CFP last date
20 August 2024
Call for Paper
September Edition
IJCA solicits high quality original research papers for the upcoming September edition of the journal. The last date of research paper submission is 20 August 2024

Submit your paper
Know more
Reseach Article

Optical Color Images Encryption based on Double Random Phase Encoding

by M. A. Mohamed, A. S. Samrah, M. I. Fath Allah
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 149 - Number 5
Year of Publication: 2016
Authors: M. A. Mohamed, A. S. Samrah, M. I. Fath Allah

M. A. Mohamed, A. S. Samrah, M. I. Fath Allah . Optical Color Images Encryption based on Double Random Phase Encoding. International Journal of Computer Applications. 149, 5 ( Sep 2016), 6-15. DOI=10.5120/ijca2016911397

@article{ 10.5120/ijca2016911397,
author = { M. A. Mohamed, A. S. Samrah, M. I. Fath Allah },
title = { Optical Color Images Encryption based on Double Random Phase Encoding },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2016 },
volume = { 149 },
number = { 5 },
month = { Sep },
year = { 2016 },
issn = { 0975-8887 },
pages = { 6-15 },
numpages = {9},
url = { },
doi = { 10.5120/ijca2016911397 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-06T23:53:53.362447+05:30
%A M. A. Mohamed
%A A. S. Samrah
%A M. I. Fath Allah
%T Optical Color Images Encryption based on Double Random Phase Encoding
%J International Journal of Computer Applications
%@ 0975-8887
%V 149
%N 5
%P 6-15
%D 2016
%I Foundation of Computer Science (FCS), NY, USA

Extensive studies have been carried out to develop strong encryption techniques that have played a vital role in communications and multimedia transmission. The main requirement of any encryption techniques is to get high robustness. One of the most common techniques for optical encryption is Double Random Phase Encoding (DRPE), but it was found that it suffers from weak performance against attacks especially with color images. In this paper, we will introduce three techniques, traditional, modified, and proposed one for optical encryption of colored images with various extensions and different sizes based on DRPE. As a result of the extensive comparative study, it was found that the Discrete Wavelet Transform (DWT) based DRPE provides the best experimental results from the point of view of differential attacks and statistical attacks.

  1. A. Alfalou and C. Brosseau, "Optical Image Compression and Encryption Methods," Adv. Opt. Photon, Vol.1, hal-00516980, pp: 589-636, 2010.
  2. M. A. Mohamed, A.S. Samarah, and M.I. Fath Allah, "Optical Encryption Techniques: An Overview," International Journal for Computer Science Issues (IJCSI), Vol. 11, Issue 4, No. 2, pp: 125-129, 2014.
  3. F. Mosso and M. Tebaldi, "All-Optical Encrypted Movie," Optical Society of America, Vol. 19, No. 6, pp: 5706-5712, 2011.
  4. N. K. Neshchal and T. J. Naughton, "Flexible Optical Encryption with Multiple Users and Multiple Security Levels," ELSEVIER, Optics Communication 284, pp:735-739, 2011.
  5. A. Carnicer, M. Montes-Usategui, S. Arcos, I. Juvells, Opt. Lett. 30 (2005) 1644.
  6. G. Situ, G. Pedrini, W. Osten, Appl. Opt. 49 (2010) 457.
  7. Y. Liu, J. Lin, J. Fan, and N. Zhou, "Image Encryption Based on Cat Map and Fractional Fourier Transform," Journal of Computational Information Systems 8:18, pp: 7485:7492, 2012.
  8. P. R´efr´egier and B. Javidi, "Optical Image Encryption Based on Input Plane and Fourier Plane Random Encoding," Optics. Letters., Vol. 20, pp: 767-769, 1995.
  9. M. V. Kanchana and V. K. Annapurna, "An Enhanced VCS of Image Encryption using SDS Algorithm without Secret Keys," International Journal on Recent and Innovation Trends in Computing and Communication (IJRITCC), Vol. 2, Issue 7, pp: 1794-1798, 2014.
  10. X. Li, C. Li, S. T. Kim, and I. K. Lee, "An Optical Image Encryption Scheme Based on Depth Conversion Integral Imaging and Chaotic Maps," arXiv: 1501. 04167v1 [cs. CR], pp: 1-18, 2015.
  11. Y.-L. Lee and W. H. Tsai, "A New Secure Image Transmission Technique via Secret-Fragment-visible Mosaic Images by Nearly Reversible Color Transformations," IEEE Transactions on Circuits and Systems for Video Technology, Vol. 24, No. 4, pp: 695-703, 2014.
  12. Y. Zhou, K. Panetta, S. Agaian, and C. L. P. Chen, "(n, k, p)-Gray Code for Image Systems," IEEE Transactions on Cybernetics, Vol. 43, No. 2, pp: 515-529, 2013.
  13. C. Li and K.T. Lo, "Optimal Quantitative Cryptanalysis of Permutation-only Multimedia Ciphers Against Plain-text Attacks," Signal Processing, Vol. 91, No. 4, pp: 949-954, 2011.
  14. Z. Shao, H. Shu, J. Wu, and Z. Dong, "Double Color Image Encryption using Iterative Phase Retrieval Algorithm in Quaternion Gyrator Domain," Optics Express, inserm-00951570, Version 1, 2014.
  15. X. L. Wang, H. C. Zhai, Z. L. Li, and Q. Ge, “Double Random-Phase Encryption based on Discrete Quaternion Fourier-Transforms,” Optik 122(20), pp: 1856-1859, 2011.
  16. Z. H. Shao, J. S. Wu, J. L. Coatrieux, G. Coatrieux, and H. Z. Shu, “Quaternion Gyrator Transform and its Application to Color Image Encryption,” in Proceedings of IEEE International Conference on Image Processing (Institute of Electrical and Electronics Engineers, New York, pp: 4579-4582, 2013.
  17. G. H. Situ, and J. J. Zhang, “Multiple-Image Encryption by Wavelength Multiplexing,” Opt. Lett. 30(11), pp: 1306-1308, 2005.
  18. Y. S. Shi, G. H. Situ, and J. J. Zhang, “Multiple-Image Hiding in the Fresnel Domain,” Opt. Lett. 32(13), pp: 1914-1916, 2007.
  19. H. Hwang, H. T. Chang, and W. Lie, “Multiple-image Encryption and Multiplexing using a Modified Gerchberg-Saxton Algorithm and Phase Modulation in Fresnel-Transform Domain,” Opt. Lett. 34(24), pp: 3917-3919, 2009.
  20. H. T. Chang, H. Hwang, and C. Lee, “Position Multiplexing Multiple-image Encryption using Cascaded Phase-only Masks in Fresnel Transform Domain,” Opt. Commun. 284(18), pp: 4146-4151, 2011.
  21. H. T. Chang, H. E. Hwang, C. L. Lee, and M. T. Lee, “Wavelength Multiplexing Multiple-image Encryption using Cascaded Phase-only Masks in The Fresnel Transform Domain,” Appl. Opt. 50(5), pp: 710-716, 2011.
  22. A. Alfalou and A. Mansour, “Double Random Phase Encryption Scheme to Multiplex and Simultaneous Encode Multiple Images,” Appl. Opt. 48(31), pp: 5933-5947, 2009.
  23. X. P. Deng and D. M. Zhao, “Multiple-Image Encryption using Phase Retrieve Algorithm and Intermodulation in Fourier Domain,” Opt. Laser Technol. 44(2), pp: 374-377, 2012.
  24. X. G. Wang and D. M. Zhao, “Fully Phase Multiple-image Encryption Based on Superposition Principle and The Digital Holographic Technique,” Opt. Commun. 285, pp: 4280-4284, 2012.
  25. L. S. Sui, M. T. Xin, and A. L. Tian, “Multiple-image Encryption Based on Phase Mask Multiplexing in Fractional Fourier transform domain,” Opt. Lett. 38(11), PP: 1996-1998, 2013.
  26. D. Z. Kong, X. J. Shen, Q. Z. Xu, W. Xin, and H. Q. Guo, “Multiple-image Encryption Scheme Based on Cascaded Fractional Fourier transform,” Appl. Opt. 52(12), pp: 2619-2625, 2013.
  27. R. Tao, Y. Xin, and Y. Wang, “Double Image Encryption Based on Random Phase Encoding in The Fractional Fourier Domain,” Opt. Express 15(24), pp: 16067-16079, 2007.
  28. Z. J. Liu and S. T. Liu, “Double Image Encryption Based on Iterative Fractional Fourier Transform,” Opt. Commun. 275(2), pp: 324-329, 2007.
  29. Z. J. Liu, J. M. Dai, X. G. Sun, and S. T. Liu, “Triple Image Encryption Scheme in Fractional Fourier Transform Domains,” Opt. Commun. 282(4), pp: 518-522, 2009.
  30. J. H. Wu, X. Z. Luo, and N. R. Zhou, “Four-image Encryption Method Based on Spectrum Truncation, Chaos and the MODFrFT,” Opt. Laser Technol. 45, pp: 571-577, 2013.
  31. M. Joshi, C. Shakher, and K. Singh, “Color Image Encryption and Decryption for Twin Images in Fractional Fourier Domain,” Opt. Commun. 281(23), pp: 5713-5720, 2008.
  32. M. Joshi, C. Shakher, and K. Singh, “Fractional Fourier Transform Based Image Multiplexing and Encryption Technique for Four-color Images using Input Images as Keys,” Opt. Commun. 283(12), pp: 2496-2505, 2010.
  33. Z. J. Liu, Q. Guo, L. Xu, M. A. Ahmad, and S. T. Liu, “Double Image Encryption by Using Iterative Random Binary Encoding in Gyrator Domains,” Opt. Express 18(11), pp: 12033-12043, 2010.
  34. H. J. Li and Y. R. Wang, “Double-image Encryption Based on Iterative Gyrator Transform,” Opt. Commun. 281(23), pp: 5745-5749, 2008.
  35. Q. A. Kester, "Image Encryption based on The RGB Pixel Transposition and Shuffling," I. J. Computer Network and Information Security DOI: 10.5815/ijcnis.2013.07.05, pp: 43-50, 2013.
  36. Z. Liu and H. Chen, "Color image encryption by using Arnold Transform and Color-blend Operation in Discrete Cosine Transform Domains," Optics Communications 284 (2011), pp: 123–128, 2015.
  37. X. Deng and X. Zhu, "A Simple and Practical Color Image Encryption with the Help of QR Code," Optica Applicata, Vol. XLV, No. 4, pp: 513-521, 2015.
  38. M. A. Mohamed, H. M. Abdel-Atty, A. M. Abutaleb, M. G. Abdel-Fattah, and A. S. Samrah, "Hybrid Watermarking Scheme for Copyright Protection Using Chaotic Maps Cryptography," International Journal of Computer Applications (0975 – 8887), Vol. 128, No. 1, pp: 1:14, 2015.
  39. R. C. Gonzalez and R. E.Woods, "Digital Image Processing," Third Edition, 2008.
Index Terms

Computer Science
Information Sciences


Double Random Phase Encoding (DRPE) Fast Fourier Transform (FFT) Discrete Cosine Transform (DCT) Discrete Wavelet Transform (DWT).