Page 176 - 2024-Vol20-Issue2
P. 176

172 |                                                                Muttashar & Fyath

Fig. 12. Images corresponding to the generation of the
combined fusion image in the DEsS.

                                                                     Fig. 14. Scrambled image IDEnc.

Fig. 13. XOR operation fusion images with RGB chaotic
image.

B. Optical Encryption Results                                        Fig. 15. Optical encryption results (Lena and Baboon). (a)
The simulation results of the OEsS are displayed in Fig. 15.         scrambled image, (b) cipher image after optical mask1, (c)
The scrambled image (part (a) of this figure) is used as the         cipher image after optical mask2, (d) final cipher image.
input of this OEsS. The cipher images after optical mask1,
after optical mask2, and the final result IEnc are presented in      A. Information Entropy
parts (b) to (d) of this figure, respectively. The output of the     The performance of the proposed HDOE scheme is tested
HDOE scheme describes the final cipher image, which will be          through entropy measures. The entropy for the three-color
applied to the security evaluation tester later in this subsection.  channels of the final optical encrypted color images IEnc are
                                                                     presented in Table I. The values in this table are very close to
C. Decryption Results                                                8, which corresponds to the entropy of an ideal encryption;
The decryption algorithm is processed as done in the encryp-         log2256 = 8.
tion algorithm but in reverse order. The decryption scheme
consists of an optical decryption subscheme (ODsS) followed          B. Histogram Analysis
by a digital decryption subscheme (DDsS). Fig. 16 presents           The histograms of the encrypted images corresponding to
the results related to the final stage of the decryption process,    the images of Lena-baboon, Barbara-airplane, and sailboat-
namely the DDsS. Parts a-d of the figure shows the unscram-          peppers are shown in Fig. 17. It can be seen that the histogram
bled, de-fusion, and decrypted images, respectively.                 of the encrypted image is quite uniform and significantly dis-
                                                                     similar to the histogram of the plaintext image. This prevents
  V. PERFORMANCE EVALUATION METRICS                                  an attacker from learning anything about the plain image from
               FOR THE HDOE SCHEME                                   its encrypted version. Note that the histograms of the de-
                                                                     crypted images match that of the original input images given
A security analysis is provided to evaluate the algorithm’s
performance. The test images used to assess the efficiency
and security level are given in Fig. 10.
   171   172   173   174   175   176   177   178   179   180   181