Laser & Optoelectronics Progress, Volume. 60, Issue 2, 0210015(2023)

Optical Double-Image Encryption Based on Fingerprint Key

Tianlun Li1, Wenjun Xu2, Yonggang Su1、*, Shuaiqi Liu1, and Jie Zhao1
Author Affiliations
  • 1College of Electronic and Information Engineering, Hebei University, Baoding 071000, Hebei, China
  • 2College of Science, Hebei Agricultural University, Baoding 071001, Hebei, China
  • show less
    Figures & Tables(12)
    Schematic of the encryption process
    Schematic of the decryption process
    Two original images and their encryption and decryption results. (a) (b) Original images Lena and Peppers; (c) fingerprint; (d) MFRP1; (e) phase key P1; (f) encrypted image; (g) (h) decrypted images Lena and Peppers obtained by correct keys
    Decrypted results of image Lena with incorrect keys. (a) Incorrect fingerprint; (b) decrypted result with the incorrect fingerprint; (c)-(f) decrypted results with the incorrect parameters of the chaotic map a0'=1.75+10-15, b0'=0.33+10-15, x0'=0.34+10-15, y0'=10-15; (g)-(h) decrypted results with the incorrect parameter of the Gyrator transform α1'=0.5+10-2, α2'=0.6+9×10-3; (i) decrypted result with the incorrect phase key P1
    Decrypted results of image Peppers with incorrect keys. (a) Incorrect fingerprint; (b) decrypted result with the incorrect fingerprint; (c)-(f) decrypted results with the incorrect parameters of the chaotic map a0'=1.75+10-15, b0'=0.33+10-15, x0'=0.34+10-15, y0'=10-15; (g)-(h) decrypted results with the incorrect parameter of the Gyrator transform α1'=0.5+10-2, α2'=0.6+9×10-3; (i) decrypted result with the incorrect phase key P2
    Histograms of the original image and encrypted image. (a) Original image Lena; (b) histogram of Lena; (c) original image Peppers; (d) histogram of Peppers; (e) encrypted image; (f) histogram of the encrypted image
    Encrypted images with different occlusion sizes. (a)-(d) Occlusion size is 12.5%, 25%, 37.5%, 50% respectively
    PSNR and CC curves of decrypted images versus different occlusion sizes. (a) Lena; (b) Peppers
    PSNR and CC curves of decrypted images versus different intensity of Gaussian noise. (a) Lena; (b) Peppers
    • Table 1. PSNR of ciphertext images and original images

      View table

      Table 1. PSNR of ciphertext images and original images

      MethodLenaPeppersCameramanEinsteinElaineFiore
      Method in Ref.[3411.439110.824610.278111.76498.742813.5697
      Method in Ref.[289.48848.58788.07319.82626.856212.7532
      Proposed method8.15797.01876.40638.04925.796511.5553
    • Table 2. SSIM of original images and decrypted images

      View table

      Table 2. SSIM of original images and decrypted images

      MethodLenaPeppersCameramanEinsteinElaineFiore
      Method in Ref.[340.95680.95720.96850.96920.95340.9596
      Method in Ref.[280.98210.98530.99670.99820.99860.9979
      Proposed method0.99870.99790.99940.99910.99830.9979
    • Table 3. Correlation coefficients of adjacent pixels in original and encrypted images

      View table

      Table 3. Correlation coefficients of adjacent pixels in original and encrypted images

      DirectionOriginal imageEncrypted image
      LenaPeppersMethod in Ref.[34Method in Ref.[28Proposed method
      Level0.97280.94480.03880.0307-0.0270
      Vertical0.93890.95270.0164-0.00740.0044
      Diagonal0.91380.89670.03650.00490.0013
    Tools

    Get Citation

    Copy Citation Text

    Tianlun Li, Wenjun Xu, Yonggang Su, Shuaiqi Liu, Jie Zhao. Optical Double-Image Encryption Based on Fingerprint Key[J]. Laser & Optoelectronics Progress, 2023, 60(2): 0210015

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category: Image Processing

    Received: Feb. 17, 2022

    Accepted: Mar. 14, 2022

    Published Online: Jan. 6, 2023

    The Author Email: Yonggang Su (ygsu0726@163.com)

    DOI:10.3788/LOP220758

    Topics