• Laser & Optoelectronics Progress
  • Vol. 60, Issue 2, 0210015 (2023)
Tianlun Li1, Wenjun Xu2, Yonggang Su1,*, Shuaiqi Liu1, and Jie Zhao1
Author Affiliations
  • 1College of Electronic and Information Engineering, Hebei University, Baoding 071000, Hebei, China
  • 2College of Science, Hebei Agricultural University, Baoding 071001, Hebei, China
  • show less
    DOI: 10.3788/LOP220758 Cite this Article Set citation alerts
    Tianlun Li, Wenjun Xu, Yonggang Su, Shuaiqi Liu, Jie Zhao. Optical Double-Image Encryption Based on Fingerprint Key[J]. Laser & Optoelectronics Progress, 2023, 60(2): 0210015 Copy Citation Text show less
    Schematic of the encryption process
    Fig. 1. Schematic of the encryption process
    Schematic of the decryption process
    Fig. 2. Schematic of the decryption process
    Two original images and their encryption and decryption results. (a) (b) Original images Lena and Peppers; (c) fingerprint; (d) MFRP1; (e) phase key P1; (f) encrypted image; (g) (h) decrypted images Lena and Peppers obtained by correct keys
    Fig. 3. Two original images and their encryption and decryption results. (a) (b) Original images Lena and Peppers; (c) fingerprint; (d) MFRP1; (e) phase key P1; (f) encrypted image; (g) (h) decrypted images Lena and Peppers obtained by correct keys
    Decrypted results of image Lena with incorrect keys. (a) Incorrect fingerprint; (b) decrypted result with the incorrect fingerprint; (c)-(f) decrypted results with the incorrect parameters of the chaotic map a0'=1.75+10-15, b0'=0.33+10-15, x0'=0.34+10-15, y0'=10-15; (g)-(h) decrypted results with the incorrect parameter of the Gyrator transform α1'=0.5+10-2, α2'=0.6+9×10-3; (i) decrypted result with the incorrect phase key P1
    Fig. 4. Decrypted results of image Lena with incorrect keys. (a) Incorrect fingerprint; (b) decrypted result with the incorrect fingerprint; (c)-(f) decrypted results with the incorrect parameters of the chaotic map a0'=1.75+10-15, b0'=0.33+10-15, x0'=0.34+10-15, y0'=10-15; (g)-(h) decrypted results with the incorrect parameter of the Gyrator transform α1'=0.5+10-2, α2'=0.6+9×10-3; (i) decrypted result with the incorrect phase key P1
    Decrypted results of image Peppers with incorrect keys. (a) Incorrect fingerprint; (b) decrypted result with the incorrect fingerprint; (c)-(f) decrypted results with the incorrect parameters of the chaotic map a0'=1.75+10-15, b0'=0.33+10-15, x0'=0.34+10-15, y0'=10-15; (g)-(h) decrypted results with the incorrect parameter of the Gyrator transform α1'=0.5+10-2, α2'=0.6+9×10-3; (i) decrypted result with the incorrect phase key P2
    Fig. 5. Decrypted results of image Peppers with incorrect keys. (a) Incorrect fingerprint; (b) decrypted result with the incorrect fingerprint; (c)-(f) decrypted results with the incorrect parameters of the chaotic map a0'=1.75+10-15, b0'=0.33+10-15, x0'=0.34+10-15, y0'=10-15; (g)-(h) decrypted results with the incorrect parameter of the Gyrator transform α1'=0.5+10-2, α2'=0.6+9×10-3; (i) decrypted result with the incorrect phase key P2
    Histograms of the original image and encrypted image. (a) Original image Lena; (b) histogram of Lena; (c) original image Peppers; (d) histogram of Peppers; (e) encrypted image; (f) histogram of the encrypted image
    Fig. 6. Histograms of the original image and encrypted image. (a) Original image Lena; (b) histogram of Lena; (c) original image Peppers; (d) histogram of Peppers; (e) encrypted image; (f) histogram of the encrypted image
    Encrypted images with different occlusion sizes. (a)-(d) Occlusion size is 12.5%, 25%, 37.5%, 50% respectively
    Fig. 7. Encrypted images with different occlusion sizes. (a)-(d) Occlusion size is 12.5%, 25%, 37.5%, 50% respectively
    PSNR and CC curves of decrypted images versus different occlusion sizes. (a) Lena; (b) Peppers
    Fig. 8. PSNR and CC curves of decrypted images versus different occlusion sizes. (a) Lena; (b) Peppers
    PSNR and CC curves of decrypted images versus different intensity of Gaussian noise. (a) Lena; (b) Peppers
    Fig. 9. PSNR and CC curves of decrypted images versus different intensity of Gaussian noise. (a) Lena; (b) Peppers
    MethodLenaPeppersCameramanEinsteinElaineFiore
    Method in Ref.[3411.439110.824610.278111.76498.742813.5697
    Method in Ref.[289.48848.58788.07319.82626.856212.7532
    Proposed method8.15797.01876.40638.04925.796511.5553
    Table 1. PSNR of ciphertext images and original images
    MethodLenaPeppersCameramanEinsteinElaineFiore
    Method in Ref.[340.95680.95720.96850.96920.95340.9596
    Method in Ref.[280.98210.98530.99670.99820.99860.9979
    Proposed method0.99870.99790.99940.99910.99830.9979
    Table 2. SSIM of original images and decrypted images
    DirectionOriginal imageEncrypted image
    LenaPeppersMethod in Ref.[34Method in Ref.[28Proposed method
    Level0.97280.94480.03880.0307-0.0270
    Vertical0.93890.95270.0164-0.00740.0044
    Diagonal0.91380.89670.03650.00490.0013
    Table 3. Correlation coefficients of adjacent pixels in original and encrypted images
    Tianlun Li, Wenjun Xu, Yonggang Su, Shuaiqi Liu, Jie Zhao. Optical Double-Image Encryption Based on Fingerprint Key[J]. Laser & Optoelectronics Progress, 2023, 60(2): 0210015
    Download Citation