Page 171 - 2024-Vol20-Issue2
P. 171
167 | Muttashar & Fyath
encrypted images are susceptible to attacks in practical appli- image encryption scheme based on a novel fusion applica-
cations. tion of CS and DRPE optical transformation technology. The
In 2020, Kumar et al. [14] demonstrated the 2D multiple pa- method not only realizes the compression and encryption of
rameters fractional discrete cosine transform (2D-MPFrDCT) two images into one image but also realizes image authentica-
and the 3D-chaotic logistic map (3D-LCM) to present a new tion.
encryption and decryption method for optical and digital dou- In 2022, Zhang et al. [25] evaluated the use of DL to create a
ble color images. A random phase mask (RPM) produced by single-exposure phase-only optical image encryption and hid-
3D-LCM was multiplied by the second scrambled image. ing (POIEH) technique. The original image and correspond-
In 2021, Man et al. [15] proposed a double grayscale im- ing encrypted hidden interferogram acquired with POIEH
age encryption algorithm based on dynamic adaptive diffu- were used to train an end-to-end designed U-net. Once the
sion, five-dimensional (5D) chaos, and CNN. The algorithm relationship between the encrypted hidden interferogram and
used a two-channel (optical channel/digital channel) encryp- the reconstructed image was learned, only a single-frame
tion method supported by a novel image bit-level split-fusion encrypted hidden interferogram was needed to reconstruct
scheme, which depends on the amount of information it holds. POIEH.
Further, a chaotic sequence was employed as a convolution The main conclusions drawn from this survey as related to
kernel of CNN to generate a plaintext-related chaotic pointer double and multiple image encryption are
to control the scrambling operation of two images. The optical
encryption channel used DRPE scheme. 1)
In 2021, Liao et al. [22] introduced a two-step DL strategy The maximum dimension of the used chaotic system is 5D.
for ciphertext image-only attacks (COA) on a classical DRPE It is expected that going to higher-dimensional chaos will
system. In particular, they built a virtual DRPE system to increase the level of encryption security and open new space
collect the training data. In Addition, the inverse problem keys to support further the quality measures of the encryption
in COA was split into two more specific inverse problems. process.
Two deep neural networks (DNNs) were used after training to
respectively learn the removal of speckle noise in the autocor- 2)
relation domain and the de-correlation operation to retrieve The optical transform (such as Fourier transform (FT), FrFT,
the plaintext image. and GT)-based encryption methods used a double random
In 2021, Ni et al. [23] suggested a multiple image encryption phase encoding approach. It is interesting to investigate these
approach based on CS and DL in the optical gyrator trans- optical transform-based methods using double chaotic (or
form (GT) domains. Various measurements were obtained hybrid chaotic/random) phase-encoding approaches.
after compression of the images using CS, then the pixels of
each measure were scrambled using a chaotic system. The 3)
scrambled measurements were combined into a matrix and The use of DL to enhance double and multiple-image optical
diffused by XOR operation with a chaotic matrix. Later, the inception is limited in the open literature. This issue needs
diffused matrix was encoded with an RPM and an optical further investigation to enhance the optical encryption capa-
gyrator transform to obtain a complex-valued matrix, which bility.
was taken as the ciphertext. This paper aims to design a high-secure optical scheme for
In 2022, Abuturab et al. [17] investigated using CS, chaotic- multiple color image encryption incorporating deep learning
biometric keys, and optical FrFT for multiple-color image techniques for performance enhancement. This aim may be
fusion, compression, and encryption. The original four-color achieved through the following steps
images were split into four sub bands in the proposed cryp-
tosystem. Four sub bands were merged to create a single A.
image separated into R, G, and B channels, where CS com- Proposing a chaotic-based HDOE scheme to make use of
presses each channel. The measurement matrix was a circulant the advantages behind both digital and optical encryption
matrix based on a logistic map’s random sequence. The com- algorithms.
pressed R and G channels produce the first chaotic-biometric
phase mask (CBPM), while the compact B channel produces B.
the second CBPM. The resulting complex image is modulated Using a high-order chaotic system such as a 9D system to
by a second CBPM, then FrFT. The final encrypted image was enhance the security level and robustness of the proposed
a phase- and amplitude-truncated. HDOE algorithm.
In 2022, Zhang et al. [24] proposed a secure double grayscale