This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
1. Introduction
With the popularity of mobile devices, the increase of hardware storage space, and the continuous development of computer networks, the unlimited speed and convenience of image transmission through the Internet save a lot of costs [1]. While the network provides convenience to users, it also brings great risks to users. The basic Internet protocol is not a security protocol. When the image information is finally encrypted and transmitted through the network, it can be directly exposed to the entire network [2]. This will provide criminals with a favorable criminal channel to obtain more image information on the network. Therefore, when we use image information communication, we need to strengthen network security protection measures and the research of digital image encryption technology to ensure social stability and national security issues. Most online information involves more personal privacy, such as personal private photos, patient photos, and weapon development. Once used by criminals, it will seriously affect national security [3, 4]. Data encryption technology is of great help to the Internet at this stage. This technology is to encrypt the relevant technologies of the password and then process the password for covert transmission. This is actually the core technical problem of computer security, to provide higher security for the data of the computer network.
Computer-generated hologram (CGH) is a process of simulating recording and manufacturing in a computer based on the principle of optical holography. Compared with optical holography, CGH replaces the field recording of optical holography equipment, simplifies the complexity of the experiment, and can complete the recording of virtual object holograms. It has the characteristics of high repeatability, low noise, and excellent operability, which makes CGH simpler and more flexible than optical holography. Compared with traditional image encryption, CGH image encryption solves the problem of difficult key distribution in traditional image encryption technology. It is more efficient to process images and the encryption performance is improved. With the application of fractional Fourier transform, Fresnel transform, double random phase coding, and other algorithms in image encryption, the efficiency and capacity requirements of image encryption are gradually improved.
Based on the above analysis, we mainly carry out in-depth research on the use of computational holography for image encryption. In the process, this article focuses on the research on encryption algorithms in optical images and implements encryption design through fractional Fourier transform and Arnold transform [5, 6].
2. Methods
2.1. Namias-Type Fractional Fourier Transform
With the application of Fourier, there are new methods and new ideas for image processing. Compared with the traditional Fourier transform method, the fractional Fourier has a wider application of order, which makes the transform order able to be applied to the fractional problem. The study of fractional Fourier makes people enjoy the great achievements that it brings and creates numerous economic and social values. Fractional Fourier has different forms, but the Namias type and Shih type are often used.
The following is the one-dimensional Fourier transform method under the traditional method [7]:
In formula (1), the integration processing operation process demonstrated is the Fourier integral that we are more familiar with daily. The function
After Namias-type fractional Fourier transform, the corresponding function integral form of one-dimensional function [9] is as follows:
In the formula,
It is worth explaining that when
2.2. Shih-Type Fractional Fourier Transform
The whole process mainly revolves around one-dimensional processing, and the related mathematical transformation forms are as follows:
The integrals involved in formula (6) are usually called Fourier integrals. The function
The frequency spectrum of aperiodic functions is a continuous or piecewise continuous function of frequency, not a discrete function. Generally speaking, the inverse Fourier transform is the frequency complex index obtained after a certain weighting process and the components are superimposed to obtain the required original function
After combined with shih-type transformation processing, the corresponding function integral form of one-dimensional function
2.3. Properties of Fractional Fourier Transform
Generally speaking, the two types of fractional Fourier transform methods have the following corresponding characteristics:
(1) Obvious boundary. The fractional Fourier transform is essentially the same as the traditional transform; especially if the order of the fractional Fourier transform is an integer value, it can be easily converted to the traditional Fourier form without any difference
(2) The function shows continuity. This point means that fractional Fourier can perform continuous function transformation in two-dimensional space
(3) Additivity of functional expressions. For the fractional Fourier transform of any order of
(4) Convolution. These two functions satisfy in the fractional convolution
In special cases, Namias-type fractional Fourier transform also has the following properties [9]:
2.4. Optical Realization of Fractional Fourier Transform
Regarding the optical application under the fractional Fourier transform algorithm, related scholars have used the optical properties of the lens a long time ago to achieve fractional Fourier transformation of the image [9]. This idea has been well confirmed and the related principle [10] method is shown in Figure 1 as follows:
[figure(s) omitted; refer to PDF]
The optical path propagation mode shown in Figure 1 is a combination method of a lens, which is also called a single-lens method here. It can be seen that the entire system is divided into two parts: input and output [10, 11]. There is a plane L1 as a single input plane, which is then transferred to the lens L and then transferred from the lens L to the plane L2 and output via L2. The focal length of the lens L here is
According to the meaning of the abovementioned formula, if the focal length
2.5. Scrambling Technique of Arnold Transform
The processing principle of this type of method is to use a certain conversion method to change the different pixel points or gray values in a picture, so as to convert the original image display information content into the content that others cannot understand, thereby realizing the effect that people who want to obtain information cannot really recognize. Under normal circumstances, the transformation process can be marked and the specific description can be seen in formulas (13) and (14), where
In the abovementioned formula, (
When using this method to transform the position of digital image pixels, the main principle is to replace the position of the smallest unit in Figure 1 with formula (14), that is, to transform the position of each smallest unit
The information in the image processed by the algorithm will become blurred, and the image presented is similar to white noise. At this time, the first encryption process of the original image is completed and the secret key can be expressed by the number of iterations performed in the process. In the process of repeatedly performing the conversion operation for a certain number of times, a special situation will occur, that is, the processed image is restored to the original image. It can be seen that the processing in this way has periodicity and the recovery operation of the encrypted digital image can be completed through this characteristic, so that it can complete the decryption in the reverse scrambling.
2.6. Computational Holography
Computer-type holograms need to be calculated according to data and also need to use modern optical principles. However, it can only draw the figure through computer control after the mathematical process of the object wave is processed by a computer without the aid of physical entities. It can also record it to the corresponding device, so as to achieve the drawing effect of the simulated interferogram and copy it to the film. The computer-generated hologram can not only record the amplitude and phase of the light wave relatively comprehensively but also record some complex comprehensive information and the object information that must be recorded in the hologram. Therefore, it has relatively unique advantages and great flexibility.
The flow of the hologram is shown in Figure 2.
[figure(s) omitted; refer to PDF]
2.7. Picture Evaluation Index System
Due to the characteristics of encrypted and decrypted images, specific performance analysis can be done according to the picture evaluation system indicators [15]. The image evaluation system indicators include four major aspects: robustness analysis, adjacent pixel correlation analysis, sensitivity analysis, and others. The specific indicators are as follows (Figure 3):
[figure(s) omitted; refer to PDF]
This chapter mainly introduces the theoretical basis of optical image encryption. Firstly, the concept and properties of Namias-type and Shih-type fractional Fourier transform are introduced and the optical implementation of fractional Fourier transform is analyzed. Then, the concept and principle of the scrambling technique of Arnold transform are expounded. Finally, the concept and characteristics of CGH are summarized and the image evaluation index system is established, which lays a theoretical foundation for the research of optical encryption in this paper.
3. Results and Analysis
3.1. Image Encryption Simulation and Performance Analysis of Arnold Transform
3.1.1. Simulation of Image Encryption Based on Arnold Transform
For Arnold’s optical image encryption algorithm, MATLAB simulation is used to decode with the correct key. Figures 4(a) and 4(f) show the original image and the decrypted image, respectively, and Figures 4(b)–4(e) describe the Arnold transformation image that has undergone once, twice, eight, and fifteen times, respectively.
[figure(s) omitted; refer to PDF]
3.1.2. Performance Analysis of Image Encryption Based on Arnold Transform
Figures 5 and 6 show the histograms of the original image and encrypted image of the Arnold transform encryption algorithm.
[figure(s) omitted; refer to PDF]
As can be seen in Figures 5 and 6, the graphics of the original image and the coded image are completely different, so the Arnold conversion encryption algorithm has a better coding effect [16, 17]. In addition, by comparing the PSNR and CC values of the original image and the decrypted image, the results can be seen in Table 1.
Table 1
Peak signal-to-noise ratio and correlation coefficient of the Arnold transform encrypted image and decrypted image.
Process | Parameter | |
Peak signal-to-noise ratio (PSNR) | Correlation coefficient (CC) | |
Encryption | 9.3214 | −0.0071 |
Decrypt | 25.9574 | 0.8473 |
The calculation results in Table 1 can show that the PSNR of the very low encryption process is very low, indicating that the encryption quality is very high, and the analysis itself can obtain high decryption quality [18].
3.2. Image Encryption Simulation and Performance Analysis Based on Fractional Fourier Transform
3.2.1. Image Encryption Simulation of Fractional Fourier Transform
The principle of the complete encryption algorithm described in this document is based on the Mach-Zed interference structure outside the axis.
In the formula, by multiplying the random phase mask
The cryptographic hologram is recorded by removing the original physical and transformation lens and single-band planar illumination as follows:
For the decryption process, we first perform Fourier transform on the encrypted image, then multiply it by the total of the random phase mask
Formula (19) is a numerical transformation of Fourier, where the first and second terms refer to the enhancement of two conjugate images on different optical axes [20]. The third and fourth items are Fourier transform into a random phase mask to amplify the background noise. The decoded image is a phase image, and it still needs to be converted into an amplitude image.
In order to analyze the performance of the encryption algorithm based on fractional Fourier transform, this paper uses MATLAB software to carry out numerical simulation. According to the algorithm described in the previous section, the original image used in the Fourier-based holographic encryption simulation is selected as Barbara’s grayscale image with a pixel distribution of
[figure(s) omitted; refer to PDF]
By using the holographic optical image encryption algorithm used for Fourier decomposition transformation and the MATLAB simulation technology, we use the correct key to decrypt and the original image and encryption and decryption diagrams are shown in Figures 8–10.
[figure(s) omitted; refer to PDF]
3.2.2. Performance Analysis of Image Encryption Based on Fractional Fourier Transform
In order to have a deeper understanding of the performance of the encryption algorithm, this paper introduces three parameters: histogram, correlation coefficient CC, and peak signal-to-noise ratio PSNR to analyze the encryption performance of optical images. Among them, the peak signal-to-noise ratio (PSNR) is defined as follows:
The histogram of the image can show the gray distribution of the value and spatial frequency of the image. If there is a big difference between the two images, there is a difference between the two images. The smaller the CC and the value, the greater the difference between the two images. Therefore, the above three parameters are mainly used to indicate the similarity of two images. Figures 11 and 12 are the histograms of the original image and encrypted image of the fractional Fourier transform encryption algorithm.
[figure(s) omitted; refer to PDF]
As can be seen in Figures 11 and 12, the graphics of the original image and the encoded image are completely different, so the encryption algorithm of the fractional Fourier transform image is more effective. We compare the PSNR and CC values of the original image and the decrypted image, and the results are shown in Table 2.
Table 2
Peak signal-to-noise ratio and correlation coefficient of Fourier transform encrypted image and decrypted image.
Process | Parameter | |
Peak signal-to-noise ratio (PSNR) | Correlation coefficient (CC) | |
Encryption | 11.3254 | −0.0001 |
Decrypt | 25.5472 | 0.8745 |
From the calculation results in Table 2, it can be shown that the PSNR of the very low encryption process is very low, indicating that the encryption quality is very high. The same analysis may indicate that the decryption quality is very high.
4. Conclusions
In recent years, research on image encryption based on optical information processing technology is becoming more and more favored by researchers. In this regard, this study will focus on the research of encryption algorithms in optical images and realize encryption through fractional Fourier transform and Arnold transform:
(1) The theoretical basis of optical image encryption is introduced, and the scrambling technology of fractional Fourier transform, Arnold transform, computational holography, and picture evaluation system indicators are introduced. First, the concept and properties of the Namias-type and shih-type fractional Fourier transform are introduced and the optical realization of the fractional Fourier transform is analyzed. Then, the concept and principle of the scrambling technique of Arnold transform are explained. Finally, the concept and characteristics of computational holography are summarized and a picture evaluation index system is established at the same time, which lays a theoretical foundation for the optical encryption research in this article
(2) We perform simulation and performance analysis for computational holographic encryption algorithms. First, we use MATLAB software for simulation and performance analysis to compare different algorithms; calculate the histogram, peak signal-to-noise ratio PSNR, and correlation coefficient CC of each image; and analyze the encryption and decryption effects of each algorithm
(3) We improve the encryption algorithm of the computational holographic image based on fractional Fourier. Combined with Arnold transform, we compare the image of the algorithm encryption and decryption process and calculate the histogram, peak signal-to-noise ratio PSNR, and correlation coefficient CC of each image. The result shows that the improved algorithm performs better in the encryption and decryption process
Acknowledgments
The authors would like to show sincere thanks to the techniques that contributed to this research.
[1] J. H. Wang, H. B. Wang, "Computer local area network security and management," Advanced Materials Research, vol. 1079-1080, pp. 595-597, DOI: 10.4028/www.scientific.net/AMR.1079-1080.595, 2014.
[2] R. W. Shirey, "Security requirements for network management data," Computer Standards & Interfaces, vol. 17 no. 4, pp. 321-331, DOI: 10.1016/0920-5489(95)00012-J, 1995.
[3] D. Melas, I. Ziomas, I. Kioutsioukis, "Real time calculation of the dispersion of air pollutants from industrial stacks using a personal computer," Fresenius Environmental Bulletin, vol. 7 no. 3, pp. 134-140, 1998.
[4] A. J. Babatunde, F. A. Ejiga, "Network security management: solutions to network intrusion related problems," Global Journal of Computerence & Technology, vol. 12 no. 6, pp. 239-244, 2014.
[5] O. E. Muogilim, K. K. Loo, R. Comley, "Wireless mesh network security: a traffic engineering management approach," Journal of Network and Computer Applications, vol. 34 no. 2, pp. 478-491, DOI: 10.1016/j.jnca.2010.03.027, 2011.
[6] J. Homer, X. Ou, "Sat-solving approaches to context-aware enterprise network security management," IEEE Journal on Selected Areas in Communications, vol. 27 no. 3, pp. 315-322, DOI: 10.1109/JSAC.2009.090407, 2009.
[7] E. Okamoto, K. Tanaka, "Identity-based information security management system for personal computer networks," IEEE Journal on Selected Areas in Communications, vol. 7 no. 2, pp. 290-294, DOI: 10.1109/49.17700, 1989.
[8] M. Baltatu, A. Lioy, F. Maino, D. Mazzocchi, "Security issues in control, management and routing protocols," Computer Networks, vol. 34 no. 6, pp. 881-894, DOI: 10.1016/S1389-1286(00)00159-6, 2000.
[9] S. Muftic, "Implementation of the comprehensive integrated security system for computer networks," Computer Networks and Isdn Systems, vol. 25 no. 4-5, pp. 469-475, DOI: 10.1016/0169-7552(92)90042-O, 1992.
[10] S. Demir, K. Yetilmezsoy, N. Manav, "Development of a modified Hardy-cross algorithm for time-dependent simulations of water distribution networks," Fresenius Environmental Bulletin, vol. 17 no. 8A, pp. 1045-1053, 2008.
[11] L. Zhao, Y. Zi, "The network security management problem of library," Advanced Materials Research, vol. 760-762, pp. 1241-1243, DOI: 10.4028/www.scientific.net/AMR.760-762.1241, 2013.
[12] A. B. Odunola, A. A. Olawumi, O. E. Ajayi, "An adaptive decision-support model for data communication network security risk management," International Journal of Computer Applications, vol. 106 no. 8,DOI: 10.5120/18537-9752, 2014.
[13] O. N. Ozdemir, E. Ucaner, "Validation of genetic algorithms for the hydraulic calibration of a water supply network," Fresenius Environmental Bulletin, vol. 16 no. 3, pp. 278-284, 2007.
[14] S. Z. Wu, "Based on computer network security in financial informationization construction of colleges and universities," Advanced Materials Research, vol. 989-994, pp. 5415-5418, DOI: 10.4028/www.scientific.net/AMR.989-994.5415, 2014.
[15] X. H. Yang, Y. F. Chen, "A study of vulnerability detection and prevention on computer network security," Applied Mechanics and Materials, vol. 321-324, pp. 2630-2634, DOI: 10.4028/www.scientific.net/AMM.321-324.2630, 2013.
[16] X. Wei, Y. Guo, H. Cheng, X. Meng, M. Cheng, T. Yang, C. Xu, "Rock mass characteristics in beishan, a preselected area for China’s high-level radioactive waste disposal," Acta Geologica Sinica, vol. 93 no. 2, pp. 116-126, DOI: 10.1016/S1389-1286(00)00159-6, 2019.
[17] L. X. Shen, G. Cao, S. Z. Cao, "A hybrid model for evaluation computer network security risk in commercial bank," Advanced Materials Research, vol. 393-395, pp. 531-534, DOI: 10.4028/www.scientific.net/AMR.393-395.531, 2011.
[18] C. Shan, "Misuse detection in large-scale network for network security management systems," Computer Engineering and Applications, vol. 42 no. 6, pp. 136-139, 2006.
[19] J. Dawkins, K. Clark, G. Manes, M. Papa, "A framework for unified network security management: identifying and tracking security threats on converged networks," Journal of Network and Systems Management, vol. 13 no. 3, pp. 253-267, DOI: 10.1007/s10922-005-6292-x, 2005.
[20] S. Basbas, P. Papaioannou, A. Kokkalis, "The role of environment in traffic management studies: need for a new approach," Fresenius Environmental Bulletin, vol. 15 no. 8, pp. 963-974, 2006.
[21] E. Andriani, M. Brattoli, P. Buono, G. D. Gennaro, L. D. Gennaro, A. Mazzone, "A GIS tool for atmospheric emission management in south of Italy," Fresenius Environmental Bulletin., vol. 21 no. 11A, pp. 3325-3329, 2012.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Copyright © 2022 Caiping Sun and Weijiang Wang. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
With the continuous promotion of high and new technologies such as computers and big data, humans enter a new period-information age. Mass data and information can be transmitted and exchanged online through the network. In recent years, research on image encryption based on optical information processing technology is becoming more and more favored by researchers. In this regard, this study will focus on the research of encryption algorithms in optical images and realize encryption through fractional Fourier transform and Arnold transform. This article first introduces the research background of the subject and analyzes the current situation of the subject at home and abroad and then proposes the theoretical guidance basis for the subject research, which covers the fractional Fourier transform, Arnold transform, computational hologram, and picture evaluation index system. Finally, MATLAB simulation and performance analysis are carried out for fractional Fourier transform, Arnold transform, and holographic encryption technology. The results shows that the improved algorithm in this study performs better in the encryption and decryption process.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer