Laser & Optoelectronics Progress, Volume. 60, Issue 10, 1010016(2023)

Multipleimage Polarization Encryption Method Based on Light Field Regulation and Frequency Shifting

Di Zhang1, Nana Yu1, Sixing Xi1、*, Liying Lang2, Xiaolei Wang3, and Huanzhen Zhang1
Author Affiliations
  • 1School of Mathematics and Physics Science and Engineering, Hebei University of Engineering, Handan 056038, Hebei , China
  • 2Advanced Laser Technology Research Center, Hebei University of Technology, Tianjin 300401, China
  • 3Institute of Modern Optics, Nankai University, Tianjin 300350, China
  • show less
    Figures & Tables(14)
    Images to be encrypted. (a) Original image 1; (b) original image 2; (c) original image 3; (d) original image 4
    Schematic of multi-image Fourier transform frequency shifting synthesis
    Multi-image asymmetric encryption system based on full vector light field regulation of 4F system
    Multi-image encryption result
    Decryption result. (a) Decryption image 1; (b) decryption image 2; (c) decryption image 3; (d) decryption image 4
    Decryption result when the decryption key φ1 is perturbed. (a) Decryption result when r=1.75×10-7; (b) decryption result when r=-4.0×10-6
    Decryption result when the decryption key θ is perturbed. (a) Decryption result when p=2.0×10-5; (b) decryption result when p=-2.0×10-5
    Relationship between the average similarity and the change of the perturbation coefficient. (a) Perturbation coefficient r; (b) perturbation coefficient p
    Simulation result of shear resistance and noise immunity. (a) Shear resistance; (b) noise immunity
    Anti-chosen-plaintext attack simulation result. (a) Fake plaintext; (b) decrypted result of Fig.4
    • Table 1. Correlation coefficient of original image and ciphertext image

      View table

      Table 1. Correlation coefficient of original image and ciphertext image

      CorrelationFig.1(a)Fig.1(b)Fig.1(c)Fig.1(d)Encrypted image
      Horizontal correlation0.97350.99290.95950.94880.0013
      Vertical correlation0.99020.98060.96420.96520.0010
      Diagonal correlation0.96790.97710.93410.9365-0.0003
    • Table 2. Plaintext sensitivity analysis

      View table

      Table 2. Plaintext sensitivity analysis

      Any position pixel plus 0.1Swap positions of two pixel values
      NPCRUACINPCRUACI
      0.99460.17330.99450.1709
    • Table 3. Correlation coefficient between the original image and the decrypted image when the decryption key φ1 is slightly disturbed

      View table

      Table 3. Correlation coefficient between the original image and the decrypted image when the decryption key φ1 is slightly disturbed

      Attack typeFig.1(a)Fig.1(b)Fig.1(c)Fig.1(d)
      Gaussian noise0.00330.00150.0008-0.0008
      Salt and pepper noise0.00330.0042-0.0021-0.0054
      Shear0.06700.0892-0.0049-0.0566
      Rotation0.00770.00970.00790.0165
      Motion blur0.03080.02710.0077-0.0207
      Gaussian low pass filtering0.02980.0905-0.00350.0226
    • Table 4. Algorithm comparative analysis

      View table

      Table 4. Algorithm comparative analysis

      MethodCorrelation coefficientNPCRUACITime /s
      HorizontalVerticalDiagonal
      Method in Ref.[36-0.07810.06650.06070.00000.00009.656
      Method in Ref.[37-0.0022-0.00310.00160.99620.33430.7103
      Proposed method0.00130.0010-0.00030.99460.17330.3417
    Tools

    Get Citation

    Copy Citation Text

    Di Zhang, Nana Yu, Sixing Xi, Liying Lang, Xiaolei Wang, Huanzhen Zhang. Multipleimage Polarization Encryption Method Based on Light Field Regulation and Frequency Shifting[J]. Laser & Optoelectronics Progress, 2023, 60(10): 1010016

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category: Image Processing

    Received: Jan. 28, 2022

    Accepted: Mar. 3, 2022

    Published Online: May. 10, 2023

    The Author Email: Sixing Xi (xisixing@126.com)

    DOI:10.3788/LOP220659

    Topics