Efficient Compression Schemes for Double Random Phase-encoded Data for Image Authentication

  • Gholami, Samaneh (Department of Computer Engineering, Chosun University) ;
  • Jaferzadeh, Keyvan (Department of Robotics Engineering, DGIST) ;
  • Shin, Seokjoo (Department of Computer Engineering, Chosun University) ;
  • Moon, Inkyu (Department of Robotics Engineering, DGIST)
  • Received : 2019.03.28
  • Accepted : 2019.06.27
  • Published : 2019.10.25


Encrypted images obtained through double random phase-encoding (DRPE) occupy considerable storage space. We propose efficient compression schemes to reduce the size of the encrypted data. In the proposed schemes, two state-of-art compression methods of JPEG and JP2K are applied to the quantized encrypted phase images obtained by combining the DRPE algorithm with the virtual photon counting imaging technique. We compute the nonlinear cross-correlation between the registered reference images and the compressed input images to verify the performance of the compression of double random phase-encoded images. We show quantitatively through experiments that considerable compression of the encrypted image data can be achieved while security and authentication factors are completely preserved.


Optical security and encryption;Double random phase encoding;Image cryptography;Pattern recognition


Supported by : National Research Foundation of Korea (NRF)


  1. P. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995).
  2. I. Moon, F. Yi, Y. H. Lee, and B. Javidi, "Avalanche and bit independence characteristics of double random phase encoding in the Fourier and Fresnel domains," J. Opt. Soc. Am. A 31, 1104-1111 (2014).
  3. R. Tao, Y. Xin, and Y. Wang, "Double image encryption based on random phase encoding in the fractional Fourier domain," Opt. Express 15, 16067-16079 (2007).
  4. Z. Liu, Y. Zhang, S. Li, W. Liu, W. Liu, Y. Wang, and S. Liu, "Double image encryption scheme by using random phase encoding and pixel exchanging in the gyrator transform domains," Opt. Lasers Technol. 47, 152-158 (2013).
  5. G. Unnikrishnan, J. Joseph, and K. Singh, "Optical encryption by double-random phase encoding in the fractional Fourier domain," Opt. Lett. 25, 887-889 (2000).
  6. W. Chen, "Multiple-wavelength double random phase encoding with CCD-plane sparse-phase multiplexing for optical information verification," Appl. Opt. 54, 10711-10716 (2015).
  7. F. Yi, Y. Jeoung, and I. Moon, "Three-dimensional image authentication scheme using sparse phase information in double random phase encoded integral imaging," Appl. Opt. 56, 4381-4387 (2017).
  8. X. Wang, W. Chen, and X. Chen, "Optical information authentication using compressed double-random-phase-encoded images and quick-response codes," Opt. Express 23, 6239- 6253 (2015).
  9. Z. Leihong, Y. Xiao, Z. Dawei, and C. Jian, "Research on multiple-image encryption scheme based on Fourier transform and ghost imaging algorithm," Curr. Opt. Photon. 2, 315-323 (2018).
  10. J. Chen, N. Bao, L. Y. Zhang, and Z. Zhu, "Optical information authentication using optical encryption and sparsity constraint," Opt. Lasers Eng. 107, 352-363 (2018).
  11. Z. Shao, Y. Shang, Q. Tong, H. Ding, X. Zhao, and X. Fu, "Multiple color image encryption and authentication based on phase retrieval and partial decryption in quaternion gyrator domain," Multimed. Tools Appl. 77, 25821-25840 (2018).
  12. G. Luan, A. Li, D. Zhang, and D. Wang, "Asymmetric image encryption and authentication based on equal modulus decomposition in the Fresnel transform domain," IEEE Photon. J. 11, 6900207 (2019).
  13. S. Liu, B. M. Hennelly, C. Guo, and J. T. Sheridan, "Robustness of double random phase encoding spread-space spread-spectrum watermarking technique," Sig. Process. 109, 345-361 (2015).
  14. S. Gholami, K. Jaferzadeh, S. Shin, and I. Moon, "An efficient image-based verification scheme by fusion of double random phase encoding and dynamic chaotic map," Multimed. Tools Appl. 78, 25001-25018 (2019).
  15. A. V. Zea, J. F. Barrera, and R. Torroba, "Cryptographic salting for security enhancement of double random phase encryption schemes," J. Opt. 19, 105703 (2017).
  16. X. Liu, J. Wu, W. He, M. Liao, C. Zhang, and X. Peng, "Vulnerability to ciphertext-only attack of optical encryption scheme based on double random phase encoding," Opt. Express 23, 18955-18968 (2015).
  17. Y. Frauel, A. Castro, T. Naughton, and B. Javidi, "Resistance of the double random phase encryption against various attacks," Opt. Express 15, 10253-10265 (2007).
  18. F. Yi, I. Moon, and Y. H. Lee, "A Multispectral photoncounting double random phase encoding scheme for image authentication," Sensors 14, 8877-8894 (2014).
  19. I. Moon, F. Yi, M. Han, and J. Lee, "Efficient asymmetric image authentication schemes based on photon countingdouble random phase encoding and RSA algorithms," Appl. Opt. 55, 4328-4335 (2016).
  20. E. Perez-Cabre, M. Cho, and B. Javidi, "Information authentication using photon-counting double-random-phase encrypted images," Opt. Lett 36, 22-24 (2011).
  21. E. Perez-Cabre, H. C. Abril, M. S. Millan, and B. Javidi, "Photon-counting double-random-phase encoding for secure image verification and retrieval," J. Opt. 14, 094001 (2012).
  22. F. Yi, Y. Jeoung, and I. Moon, "Three-dimensional image authentication scheme using sparse phase information in double random phase encoded integral imaging," Appl. Opt. 56, 4381-4387 (2017).
  23. S. K. Rajput, D. Kumar, and N. K. Nishchal, "Photon counting imaging and phase mask multiplexing for multiple images authentication and digital hologram security," Appl. Opt. 54, 1657-1666 (2015).
  24. J. Lee, N. Sultana, F. Yi, and I. Moon, "Avalanche and bit independence properties of photon-counting double random phase encoding in gyrator domain," Curr. Opt. Photon. 2, 368-377 (2018).
  25. Y. Wiseman, "The still image lossy compression standard-JPEG," in Encyclopedia of Information Science and Technology, D. B. A. M. Khosrow-Pour, ed. 3rd ed. (IGI Global, PA, 2015).
  26. P. Schelkens, A. Skodras, and T. Ebrahimi, The JPEG 2000 Suite (John Wiley & Sons, NY, 2009).
  27. D. Santa-Cruz, T. Ebrahimi, J. Askelof, M. Larsson, and C. Christopoulos, "JPEG 2000 still image coding versus other standards," Proc. SPIE 4115, 446-454 (2000).
  28. A. N. Skodras, C. A. Christopoulos, and T. Ebrahimi, "JPEG2000: the upcoming still image compression standard," Pattern Recogn. Lett. 22, 1337-1345 (2001).
  29. D. Santa-Cruz, R. Grosbois, and T. Ebrahimi, "JPEG 2000 performance evaluation and assessment," Signal Process. Image Commun. 17, 113-130 (2002).
  30. S. N. Sivanandam, A. Pasumpon, and P. Rani, "Lossy still image compression standards: JPEG and JPEG2000 - a survey," Int. J. Comput., Internet Manage. 17, 69-84 (2009).
  31. A. Skodras, C. Christopoulos, and T. Ebrahimi, "The JPEG 2000 still image compression standard," IEEE Signal Process. Mag. 18, 36-58 (2001).
  32. G. K. Wallace, "The JPEG still picture compression standard," IEEE Trans. Consum. Electron. 38, xviii-xxxiv (1992).
  33. K. Jaferzadeh, S. Gholami, and I. Moon, "Lossless and lossy compression of quantitative phase images of red blood cells obtained by digital holographic imaging," Appl. Opt. 55, 10409-10416 (2016).
  34. P. Li and K. T. Lo, "A content-adaptive joint image compression and encryption scheme," IEEE Trans. Multimedia 20, 1960-1972 (2018).
  35. V. Itier, P. Puteaux, and W. Puech, "Recompression of JPEG crypto-compressed images without a key," IEEE Trans. Circuits Syst. Video Technol. (to be published).