† Corresponding author. E-mail:
As a typical technology for optical encryption, phase retrieval algorithms have been widely used in optical information encryption and authentication systems. This paper presents three applications of two-dimensional (2D) phase retrieval for optical encryption and authentication: first, a hierarchical image encryption system, by which multiple images can be hidden into cascaded multiple phase masks; second, a multilevel image authentication system, which combines (t, n) threshold secret sharing (both t and n are positive integers, and
The security issues of information, especially image information have received increasing attention. Besides traditional image information security,[1,2] optical information security also has a lot of room to develop. Different kinds of optical information processing technologies have been put into application to realize more efficient security systems, such as phase retrieval algorithms, double random phase encoding (DRPE) technique,[3–6] digital holography,[7–9] phase-shifting interferometry,[10–12] ghost imaging,[13–19] aperture movement,[20] and sparse-phase multiplexing.[21]
Phase retrieval is a typical technology for optical encryption and authentication, which usually encodes the information of the secret image into one or several pseudo-random phase masks. This technique was first proposed by Wang et al. in 1996.[22] The encryption scheme was based on a 4f system, in which the secret image in the output plane was encoded into a phase mask in the Fourier plane by using a modified projection-onto-constraint-sets (POCS) algorithm, while the other phase mask in the input plane was fixed. Situ and Zhang designed a two-phase-encoding-mask security scheme in 2004. In each iteration of their scheme, the phase distributions of both masks would be adjusted simultaneously,[23] which have improved the speed of iteration. Later, they also extended the iterative algorithm from the 4f system to the Fresnel domain.[24] From then on, many researches on optical encryption based on the phase retrieval algorithm have been carried out in the Fresnel domain. In 2012, a lensless multiple-image optical encryption scheme based on the cascading modified Gerchberg–Saxton (GS) algorithm in the Fresnel domain was proposed by Huang et al.,[25] which increased the encryption capacity while avoiding the crosstalk noise. Chen et al. proposed an information authentication scheme based on cascaded iterative phase retrieval algorithm and sparse representation in 2013, in which the concept of nonlinear correlation was used to identify the decoded image when it cannot be identified through directly visual detection.[26] We have also done some work in this field. We first designed a hierarchical image encryption system based on cascaded iterative phase retrieval algorithm in 2007.[27] During 2013 ∼2017, several multilevel authentication systems were designed in succession, in which the phase retrieval algorithm was combined with the phase multiplexing or secret sharing algorithms, which made the authentication systems have good information encryption characteristic and security.[28–32] We proposed a secret shared multiple image encryption method based on row scanning compressive ghost imaging and phase retrieval in 2017, which increased data encryption efficiency and realized secret key data sharing.[33]
In this paper, we review the phase retrieval algorithms for optical information security. As a typical technology for optical encryption, the excavation of its application prospect has always been a direction of our efforts. To give readers a sense of our meaningful work in this field, three phase retrieval algorithms for optical encryption and authentication are reviewed here: first, a hierarchical image encryption system, by which multiple images can be hidden into cascaded multiple phase masks; second, a multilevel image authentication system which combines (t, n) threshold secret sharing and phase retrieval, and provides both high-level and low-level authentication; and finally, a hierarchical multilevel authentication system combining secret sharing scheme based on basic vector operations and phase retrieval, by which more certification images could be encoded into multiple cascaded phase masks of different hierarchical levels. These three phase retrieval algorithms can effectively show a picture about phase-retrieval-based optical information security. The principles and features of each phase-retrieval-based optical security method are analyzed and discussed. New ideas, such as single-channel color image encryption, have also revitalized these systems.
A schematic diagram of an optical information security system based on the iterative double phase retrieval algorithm in the Fresnel domain is shown in Fig.
The two phase masks ψ1 and ψ2 whose initial phase values are randomly distributed between 0 and 2π are, respectively, placed in the transform plane (x1, y1) and input plane (x2, y2), and the secret image g(x, y) is placed in the output plane (x, y). The distance between the transform and the output plane is z1, and that between the input and the transform plane is z2. We could place a binary or grayscale image f(x, y) in the input plane clinging to the random phase mask ψ2 as input amplitude constraint. When illuminating the input plane with an on-axis plane wave of unit amplitude and wavelength λ, after the kth iteration (k = 1, 2, 3, …) the complex amplitude
Suppose that the distributions of the two phase masks after the k-th iteration are
To evaluate the similarity between the output real amplitude image after the k-th iteration
When the iteration cycle stops, two final phase distributions ψ1 and ψ2, located, respectively, in the transform and input plane, are generated, which can be stored as keys of decryption.
In the process of decryption, suppose that the original input image (if any) and the phase masks after iteration are placed at the correct position. Once the system is illuminated by a plane wave of the correct wavelength, the decrypted image will be available on the output plane.[36]
In recent years, the research of efficient color image encryption is in the ascendant.[39] Phase retrieval algorithms can also realize the encryption of color images. Unlike the traditional RGB three-channel encryption, our suggested single-channel encryption scheme for color images uses color filter array (CFA) in the traditional color-imaging scheme.
Color filter array was invented by Bryce Bayer. As can be seen from Fig.
Here, we introduce the Bayer CFA into our optical encryption scheme based on phase retrieval algorithm. Comparing with gray image, we need to do pre-processing before putting the color image in the output plane (x, y); i.e., to sample the three-channel color image into the single-channel gray mosaic image by the Bayer CFA, and figure
A hierarchical image encryption system based on the cascaded iterative phase retrieval algorithm is presented in this section, which can encrypt the information of different levels into different cascaded phase masks. The use of multiple phase masks makes the convergence rate fast and the construction of hierarchical encryption avoid crosstalk noise. Thus, it can be widely used in hierarchical security authentication.
A schematic diagram of an N-level encryption system by cascaded iterative phase retrieval algorithm is shown in Fig.
Suppose that an on-axis plane wave of unit amplitude and wavelength λ illuminates the encryption system, under the premise of section
When the iteration cycle stops, the resulting phase distribution
Hierarchical image encryption can classify the information according to the security level, thus it can be opened to users of different privilege levels. The 1-level encryption system is suitable for encrypting low level information, which requires only two keys (ψ1 and ψ2). The 2-level encryption system is suitable for encrypting higher level information, which requires four keys (
Taking the 4-level image encryption system for example, the feasibility of the system is verified by computer simulation. Four greyscale images ‘Goldhill’, ‘Peppers’, ‘Lena’, and ‘Couple’ represent 1st–4th level secret images, and they are shown in Figs.
Figure
To verify the feasibility of color image encryption, we replace the 2nd and 3rd level grayscale secret images ‘Peppers’ and ‘Lena’ with RGB images and repeat the simulation. The pre-processing and post-processing steps are added as shown in Section 2. The interpolation algorithm in the post-processing adopts a color demosaicking algorithm using direction similarity in color difference spaces,[39] and the steps of color correction and smoothing are added to obtain more realistic results. The original images and their decrypted images are shown in Fig.
This color image encryption scheme can also be applied to the authentication systems introduced in Sections 4 and 5, because, except for the two steps of pre-processing and post-processing, other processes are exactly the same as grayscale images. To avoid excessive duplication, in the following sections only grayscale images will be used for simulation.
However, it should be noted that the phase retrieval based on the iteration algorithms will theoretically cause slightly information loss. The single-channel encryption scheme for color images we introduced in this paper also sacrifices the amount of information for less computation and storage cost. So this system is not suitable for image encryption scene which pursues the perfect decryption. However, it is very appropriate to apply it to ID card, certificate and other actual authentication systems, which only need a similarity between the decrypted and the original image as a criterion for passing through the systems or not.
Encryption and authentication are two important aspects of modern information security. The role of encryption system is to protect information from illegal intruders, while the role of authentication system is to verify messages.
Widely used in the information security, the (t, n) threshold secret sharing was first proposed by Shamir,[41] by which n participants will share the secret information but no valid information will be available unless at least t (
The fundamental structure of iterative phases generation is the same as that in Section 2, only without the input constraint.
Putting standard certification image g(x, y) in the output plane, when illuminating the input plane with an on-axis plane wave of unit amplitude and wavelength λ, after the k-th iteration (k = 1, 2, 3, …) the complex amplitude
The Lagrange interpolating polynomial is the basis of (t, n) threshold secret sharing algorithm. A polynomial f about x of degree t −1 is usually written as follows:[42–46]
To determine the t unknowns (that is, to find the unique solution), no less than t equations about x are needed. Thinking of each xk and the corresponding value
For a secret sharing scheme, y could be viewed as the secret information, and the n points as n participants who hold their information. To retrieve the secret information, using t points from the n points in G we can solve the equation group and obtain the value of y:
A flow chart of the system designing is depicted in Fig.
(i) Encode the standard certification image g(x,y) into two phase masks ψ1 and ψ2 by the Fresnel domain iterative phase retrieval algorithm. This step is depicted in Fig.
(ii) Store and upload the certification image g(x, y), the geometrical parameters’ keys (distances z1 and z2, wavelength λ), and the phase ψ1 to the authentication center when the iterative cycle stops.
(iii) Select n plaintext images as camouflage images.
(iv) Decompose the phase mask ψ2 in the input plane based on the (t, n) threshold secret sharing algorithm. This step is depicted in Fig.
For this multilevel authentication system, each individual pixel value of ψ2 can be viewed as a separate secret value y in a Lagrange interpolating polynomial f, which is to be divided into n parts. Treating the pixel values at the corresponding positions of the n camouflage images as the unknown variables x1–xn, the n corresponding values f(x1) ∼f(xn) can be calculated from Eq. (
(v) Distribute the n SKC images to n different participants of the authentication system to realize secret sharing, with the corresponding camouflage images used as auxiliary tools.
In an authentication system, the level of authentication generally corresponds to the level of privilege. In this image authentication system, the matching degree between decrypted image and the standard certification image determines the the level of authentication. The CC and NCC are the main criteria for determining the privilege level of authenticators. The flow chart of the authentication process is depicted in Fig.
The principle of (t, n) threshold secret-sharing algorithm described in Subsection 4.1.2 shows that only by gathering at least t (
i) Any t authenticators input their SKC images into the authentication system.
ii) The system recovers phase
iii) With the geometrical keys, the original phase ψ1 and recovered
iv) The authentication center calculates the CC between the reconstructed image g’ and the standard certification image g. Serving as a criterion for determining the success of high-level authentication, if it is higher than a preset threshold, the authentication is successful, otherwise it means a failure.
We have known that it is impossible to pass the high-level authentication without gathering t (
The process of low-level authentication is depicted in Fig.
(I) An authenticator inputs his SKC image into the authentication system.
(II) With the geometrical keys, the original phase ψ1 and the SKC image treated as
(III) Calculate and display the three-dimensional (3D) NCC distribution between g and
Taking (3, 5) threshold secret sharing algorithm for example, the feasibility and performance of the system are verified by computer simulation. The original certification image and the phase distribution (ψ1 and ψ2) generated by phase retrieval algorithm after 200 iterations are, respectively, depicted in Figs.
We first test the high-level authentication. As the criterion of the high-level authentication, the threshold of the CC between the recovered image
We further test the low-level authentication. The parameter ω in NCC is set to be 0.4. A correct SKC image is randomly selected as retrieved phase key
If any SKC images involved in the authentication process are incorrect, then neither the high-level nor low-level authentications will pass, no clear certification will be recovered in the output plane and no remarkable peak will be generated in the NCC distribution either.[29]
But this system is not perfect. Besides the limitations mentioned in Subsection 3.2, the main shortcoming is the large space cost. Every participant in the authentication system needs a camouflage image as an auxiliary tool besides the SKC image held as the key, which means that the authentication center needs a large space to store camouflage image database.
Basic vector operations were first applied to optical encryption by Deng et al. in 2015.[47] The authors designed a (2, n) threshold secret sharing scheme based on basic vector operations and coherence superposition, but only binary images are suitable for their scheme. The system introduced in this section improves Dengʼs method and combines basic vector operations with phase retrieval algorithm, and present a kind of hierarchical multilevel authentication system, so that both binary and grayscale images are suitable for this authentication system (color images are also applicable to the system by using the single-channel encryption scheme introduced in Subsection 2.2), and the same system can provide multiple privileges, each privilege can also provide multiple levels.
The fundamental structure of hierarchical image encryption based on phase retrieval is similar to that in Section 3. But only one phase mask is updated for each level of encryption, except for the 1-level encryption.
As shown in Fig.
Then, in the (k + 1)-th iteration process, the distribution of phase mask
As for the 1-level encryption, phase masks
Then, in the (k + 1)-th iteration process, the distribution of phase masks
Vector
For a secret sharing scheme, the modulus G could be viewed as the secret information. With preselected
When reconstructing the secret information G, at least two pairs of keys are needed. For example, the recovery procedure with
The coefficient
The flow chart of the integrated system designing process is depicted in Fig.
I) Encode the certification images
II) Store and upload the certification images
III) Randomly select
IV) Split phase masks
The strategy of secret sharing in the system is similar to that described in Section 4, each individual pixel value of
V) Distribute the n pairs of SIKs at each level of the system to n different participants to realize secret sharing.
It is worth noting that in this system the distribution of privileges is in order of security level from low to high, This means that authenticators at higher levels of the authentication system will possess all phase keys at lower levels, they can access the information from lower levels if they want, but they cannot pass the high-level authentication at their own level of the system.
The authentication process of this hierarchical multilevel authentication system is similar in principle to that of the system introduced in Section 4. The CC and NCC are also used as the main criteria for determining the privilege level of authenticators. We take the t-level (t = 1, 2,
The principle of the secret sharing algorithm based on basic vector operations mentioned in Subsection 5.1.2 shows that for any level of the system, only by gathering at least two participants with their SIKs will the high-level authentication be passed. The process of high-level authentication is shown in Fig.
1) Any two authenticators input their SIKs into the authentication system.
2) The system recovers phase
3) With the geometrical keys, the original phase
As described above, to recover all the N certification images, the higher level authenticators should possess phase keys of all lower levels of the authentication system. The higher the level of authentication system is, the more keys are required.
4) The authentication center calculate the CC between the reconstructed image
The process of low-level authentication is depicted in Fig.
a) An authenticator inputs his pair of SIK into the authentication system.
b) With the geometrical keys, the original phase
c) Calculate and display the 3D NCC distribution between gt and
Taking the 4-level image encryption system for example, the feasibility and performance of the system are verified by computer simulation. We use the four greyscale images ‘Goldhill’, ‘Peppers’, ‘Lena’ and ‘Couple’ as standard certification images, and they are respectively depicted in Figs.
We first test the high-level authentication. The threshold of the CC between the recovered image and the standard certification image is set to 0.90. We randomly select two pairs of SIKs at each level to retrieve the phase key
We further test the low-level authentication. The parameter ω in NCC is set to be 0.4. Only one pair of SIKs is randomly selected at each level of the authentication systems to retrieve the phase key
If any SIKs involved at each level of the authentication process are incorrect, both the high-level and the low-level authentications will be not passed, that is, no clear certification images will be recovered and no remarkable peaks will be generated in the NCC distributions.[32]
The secret sharing algorithm in this system is different from that in Section 4. Because
We also test the authentication time. The time cost of the high-level authentication of the 1st–4th level system are 0.07 s, 0.08 s, 0.09 s and 0.10 s, respectively. Both theoretical description and simulation results show that with the increase of the level of authentication system, the authentication time increases. The authentication time of the 4th level system already exceeds 0.10 s. Time cost may be a future improvement of the system.
In this paper, we review the phase retrieval algorithms for optical information security, including optical encryption and authentication. Three typical phase retrieval algorithms are presented and discussed, and theoretical principles and application examples are correspondingly demonstrated for each phase-retrieval-based optical information security. The three phase retrieval algorithms reviewed here can effectively show a picture about phase-retrieval-based optical information security. Significant advantages of each phase-retrieval-based optical information security system are analyzed. It is hoped that this review will provide a picture of the current developments of phase retrieval algorithms for optical information security and will also shed light on the future developments of phase retrieval algorithms for optical information security.
[1] | |
[2] | |
[3] | |
[4] | |
[5] | |
[6] | |
[7] | |
[8] | |
[9] | |
[10] | |
[11] | |
[12] | |
[13] | |
[14] | |
[15] | |
[16] | |
[17] | |
[18] | |
[19] | |
[20] | |
[21] | |
[22] | |
[23] | |
[24] | |
[25] | |
[26] | |
[27] | |
[28] | |
[29] | |
[30] | |
[31] | |
[32] | |
[33] | |
[34] | |
[35] | |
[36] | |
[37] | |
[38] | |
[39] | |
[40] | |
[41] | |
[42] | |
[43] | |
[44] | |
[45] | |
[46] | |
[47] | |
[48] | |
[49] | |
[50] |