of sensitive information has been a concern. As images are the most frequently used means to convey information, the issue related to the privacy preservation needs to be addressed in each of the application domains. There are various security methods proposed by researchers from time to time. This paper presents a review of various image encryption schemes based on fractional integral transform. As the fractional integral transforms have evolved through their applications from optical signal processing to digital signal and digital image processing over the decades. In this article, we have adopted an architecture and corresponding domain-based taxonomy to classify various existing schemes in the literature. The schemes are classified according to the implementation platform, that may be an optical setup comprising of the spatial modulators, lenses, and charge-coupled devices or it can be a mathematical modeling of such transforms. Various schemes are classified according to the methodology adopted in each of them and a comparative analysis is also presented in tabular form. Based on the observations, the work is converged into a summary of various challenges and some constructive guidelines are provided for consideration in future works. Such a narrative review of encryption algorithm based on various architectural schematics in fractional integral transforms has not been presented before at one place.

Introduction

Fractional transforms are the generalization of full transforms which we refer to as ordinary transforms in a more generic sense. Interestingly, the idea of fractional order in a transform first came into existence in 1695 during discussions between Leibnez and L' Hospital [1]: “Can the meaning of derivatives with integer order be generalized to derivatives with non-integer orders?” The question that was put up more than 300 years ago did not get a solution till the work on fractional calculus got explored. Later Jean-Baptiste Joseph Fourier in 1807 made important contributions to the study of trigonometric series and claimed that a periodic signal could be represented by a series of harmonically related sinusoids for the solution of 1D problems. Thus, the well-known Fourier transform is named in honor of Joseph Fourier for his significant contribution and application of the Fourier transform (FT) in many scientific disciplines. However, with the ever-expanding scope of research, it was found that FT has some shortcomings. As it is a holistic transform, the time domain signal is converted to the frequency domain and therefore is able to analyze only time-invariant signals. In other words, it is not possible to obtain a local time-frequency analysis which is pivotal for processing a time-variant or nonstationary signal. Thus, fractional Fourier transforms (FrFT), Short time Fourier transform (STFT), Wigner-Ville distribution, Wavelet transform, Gabor transform etc. were proposed as an alternative.

The initial work on fractional transform by Namias [2] presented a theory on fractional powers of Fourier transform and its application to quantum mechanics. The formal mathematical elaboration to Namias's theory was given by Mc Bride and Kerr [3]. Later, Lohmann [4] illustrated the relation of FrFT to Wigner rotation and image rotation. Almeida [5] further elaborated the concept by proposing a time-frequency representation of FrFT. Further, Ozakatas and Mendelovic proposed optical implementation and interpretation of FrFT [68]. With the evolution of digital channels, the digital computation of FrFT [9] and its discrete version [10] gave a new perspective to the application of FrFT in optical signal processing and related applications [11]. Pei et al. [12] established a relationship between FrFT and Discrete fractional Fourier transform (DFrFT) using Hermite eigen vectors based on the postulate in [13]. Various methods of DFrFT representations are given [1416] with the extension to other similar transform domains [1720]. We won't elaborate much on the mathematical details of the transforms here, interested readers may refer to above-mentioned references for the mathematical aspect of integral transforms and more specifically fractional Fourier transform and its variants. However, we give a conceptual description of the definition of fractional integral transforms. The term “fractional” in a transform indicates that some parameter has non-integer value. We can define any integral transform of the input function, f(x) using any transform operator, as:

T[f(x)](u)=-K(x,u)f(x)dx    (1)

where K (x, u) is operator kernel. For example, in Fourier transform, K (x, u) = exp(−iux). If it is a fractional transform then the operator is denoted as Tα with ‘α' as a parameter of fractionalization. Therefore,

Tα[f(x)](u)=-K(α,x,u)f(x)dx     (2)

For instance, continuous fractional Fourier transform is the generalization of a continuous Fourier transform. The ath order continuous fractional Fourier Transform of a function, y(t), is given as:

Yα(u)= -+Qa(u,t)y(t)dt    (2.a)

where Qa(u, t) is transform kernel given by

Qa(u,t)= 1-jcotα.ejπ(t2cotα-2tucsc(α)+u2cotα)                = k=0exp(-jkαπ2)ψk(t).ψk(u)     (2.b)

ψk(t) is kth-order Hermite Gaussian function, α = /2

ψk(t)=2142k k! Hk(2πt)e-πt2     (2.c)

where Hk is kth Hermite polynomial with k real zeros.

For the discrete version of these fractional transforms, the postulate of discrete Fourier transform (DFT) is followed. As, N × N DFT matrix F is defined as

Fkn=1N e-j2πN.kn 0k,nN-1    (2.d)

where N is the length of the input sequence. Thus, αth order N × N DFRFT matrix is defined [12] as:

Fα=VΛaVT      ={k=0N1ejπ2kavkvkT,for N:oddk=0N2ejπ2kavkvkT+ejπ2NavNvNT,for N:even    (3)

where V = [v1v2vN−2 vN−1] for N : odd and V = [v1v2vN−2 vN] for N : even, vk is kth-order Hermite-gaussian like eigenvector, Λ is a diagonal matrix with its diagonal entries corresponding to eigenvalues of each column vector vk. However, there are certain properties [2, 6, 7] that are desirable for fractional integral transform used in Eq. (2). Some of them are:

1. The fractional transform has to be continuous for any real value of the parameter, ‘α'.

2. It should be additive: Tα1+α2 =Tα1Tα2.

3. It should be reproducible for full transform if the parameter is replaced by integer values.

4. For α = 1, it should give T1 = T, a full transform.

5. For α = 0, it should give T0 = I, an identity matrix.

6. From the additivity property,

-K(α1,x,u).K(α2,y,u)du=K(α1+α2,x,y)    (4)

It is likely to mention here that the fractional parameter in a fractional Fourier transform refers to an angle of rotation (Wigner distribution) [4]. In some references, the fractional parameter is represented as α = /2, where a: fractional number. If the angle of rotation, α = 0, the transform is said to be in purely time domain. If α = 1, it gives the transformation to the frequency domain whereas if the parameter is some fractional value then the transformation output results in a collective time-frequency domain. Table 1 lists some of the fractional transforms that are used in various applications of signal processing. Very few of them are used for image encryption applications due to certain properties that are required to be fulfilled for cryptographic applications.

TABLE 1
www.frontiersin.org

Table 1. Various fractional integral transforms.

Contributions and outline

The major contributions of this review article are summarized as:

• Information regarding the background and evolution of fractional integral transforms and their application in image encryption.

• Detailed taxonomy on various methods and corresponding architectural schematics for implementing these transforms in different domains.

• A brief overview and recent developments in optical transforms for image encryption with a tabulated description of recent review articles and various cryptanalytic strategies that are adopted to break the encryption.

• Review recent articles on the digital implementation of fractional integral transforms that have been merged with other domains/schemes for enhanced of security. Each of the classification is separately described and reviewed.

• The performance parameters adopted to evaluate an image encryption scheme are also summarized for reference in the comparative analysis of schemes.

• Based on the observations made in the review article, some issues are highlighted along with some viable solutions. A set of constructive guidelines are summarized that may be helpful to future researchers in designing a robust and highly sensitive encryption algorithm based on digital implementation of these fractional integral transforms.

The paper is further organized into five more sections. Section Taxonomy of fractional integral transforms provides the taxonomy along with a description of each classification and the review. Section Performance metrics for image encryption elaborates on the performance measures of encryption algorithms. Section Comparative analysis provides a comparative analysis of the results of some recently proposed articles. A summary on observations based on the literature review is included in Section Observations based on published literature. The review is concluded in Section Conclusion.

Taxonomy of fractional integral transforms

The fractional integral transforms have evolved through their applications from optical signal processing to digital signal and digital image processing over the decades. In this article, we have adopted an architecture and corresponding domain-based taxonomy to classify various existing schemes in the literature. The architecture can be broadly classified on the bases of the platforms used for implementation as shown in Figure 1. The platform can be an optical setup that comprises of lenses, spatial light modulators (SLM), and charge-coupled devices (CCD). Another platform is based on the use of random phase masks (RPM) in transforming image pixels. Yet another is a digital platform, where mathematical modeling is followed to achieve the transformation.

FIGURE 1
www.frontiersin.org

Figure 1. Classification of architectures for fractional transform-based image encryption.

Optical data processing

Optical data processing got introduced almost four decades before by Van der Lugt as an optical correlator which is based on the usage of the thin lens to produce two-dimensional Fourier transform of an image. This further led to the invention of other more advanced optical and optoelectronic processors. The classical methods for the realization of the optical scheme are based on two architectures [73]: a 4f-Vander Lugt (VL) and a joint transform correlator (JTC) architecture. In both of these methods, the input image is displayed in the form of transparency or as on SLM. With the advancement in technology, SLMs that are used these days are electrically addressed liquid crystal-based SLMs. The randomness in phase is obtained with ground glass or with a nonuniform coating of gelatine on glass plates. The RPMs thus obtained are recorded on SLMs during encryption or decryption. The outcome of a DRPE encryption is a random noise-like pattern with complex nature. In order to record these complex coefficients for storage and transmission, a holographic technique is required. Although both architectures require two RPMs to convert an image (amplitude or phase) to a stationary random noise, JTC is considered superior to VLC architecture. The VLC architecture requires conjugate RPMs and stringent alignment for decryption, whereas JTC does not require these two conditions and it is considered as alleviated from these limitations. Hence, a JTC architecture is considered superior to the VLC. To record the decrypted image, either a CCD (charge-couple device) or a conjugate of input plane RPM is used. In another method known as the optical phase conjugation method [74], a conjugation of an encrypted image is obtained with the use of optical phase conjugation in a photo-refractive crystal through 4 wave mixing. This phase conjugation can nullify the effect of RPM in the decryption process. A most recent classical implementation of fractional Fourier transform in terms of wave functions is presented in Weimann et al. [75].

We provide a brief overview of the various optical setups that are used for obtaining an optical transform of the scene or image. These are categorized as:

• Holographic methods: Holography is based on using an interference pattern generated by diffraction of the light field in 3 dimensions. Their resultant 3D image retains depth, parallax, and other such properties of the scene. Thus, the hologram is an unintelligible pattern formed by an image. Digital holography is further divided into two categories, namely, off-axis digital holography and phase-shifting digital holography. Javidi et al. [76] first presented a combined approach to providing image security through Double Random Phase encryption (DRPE) and holography. The author further extended his work to 3D information encryption [77]. Some of the most recent reviews are available in the literature [78, 79] that give insight into the evolution of this scheme over the last decade.

• Ptychography: It is based on coherent imaging generated using multiple probes that generate multiple diffraction patterns in a far field. Ptychography offers good quality of both recovered amplitude and phase distribution. Similar to holography, it also generates complex amplitude of the object but it does not require any reference beam like in holography. The application of Ptychography in image encryption has been proposed by many researchers [8082] and most recently in [83, 84].

• Ghost imaging: It is also known as coherent imaging or two-photon imaging or photon-correlated imaging. It is a technique that produces an image formed by combining effects from two light detectors: one from the multipixel detector that does not view the object and another is a single pixel detector that views the object. Clemente et al. [85] proposed to use of ghost imaging for image encryption. Some of the recent works [86, 87] are based on a similar strategy.

• Diffractive imaging: It is referred to as imaging formed by a highly coherent beam of wavelike particles like electrons, X-rays, or other wavelike particles. The waves thus diffracted from the object form a pattern which is recorded on a detector. The pattern is used to reconstruct an image with an iterative feedback algorithm. The advantage of the absence of lenses is that the final image has no aberrations and therefore resolution is only dependent on the wavelength, aperture size, and exposure. The application of diffractive imaging in image encryption is proposed in Chen et al. [88], Quin et al. [89], He et al. [90] and Hazer et al. [91].

• Polarization encoding: An optical plane wave is used to illuminate the intensity key image and encoded into a polarization state. It is then passed through a polarizer (pixelated polarizer) to obtain the encrypted image. Gopinathan et al. [92] proposed to use of polarization encoding in image encryption. Some of the recent works in encryption application are proposed in Wang et al. [93].

• Joint Transform Correlators: The joint power spectrum of the plane image and key codes are the encrypted data in the JTCs [94]. Joint correlator-based encryption uses the same key code for decryption as used in encryption. This is unlike a classical DRPE scheme where a conjugate key is required. Many encryption schemes have been recently proposed based on JTC in fractional transform domain [65, 95].

• Phase retrieval method: In addition to the methods described above, there is an iterative phase retrieval method [9698] wherein a digital approach is usually applied for embedding the input image into phase-only mask(POM), and either a digital or optical method is employed for image decryption. The main objective of a phase retrieval algorithm is to find either the correct or an estimate of POM under some constraint for a measured amplitude. Phase retrieval algorithms can be 2D or 3D. Unlike holographic-based or diffractive imaging-based optical encoding, a phase retrieval-based optical security system generates POMs as ciphertexts. Various transform domains such as FrFT and Gyrator transform can be employed in these encoding schemes.

Advantages of optical encryption

1. Optical instruments such as SLM and lenses have inherent characteristics of parallel processing.

2. Optical encryption methods possess multiple-dimensional and multiple-parameter capabilities. The optical parameters for security keys can be wavelength, polarization, and phase.

3. For optical encryption, researchers require multidisciplinary knowledge regarding optical signal processing, image processing, optical theories, and computer technologies as well.

Applications of optical signal processing

Fractional transforms and more precisely, fractional Fourier transform have gained keen interest from researchers in the area of optical signal processing. Thus, it is also commonly referred to as “Fourier Optics” or “Information optics.” Fractional transforms have a widespread application in signal processing and image processing, in the area of time-variant signal filtering, phase retrieval, image restoration, pattern recognition, tomography, image compression, encryption, and watermarking. This article focuses on the image encryption application of various fractional integral transforms.

DRPE model for image encryption

DRPE-based image encryption has its roots in the work of Refregier and Javidi [21] where two random-phase functions in fractional Fourier domains are used to encrypt input plain image into stationary white noise. Hennelly and Sheridan [99] have shown image encryption as random shifting in the fractional Fourier domain. Unnikrishnan [22] has generalized the DRPE scheme in the fractional Fourier domain. The DRPE architecture is most exhaustively used and explored in various optical processing-based applications. The research community has been continuously exploring the possibilities to improve the security of DRPE [23, 50, 66, 67, 100] and has also successfully extended the DRPE scheme to other linear canonical transforms (LCTs) domains. Figure 2 shows the schematic architecture of DRPE-based image encryption scheme. As shown in Figure 2, there are two RPMs also known as POMs. One of the POM is placed at the input plane and another is placed at the Fourier plane. The POM1 at the input plane makes the input signal/image white noise-like but nonstationary and POM2 at the Fourier plane is also a white noise but is stationary. Let POM1 at the input plane be exp((x, y)) and POM2 at Fourier plane as exp((μ, ν)), both being randomly distributed in the range [0, 2π]. Therefore, wavefront after POM1 is given by

F(μ,ν)=FT{I(x,y)exp(jφ(x,y))}    (5)

where I(x, y) is input image in the spatial domain, FT denotes a Fourier transform operation. The wavefront, F(μ, ϑ), gets modified by POM2 in the Fourier domain and an inverse Fourier (IFT) is performed over it. This gives a complex domain wavefront as

C(ξ, η)=IFT{F(μ,ν)exp[jϕ(μ,ν)]}    (6)

The complex-valued coefficients are recorded on a CCD in optical processing while the terms can be electronically recorded in a computer. During the decryption/reverse process, the complex domain wavefront is first transformed to POM2 as

F^(μ,ν)={FT[C^(ξ,η)]{exp(jϕ(μ,ν))}    (7)

where * represents a conjugate operation. IFT of Fourier wavefront is obtained with POM1 conjugate as

Î(x,y)={IFT[F^(μ,ν)]} {exp(jφ(x,y))}*    (8)

Thus, Î (x, y) is the decoded wavefront in the spatial domain.

FIGURE 2
www.frontiersin.org

Figure 2. Architectural model for DRPE-based encryption scheme.

DRPE schemes are broadly classified as (1) Amplitude-only DRPE where decoding is done without using POM1. (2) Full-phase DRPE where the input image is fully converted into a full-phase map. This POM is used to encode images with the DRPE procedure. The only difference is that the input image is first normalized and converted into a phase image as exp[jI(x, y)] before encoding. Details of each classification are beyond the scope of this review work. However, it is likely to mention that each POM at the input as well as Fourier domain can be used as secret keys. This enlarges the key space thereby enhancing security.

Previous review articles and contributed evaluations

There are many review articles available in the literature [101103] that provide the evolution of classical DRPE-based architecture. Some of the significant contributions in reviewing fractional transforms are listed in Table 2. The contribution of these reviews is summarized on various aspects and evaluations included in them. Each review article is categorized according to the evaluation of various schemes in the work. Whereas some of these are based on just conceptual and theoretical aspects, while others provide an evaluation of quantitative, qualitative, comparative, applications, etc. We have nomenclated these evaluations from E01 to E09 based on the criteria mentioned at the bottom of Table 2.

TABLE 2
www.frontiersin.org

Table 2. Recent review articles on fractional transforms-based image encryption schemes.

This will give better clarity to the reader and future researchers regarding various aspects discussed in each review. It is not possible to include all the related work in this paper for the sake of brevity. However, best efforts are put to include the most recent developments in DRPE-based encryption schemes as listed in Table 3. DRPE-based architecture has been extensively used and is considered as an effective method. DRPE methods require an RPM as the secret key that needs to be stored at the receiver for decryption. Besides that, a careful alignment of the RPM with received encrypted data has to be done. The inherent property of linearity and symmetricity proves to be a bane of encryption applications as the linearity may lead to vulnerability to different types of attacks. Based on these vulnerabilities, some of the recent works on cryptanalysis are summarized in Table 4. Each reference is included with a short description of the work and methodology adopted to cryptanalyze the security scheme.

TABLE 3
www.frontiersin.org

Table 3. Recent publications on evolutionary methods adopted in optical transform with DRPE-based architecture (2016–2021).

TABLE 4
www.frontiersin.org

Table 4. Cryptanalytic approaches in optical/DRPE-based encryption schemes (2016–2021).

Mathematical modeling of optical transforms with FRFT and its variants

LCTs, time-frequency transforms, and fractional Fourier transform (FrFT) are closely related. Since the application of FrFT to signal processing is proposed [4, 5, 8], there has been tremendous development in the application of FrFT and its variants to image encryption. As fractional transform orders serve as the secret key, the digital implementation is particularly suitable for encryption applications [99]. Since this work is mainly focused on the application of fractional transform in image encryption only, we won't elaborate the mathematical eloquence behind the fractional transforms here. This section specifically emphasizes the discrete realizations (DFrFT) and their application to image encryption. There are various methods proposed in the literature for the discretization of fractional transforms; some of them are classified as shown in Table 5 with pros and cons of each type. It is worth noting that Table 5 includes only a fractional version of Fourier transform. This is due to the fact that the fractionalization of LCTs started with Fourier transform itself and later was extended to other transform domains. The methods of discretization mentioned below are therefore conceptually applicable to variants of Fourier transforms as well, namely, Gyrator transform [57, 66], Mellin transform [25, 26, 58], Hillbert transform [137], Hartley transform [17, 20], Hadamard transform [19], etc.

TABLE 5
www.frontiersin.org

Table 5. Various methods for discretization of Linear Canonical transforms.

Figure 3 shows the basic architecture for fractional transform-based image encryption that is digitally implemented without an RPM in either domain (without DRPE). As depicted in Figure 1, this method requires the knowledge of fractional transform orders that are used along both dimensions within a range [0,1]. The decryption is exactly similar to the forward process and requires the same fractional orders but with negative values to decrypt the image correctly. The encryption is thus a symmetric scheme and a slight change in the key value will result in incorrect decryption.

FIGURE 3
www.frontiersin.org

Figure 3. Schematic architecture for Fractional transform-based image encryption in digital domain.

The major limitation of such a scheme is shorter key space which makes it vulnerable to brute force attacks. The input image is pre-processed for enhanced security and enlarging a key space. The pre-processing can be a scrambling operation that only shuffles the pixel positions to make the image, unintelligible. In some cases, this pre-processing can be a nonlinear operation that can be a substitution of pixel intensity values. There are various schemes that employ either scrambling [2729, 47], substitution [30] or both [23, 48, 138] to enhance the security. The following section includes all major schemes that are proposed to improve the performance of fractional transform-based image encryption. We have categorized them in accordance with the strategical amalgamation of scheme with fractional transform domain. The schemes proposed in the literature are nomenclated in eight major categories (T01–T08). Each amalgamated scheme is reviewed separately. This portion of review article is elaborated as our emphasis is on the digital implementation of fractional integral transforms for image encryption.

Reality preserving with optical transform domain (T01)

The optical transform results in complex coefficients output corresponding to a real domain input image. Although it is easy to process these complex coefficients with a holography method but in a digital domain, it requires two images to be processed in the encrypted domain, one for real terms and other for imaginary terms. Therefore, storage and transmission increase complexity and overhead in digital channels. To overcome this limitation, Venturi and Duhamel [139] proposed a mathematical solution based on the properties of the complex transform output. Reality preserving refers to real domain output for a real domain input signal. The algorithm still has computational complexity, O(N2) for matrix order of N. Reality preserving transforms that are formulated with this algorithm have most of the required properties of fractional transforms along with a monotonously decreasing decorrelation power. Such transforms are beneficial where orthogonal reality preserving transform is required with their decorrelation power controlled by some parameters such as in joint source and channel coding. Initially, the algorithm was proposed in fractional sine and cosine transforms. It is further extended to other transforms with the basic properties of the transforms retained well. Recently, Zhao et. al [25, 59] used it to obtain fractional Mellin transform for triple image encryption. Reality preserving is also used in discrete fractional Cosine transform (FrCT) [47, 140], fractional Angular transform [60, 61], fractional Hartley transform [5254, 141], besides fractional Fourier transform [28, 29, 31].

Application of chaos theory in optical transforms-based image encryption (T02)

Chaos theory refers to the study of unpredictable behavior in systems governed by deterministic laws. Chaotic properties are closely related to cryptography [142] owing to their sensitivity to initial conditions, randomness and ergodicity. Due to such intrinsic characteristics, chaotic maps have been extensively used in data encryption. Chaotic maps are used as pseudorandom generators [143], for substitution, and permutation of image pixels. Various schemes for encryption based on permutation only [144, 145], or substitution only [146] or a combination of both [138, 143] with the usage of either one-dimensional basic maps like logistic [147], sine, the tent [148], 2D Chirikov standard map [143], or higher dimensional compound chaos or higher dimensional hyperchaotic maps [149151], depending on the application and level of security.

Chaotic maps have been extensively used in amalgamation with optical transforms-based image encryption for enhancing security. Fractional transform-based image encryption schemes have only transform orders as the secret key. However, this key space is not large enough and is therefore vulnerable to cryptanalysis. To enhance security, chaotic maps are used that also enlarge the key space. There are various schemes proposed in the literature that have used permutation with chaotic maps along with an optical transform [23, 28, 29, 50, 66, 69, 72, 152]. The order in which these two schemes are amalgamated may vary. Permutation in the spatial domain followed by transform or transform followed by permutation in the transform domain. Some of the schemes follow substitution-permutation and transform collectively [138, 153, 154] to further enhance security. We have reviewed some of the most recently proposed schemes that use chaos-based permutation/substitution with optical transforms.

Wu et al. [48] proposed a color image encryption scheme in random fractional discrete cosine transform (RFrDCT) along with scrambling and diffusion paradigm (DSD). A logistic map is used to generate a randomized vector of fractional order. This enlarges key space and increases sensitivity.

A multiple parameter fractional Hartley transform (FrHT) is proposed by Kang et al. [141] with its reality preserved for a color image encryption. The chaos is embedded into the algorithm at each step. The original color image with individual color components is first combined into a single image. This single image is divided into different sub-blocks. The blocks are then shuffled based on a pseudo-random sequence generated from non-adjacent-coupled map lattices (NCML) based on logistic maps. The initial parameters of NCML are generated from yet another chaotic map (Arnold Cat map). The initial parameters of chaotic maps at this stage serves as secret keys. Next stage of encryption is based on a pixel scrambling operator which is based on a 2D Chirikov standard chaotic map (CSM). Using CSM, a series of 2D and 3D angle matrices are generated that are used to convert images in RGB space to newer space. The final stage is to obtain an MPFrHT in real domain (RPMPFrHT) and to divide the image into three to get concatenated encrypted image as ciphertext.

A new fractional transform coined as the non-separable fractional Fourier transform is proposed by Ran et al. [32]. RPMs are generated by Arnold transform. The advantage of this type of transform is that it is able to tangle information along and across two dimensions together. It is closely related to the Gyrator transform. Also, the proposed scheme is resistant to decryption with multiple keys, unlike ordinary fractional Fourier transform.

Wu et al. [155] proposed a RFrDCT for image encryption. The RFrDCT domain image is subjected to confusion-diffusion paradigm. The confusion is obtained using a game-of-life (GoL) algorithm and diffusion in the next stage is based on an XOR operation with another chaotic map. The initial parameters of chaos serve as secret keys of encryption. Enhanced performance is claimed with the adopted strategy. A perturbation factor is applied for resistance against differential attacks.

An encryption scheme with S-box generation is proposed in Wu et al. [72] which is unique in the way these S-boxes are generated. Chaotic Chebyshev map and linear fractional transform are used for the construction of S-box. Partial image encryption is achieved by a permutation-substitution-diffusion (PSD) network and multiple chaotic maps in the linear wavelet transform (LWT) domain. Using dynamic keys for controlling encryption aids in security against differential attacks. Partial encryption of only sensitive portions not only reduces computation complexity but is also faster and more efficient.

Jamal et al. [156] proposed yet another scheme that uses a combination of linear fractional transform and chaotic systems to generate substitution boxes for image encryption. The chaotic maps used in the scheme are generated from a combination of seed maps to enhance the security and chaotic range. The investigation for complexity thus obtained with the proposed scheme is based on various algebraic and statistical tests. The investigation gives testimony of improved perplexity and confusion in the encrypted domain.

A novel Fresnel-based Hartley transform is proposed in Faragallah [50] for an optical-double color image encryption scheme. The color image is first separated into individual channels and are scrambled separately with the Arnold transform (AT) in spatial domain. Each scrambled image is then multiplied with a 2D chaotic Sine-adjusted logistic map (LASM) and then a Hartley transform is applied to each channel. This procedure is repeated once again with another set of AT-based scrambling (now in Hartley domain), and then each channel is multiplied with another set of 2D-LASM. The final step is obtaining inverse Hartley transform which gives an outcome across each channel in Fresnel domain. The color channels in Fresnel domain are concatenated to obtain a single image which is the final ciphered image.

A fractional angular transform (FrAT) is used in Sui et al. [62] where plain image is substituted with a chaotic logistic map prior to transform. The transform orders along with initial value of logistic map serve as secret keys of encryption. The scheme performs marginally as there are certain limitations due to similarity in histograms of plain and encrypted domain and correlation coefficients in encrypted domain are considerably higher. Moreover, the scheme is not evaluated for entropy measure and differential attack analysis.

Compressive sensing (T03)

Compressive sensing (CS), also referred to sparse signal sampling, was introduced by work of Donoho, Candes [157, 158]. CS is able to achieve compression and signal sampling simultaneously [118, 159, 160]. For a signal of bandwidth, BW = Ω, the sampling frequency (fs) required to represent the signal is much smaller than Nyquist frequency (fs ≪ Ω). Let RN be the set of N-tuples of real numbers. If xRN is input 1D signal sampled using CS, then x can be sparsely represented using an appropriate basis function Ψ = [ψ1, ψ2…ψN]. Thus, x=Ψs=i=1 Nsiψi. Let yM×N be the measured matrix with MN. Then, y = ∅x = ∅Ψs = As where yRN. Thus if measurement matrix, A that is used to measure sparse signal, s is given, then the construction of signal requires solving an underdetermined linear system and the sparse signal can be obtained by solving a combinatorial optimization problem given by : min‖s0 : y = ∅ Ψs = As.

A collective compression-encryption scheme is proposed in Santhanam and McClellan [26] with 2D compressive sensing and fractional Mellin transform. The original image is first measured using a measurement matrix in both dimensions to reduce data volume with 2D CS. The measurement matrix is constructed using partial Hadamard matrices. Chaos is used to control the measurement matrix with its initial conditions. The non-linear Mellin transform is used to overcome the security issue related to linear transform.

Zhao et al. [161] proposed a double-image encryption scheme which is claimed to be faster and more efficient. The scheme utilizes DWT as the basis for the measurement matrix. Both images are first transformed into DWT basis and are compressed with the measurement matrix derived from 2D Sine-Logistic modulation map (2D-SLMM). The images are then combined and Arnold transformation is applied for scrambling the coefficients. Two circular random matrices are generated using 2D-SLMM with different seed values. These random matrices are used to obtain DFrRT. The encrypted image is thus in DFrRT domain.

In another CS-based scheme proposed by Zhang et al. [33], Kronecker product (KP) is combined with the chaotic map for the generation of measurement matrix and RPMs. Low-dimensionality seed maps are extended to high-dimensional KP. These high-dimensional maps are used for the measurement matrix. The scheme is able to provide an efficient and fast approach to color image encryption.

A comparatively simpler scheme is proposed in Deng et al. [162] where image compression-encryption uses a combination of 2D CS and DFrRT. The basis function for the measurement matrix is a discrete cosine transform (DCT). The measurement matrix is constructed with a chaotic logistic map to control row vectors of the Hadamard matrix. The compressed image is then encrypted by DFrRT. Reconstruction of CS requires Newton's smoothed l0 norm (NSL0) algorithm.

An asymmetric cryptosystem for color images based on CS and equal modulus decomposition (EMD) is proposed by Chen et al. [163]. In this scheme, the color image is initially combined to a single image. With the application of DWT, this image is converted into low-frequency and high-frequency images. The high-frequency image is compressed by a measurement matrix generated from logistic map. The compressed image is segmented into two matrices. One of the matrices is used as a private key (a random matrix related to the plain image) for DFrRT and another matrix is combined with the low-frequency image to form a complex function. This complex function is transformed into DFrRT with the private key (random matrix) that is plain image-dependent. This enables the cryptosystem to resist known and chosen plaintext attacks. The output of DFrRT is decomposed into 2 masks using EMD where one mask is a cipher image and another is a private key. The inverse CS in the decryption process is based on the basis pursuit (BP) algorithm.

Yi et al. [34] proposed to use multiple measurement matrices instead of a single measurement matrix that is used to sample all blocks of an image. This strategy enables to overcome the issue of chosen plaintext attacks. The mother measurement matrix is derived from a single chaotic map and other measurement matrices are generated by exchanging rows using a random row exchanging method. However, another chaotic map is required to control the row-exchanging operation. The compressed image is then transformed with FrFT. The transform is followed by two consecutive pixel scrambling operations to guarantee nonlinearity and to increase key sensitivity in the proposed scheme. Ye et al. [164] proposed a compressed-sensed color image encryption scheme based on quaternion discrete multi-fractional random transform with the hash function SHA-512. The parameters of chaos are updated by randomly selected hash values. The use of multifunctional transform not only increases the key space but also improves the key sensitivity.

On the basis of fixed/multiparameter (T04)

Fractional transforms can decorrelate the spatial domain pixels based on the fractional value of the transform orders. The fractional transforms are also looked upon as Wigner distribution where each fractional order corresponds to an angle of rotation in the optical domain [4]. With a fixed value of transform orders, the key space is limited and the cryptosystem is vulnerable to brute force attack. To overcome this limitation, various researchers proposed to use multiple parameter-based fractional transforms [3539, 153, 165] with their own definitions and postulates. Mathematically, a FrFT has multiplicity which is due to different choices of both Eigen function and eigen value classes [35]. Thus, the multiplicity is intrinsic in a fractional operator. Lang [31] proposed a multiparameter FrFT where the periodicity of M is utilized. The transform order vector, n, can be M-dimensional integer vector. This provides an extra degree of freedom as the periodicity parameter; M serves as a secret key along with the vector parameters.

Sui et al. [63] proposed a multiparameter discrete fractional angular transform (MPFAT) for image encryption that uses fractional order and periodicity parameters to provide multiple parameters in the transform. Similar to a discrete fractional Angular transform (DFAT), MPDFAT also satisfies properties such as linearity, multiplicity, and index additivity. Zhong et al. [166] proposed a discrete multiple parameter FrFT (DMPFrFT) for image encryption using the periodicity parameter for extending to multiple parameters.

Azoug et al. [23] proposed yet another opto-digital image encryption with a multiple parameter DFrFT after a non-linear pre-processing of the image in spatial domain with a chaotic map. The multiparameter scheme is extended based on the work of Pei et al. [40] which extend the DFrFT to have multiple order parameters equal to the number of input data points. If all the parameters are made equal in an MPDFrFT, then it reduces to a single parameter DFrFT.

A general theoretical framework of MPDFrFT is presented in Kang et al. [153]. The work proposed two different frameworks as Type I and Type II MPDFrFT that include existing multiparameter transforms as their special cases. Further, an in-detail analysis of the properties of such transforms is discussed and higher dimensional operators are also defined. Some new types of transforms such as MPDFrCT, MPDFrST, and MPDFrHT (Cosine, Sine, Hartley) are constructed under the proposed framework along with their applications such as feature extraction and 2D image encryption.

A quaternion algebra is used with multiple parameter fractional Fourier transform (MPFrQFT) by Chen et al. [30] for generalizing MPFrFT. Both forward and reverse MPFrQFT transform are defined and a color image encryption based on the proposed transform is evaluated for its performance as compared to other encryption algorithms. The proposed scheme has larger key space and is more sensitive to transform orders.

Ren et al. [41] proposed a multiple image encryption scheme based on discrete multiple parameter fractional Fourier transform (DMPFrFT) for which original images are filtered in DCT domain and multiplexed into a single image. The multiple parameters are again generated using a periodicity parameter which serves as one of the keys. Other keys are the parameters for scrambling the multiplexed image (random matrix), and transform orders of DMPFrFT.

A multiparameter discrete fractional Hartley transforms for image encryption is proposed by Kang and Tao [141]. The multiple parameters are generated by extending the fractional order to N-dimensional vector and the FRHT kernel is represented as a linear summation with weighting coefficients.

DNA sequence (T05)

DNA coding method is inferred from the Deoxyribonucleic acid and is a branch of computing based on DNA, biochemistry and molecular biology hardware. DNA sequences appear in the form of double helices in living cells. A DNA code is simply a code of alphabetic set Q = {A, T, C, G}. These alphabets refer to 4 nucleic acid bases: A (adenine), C (cytosine), G (guanine), and T (thymine): A and T, G and C are complimentary. The complimentary rules are referred to as Watson-Crick compliment [167]. Thus, pairing can be described as: A ¯=T, T ¯=A, C ¯=G, G ¯=C and if a binary code is given to each as 00, 11, 01, 10 with (00, 11) and (01, 10) as complimentary. With vector algebraic operations based on DNA computing [168, 169], pixel permutation and substitution can be performed if the image pixels are represented in the form of binary sequences.

Recently Farah et. al [27] proposed to use FRFT along with chaos and DNA for image encryption. Initially, a random phase matrix is generated using a chaotic Lorenz map. The plain image is converted to a binary matrix and encoded according to chosen DNA encoding rule. Also, the random phase matrix is encoded to DNA sequence with the same rule. The coded plain image is XORed with that of the encoded random phase matrix. Using the RPMs generated from the 3D chaotic map (Lorenz map), iterative FrFT is performed and the resultant image is XORed with the third chaotic sequence to obtain the final ciphered image.

An optical image encryption set-up based on DNA coding is proposed by Huo et al. [117] where a piecewise linear chaotic map (PWLCM) is used to generate a key matrix as well as a random phase matrix. A message digest hash algorithm (MD5) is used to generate initial values of PWLCM. An MD5 hash of plaintext consists of 128 bits. XOR operation for DNA is used. Initially, the plain image and key matrix are converted to binary sequences with DNA coding rules that are different for different rows in the image. The DNA-encoded plain image is XORed with a key matrix and a forward Fresnel domain DRPE is applied to obtain the final-ciphered image.

Cellular automata (T06)

Cellular Automata (CA) also called cellular spaces, tessellation automata/structures, cellular structures, or iteration arrays find application in various fields like physics, microstructure modeling etc. CA consists of regular rigid cells that are generated in accordance with a fixed rule which is nothing but a mathematical function. CA is used in cryptography due to the possibility of pseudo-random number generation with such rule (Rule 30) which is a class III rule displaying aperiodic chaotic behavior [42, 170]. Li et. al [171] proposed a 3D image encryption using computer-generated integral imaging (CIIR) and cellular automata transform. An elemental image array (EIA) recorded by light rays coming from 3D image is mapped according to a ray-tracing theory. An encrypted image is then generated from 2D EIA using cellular automata transform. It is claimed that CA-based encryption is error-free and being an orthogonal transformation, it offers simplicity. The performance of the scheme is measured in terms of bit correct ratio (BCR) and PSNR for reconstructed and is compared to some similar proposed schemes. This scheme of combining optical transforms to that of CA is unique in its methodology. Recently, there is no further exploration of the proposed idea.

Double image (T07.1)/multiple image (T07.2)

Double image encryption schemes are aimed to provide more efficiency in terms of resources. A double image is simultaneously encrypted and decrypted. Such schemes also provide higher speed and better sensitivity besides less storage space requirement. Therefore, double image encryption schemes have drawn attention of various researchers [29, 63, 70, 152, 161, 172].

Recently, Yuan et al. [173] proposed an image authentication with double image encryption based on non-separable fractional Fourier transform (NFrFT). The two images are combined to form a complex image matrix and is transformed with NFrFT. The output of the transform is also a complex matrix. The transform orders and coefficient parameters serve as secret keys. Novelty of the proposed work is in the selection of a partial phase that is reserved for decryption. A nonlinear correlation algorithm is to authenticate the two recovered images. The cross-correlation of two compared images is referred to as non-linear correlation (NC) whose strength is specified by a parameter, k ∈ [0, 1]. An appropriate value of k is selected to authenticate the images. Peak to correlation energy (PCE) is a ratio of maximum peak intensity value and total energy of the non-linear correlation plane. Thus, PCE is measured to determine k and hence authenticity.

A double image encryption scheme based on interference and logistic map is proposed in Liansheng et al. [174] to overcome the silhouette problem. The two input images are initially joined to make an enlarged image. This joined image is subjected to scrambling based on chaotic sequence generated from a logistic map. Then, the scrambled image is again separated into two. One of the images is directly used to generate two-phase keys/masks based on optical interference. Another scrambled image is encrypted with DRPE method using first phase mask (key). This is followed by multiplying the complex outcome with another phase mask for transformation to the ciphertext. The author suggests to use input parameters of the logistic map, wavelength and axial mask as secret encryption keys to further enhance the security.

Singh et al. [67] proposed a full-phase encryption scheme for its better security compared to amplitude image. The scheme uses two spatial domain input images and converts each of them to a phase image. The phase images are then multiplied with RPMs and transformed in the Gyrator domain with rotation angle, α. The gyrator domain images are then added and subtracted to get two intermediate images. The intermediate images are then bonded with structured phase masks based on the Devils vortex lens (DVFL) specified with certain parameters. This is followed by another Gyrator transform with a different rotation angle, β to obtain two encrypted images. Decryption is exactly the inverse of the encryption process.

Similar to double image encryption schemes, there is another category where multiple images are simultaneously encrypted to reduce the key space as compared to the data to be encrypted (images) but at the cost of increased complexity [69, 175]. Recently Sui et al. [64] proposed a double image encryption where two images are initially combined into a single image along the column of the first image followed by the second image. This combined image is scrambled with a 2D sine logistic modulation map. Next, the scrambled image is divided into two components to constitute a complex image. One of the components is the phase part and another part is the amplitude of the complex image. The complex image is shared using Shamir's three-pass protocol where the encryption function is a multiparameter fractional angular transform which is preferred for its commutative property.

Sui et al. [43] proposed multiple image encryption with asymmetric keys in the FrFT domain. Initially, a sequence of chaotic pairs is generated using symmetrically coupled logistic maps. This chaotic sequence is used to scramble the spatial domain images. Phase only function (POF) of image is retrieved using an iterative process of FrFT domain. In the next stage, all the POFs are modulated into an interim which is transformed to real-value ciphertext by FrFT and chaotic diffusion. The three random phase functions are used as keys to retrieve POFs of plain images and three decryption keys are generated in the encryption process.

A multiple image encryption scheme is proposed [49] by combining a non-linear fractional Mellin transform with a FrCT. Fractional Mellin transform is used for its robustness to classical attacks. The original images are simultaneously transformed into a DCT domain and then re-encrypted with amplitude and phase encoding. The transformed images have changed center-coordinates due to fractional Mellin transform since FrMT is a log-polar transform of the image followed by a FrFT of log-polar image. The fractional orders of FrFT, phases ψj, θj are the secret keys.

Recently, Guleria et al. [176] proposed to encrypt three RGB images simultaneously using RSA cryptosystem followed by a discrete reality preserving FrCT and the final stage of scrambling with Arnold transform. To accomplish multiple image encryption, 3 RGB images are combined into a single image using a single color component of each image as R,G,B components. All three indexed images are individually ciphered with the proposed algorithm and then combined as a single ciphered image. The security of the scheme depends not only on the input parameters of RSA, Arnold transform and orders of transform but also on their sequence of arrangement. Decryption is exactly the inverse of the encryption scheme.

Watermarking in the encrypted domain (T08)

Recently, many researchers have proposed to use of optical transform for watermarking applications [69, 71, 177179]. Watermarking an image is a data-hiding method for copyright protection and copy prevention. Depending on the application, a watermark can be a visible pattern or can be hidden in the host image. For copyright, its generally a visible pattern and for resolving an authorship problem, the watermark is secretly embedded into image which can be recovered by an authorized user only. In the latter case, the watermark is usually a binary logo that is encrypted into a noise-like pattern and then embedded in the image for enhanced security. Many researchers have followed this approach in the watermarking algorithm. Some of the recent watermarking schemes with an encryption algorithm using fractional transforms are reviewed in this section.

Singh et al. [180] proposed to embed an encrypted watermark in fractional Mellin transform (FrMT) into the host image. The two deterministic phase masks (DPM) are generated to be used in the input and frequency plane. The watermark image is first converted into a log-polar image. After multiplying the log-polar image with the first DPM, it is transformed to a FrFT domain. This is FrMT transformation. In the next step, again the second DPM is multiplied by the complex outcome and inverse FrFT is obtained. For embedding, the outcome is attenuated by a factor and then added to the host image. SVD decomposition is applied in the last stage to make the watermarked image unrecognizable and is transmitted as individual S, V, D matrices.

A quaternion algebra is used to define a quaternion discrete fractional random transform (QDFRNT) which generalizes DFRNT for its application in watermarking [181]. The host image is divided into blocks and QDFRNT is applied to each block. The scrambled watermark image is used to modify the mid-frequency coefficients of the QDFRNT host image. The transform orders and parameters of the scrambling scheme in the watermark image are used as secret keys of encryption.

Liu et al. [182] proposed a novel transform, known as fractional Krawchouk transform (FrKT), to generalize the Krawchouk transform. Derivation of FrKT is based on eigenvalue decomposition and eigen vectors. For validating the imperceptibility of the proposed transform, a watermarking application is illustrated in the work. A better robustness and imperceptibility with proposed transform have been claimed in the work.

Performance metrics for image encryption

Image data have high redundancy and large volumes as compared to text or binary data. It may also have some real-time operations or may also be incorporated with compressed data of a certain format. Thus, an image encryption scheme needs to satisfy certain requirements. Some of the commonly used performance requirements are discussed in this section. The categorization of such performance analysis is shown in Figure 4. Performance analysis of encryption requires a comprehensive investigation of perceptual security and cryptographic security. Perceptual analysis requires that the outcome of an algorithm is unintelligible to human perception whereas cryptographic analysis refers to the ability of the algorithm to resist cryptanalysis that includes all possible attacks in terms of the secret key, data statistics etc.

FIGURE 4
www.frontiersin.org

Figure 4. Performance requirements of image encryption scheme.

Perceptual security analysis

Perceptual security can be investigated with some subjective metrics [183]. The ciphertext can be classified into typical quality levels as shown in Table 6. QL0: signifies a completely recognizable image which indicates that the encryption is not valid, QL1: signifies a partially recognizable image contour like edges and boundaries are visible but the texture is not clear. QL2: signifies that the image is completely unintelligible and is considered perceptually secure.

TABLE 6
www.frontiersin.org

Table 6. Subjective metrics for perceptual security analysis.

Another measure of perceptual quality is done by evaluating a set of parameters for comparison of encrypted images with reference to the plain image. Some of the commonly used objective metrics are explained below.

i. Peak signal to noise ratio (PSNR): PSNR is the measure of spectral information in an image. A higher value indicates greater similarity in the test images. In an encryption algorithm, PSNR values are evaluated to quantify the dissimilarity in the encrypted image with respect to plain image. During decryption, the same measure indicates the efficacy of the algorithm in the reverse process. Practically PSNR ≥ 28 indicates that the test images are similar. For any pair of images, plain image (P) and ciphered image (C), the PSNR is mathematically defined as:

PSNR(P,C)=10log10(L1)21MNi=1Mj=1N[Pi,jCi,j]2    (9)

ii. Mean square error (MSE): It is also an error metric like PSNR that indicates the dissimilarity between the test images. In an ideal case, for two similar images, MSE should be zero. PSNR and MSE are mathematically related to each other as:

       PSNR(P,C)=10log10(L1)2MSE    (10)
 MSE= 1MNi=1M  j=1N[Pi,j-Ci,j]2    (11)

iii. Spectral Distortion measure (SD): It indicates the spectral dissimilarity between the reference image and test image. The SD measure evaluates as to how far is the spectrum of the test image from that of the reference image. The spectral distortion is defined as:

SD(P,C)=1MN u=1M v=1N|FP(u,v)-FC(u,v)|    (12)

where FP(u, v), FC(u, v) are Fourier transforms of plain image, fP(m, n) and encrypted image, fC(m, n), respectively.

iv. Structural Similarity Index Measure (SSIM): Wang et al. [184] proposed a metric based on the human visual system (HVS) that considers biological factors, namely, luminance, contrast, and structural comparison between the image and a reference image. This measure known as SSIM, is used to quantify the visual image quality.

SSIM(x,y)=f(l(x,y),c(x,y),s(x,y) )    (13)

where l(x,y), c(x,y) and s(x,y) are luminance, contrast, and structural comparison, respectively. For any two pairs of images P and C, it is mathematically defined as:

SSIM(P,C)=(2μPμC+ C1)(2σPC+C2)(μP2+μC2+C1)(σP2+σC2+C2)\n    (14)

v. Histogram variance: In order to quantify the uniformity of cipher images, variances of histograms are evaluated [185]. Variances are also evaluated for two different cipher images that are encrypted from two different secret keys on the same plain images. The lower values of variance indicate higher uniformity. The variance of histogram is mathematically evaluated as:

var(Z)=1/n2i=1nj=1n12(zi-zj)2    (15)

where Z = {z1, z2, z3,, …z256} is vector of histogram values, zi, zj are the number of pixels that have grey values equal to i and j, respectively.

vi. Encryption Quality is a subjective measure that collectively evaluates an algorithm for the level of security it provides. There are 4 different levels for evaluation as explained in Table 7.

TABLE 7
www.frontiersin.org

Table 7. Evaluation of encryption quality.

Statistical analysis

According to Shannon's communication theory of perfect secrecy [186], “It is possible to evaluate most of the encryption techniques by statistical analysis”. He suggested two methods for such analysis. One is histogram analysis and another is correlation analysis for the adjacent pixels in the encrypted image.

Histogram analysis

Histogram is the pixel frequency distribution where each grey level is plotted for the number of pixels with that particular value in the image. An effective cryptosystem should be able to generate ciphertext with fairly uniform histograms, which are also significantly different from the plaintext.

Chi-square test

In order to verify the uniformity of the histogram, a chi-square test is performed [187] and defined as:

χtest2=k=1K(oi-ei)2ei    (16)

where k is gray-level (256 for 8-bit image), oi, ei are the observed and expected times occurrence of each gray-level, respectively. The test is performed with different significance levels (generally at 0.05) for a null hypothesis.

Correlation analysis

For a perceptually meaningful image, the correlation between adjacent pixels is very high. It is necessary for an effective cryptosystem to significantly reduce these correlation values by decorrelating them in the encrypted domain. For such analysis, either all or a few pixels are randomly selected and correlation plots are obtained for horizontally, vertically, and diagonally adjacent pixels. The correlation plots in each direction should display the pixels to be uniformly scattered over the entire intensity range. For quantitative analysis, correlation coefficients are evaluated for two adjacent pixels in horizontal, vertical, and diagonal directions using Eqs. (17)–(19). For xi, yi as gray values of ith pair of selected adjacent pixels,

ρ(x,y)=cov(x,y)D(x)D(y)    (17)

where cov(x, y) = E[xE(x))(yE(y))]

=1Ni=1i=N[(xi1Ni=1i=Nxi)(yi1Ni=1i=Nyi)]    (18)
                   D(x)=1Ni=1i=N(xi1Ni=1i=Nxi)2,                   D(y)=1Ni=1i=N(yi1Ni=1i=Nyi)2    (19)

Entropy analysis

Information entropy is a mathematical property that depicts the randomness associated with the information source. The entropy of a message source s is given as:

H(d)=-i=0L-1P(si)log2P(si)    (20)

where L is the highest intensity value of pixels in image, si is the ith symbol in message, P(.) refers to the probability. The entropy defined in Eq. (20) is termed as Shannon's entropy [186]. Besides, a local entropy has been recently proposed [188] as an extension of Shannon's entropy measure. It is the mean entropy of several randomly selected non-overlapping blocks of information source. For an 8-bit image, L = 256, there are K = 30, nonoverlapping blocks to be randomly selected from the image with each block having 1,936 pixels (TB=1936). Therefore, this entropy measure is also termed as (K,TB)-local entropy and is evaluated using Eq. (21)

Hk,TB¯(S)=i=1kH(Si)k    (21)

where Si are randomly selected non-overlapping image blocks with TB pixels in each block of S with total of L intensity scales.

Sensitivity analysis

Key sensitivity analysis

The sensitivity of an encryption scheme can be evaluated in two aspects: (1) at encryption stage which means that a completely different ciphertext should be generated with a very minute change in the input key value, (2) at the decryption stage, the ciphertext should not be correctly recovered if there is very slight change in the correct key values. Key sensitivity (KS) is mathematically defined as:

KS=1M×Nm=1M n=1NC1(m,n) C2(m,n)× 100%    (22)

where C1 and C2 are two different ciphered images with slight change in key values corresponding to same plain image, P. M × N is total number of image pixels in the image.

C1(m,n)C2(m,n)={1,C1(m,n)C2(m,n)0,C1(m,n)=C2(m,n)    (23)

The value of KS should be as close to 100% [183].

Key space analysis

Key space refers to the set of all possible keys that are used in encryption of information. A brute force attack is possible if an intruder manages to make an exhaustive search on the set of possibilities until the correct one is found. Thus, feasibility of brute-force attack depends on the total number of valid keys. This number is an important feature to determine the strength of a cryptosystem, and it has to be large enough (> 2100) [142] as per today's computing power.

Differential analysis

With reference to plaintext, the sensitivity refers to change in ciphertext with slight change in plaintext. This is termed as differential analysis where an adversary can change a single pixel in plaintext and compare the corresponding ciphertexts to get some clue about secret keys. The diffusion property of a cryptosystem enables it to spread any change in plaintext to the entire ciphertext. There are two indicators for numerical evaluation of resistance to such attack: NPCR (number of pixel change rate) and UACI (unified average change in intensity). Theoretically, the closer values of NPCR and UACI are 99.6093 and 33.4635%, respectively, indicating the effectiveness of the applied algorithm [189]. These indicators are mathematically defined as:

          NPCR=1M×Ni,jD(i,j)×100%    (24)
UACI=1M×Ni,j|C(i,j)-C ~(i,j)|L-1×100%    (25)

where C , C ~ are two encrypted images with the same keys but with a slight change in the corresponding plain image of size, [M N] with the highest intensity value, L.

D(i,j)={1,C(i,j)C˜(i,j)0,  otherwise    (26)

Avalanche effect

The avalanche criterion is referred to as an average number of bits that differ between C and C ~ while changing a pixel in plaintext. The ideal value of the avalanche effect is 0.5 (50%).

Noise analysis

The communication channels over which the image information is transferred are responsible for the addition of some noise in the form of degradation or distortion. The performance of a cryptosystem in such a scenario requires analysis. Gaussian noise with zero mean and varying values for variance is added to the encrypted image for Gaussian noise analysis. The quality of the decrypted image is checked in perceptual as well as numerical terms with different variances in noise [60, 190]. The results thus obtained are compared for the noise analysis. The Occlusion attack refers to the loss of data or cropping of a portion of the image due to noisy channels. The cryptosystem should be capable of recovering the appropriate amount of information even after some occlusion in data. In order to check for the robustness to occlusion attack, some pixels of encrypted image (10, 15, 25, 50, 75%) are cropped and corresponding decrypted image quality is evaluated in perceptual and numerical analysis [25, 66, 190].

Speed analysis

Speed analysis refers to the critical execution time for forward and reverse process in an encryption scheme. As typical configuration and capacity of a system greatly determine its computation speed, therefore a comparison of encryption and decryption time is a trivial task. Different machines perform differently. However, time analysis is an important feature, especially where real-time application is involved. Time analysis is performed in terms of encryption time and decryption time separately. Generally, a large sample set of images are considered for evaluating the average time taken in the encryption and decryption process on a present-day commonly used system configuration.

Randomness analysis

NIST SP800-22 is a statistical test suite for random and pseudorandom number generators that are used for cryptographic applications. The advantage of this test suite is that it does not require any assumptions on the generator. Rather, it only looks for a particular statistical recurrence in the generated sequence (random). It consists of 15 p-value-based tests that include frequency test, run test, and spectral test. These tests are generally not used in transform-based cryptography. However, we mention it here due to usage of it in some classical methods of image encryption.

GVD analysis

The gray value difference of a pixel form its four neighboring pixels in an image is given by:

G(i,j)=[ I(i,j)-I(i ,j )]4    (27)

The average difference in gray values corresponding to each pixel in image is

Gav(i,j)= 1(M-2)(N-2)i=2M-1j=2N-1G(i,j)     (28)

Thus, gray value difference (GVD) parameter [191] of an encryption scheme is defined as:

GVD= GavP(i,j)-GavC(i,j)GavP(i,j)+GavC(i,j)    (29)

where GavP and GavC are the average differences in gray values for original plain image and ciphered image, respectively. The ideal value of GVD parameter is unity. For a good encryption scheme, this parameter should be as close to 1.

Classical attack analysis

In cryptography, classical attacks are launched to cryptanalyze an encryption scheme. The adversary can have certain information regarding plain text or ciphertext that provide for cryptanalysis. If the adversary has access to set of ciphertext, then it can launch a ciphertext only attack. If it is able to get access to set of plain texts and corresponding ciphertexts, then a known plaintext attack can be launched. In a chosen plaintext attack, it is assumed that the adversary has access to arbitrary plaintexts and can obtain the corresponding ciphertexts. From the above-stated assumptions, a chosen plaintext attack provides the most information to the adversary. Thus, if a cryptosystem is able to resist chosen plaintext attack, it is believed to be able to resist other classical attacks as well [154, 192]. Therefore, an image encryption scheme should have excellent diffusion properties for providing robustness to a chosen plaintext attack analysis.

Comparative analysis

As shown in Table 8, each of the proposed schemes is accompanied by the parameters used to evaluate the encryption algorithm and the technique that is merged with the fractional transform. We have categorized these techniques into eight, as reality preserving (T01), chaos theory based (T02), compressive sensing (T03), multiple parameters (T04), DNA sequence (T05), cellular automata (T06), double image encryption (T07.1), multiple image encryption (T07.2), and with watermarking (T08). The comparative analysis is based on the results available for Lena image only. Table 9 illustrates the subjective comparison for the same references as listed in Table 8 along with the probable vulnerabilities associated with each of them. These vulnerabilities are expressed as V01–V07 (mentioned below the Table 9). It is worth mentioning here that the vulnerabilities of each scheme can be removed by specific methodology in practice.

TABLE 8
www.frontiersin.org

Table 8. Comparative analysis for performance metrics of proposed schemes (for Lena image).

TABLE 9
www.frontiersin.org

Table 9. Comparative analysis for subjective parameters (refer Table 8 for performance metrics).

It is evident from the values in Table 8 that studies in which chaos-based permutation or substitution is merged with fractional transform domain have higher entropy measure, low correlation coefficients, high NPCR and UACI, higher key space, excellent key sensitivity, robustness to noise and data occlusion attacks, hence having higher security levels. Reality preserving algorithm has contributed toward the digital implementation of optical transforms and has enabled researchers to overcome major limitations regarding complexity issues of fractional transforms in the digital domain. Compressive sensing is used to reduce the data deluge while dealing with large images for encryption but their performance is marginal in terms of higher correlation coefficients and vulnerability to leakage in information.

CS-based encryption schemes are highly complex [193] and reconstruction is time-consuming. It has been observed in the results of the above-reviewed articles that CS-based schemes lack uniform histograms in the encrypted domain and CC values are considerably higher. Also, CS-based simultaneous compression and encryption schemes are vulnerable to cryptanalysis due to linearity [194]. In a broad sense, if the plaintext is sparse, the key of the cryptosystem may not be safe as it is possible to exploit the prior sparsity knowledge to extract information of the key from ciphertext. The key and the plaintext may be partly accessed using some information processing technology such as Blind source separation (BSS) [195].

Multiple parameter-based fractional transform schemes perform better than fixed/single transform order-based schemes. This is due to enlarged key space and better uniformity in encrypted histograms. However, there are some deficiencies related to multiple parameter schemes [4446] due to linearity that need to be avoided. The linear relation among consecutive transform orders and periodicity is the major limitation that can lead to multiple decryption keys corresponding to an encryption key. This depicts its vulnerability to various attacks. To overcome this issue, it is necessary to introduce some means of breaking the linear relationship among consecutive transform orders or by careful selection of transform orders through a random selection scheme [38], [190].

DNA sequence operation is little less explored with optical transforms. However, it is able to enhance security with increased key space and randomness in encrypted data. Double and multiple image encryption schemes are preferred for speed and increasing encryption efficiency. Watermarking is another domain where fractional transforms are used to encrypt the watermark before embedding in a blind watermark scenario. The encryption of the watermark logo in the collective time-frequency domain increases the robustness to various attacks.

Observations based on published literature

In an exhaustive search performed in the month of December 2021 on the various online databases: ACM Digital library, Elsevier, Google Scholar, IEEE explore, Springer link, Taylor and Francis and Wiley for the number of research papers published related to the encryption of different multimedia contents during the period 2015–2021. The pictorial view to highlight the percentage of papers published on the encryption of various multimedia contents like: images, video, audio, text data etc. has been shown in Figure 5.

FIGURE 5
www.frontiersin.org

Figure 5. Percentage of research papers published on the encryption of various multimedia contents like: images, video, audio, text data during 2015–2021.

According to search results, it is observed that the number of publications is majorly in text and image encryption. However, the number of image encryption works is dominating with 42% of all the metadata available. We believe that it is due to the wide application area of image data, from platforms like social media to sensitive data like military and telemedicine fields. Almost every sector of communication is dependent on image transmission in one way or the other. It is also observed that amongst various mathematical implementations of the fractional transforms, FrFT is most popular with more than 60% of the total publications in fractional integral-based image encryption schemes. This is followed by fractional wavelet transform (FrWT) with a contribution of 16%, fractional Hartley transform, FrHT (10%), fractional Cosine transform, FrCT (7%) and the remaining few on other transforms (namely, Mellin, angular, sine etc.).

As the present manuscript is mainly concerned with image encryption using optical/fractional integral transforms, therefore, we narrowed down our search for the number of papers published year-wise on the fractional transform-based image encryption schemes. Figure 6 illustrates a graphical representation of the related publications in all the major online databases during the period 2015–2021.

FIGURE 6
www.frontiersin.org

Figure 6. Number of papers published on fractional integral transform-based image encryption schemes on various online databases.

It is observed that the number of publications on image encryption in the fractional transform domain has considerably increased every year. This gives testimony to the fact that with the advent of evolutionary algorithms based on fractional integral transforms in the digital domain has increased its popularity and is receiving significant attention from the researcher community.

It has been also observed that most of the encryption algorithms with fractional transform as the main component are evaluated for statistical analysis, noise attack, and occlusion attack analysis only. This is probably the reason for less popularity of optical transform-based image encryption schemes as compared to purely chaos-based schemes or other number theory-based approaches. According to a recent survey on color image encryption [111], only 8.65% of the proposed schemes are based on optical transforms. In order to widen the contribution of optical transform-based schemes to image encryption, certain limitations need solutions for encouraging practical implementations.

In Section Mathematical modelling of optical transforms with FRFT and its variants, we have described the categorization of fractional transform-based image encryption schemes in accordance with the strategical amalgamation of the fractional transform domain with other evolutionary methods. There are total of eight major categories T01 to T08 (one of them T07 having two subcategories). In Figure 7, we have shown the relative contributions in terms of the number of papers published in each of these categories so far. We observe that the major contributions come from the T07: Double Image/Multiple Image category, followed by T02: chaos-based, T08: Watermarking, T03: Compressive Sensing, T01: Reality Preserving category T04: Multiple/fixed parameter transforms, T05: DNA Sequences, and least in T06: Cellular Automata.

FIGURE 7
www.frontiersin.org

Figure 7. Relative contribution in terms of the number of papers published belonging to different categories (T01-T08) of fractional transform-based image encryption techniques.

Based on the observations related to security levels and vulnerabilities mentioned in Tables 8, 9, we elaborate on the possible ways to overcome some limitations. Most of the algorithms mainly lack in the following aspects: (1) uniform histograms, (2) entropy measure, (3) smaller key space, (4) differential analysis, (5) classical attack analysis, (6) speed analysis. In the discussion below, we try to highlight some of the possible solutions as:

Uniform Histogram: A majority of fractional transform-based image encryption schemes produce cipher images having Gaussian distribution like histograms [23, 29, 141]. It is due to the fact that the energy of a transform is concentrated at the center. Authors have claimed the robustness of encryption schemes only on the basis of similarity in the distribution of histograms irrespective of the content of the plain image. The entropy measure for such distributions has values that is significantly less than the ideal value (8 for 256 intensity levels image). However, in cryptography, it is expected that the cipher image pixels should have a uniform distribution over the entire intensity ranges having entropy measure very near or equal to the ideal value. This points to some information leakage, that can make a scheme vulnerable to entropy attacks. To overcome such limitation, a hybrid algorithm in which fractional integral transform domains are amalgamated with chaos based pseudorandom substitutions should be used.

Smaller Key space: Adopting multiple layer security for image encryption algorithm will lead to an increase in key space. Apart from this, making a selection of transform orders to depend on some chaotic parameters or a similar analogy will result in larger key space [141, 190]. Most of the proposed schemes have added a permutation layer along with the transform domain. Some of the schemes that are based on permutation and substitution paradigm are able to offer larger key space to overcome brute force attack.

Differential Analysis: In order to fulfill the requirement of effective encryption algorithm, the scheme should be able to resist differential attack analysis. The parameters NPCR and UACI are its measures. From Table 9, it is clear that majority of schemes lack such analysis. Even if done, the UACI values are not optimum or even zero. This is due to the fact that there is no significant change in intensity values with a single pixel change in input. Therefore, for a successful strategy, the change should be diffused over the entire image coefficients. One of the solutions to this issue is to make the initial parameters of diffusion scheme to depend on some significant feature of the input image like mean or average values.

Time analysis: A run time for an encryption algorithm refers to the time required for its execution. Various factors need to be considered for time analysis like the size of image, system configuration, programming language etc. [109]. To compare the computational performance of an algorithm, is a crucial task as different host machines have their own set of configurations. Due to this reason, some researchers have used an average time Vs size paradigm to evaluate computational performance [143] wherein input images with variable size are selected and the average time of encryption is evaluated using large set of different keys. Fractional transform-based encryption schemes have inherent advantage of high speed and parallel processing. However, while merging of these schemes with other domains like chaos etc., computational optimization should be taken care of. In summary, there should be trade-off management between complexity and security while designing an algorithm and some optimum suggestion for the choice of parameters, number of rounds etc. should be given.

Careful Selection of chaotic maps: The chaotic maps wherever used in an encryption scheme, need a careful selection. As most of the schemes that are reviewed have employed one dimensional chaotic map [28, 66, 69]. Although 1D maps are simplest in hardware implementation but are less secure. For instance, 1D logistic maps have some periodic windows in the chaotic range [196] and that Arnold transform also has periodicity [197], hence are vulnerable. At the same time, the higher dimensional chaotic maps are sometimes secure but complex. To keep a balance, it is recommended to use a coupled map scheme where two or more 1D chaotic maps are coupled for enhanced security [50] and also robust chaotic maps may be used with proper specification of the range of parameters where robust chaos is observed. Prior to selection of such chaotic map, a proper bifurcation analysis and investigation of dynamical behavior in the entire parameter space must be done to identify the suitable regions of parameter space exhibiting robust chaos.

Conclusion

The evolution of digital media over the past two decades has revolutionized the development of strategies pertaining to security preservation of the multimedia contents. Encryption is the most effective way to secure the data. It has been observed in the study that out of all the data types, (audio, video, text, image) image data are most frequently used to convey the information. Consequently, the percentage of published work on image encryption is dominating with 42% of all the metadata available. However, cryptography for image data is challenging when it comes to classical methods of encryption due to huge volume of data and also due to the high correlation among adjacent pixel values. Various research works have been proposed in the literature that are specifically suitable for image encryption. Application of fractional integral transforms in image encryption has been an active research area and the review work in this paper is also focused on the same. The fractional integral transform provide an extra degree of freedom to the encrypted data as the fractional order of the transform is used as secret key.

The aim of this review is to build an understanding of the reader toward application of fractional integral transforms in image encryption. The initial description of the paper gives a conceptual idea on using these transforms and also the domain-based taxonomy to classify various existing schemes in the literature. The optical image encryption that comprises of optical setup and double random phase encoding (DRPE) has been discussed. Few recent review works and cryptanalysis of these schemes are tabulated and analyzed. The digital implementation of the fractional integral transforms is discussed with its analogy to the optical setup. Further, various algorithms are categorized in accordance with their merging techniques and a comprehensive review is presented on some of the most recently published articles. The performance criteria and standards to be followed have been discussed. A performance comparison in tabular format is presented for objective as well as subjective metrics of some of the recent publications. Finally, based on the observations, some major concerns are listed and a few constructive guidelines are provided. This work intends to provide the readers with an understanding of why and how fractional integral transformations are applicable to the encryption of images. In addition, the study highlights some vulnerabilities and threats associated with the usage of fractional transforms along with the probable solutions that may help in the future design and development of hybrid and robust encryption schemes.

Author contributions

GK and VP: concept and design of the article, data collection, and review. GK, RA, and VP: analysis, interpretation, and writing of the manuscript. VP: critical review and revision of the manuscript. All authors contributed to the article and approved the submitted version.

Acknowledgments

VP acknowledges the MATRICS Grant (MTR/000203/2018) from SERB, DST, Govt. of India.

Conflict of interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Publisher's note

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.

References

1. Petrás I. Fractional Derivatives, Fractional Integrals, and Fractional Differential Equations in Matlab. London, UK: INTECH Open Access Publisher (2011).

Google Scholar

2. Namias V. The fractional order Fourier transform and its application to quantum mechanics. IMA J Appl Math. (1980) 25:241–65. doi: 10.1093/imamat/25.3.241

CrossRef Full Text | Google Scholar

3. McBride AC, Kerr FH. On Namias's fractional Fourier transforms. IMA J Appl Math. (1987) 39:159–75. doi: 10.1093/imamat/39.2.159

PubMed Abstract | CrossRef Full Text | Google Scholar

4. Lohmann AW. Image rotation, Wigner rotation, and the fractional Fourier transform. JOSA A. (1993) 10:2181–6. doi: 10.1364/JOSAA.10.002181

PubMed Abstract | CrossRef Full Text | Google Scholar

5. Almeida L. The fractional Fourier transform and time-frequency representations. IEEE Transac Signal Process. (1994) 42:3084–91. doi: 10.1109/78.330368

CrossRef Full Text | Google Scholar

6. Mendelovic D, Ozaktas HM. Fractional Fourier transforms and their optical implementation. J Opt Soc Am A. (1993) 10:1875–81. doi: 10.1364/JOSAA.10.001875

PubMed Abstract | CrossRef Full Text

7. Ozaktas HM, Mendlovic D. Fractional Fourier transforms and their optical implementation. II JOSA A. (1993) 10:2522–31. doi: 10.1364/JOSAA.10.002522

PubMed Abstract | CrossRef Full Text | Google Scholar

8. Ozaktas HM, Mendlovic D. Fourier transforms of fractional order and their optical interpretation. Opt Commun. (1993) 101:163–9. doi: 10.1016/0030-4018(93)90359-D

CrossRef Full Text | Google Scholar

9. Ozaktas HM, Arikan O, Kutay MA, Bozdagt G. Digital computation of the fractional Fourier transform. IEEE Transac Signal Process. (1996) 44:2141–50. doi: 10.1109/78.536672

CrossRef Full Text | Google Scholar

10. Candan C, Kutay MA, Ozaktas HM. The discrete fractional Fourier transform. IEEE Transac Signal Process. (2000) 48:1329–37. doi: 10.1109/78.839980

CrossRef Full Text | Google Scholar

11. Abu Arqub O. Numerical simulation of time-fractional partial differential equations arising in fluid flows via reproducing Kernel method. Int J Num Methods Heat Fluid Flow. (2020) 30:4711–33. doi: 10.1108/HFF-10-2017-0394

CrossRef Full Text | Google Scholar

12. Pei SC, Yeh MH, Tseng CC. Discrete fractional Fourier transform based on orthogonal projections. IEEE Transac Signal Process. (1999) 47:1335–48. doi: 10.1109/78.757221

CrossRef Full Text | Google Scholar

13. Dickinson B, Steiglitz K. Eigenvectors and functions of the discrete Fourier transform. IEEE Transac Acoust Speech Signal Process. (1982) 30:25–31. doi: 10.1109/TASSP.1982.1163843

CrossRef Full Text | Google Scholar

14. Pei SC, Yeh MH. Two dimensional discrete fractional Fourier transform. Signal Process. (1998) 67:99–108. doi: 10.1016/S0165-1684(98)00024-3

CrossRef Full Text | Google Scholar

15. Pei SC, Ding JJ. Closed-form discrete fractional and affine Fourier transforms. IEEE Transac Signal Process. (2000) 48:1338–53. doi: 10.1109/78.839981

CrossRef Full Text | Google Scholar

16. Pei SC, Yeh MH. Improved discrete fractional Fourier transform. Opt Lett. (1997) 22:1047–9. doi: 10.1364/OL.22.001047

PubMed Abstract | CrossRef Full Text | Google Scholar

17. Pei SC, Tseng CC, Yeh MH, Shyu JJ. Discrete fractional Hartley and Fourier transforms. IEEE Transac Circ Syst II Analog Digital Signal Process. (1998) 45:665–75. doi: 10.1109/82.686685

CrossRef Full Text | Google Scholar

18. Pei SC, Yeh MH. The discrete fractional cosine and sine transforms. IEEE Transac Signal Process. (2001) 49:1198–207. doi: 10.1109/78.923302

PubMed Abstract | CrossRef Full Text | Google Scholar

19. Pei, SC, Yeh MH. (1999). Discrete fractional Hadamard transform in ISCAS'99. In: Proceedings of the 1999 IEEE International Symposium on Circuits and Systems VLSI (Cat No 99CH36349). Piscataway, NJ: IEEE. 3, 179–182

Google Scholar

20. Pei SC, Ding JJ. Fractional cosine, sine, and Hartley transforms. IEEE Transac Signal Process. (2002) 50:1661–80. doi: 10.1109/TSP.2002.1011207

CrossRef Full Text | Google Scholar

21. Refregier P, Javidi B. Optical image encryption based on input plane and Fourier plane random encoding. Opt Lett. (1995) 20:767–9. doi: 10.1364/OL.20.000767

PubMed Abstract | CrossRef Full Text | Google Scholar

22. Unnikrishnan G, Joseph J, Singh K. Optical encryption by double-random phase encoding in the fractional Fourier domain. Opt Lett. (2000) 25:887–9. doi: 10.1364/OL.25.000887

PubMed Abstract | CrossRef Full Text | Google Scholar

23. Azoug SE, Bouguezel S. A non-linear preprocessing for opto-digital image encryption using multiple-parameter discrete fractional Fourier transform. Opt Commun. (2016) 359:85–94. doi: 10.1016/j.optcom.2015.09.054

CrossRef Full Text | Google Scholar

24. Xiong Y, He A, Quan C. Cryptoanalysis on optical image encryption systems based on the vector decomposition technique in the Fourier domain. Appl Opt. (2019) 58:3301–9. doi: 10.1364/AO.58.003301

PubMed Abstract | CrossRef Full Text | Google Scholar

25. Maan P, Singh H. Non-linear cryptosystem for image encryption using radial Hilbert mask in fractional Fourier transform domain. 3D Res 9. (2018) 53. doi: 10.1007/s13319-018-0205-8

CrossRef Full Text | Google Scholar

26. Santhanam B, McClellan JH. The discrete rotational Fourier transform. IEEE Transac Signal Process. (1996) 44:994–8. doi: 10.1109/78.492554

CrossRef Full Text | Google Scholar

27. Farah MB, Guesmi R, Kachouri A, Samet M. A novel chaos based optical image encryption using fractional Fourier transform and DNA sequence operation. Opt Laser Technol. (2020) 121:105777. doi: 10.1016/j.optlastec.2019.105777

CrossRef Full Text | Google Scholar

28. Mishra DC, Sharma RK, Suman S, Prasad A. Multi-layer security of color image based on chaotic system combined with RP2DFRFT and Arnold transform. J Inf Secur Appl. (2017) 37:65–90. doi: 10.1016/j.jisa.2017.09.006

CrossRef Full Text | Google Scholar

29. Kaur G, Agarwal R, Patidar V. Double image encryption based on 2D discrete fractional Fourier transform and piecewise nonlinear chaotic map. In: International Conference on Advanced Informatics for Computing Research. Singapore: Springer (2018). p. 519–30.

Google Scholar

30. Chen B, Yu M, Tian Y, Li L, Wang D, Sun X, et al. Multiple-parameter fractional quaternion Fourier transform and its application in colour image encryption. IET Image Process. (2018) 12:2238–49. doi: 10.1049/iet-ipr.2018.5440

CrossRef Full Text | Google Scholar

31. Lang J. Color image encryption based on color blend and chaos permutation in the reality-preserving multiple-parameter fractional Fourier transform domain. Opt Commun. (2015) 338:181–92. doi: 10.1016/j.optcom.2014.10.049

CrossRef Full Text | Google Scholar

32. Ran Q, Yuan L, Zhao T. Image encryption based on nonseparable fractional Fourier transform and chaotic map. Opt Commun. (2015) 348:43–9. doi: 10.1016/j.optcom.2015.03.016

CrossRef Full Text | Google Scholar

33. Zhang D, Liao X, Yang B, Zhang Y. A fast and efficient approach to color-image encryption based on compressive sensing and fractional Fourier transform. Multimed Tools Appl. (2018) 77:2191–208. doi: 10.1007/s11042-017-4370-1

CrossRef Full Text | Google Scholar

34. Yi J, Tan G. Optical compression and encryption system combining multiple measurement matrices with fractional Fourier transform. Appl Opt. (2015) 54:10650–8. doi: 10.1364/AO.54.010650

PubMed Abstract | CrossRef Full Text | Google Scholar

35. Cariolaro G, Erseghe T, Kraniauskas P, Laurenti N. Multiplicity of fractional Fourier transforms and their relationships. IEEE Transac Signal Process. (2000) 48:227–41. doi: 10.1109/78.815493

CrossRef Full Text | Google Scholar

36. Lang J, Tao R, Wang Y. The discrete multiple-parameter fractional Fourier transform. Science China Inf Sci. (2010) 53:2287–99. doi: 10.1007/s11432-010-4095-5

PubMed Abstract | CrossRef Full Text | Google Scholar

37. Tao R, Meng XY, Wang Y. Transform order division multiplexing. IEEE Transac Signal Process v. (2010) 59:598–609. doi: 10.1109/TSP.2010.2089680

CrossRef Full Text | Google Scholar

38. Kang X, Zhang F, Tao R. Multichannel random discrete fractional Fourier transform. IEEE Signal Process Lett. (2015) 22:1340–4. doi: 10.1109/LSP.2015.2402395

CrossRef Full Text | Google Scholar

39. Joshi AB, Kumar D, Gaffar A, Mishra DC. Triple color image encryption based on 2D multiple parameter fractional discrete Fourier transform and 3D Arnold transform. Opt Lasers Eng. (2020) 133:106139. doi: 10.1016/j.optlaseng.2020.106139

CrossRef Full Text | Google Scholar

40. Pei SC, Hsue WL. The multiple-parameter discrete fractional Fourier transform. IEEE Signal Process Lett. (2006) 13:329–32. doi: 10.1109/LSP.2006.871721

CrossRef Full Text | Google Scholar

41. Ren G, Han J, Zhu H, Fu J, Shan M. High security multiple-image encryption using discrete cosine transform and discrete multiple-parameter fractional fourier transform. J Commun. (2016) 11:491–7. doi: 10.12720/jcm.11.5.491-497

CrossRef Full Text | Google Scholar

42. Tomassini M, Sipper M, Perrenoud M. On the generation of high-quality random numbers by two-dimensional cellular automata. IEEE Transac computers. (2000) 49:1146–51. doi: 10.1109/12.888056

CrossRef Full Text | Google Scholar

43. Sui L, Duan K, Liang J, Zhang Z, Meng H. Asymmetric multiple-image encryption based on coupled logistic maps in fractional Fourier transform domain. Opt Laser Eng. (2014) 62:139–52. doi: 10.1016/j.optlaseng.2014.06.003

CrossRef Full Text | Google Scholar

44. Ran Q, Zhang H, Zhang J, Tan L, Ma J. Deficiencies of the cryptography based on multiple-parameter fractional Fourier transform. Opt Lett. (2009) 34:1729–31. doi: 10.1364/OL.34.001729

PubMed Abstract | CrossRef Full Text | Google Scholar

45. Zhao T, Ran Q, Yuan L, Chi Y, Ma J. Security of image encryption scheme based on multi-parameter fractional Fourier transform. Opt Commun. (2016) 376:47–51. doi: 10.1016/j.optcom.2016.05.016

CrossRef Full Text | Google Scholar

46. Youssef A. On the security of a cryptosystem based on multiple-parameters discrete fractional Fourier transform. IEEE Signal Process Letters. (2008) 15:77–8. doi: 10.1109/LSP.2007.910299

PubMed Abstract | CrossRef Full Text | Google Scholar

47. Wu J, Guo F, Liang Y, Zhou N. Triple color images encryption algorithm based on scrambling and the reality-preserving fractional discrete cosine transform. Optik. (2014) 125:4474–9. doi: 10.1016/j.ijleo.2014.02.026

CrossRef Full Text | Google Scholar

48. Wu J, Zhang M, Zhou N. Image encryption scheme based on random fractional discrete cosine transform and dependent scrambling and diffusion. J Modern Opt. (2017) 64:334–46. doi: 10.1080/09500340.2016.1236990

CrossRef Full Text | Google Scholar

49. Pan SM, Wen RH, Zhou ZH, Zhou NR. Optical multi-image encryption scheme based on discrete cosine transform and nonlinear fractional Mellin transform. Multimed Tools Appl. (2017) 76:2933–53. doi: 10.1007/s11042-015-3209-x

CrossRef Full Text | Google Scholar

50. Faragallah OS. Optical double color image encryption scheme in the Fresnel-based Hartley domain using Arnold transform and chaotic logistic adjusted sine phase masks. Opt Quant Electron. (2018) 50:118. doi: 10.1007/s11082-018-1363-x

CrossRef Full Text | Google Scholar

51. Yadav AK, Singh P, Singh K. Cryptosystem based on devil's vortex Fresnel lens in the fractional Hartley domain. J Opt. (2018) 47:208–19. doi: 10.1007/s12596-017-0435-9

CrossRef Full Text | Google Scholar

52. Kaur G, Agarwal R, Patidar V. Multiple image encryption with fractional hartley transform and robust chaotic mapping. In: 2019 6th International Conference on Signal Processing and Integrated Networks (SPIN). (2019). Piscataway, NJ: IEEE. 399–403. doi: 10.1109/SPIN.2019.8711777

CrossRef Full Text | Google Scholar

53. Kaur G, Agarwal R, Patidar V. Color image encryption system using combination of robust chaos and chaotic order fractional Hartley transformation. J King Saud Univ Comput Inf Sci. (2021) 34:5883–97. doi: 10.1016/j.jksuci.2021.03.007

CrossRef Full Text | Google Scholar

54. Kaur G, Agarwal R, Patidar V. Color image encryption scheme based on fractional Hartley transform and chaotic substitution–permutation. Visual Comput. (2021) 38:1027–50. doi: 10.1007/s00371-021-02066-w

CrossRef Full Text | Google Scholar

55. Wang M, Pousset Y, Carré P, Perrine C, Zhou N, Wu J, et al. Optical image encryption scheme based on apertured fractional Mellin transform. Opt Laser Technol. (2020) 124:106001. doi: 10.1016/j.optlastec.2019.106001

CrossRef Full Text | Google Scholar

56. Zhou N, Wang Y, Gong L. Novel optical image encryption scheme based on fractional Mellin transform. Opt Commun. (2011) 284:3234–42. doi: 10.1016/j.optcom.2011.02.065

CrossRef Full Text | Google Scholar

57. Zhou N, Wang Y, Gong L, Chen X, Yang Y. Novel color image encryption algorithm based on the reality preserving fractional Mellin transform. Opt Laser Technol. (2012) 44:2270–81. doi: 10.1016/j.optlastec.2012.02.027

CrossRef Full Text | Google Scholar

58. Zhou N, Li H, Wang D, Pan S, Zhou Z. Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform. Opt Commun. (2015) 343:10–21. doi: 10.1016/j.optcom.2014.12.084

CrossRef Full Text | Google Scholar

59. Wang M, Pousset Y, Carré P, Perrine C, Zhou N, Wu J, et al. Image encryption scheme based on a Gaussian apertured reality-preserving fractional Mellin transform. Optica Applicata. (2020) 50:477–495. /oa200312 doi: 10.37190/oa200312

CrossRef Full Text | Google Scholar

60. Kang X, Ming A, Tao R. Reality-preserving multiple parameter discrete fractional angular transform and its application to color image encryption. IEEE Transac Circ Syst Video Technol. (2018) 29:1595–607. doi: 10.1109/TCSVT.2018.2851983

CrossRef Full Text | Google Scholar

61. Tong LJ, Zhou NR, Huang ZJ, Xie XW, Liang YR. Nonlinear multi-image encryption scheme with the reality-preserving discrete fractional angular transform and DNA sequences. Secur Commun Netw. (2021) 2021:1–18. doi: 10.1155/2021/6650515

CrossRef Full Text | Google Scholar

62. Yu J, Li Y, Xie X, Zhou N, Zhou Z. Image encryption algorithm by using the logistic map and discrete fractional angular transform. Optica Applicata. (2017) 47. doi: 10.5277/oa17011310.5277/oa170113

CrossRef Full Text | Google Scholar

63. Sui L, Duan K, Liang J. Double-image encryption based on discrete multiple-parameter fractional angular transform and two-coupled logistic maps. Opt Commun. (2016) 343:140–9. doi: 10.1016/j.optcom.2015.01.021

CrossRef Full Text | Google Scholar

64. Sui L, Duan K, Liang J. A secure double-image sharing scheme based on Shamir's three-pass protocol and 2D Sine Logistic modulation map in discrete multiple-parameter fractional angular transform domain. Opt Laser Eng. (2016) 80:52–62. doi: 10.1016/j.optlaseng.2015.12.016

CrossRef Full Text | Google Scholar

65. Vilardy JM, Millán MS, Pérez-Cabré E. Nonlinear image encryption using a fully phase nonzero-order joint transform correlator in the Gyrator domain. Opt Laser Eng. (2017) 89:88–94. doi: 10.1016/j.optlaseng.2016.02.013

CrossRef Full Text | Google Scholar

66. Abuturab M. Securing color information using Arnold transform in gyrator transform domain. Opt Laser Eng. (2012) 50:772–9. doi: 10.1016/j.optlaseng.2011.12.006

CrossRef Full Text | Google Scholar

67. Singh H, Yadav AK, Vashisth S, Singh K. Double phase-image encryption using gyrator transforms, and structured phase mask in the frequency plane. Opt Laser Eng. (2015) 67:145–56. doi: 10.1016/j.optlaseng.2014.10.011

CrossRef Full Text | Google Scholar

68. Singh N, Sinha A. Gyrator transform-based optical image encryption, using chaos. Opt Laser Eng. (2009) 47:539–46. doi: 10.1016/j.optlaseng.2008.10.013

CrossRef Full Text | Google Scholar

69. Abuturab M. Group multiple-image encoding and watermarking using coupled logistic maps and gyrator wavelet transform. JOSA A. (2015) 32:1811–20. doi: 10.1364/JOSAA.32.001811

PubMed Abstract | CrossRef Full Text | Google Scholar

70. Li H, Wang Y, Yan H, Li L, Li Q, Zhao X, et al. Double-image encryption by using chaos-based local pixel scrambling technique and gyrator transform. Opt Laser Eng. (2013) 51:1327–31. doi: 10.1016/j.optlaseng.2013.05.011

CrossRef Full Text | Google Scholar

71. Shao Z, Duan Y, Coatrieux G, Wu J, Meng J, Shu H, et al. Combining double random phase encoding for color image watermarking in quaternion gyrator domain. Opt Commun. (2015) 343:56–65. doi: 10.1016/j.optcom.2015.01.002

CrossRef Full Text | Google Scholar

72. Belazi A, El-Latif AAA, Diaconu AV, Rhouma R, Belghith S. Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms. Opt Laser Eng. (2017) 88:37–50. doi: 10.1016/j.optlaseng.2016.07.010

CrossRef Full Text | Google Scholar

73. Javidi, BE. (2006). Optical and Digital Techniques for Information Security (Vol 1). Berlin, Germany: Springer Science and Business Media.

Google Scholar

74. Unnikrishnan G, Joseph J, Singh K. Optical encryption system that uses phase conjugation in a photorefractive crystal. Appl Opt. (1998) 37:8181–6. doi: 10.1364/AO.37.008181

CrossRef Full Text | Google Scholar

75. Weimann S, Perez-Leija A, Lebugle M, Keil R, Tichy M, Gräfe M, et al. (2016). Implementation of quantum and classical discrete fractional Fourier transforms. Nat Commun. 7, 1–8. doi: 10.1038/ncomms11027

PubMed Abstract | CrossRef Full Text | Google Scholar

76. Javidi B, Nomura T. Securing information by use of digital holography. Opt Lett. (2000) 25:28–30. doi: 10.1364/OL.25.000028

PubMed Abstract | CrossRef Full Text | Google Scholar

77. Tajahuerce E, Javidi B. Encrypting three-dimensional information with digital holography. Appl Opt. (2000) 39:6595–601. doi: 10.1364/AO.39.006595

PubMed Abstract | CrossRef Full Text | Google Scholar

78. Kim M. Principles and techniques of digital holographic microscopy. SPIE Rev. (2010) 1:018005. doi: 10.1117/6.0000006

CrossRef Full Text | Google Scholar

79. Osten, W, Faridian, A, Gao, P, Körner, K, Naik, D, Pedrini, G. (2014). Recent advances in digital holography. Appl Opt. 53. G44–G63. doi: 10.1364/AO.53.000G44

PubMed Abstract | CrossRef Full Text | Google Scholar

80. Shi Y, Li T, Wang Y, Gao Q, Zhang S, Li H, et al. Optical image encryption via ptychography. Opt Lett. (2013) 38:1425–7. doi: 10.1364/OL.38.001425

PubMed Abstract | CrossRef Full Text | Google Scholar

81. Rawat N, Hwang IC, Shi Y, Lee BG. Optical image encryption via photon-counting imaging and compressive sensing based ptychography. J Opt. (2015) 17:065704. doi: 10.1088/2040-8978/17/6/065704

CrossRef Full Text | Google Scholar

82. Gao Q, Wang Y, Li T, Shi Y. Optical encryption of unlimited-size images based on ptychographic scanning digital holography. Appl Opt. (2014) 53:4700–7. doi: 10.1364/AO.53.004700

PubMed Abstract | CrossRef Full Text | Google Scholar

83. Su Y, Xu W, Zhao J. Optical image encryption based on chaotic fingerprint phase mask and pattern-illuminated Fourier ptychography. Opt Laser Eng. (2020) 128:106042. doi: 10.1016/j.optlaseng.2020.106042

CrossRef Full Text | Google Scholar

84. Liu L, Shan M, Zhong Z, Liu B. Multiple-image encryption and authentication based on optical interference by sparsification and space multiplexing. Opt Laser Technol. (2020) 122:105858. doi: 10.1016/j.optlastec.2019.105858

CrossRef Full Text | Google Scholar

85. Clemente P, Durán V, Tajahuerce E, Lancis J. Optical encryption based on computational ghost imaging. Opt Lett. (2010) 35:2391–3. doi: 10.1364/OL.35.002391

PubMed Abstract | CrossRef Full Text | Google Scholar

86. Yi K, Leihong Z, Hualong Y, Mantong Z, Kanwal S, Dawei Z, et al. Camouflaged optical encryption based on compressive ghost imaging. Opt Laser Eng. (2020) 134:106154. doi: 10.1016/j.optlaseng.2020.106154

CrossRef Full Text | Google Scholar

87. Du J, Xiong Y, Quan C. High-efficiency optical image authentication scheme based on ghost imaging and block processing. Opt Commun. (2020) 460:125113. doi: 10.1016/j.optcom.2019.125113

CrossRef Full Text | Google Scholar

88. Chen W, Chen X, Sheppard CJ. Optical image encryption based on diffractive imaging. Opt Lett. (2010) 35:3817–9. doi: 10.1364/OL.35.003817

PubMed Abstract | CrossRef Full Text | Google Scholar

89. Qin Y, Wang Z, Pan Q, Gong Q. Optical color-image encryption in the diffractive-imaging scheme. Opt Laser Eng. (2016) 77:191–202. doi: 10.1016/j.optlaseng.2015.09.002

CrossRef Full Text | Google Scholar

90. He X, Tao H, Zhang L, Yuan X, Liu C, Zhu J, et al. Single-Shot optical multiple-image encryption based on polarization-resolved diffractive imaging. IEEE Photon J. (2019) 11:1–12. doi: 10.1109/JPHOT.2019.2939164

CrossRef Full Text | Google Scholar

91. Hazer A, Yildirim R. Hiding data with simplified diffractive imaging based hybrid method. Opt Laser Technol. (2020) 128:106237. doi: 10.1016/j.optlastec.2020.106237

CrossRef Full Text | Google Scholar

92. Gopinathan U, Naughton TJ, Sheridan JT. Polarization encoding and multiplexing of two-dimensional signals: application to image encryption. Appl Opt. (2006) 45:5693–700. doi: 10.1364/AO.45.005693

PubMed Abstract | CrossRef Full Text | Google Scholar

93. Wang Q, Xiong D, Alfalou A, Brosseau C. Optical image encryption method based on incoherent imaging and polarized light encoding. Opt Commun. (2018) 415:56–63. doi: 10.1016/j.optcom.2018.01.018

CrossRef Full Text | Google Scholar

94. Nomura T, Javidi B. Optical encryption using a joint transform correlator architecture. Opt Eng. (2000) 39:2031–5. doi: 10.1117/1.1304844

CrossRef Full Text | Google Scholar

95. Zhao H, Zhong Z, Fang W, Xie H, Zhang Y, Shan M. Double-image encryption using chaotic maps and nonlinear non-DC joint fractional Fourier transform correlator. Opt Eng. (2016) 55:093109. doi: 10.1117/1.OE.55.9.093109

CrossRef Full Text | Google Scholar

96. Chen W. Optical cryptosystem based on single-pixel encoding using the modified Gerchberg–Saxton algorithm with a cascaded structure. JOSA A. (2016) 33:2305–11. doi: 10.1364/JOSAA.33.002305

PubMed Abstract | CrossRef Full Text | Google Scholar

97. Guo C, Wei C, Tan J, Chen K, Liu S, Wu Q, et al. A review of iterative phase retrieval for measurement and encryption. Opt Laser Eng. (2017) 89:2–12. doi: 10.1016/j.optlaseng.2016.03.021

CrossRef Full Text | Google Scholar

98. Huang H, Yang S, Ye R. Image encryption scheme combining a modified Gerchberg–Saxton algorithm with hyper-chaotic system. Soft Comput. (2019) 23:7045–53. doi: 10.1007/s00500-018-3345-0

CrossRef Full Text | Google Scholar

99. Hennelly B, Sheridan JT. Optical image encryption by random shifting in fractional Fourier domains. Opt Lett. (2003) 28:269–71. doi: 10.1364/OL.28.000269

PubMed Abstract | CrossRef Full Text | Google Scholar

100. Liansheng S, Cong D, Minjie X, Ailing T, Anand A. Information encryption based on the customized data container under the framework of computational ghost imaging. Opt Expr. (2019) 27:16493–506. doi: 10.1364/OE.27.016493

PubMed Abstract | CrossRef Full Text | Google Scholar

101. Moreno I, Ferreira C. 3 Fractional Fourier Transforms and Geometrical Optics. Adv Imag Electr Phys. (2010) 161:89. doi: 10.1016/S1076-5670(10)61003-8

CrossRef Full Text | Google Scholar

102. Chen W, Javidi B, Chen X. Advances in optical security systems. Adv Opt Photon. (2014) 6:120–55. doi: 10.1364/AOP.6.000120

CrossRef Full Text | Google Scholar

103. Javidi B, Carnicer A, Yamaguchi M, Nomura T, Pérez-Cabré E Millán MS, et al. Roadmap on optical security. J Opt. (2016) 18:083001. doi: 10.1088/2040-8978/18/8/083001

CrossRef Full Text | Google Scholar

104. Sejdić E, Djurović I, Stanković L. (2011) Fractional Fourier transform as a signal process. tool: an overview of recent developments. Signal Process. (2011) 91:1351–69. doi: 10.1016/j.sigpro.2010.10.008

CrossRef Full Text | Google Scholar

105. Saxena R, Singh K. Fractional Fourier transform: a novel tool for signal processing. J Indian Inst Sci. (2013) 85:11.

Google Scholar

106. Yang Q, Chen D, Zhao T, Chen Y. Fractional calculus in image processing: a review. Frac Calc Appl Anal. (2016) 19:1222–49. doi: 10.1515/fca-2016-0063

CrossRef Full Text | Google Scholar

107. Guo C, Muniraj I, Sheridan JT. Phase-retrieval-based attacks on linear-canonical-transform-based DRPE systems. Appl Opt. (2016) 55:4720–8. doi: 10.1364/AO.55.004720

PubMed Abstract | CrossRef Full Text | Google Scholar

108. Situ GH, Wang HC. Phase problems in optical imaging. Front Inf Technol Electron Eng. (2017) 18:1277–87. doi: 10.1631/FITEE.1700298

CrossRef Full Text | Google Scholar

109. Kaur M, Kumar V. A comprehensive review on image encryption techniques. Arch Comput Methods Eng. (2020) 27:15–43. doi: 10.1007/s11831-018-9298-8

CrossRef Full Text | Google Scholar

110. Jinming M, Hongxia M, Xinhua S, Chang G, Xuejing K, Ran T, et al. Research progress in theories and applications of the fractional Fourier transform. Opto-Electron Eng. (2018) 45:170747.

Google Scholar

111. Ghadirli HM, Nodehi A, Enayatifar R. An overview of encryption algorithms in color images. Signal Process. (2019) 164:163–85. doi: 10.1016/j.sigpro.2019.06.010

CrossRef Full Text | Google Scholar

112. Jindal N, Singh K. Applicability of fractional transforms in image processing-review, technical challenges and future trends. Multimedia Tools Appl. (2019) 78:10673–700. doi: 10.1007/s11042-018-6594-0

CrossRef Full Text | Google Scholar

113. Gómez-Echavarría A, Ugarte JP, Tobón C. The fractional Fourier transform as a biomedical signal and image processing tool: a review. Biocybern Biomed Eng. (2020) 40:1081–93. doi: 10.1016/j.bbe.2020.05.004

CrossRef Full Text | Google Scholar

114. Abd-El-Atty B, Iliyasu AM, Alanezi A, Abd El-latif AA. Optical image encryption based on quantum walks. Opt Lasers Eng. (2021) 138:106403. doi: 10.1016/j.optlaseng.2020.106403

PubMed Abstract | CrossRef Full Text | Google Scholar

115. Zhou K, Fan J, Fan H, Li M. Secure image encryption scheme using double random-phase encoding and compressed sensing. Opt Laser Technol. (2020) 121:105769. doi: 10.1016/j.optlastec.2019.105769

CrossRef Full Text | Google Scholar

116. Huang ZJ, Cheng S, Gong LH, Zhou NR. Nonlinear optical multi-image encryption scheme with two-dimensional linear canonical transform. Opt Laser Eng. (2020) 124:105821. doi: 10.1016/j.optlaseng.2019.105821

CrossRef Full Text | Google Scholar

117. Huo D, Zhou DF, Yuan S, Yi S, Zhang L, Zhou X, et al. Image encryption using exclusive-OR with DNA complementary rules and double random phase encoding. Phys Lett A. (2019) 383:915–22. doi: 10.1016/j.physleta.2018.12.011

CrossRef Full Text | Google Scholar

118. Gong L, Qiu K, Deng C, Zhou N. An optical image compression and encryption scheme based on compressive sensing and RSA algorithm. Opt Laser Eng. (2019) 121:169–80. doi: 10.1016/j.optlaseng.2019.03.006

CrossRef Full Text | Google Scholar

119. Chen H, Liu Z, Zhu L, Tanougast C, Blondel W. Asymmetric color cryptosystem using chaotic Ushiki map and equal modulus decomposition in fractional Fourier transform domains. Opt Laser Eng. (2019) 112:7–15. doi: 10.1016/j.optlaseng.2018.08.020

CrossRef Full Text | Google Scholar

120. Kumar R, Sheridan JT, Bhaduri B. Nonlinear double image encryption using 2D non-separable linear canonical transform and phase retrieval algorithm. Opt Laser Technol. (2018) 107:353–60. doi: 10.1016/j.optlastec.2018.06.014

CrossRef Full Text | Google Scholar

121. Jiao S, Zou W, Li X. QR code based noise-free optical encryption and decryption of a gray scale image. Opt Commun. (2017) 387:235–40. doi: 10.1016/j.optcom.2016.11.066

CrossRef Full Text | Google Scholar

122. Khurana M, Singh H. An asymmetric image encryption based on phase truncated hybrid transform. 3D Res 8. (2017) 28. doi: 10.1007/s13319-017-0137-8

CrossRef Full Text | Google Scholar

123. Su Y, Tang C, Chen X, Li B, Xu W, Lei Z, et al. Cascaded Fresnel holographic image encryption scheme based on a constrained optimization algorithm and Henon map. Opt Laser Eng. (2017) 88:20–7. doi: 10.1016/j.optlaseng.2016.07.012

CrossRef Full Text | Google Scholar

124. Li X, Li C, Lee IK. Chaotic image encryption using pseudo-random masks and pixel mapping. Signal Process. (2016) 125:48–63. doi: 10.1016/j.sigpro.2015.11.017

CrossRef Full Text | Google Scholar

125. Yuan S, Yao J, Liu X, Zhou X, Li Z. Cryptanalysis and security enhancement of optical cryptography based on computational ghost imaging. Opt Commun. (2016) 365:180–5. doi: 10.1016/j.optcom.2015.12.013

CrossRef Full Text | Google Scholar

126. Li T, Shi Y. Vulnerability of impulse attack-free four random phase mask cryptosystems to chosen-plaintext attack. J Opt. (2016) 18:035702. doi: 10.1088/2040-8978/18/3/035702

CrossRef Full Text | Google Scholar

127. Wang Y, Quan C, Tay CJ. Cryptanalysis of an information encryption in phase space. Opt Laser Eng. (2016) 85:65–71. doi: 10.1016/j.optlaseng.2016.04.024

CrossRef Full Text | Google Scholar

128. Liao M, He W, Lu D, Peng X. Ciphertext-only attack on optical cryptosystem with spatially incoherent illumination: from the view of imaging through scattering medium. Sci Rep. (2017) 7:41789. doi: 10.1038/srep41789

PubMed Abstract | CrossRef Full Text | Google Scholar

129. Hai H, Pan S, Liao M, Lu D, He W, Peng X, et al. Cryptanalysis of random-phase-encoding-based optical cryptosystem via deep learning. Opt Expr. (2019) 27:21204–13. doi: 10.1364/OE.27.021204

PubMed Abstract | CrossRef Full Text | Google Scholar

130. Xiong Y, He A, Quan C. Cryptanalysis of an optical cryptosystem based on phase-truncated Fourier transform and nonlinear operations. Opt Commun. (2018) 428:120–30. doi: 10.1016/j.optcom.2018.07.058

CrossRef Full Text | Google Scholar

131. Dou S, Shen X, Zhou B, Lin C, Huang F, Lin Y, et al. Known-plaintext attack on JTC-based linear cryptosystem. Optik. (2019) 198:163274. doi: 10.1016/j.ijleo.2019.163274

CrossRef Full Text | Google Scholar

132. Chang X, Yan A, Zhang H. Ciphertext-only attack on optical scanning cryptography. Opt Laser Eng. (2020) 126:105901. doi: 10.1016/j.optlaseng.2019.105901

CrossRef Full Text | Google Scholar

133. Jiao S, Gao Y, Lei T, Yuan X. Known-plaintext attack to optical encryption systems with space and polarization encoding. Opt Expr. (2020) 28:8085–97. doi: 10.1364/OE.387505

PubMed Abstract | CrossRef Full Text | Google Scholar

134. Zhou L, Xiao Y, Chen W. Vulnerability to machine learning attacks of optical encryption based on diffractive imaging. Opt Laser Eng. (2020) 125:105858. doi: 10.1016/j.optlaseng.2019.105858

CrossRef Full Text | Google Scholar

135. He W, Pan S, Liao M, Lu D, Xing Q, Peng X, et al. Cryptanalysis of phase-truncated Fourier-transforms-based optical cryptosystem using an untrained neural network. In Advanced Optical Imaging Technologies III, 115491W. Int Soc Opt Photon. (2020) 11549. doi: 10.1117/12.2583396 [Epub ahead of print].

CrossRef Full Text | Google Scholar

136. Song W, Liao X, Weng D, Zheng Y, Liu Y, Wang Y, et al. Cryptanalysis of phase information based on a double random-phase encryption method. Opt Commun. (2021) 497:127172. doi: 10.1016/j.optcom.2021.127172

CrossRef Full Text | Google Scholar

137. Arikan O, Kutay MA, Ozaktas HM, Akdemir OK. The discrete fractional fourier transformation. In: Proceedings of Third International Symposium on Time-Frequency and Time-Scale Analysis (TFTS-96). Paris: IEEE (1996). doi: 10.1109/TFSA.1996.547486

CrossRef Full Text | Google Scholar

138. Belazi A, El-Latif AAA, Belghith S. A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process. (2016) 128:155–170. doi: 10.1016/j.sigpro.2016.03.021

CrossRef Full Text | Google Scholar

139. Venturini I, Duhamel P. Reality preserving fractional transforms [signal processing applications]. In: Acoustics, Speech, and Signal Processing, France (2004).

140. Liang Y, Liu G, Zhou N, Wu J. Color image encryption combining a reality-preserving fractional DCT with chaotic mapping in HSI space. Multimedia Tools Appl. (2016) 75:6605–20. doi: 10.1007/s11042-015-2592-7

CrossRef Full Text | Google Scholar

141. Kang X, Tao R. Color image encryption using pixel scrambling operator and reality-preserving MPFRHT. IEEE Transac Circ Syst Video Technol. (2018) 29:1919–32. doi: 10.1109/TCSVT.2018.2859253

CrossRef Full Text | Google Scholar

142. Alvarez G, Li S. Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifur Chaos. (2006) 16:2129–51. doi: 10.1142/S0218127406015970

CrossRef Full Text | Google Scholar

143. Patidar V, Pareek NK, Purohit G, Sud KK. A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption. Opt Commun. (2011) 284:4331–9. doi: 10.1016/j.optcom.2011.05.028

CrossRef Full Text | Google Scholar

144. Rahman SMM, Hossain MA, Mouftah H, El Saddik A, Okamoto E. Chaos-cryptography based privacy preservation technique for video surveillance. Multimedia systems. (2012) 18:145–55. doi: 10.1007/s00530-011-0246-9

CrossRef Full Text | Google Scholar

145. Fu C, Lin BB, Miao YS, Liu X, Chen JJ. A novel chaos-based bit-level permutation scheme for digital image encryption. Opt Commun. (2011) 284:5415–23. doi: 10.1016/j.optcom.2011.08.013

CrossRef Full Text | Google Scholar

146. Zhang X, Zhao Z, Wang J. Chaotic image encryption based on circular substitution box and key stream buffer. Signal Process Image Commun. (2014) 29:902–13. doi: 10.1016/j.image.2014.06.012

CrossRef Full Text | Google Scholar

147. Sam IS, Devaraj P, Bhuvaneswaran RS. A novel image cipher based on mixed transformed logistic maps. Multimed Tools Appl. (2012) 56:315–30. doi: 10.1007/s11042-010-0652-6

CrossRef Full Text | Google Scholar

148. Parvaz R, Zarebnia M. A combination chaotic system and application in color image encryption. Opt Laser Technol. (2018) 101:30–41. doi: 10.1016/j.optlastec.2017.10.024

CrossRef Full Text | Google Scholar

149. Zhu C. A novel image encryption scheme based on improved hyperchaotic sequences. Opt Commun. (2012) 285:29–37. doi: 10.1016/j.optcom.2011.08.079

CrossRef Full Text | Google Scholar

150. Boriga R, Dăscălescu AC, Priescu I. A new hyperchaotic map and its application in an image encryption scheme. Signal Process Image Commun. (2014) 29:887–901. doi: 10.1016/j.image.2014.04.001

CrossRef Full Text | Google Scholar

151. Li Y, Wang C, Chen H. A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Opt Laser Eng. (2017) 90:238–46. doi: 10.1016/j.optlaseng.2016.10.020

PubMed Abstract | CrossRef Full Text | Google Scholar

152. Zhang Y, Xiao D. Double optical image encryption using discrete Chirikov standard map and chaos-based fractional random transform. Opt Laser Eng. (2013) 51:472–80. doi: 10.1016/j.optlaseng.2012.11.001

CrossRef Full Text | Google Scholar

153. Kang X, Tao R, Zhang F. Multiple-parameter discrete fractional transform and its applications. IEEE Transac Signal Process. (2016) 64:3402–17. doi: 10.1109/TSP.2016.2544740

CrossRef Full Text | Google Scholar

154. Chen J, Zhu ZL, Zhang LB, Zhang Y, Yang BQ. Exploiting self-adaptive permutation–diffusion and DNA random encoding for secure and efficient image encryption. Signal Process. 142. (2018) 340–53. doi: 10.1016/j.sigpro.2017.07.034

CrossRef Full Text | Google Scholar

155. Wu J, Cao X, Liu X, Ma L, Xiong J. Image encryption using the random FrDCT and the chaos-based game of life, J. Modern Opt. (2019) 66:764–75. doi: 10.1080/09500340.2019.1571249

CrossRef Full Text | Google Scholar

156. Jamal SS, Shah T, AlKhaldi AH, Tufail MN. Construction of new substitution boxes using linear fractional transformation and enhanced chaos. Chin J Phys. (2019) 60:564–72. doi: 10.1016/j.cjph.2019.05.038

CrossRef Full Text | Google Scholar

157. Donoho D. Compressed sensing. IEEE Transac Inf Theory. (2006) 52:1289–306. doi: 10.1109/TIT.2006.871582

CrossRef Full Text | Google Scholar

158. Candès E. Compressive sampling. In: Proceedings of the International Congress of Mathematicians. (2006). p. 1433–52. doi: 10.4171/022-3/69

CrossRef Full Text | Google Scholar

159. Gong L, Qiu K, Deng C, Zhou N. An image compression and encryption algorithm based on chaotic system and compressive sensing. Opt Laser Technol. (2019) 115:257–67. doi: 10.1016/j.optlastec.2019.01.039

CrossRef Full Text | Google Scholar

160. Lang J, Zhang J. Optical image cryptosystem using chaotic phase-amplitude masks encoding and least-data-driven decryption by compressive sensing. Opt Commun. (2015) 338:45–53. doi: 10.1016/j.optcom.2014.10.018

CrossRef Full Text | Google Scholar

161. Zhou N, Yang J, Tan C, Pan S, Zhou Z. Double-image encryption scheme combining DWT-based compressive sensing with discrete fractional random transform. Opt Commun. (2015) 354:112–21. doi: 10.1016/j.optcom.2015.05.043

CrossRef Full Text | Google Scholar

162. Deng J, Zhao S, Wang Y, Wang L, Wang H, Sha H, et al. Image compression-encryption scheme combining 2D compressive sensing with discrete fractional random transform. Multimed Tools Appl. (2017) 76:10097–117. doi: 10.1007/s11042-016-3600-2

CrossRef Full Text | Google Scholar

163. Chen XD, Wang Y, Wang J, Wang QH. Asymmetric color cryptosystem based on compressed sensing and equal modulus decomposition in discrete fractional random transform domain. Opt Laser Eng. (2019) 121:143–9. doi: 10.1016/j.optlaseng.2019.04.004

CrossRef Full Text | Google Scholar

164. Ye HS, Dai JY, Wen SX, Gong LH, Zhang WQ. Color image encryption scheme based on quaternion discrete multi-fractional random transform and compressive sensing. Optica Applicata. (2021) 51. doi: 10.37190/oa210304

CrossRef Full Text | Google Scholar

165. Tao R, Meng XY, Wang Y. Image encryption with multiorders of fractional Fourier transforms. IEEE Transac Inf For Secur. (2010) 5:734–8. doi: 10.1109/TIFS.2010.2068289

CrossRef Full Text | Google Scholar

166. Zhong Z, Qin H, Liu L, Zhang Y, Shan M. Silhouette-free image encryption using interference in the multiple-parameter fractional Fourier transform domain. Opt Expr. (2017) 25:6974–82. doi: 10.1364/OE.25.006974

PubMed Abstract | CrossRef Full Text | Google Scholar

167. Watson JD, Crick FH. A structure for deoxyribose nucleic acid. Nature. (1953) 171:737–8. doi: 10.1038/171737a0

PubMed Abstract | CrossRef Full Text | Google Scholar

168. Mills Jr AP, Yurke B, Platzman PM. Article for analog vector algebra computation. Biosystems. (1999) 52:175–80. doi: 10.1016/S0303-2647(99)00044-1

PubMed Abstract | CrossRef Full Text | Google Scholar

169. Wasiewicz P, Mulawka JJ, Rudnicki WR, Lesyng B. Adding numbers with DNA. In: Smc 2000 conference proceedings. IEEE international conference on systems, man and cybernetics.'cybernetics evolving to systems, humans, organization and their complex interactions'(cat. no. 0) (1, 265–270.). Piscataway, NJ: IEEE.

170. Wei R, Li X, Wang QH. Double color image encryption scheme based on off-axis holography and maximum length cellular automata. Optik. (2017) 145:407–17. doi: 10.1016/j.ijleo.2017.07.046

CrossRef Full Text | Google Scholar

171. Li XW, Cho SJ, Kim ST. A 3D image encryption technique using computer-generated integral imaging and cellular automata transform. Optik. (2014) 125:2983–90. doi: 10.1016/j.ijleo.2013.12.036

CrossRef Full Text | Google Scholar

172. Sui L, Lu H, Wang Z, Sun Q. Double-image encryption using discrete fractional random transform and logistic maps. Opt Laser Eng. (2014) 56:1–12. doi: 10.1016/j.optlaseng.2013.12.001

PubMed Abstract | CrossRef Full Text | Google Scholar

173. Yuan L, Ran Q, Zhao T. Image authentication based on double-image encryption and partial phase decryption in nonseparable fractional Fourier domain. Opt Laser Technol. (2017) 88:111–20. doi: 10.1016/j.optlastec.2016.09.004

CrossRef Full Text | Google Scholar

174. Liansheng S, Cong D, Xiao Z, Ailing T, Anand A. Double-image encryption based on interference and logistic map under the framework of double random phase encoding. Opt Laser Eng. (2019) 122:113–1228. doi: 10.1016/j.optlaseng.2019.06.005

CrossRef Full Text | Google Scholar

175. Liu W, Xie Z, Liu Z, Zhang Y, Liu S. Multiple-image encryption based on optical asymmetric key cryptosystem. Opt Commun. (2015) 335:205–11. doi: 10.1016/j.optcom.2014.09.046

PubMed Abstract | CrossRef Full Text | Google Scholar

176. Guleria V, Sabir S, Mishra DC. Security of multiple RGB images by RSA cryptosystem combined with FrDCT and Arnold transform, J. Inf Secur Appl. (2020) 54:102524. doi: 10.1016/j.jisa.2020.102524

CrossRef Full Text | Google Scholar

177. Guo Y, Li BZ. Blind image watermarking method based on linear canonical wavelet transform and QR decomposition. IET Image Process. (2016) 10:773–86. doi: 10.1049/iet-ipr.2015.0818

CrossRef Full Text | Google Scholar

178. Kaur G, Agarwal R, Patidar V. Crypto-watermarking of images for secure transmission over cloud, J. Inf Optim Sci. (2020) 41:205–16. doi: 10.1080/02522667.2020.1714185

CrossRef Full Text | Google Scholar

179. Xiao B, Luo J, Bi X, Li W, Chen B. Fractional discrete Tchebyshev moments and their applications in image encryption and watermarking. Inf Sci. (2020) 516:545–59. doi: 10.1016/j.ins.2019.12.044

CrossRef Full Text | Google Scholar

180. Singh H. Watermarking image encryption using deterministic phase mask and singular value decomposition in fractional Mellin transform domain. IET Image Process. (2018) 12:1994–2001. doi: 10.1049/iet-ipr.2018.5399

CrossRef Full Text | Google Scholar

181. Chen B, Zhou C, Jeon B, Zheng Y, Wang J. Quaternion discrete fractional random transform for color image adaptive watermarking. Multimed Tools Appl. (2018) 77:20809–37. doi: 10.1007/s11042-017-5511-2

CrossRef Full Text | Google Scholar

182. Liu X, Han G, Wu J, Shao Z, Coatrieux G, Shu H, et al. Fractional Krawtchouk transform with an application to image watermarking. IEEE Transac Signal Process. (2017) 65:1894–908. doi: 10.1109/TSP.2017.2652383

CrossRef Full Text | Google Scholar

183. Lian S. Multimedia Content Encryption: Techniques and Applications. (2008). Boca Raton, FL: CRC Press.

184. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP. Image quality assessment: from error visibility to structural similarity. IEEE Transac image process. (2004) 13:600–12. doi: 10.1109/TIP.2003.819861

PubMed Abstract | CrossRef Full Text | Google Scholar

185. Zhang YQ, Wang XY. A symmetric image encryption algorithm based on mixed linear–nonlinear coupled map lattice. Inf Sci. (2014) 273:329–51. doi: 10.1016/j.ins.2014.02.156

CrossRef Full Text | Google Scholar

186. Shannon C. Communication theory of secrecy systems. Bell Syst Tech J. (1949) 228:656–715. doi: 10.1002/j.1538-7305.1949.tb00928.x

PubMed Abstract | CrossRef Full Text | Google Scholar

187. Kwok HS, Tang WK. A fast image encryption system based on chaotic maps with finite precision representation. Chaos Solitons Fractals. (2007) 32:1518–29. doi: 10.1016/j.chaos.2005.11.090

CrossRef Full Text | Google Scholar

188. Wu Y, Zhou Y, Saveriades G, Agaian S, Noonan JP, Natarajan P, et al. Local Shannon entropy measure with statistical tests for image randomness. Inf Sci. (2013) 222:323–42. doi: 10.1016/j.ins.2012.07.049

CrossRef Full Text | Google Scholar

189. Wu Y, Noonan JP, Agaian S. NPCR and UACI randomness tests for image encryption. Cyber J Multidiscip J Sci Technol J Select Areas Telecommun (JSAT). (2011) 1:31–8.

PubMed Abstract | Google Scholar

190. Kaur G, Agarwal R, Patidar V. Chaos based multiple order optical transform for 2D image encryption. Eng Sci Technol Int J. (2020) 23:998–1014. doi: 10.1016/j.jestch.2020.02.007

CrossRef Full Text | Google Scholar

191. Askar SS, Karawia AA, Al-Khedhairi A, Al-Ammar FS. An algorithm of image encryption using logistic and two-dimensional chaotic economic maps. Entropy. (2019) 21:44. doi: 10.3390/e21010044

PubMed Abstract | CrossRef Full Text | Google Scholar

192. Wu Y, Zhou Y, Noonan JP, Agaian S. Design of image cipher using latin squares, Information Sciences. v. (2014) 264:317–39. doi: 10.1016/j.ins.2013.11.027

CrossRef Full Text | Google Scholar

193. Zhang Y, Xiang Y, Zhang LY, Rong Y, Guo S. Secure wireless communications based on compressive sensing: a survey. IEEE Commun Surv Tutorials. (2018) 21:1093–111. doi: 10.1109/COMST.2018.2878943

CrossRef Full Text | Google Scholar

194. Ponnaian D, Chandranbabu K. Crypt analysis of an image compression–encryption algorithm and a modified scheme using compressive sensing. Optik. (2017) 147:263–76. doi: 10.1016/j.ijleo.2017.07.0635

CrossRef Full Text | Google Scholar

195. Yang Z, Yan W, Xiang Y. On the security of compressed sensing-based signal cryptosystem. IEEE Transac Emerg Top Comput. (2014) 3:363–71. doi: 10.1109/TETC.2014.2372151

CrossRef Full Text | Google Scholar

196. Zhou Y, Hua Z, Pun CM, Chen CP. Cascade chaotic system with applications. IEEE Transac Cybern. (2014) 45:2001–12. doi: 10.1109/TCYB.2014.2363168

PubMed Abstract | CrossRef Full Text | Google Scholar

197. Dyson FJ, Falk H. Period of a discrete cat mapping. Am Math Monthly. (1992) 99:603–14. doi: 10.1080/00029890.1992.11995900

CrossRef Full Text | Google Scholar

Keywords: fractional integral transform, image encryption, double random phase encoding, discrete fractional Fourier transform, robust encryption

Citation: Kaur G, Agarwal R and Patidar V (2022) Image encryption using fractional integral transforms: Vulnerabilities, threats, and future scope. Front. Appl. Math. Stat. 8:1039758. doi: 10.3389/fams.2022.1039758

Received: 08 September 2022; Accepted: 04 October 2022;
Published: 28 October 2022.

Edited by:

Jesus Manuel Munoz-Pacheco, Benemérita Universidad Autónoma de Puebla, Mexico

Reviewed by:

Musheer Ahmad, Jamia Millia Islamia, India
Shaobo He, Central South University, China
Omar Abu Arqub, Al-Balqa Applied University, Jordan

Copyright © 2022 Kaur, Agarwal and Patidar. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Vinod Patidar, dmlub2QucGF0aWRhciYjeDAwMDQwO3Nwc3UuYWMuaW4=; cGF0aWRhci52aW5vZCYjeDAwMDQwO2dtYWlsLmNvbQ==

ORCID: Gurpreet Kaur orcid.org/0000-0002-2611-5143
Vinod Patidar orcid.org/0000-0002-1270-3454

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.