Page 174 - 2024-Vol20-Issue2
P. 174

170 |                                                            Muttashar & Fyath

       Fig. 6. Optical encryption process.

                                                                 Fig. 8. Block diagram for hybrid optical / digital decryption
                                                                 scheme.

Fig. 7. Schematic diagram of the DCPE-based encryption
scheme.

Here, (x, y) and (u, v) represent the image plane and Fourier                   Fig. 9. Architecture of the DnCNN.
plane coordinates, respectively. The second step is to bound
the obtained Fourier spectrum with a statistically indepen-      address the issue that encrypted images are susceptible to
dent CPM2, exp(2p jCPM2), and retrieve the resulting spectrum    some assaults in real applications. The resolution of the re-
once more FT                                                     constructed images is increased by applying CNN, which also
                                                                 increases the algorithm’s security robustness. The structure
E(x, y) = FT [E1(u, v)CPM2 R(u, v)]                              of DnCNN consists of an input image layer with a patch size
                                                                 (50) and four ”convolutional layers + ReLU”; for each one of
       = [E1(u, v)exp(2p jCCPM2 R(u, v))                   (6)   the first three layers, 64 filters (kernels) of size 3x3 are used
                                                                 to generate 64 feature maps. Each layer produces a feature
       exp(-2p j(ux + uv))]dudv                                  map except the fourth layer, which does not have a ReLU but
                                                                 a stride = one and a ”Regression layer.” The zero padding is
where E(x, y) is the field of the final encryption image.        implemented to ensure that the feature map and input image
                                                                 have the same size. In order to distinguish the difference be-
B. Proposed Decryption Scheme                                    tween a noisy and a clean image, the DnCNN is used in our
Decryption is the inverse process of encryption and its aim is   system. Fig. 9 illustrates the architecture of the used DnCNN.
to recover the input images from the encrypted image. Fig. 8
shows a block diagram of the proposed hybrid digital / optical                IV. SIMULATION RESULTS
decryption (HDOD) scheme. The encryption and decryption
keys are identical, and the chaotic sequence generated during    This section presents simulation results for the proposed en-
decryption is consistent with that generated during encryption.  cryption / decryption algorithms described in Section III. The
                                                                 performance is evaluated using conventional encryption qual-
C. Denoising Convolution Neural Network
A quick and efficient denoiser convolution neural network
(DnCNN) based on the DL principle is used in this work to
   169   170   171   172   173   174   175   176   177   178   179