1
|
Çiftci E, Sümer E. A novel steganography method for binary and color halftone images. PeerJ Comput Sci 2022; 8:e1062. [PMID: 36091978 PMCID: PMC9455272 DOI: 10.7717/peerj-cs.1062] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/28/2022] [Accepted: 07/18/2022] [Indexed: 06/15/2023]
Abstract
Digital steganography is the science of establishing hidden communication on electronics; the aim is to transmit a secret message to a particular recipient using unsuspicious carriers such as digital images, documents, and audio files with the help of specific hiding methods. This article proposes a novel steganography method that can hide plaintext payloads on digital halftone images. The proposed method distributes the secret message over multiple output copies and scatters parts of the message randomly within each output copy for increased security. A payload extraction algorithm, where plain carrier is not required, is implemented and presented as well. Results gained from conducted objective and subjective tests prove that the proposed steganography method is secure and can hide large payloads.
Collapse
Affiliation(s)
- Efe Çiftci
- Department of Computer Engineering, Çankaya University, Ankara, Turkey
| | - Emre Sümer
- Department of Computer Engineering, Başkent University, Ankara, Turkey
| |
Collapse
|
2
|
Nakano K, Takeda M, Suzuki H, Yamaguchi M. Encrypted imaging based on algebraic implementation of double random phase encoding. APPLIED OPTICS 2014; 53:2956-2963. [PMID: 24922013 DOI: 10.1364/ao.53.002956] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 01/09/2014] [Accepted: 04/04/2014] [Indexed: 06/03/2023]
Abstract
The security of important information captured by sensors and cameras is currently a growing concern as information theft via techniques such as side-channel attacks become increasingly more prevalent. Double random phase encoding (DRPE) is an optical encryption method based on optical Fourier transform that is currently being used to implement secure coherent optical systems. In this paper, we propose a new DRPE implementation for incoherent optical systems based on integral photography that can be applied to "encrypted imaging (EI)" to optically encrypt an image before it is captured by an image sensor. Because the proposed incoherent DRPE is constituted from conventional DRPE by rewriting the optical encryption via discretization and Euler's formula, its security level is the same as that of conventional DRPE. The results of an experiment in which we encrypted a plaintext image optically and then decrypted it numerically demonstrate that our proposed incoherent optical security system is feasible.
Collapse
|
3
|
Chen YY, Wang JH, Lin CC, Hwang HE. Lensless optical data hiding system based on phase encoding algorithm in the Fresnel domain. APPLIED OPTICS 2013; 52:5247-5255. [PMID: 23872773 DOI: 10.1364/ao.52.005247] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 02/20/2013] [Accepted: 05/20/2013] [Indexed: 06/02/2023]
Abstract
A novel and efficient algorithm based on a modified Gerchberg-Saxton algorithm (MGSA) in the Fresnel domain is presented, together with mathematical derivation, and two pure phase-only masks (POMs) are generated. The algorithm's application to data hiding is demonstrated by a simulation procedure, in which a hidden image/logo is encoded into phase forms. A hidden image/logo can be extracted by the proposed high-performance lensless optical data-hiding system. The reconstructed image shows good quality and the errors are close to zero. In addition, the robustness of our data-hiding technique is illustrated by simulation results. The position coordinates of the POMs as well as the wavelength are used as secure keys that can ensure sufficient information security and robustness. The main advantages of this proposed watermarking system are that it uses fewer iterative processes to produce the masks, and the image-hiding scheme is straightforward.
Collapse
Affiliation(s)
- Yen-Yu Chen
- Department of Tourism and Leisure Management, Chung Chou University of Science and Technology, Yuan-lin 510, Taiwan
| | | | | | | |
Collapse
|
4
|
Martinez C, Laulagnet F, Lemonnier O. Gray tone image watermarking with complementary computer generated holography. OPTICS EXPRESS 2013; 21:15438-15451. [PMID: 23842332 DOI: 10.1364/oe.21.015438] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/02/2023]
Abstract
We present herein an original approach for the watermarking of holograms in gray tone images for use in microscopic halftone image archiving. Our concept is based on the principle of complementary holography presented in a previous contribution. The efficiency of the concept is evaluated theoretically and experimentally. We demonstrate the interest of elliptical diffraction patterns as an alternative to the usual rectangular diffraction patterns and confirm the subsidiary role of the hologram amplitude in the hologram recovery process.
Collapse
Affiliation(s)
- Christophe Martinez
- CEA, LETI, MINATEC campus, DOPT, SCOOP, 17 rue des Martyrs, Grenoble, 38054, France.
| | | | | |
Collapse
|
5
|
Nakano K, Takeda M, Suzuki H, Yamaguchi M. Evaluations of phase-only double random phase encoding based on key-space analysis. APPLIED OPTICS 2013; 52:1276-1283. [PMID: 23435000 DOI: 10.1364/ao.52.001276] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/31/2012] [Accepted: 01/24/2013] [Indexed: 06/01/2023]
Abstract
Although initial research shows that double-random phase encoding (DRPE) is vulnerable to known-plaintext attacks that use phase retrieval algorithms, subsequent research has shown that phase-only DRPE, in which the Fourier amplitude component of an image encrypted with classical DRPE remains constant, is resistant to attacks that apply phase retrieval algorithms. Herein, we numerically analyze the key-space of DRPE and investigate the distribution property of decryption keys for classical and phase-only DRPE. We determine the difference in the distribution property of successful decryption keys for these DRPE techniques from the numerical analysis results and then discuss the security offered by them.
Collapse
Affiliation(s)
- Kazuya Nakano
- Global Scientific Information and Computing Center, Tokyo Institute of Technology, Tokyo, Japan.
| | | | | | | |
Collapse
|
6
|
Abstract
In this paper, a double-random phase-encoding technique-based text encryption and hiding method is proposed. First, the secret text is transformed into a 2-dimensional array and the higher bits of the elements in the transformed array are used to store the bit stream of the secret text, while the lower bits are filled with specific values. Then, the transformed array is encoded with double-random phase-encoding technique. Finally, the encoded array is superimposed on an expanded host image to obtain the image embedded with hidden data. The performance of the proposed technique, including the hiding capacity, the recovery accuracy of the secret text, and the quality of the image embedded with hidden data, is tested via analytical modeling and test data stream. Experimental results show that the secret text can be recovered either accurately or almost accurately, while maintaining the quality of the host image embedded with hidden data by properly selecting the method of transforming the secret text into an array and the superimposition coefficient. By using optical information processing techniques, the proposed method has been found to significantly improve the security of text information transmission, while ensuring hiding capacity at a prescribed level.
Collapse
|
7
|
Hwang HE, Chang HT, Lie WN. Lensless optical data embedding system using concealogram and cascaded digital Fresnel hologram. JOURNAL OF THE OPTICAL SOCIETY OF AMERICA. A, OPTICS, IMAGE SCIENCE, AND VISION 2011; 28:1453-1461. [PMID: 21734745 DOI: 10.1364/josaa.28.001453] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/31/2023]
Abstract
A robust lensless optical data embedding system using both the computer-generated concealogram and the digital Fresnel hologram (DFH) is proposed. The concealogram and the DFH are cascaded as the input and filter planes, respectively. When the concealogram is illuminated by a plane wave, the hidden data can be extracted at the output plane without using any lenses. The longitudinal positions of the filter and the output planes, as well as the wavelength, can be used as the secret keys to enhance system security. Furthermore, the robustness of the proposed system against noise and distortion is also demonstrated.
Collapse
Affiliation(s)
- Hone-Ene Hwang
- Department of Electronic Engineering, Chung Chou Institute of Technology, Yuan-lin 510, Taiwan.
| | | | | |
Collapse
|
8
|
Sheng Y, Xin Z, Alam MS, Xi L, Xiao-Feng L. Information hiding based on double random-phase encoding and public-key cryptography. OPTICS EXPRESS 2009; 17:3270-3284. [PMID: 19259163 DOI: 10.1364/oe.17.003270] [Citation(s) in RCA: 6] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/27/2023]
Abstract
A novel information hiding method based on double random-phase encoding (DRPE) and Rivest-Shamir-Adleman (RSA) public-key cryptosystem is proposed. In the proposed technique, the inherent diffusion property of DRPE is cleverly utilized to make up the diffusion insufficiency of RSA public-key cryptography, while the RSA cryptosystem is utilized for simultaneous transmission of the cipher text and the two phase-masks, which is not possible under the DRPE technique. This technique combines the complementary advantages of the DPRE and RSA encryption techniques and brings security and convenience for efficient information transmission. Extensive numerical simulation results are presented to verify the performance of the proposed technique.
Collapse
Affiliation(s)
- Yuan Sheng
- Department of Opto-electronics Science and Technology, Sichuan University, Chengdu 610065, PR China
| | | | | | | | | |
Collapse
|
9
|
Situ G, Gopinathan U, Monaghan DS, Sheridan JT. Cryptanalysis of optical security systems with significant output images. APPLIED OPTICS 2007; 46:5257-62. [PMID: 17676139 DOI: 10.1364/ao.46.005257] [Citation(s) in RCA: 6] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/16/2023]
Abstract
The security of the encryption and verification techniques with significant output images is examined by a known-plaintext attack. We introduce an iterative phase-retrieval algorithm based on multiple intensity measurements to heuristically estimate the phase key in the Fourier domain by several plaintext-cyphertext pairs. We obtain correlation output images with very low error by correlating the estimated key with corresponding random phase masks. Our studies show that the convergence behavior of this algorithm sensitively depends on the starting point. We also demonstrate that this algorithm can be used to attack the double random phase encoding technique.
Collapse
Affiliation(s)
- Guohai Situ
- School of Electrical, Electronic, and Mechanical Engineering, University College Dublin, Belfield, Dublin 4, Ireland.
| | | | | | | |
Collapse
|
10
|
Meng XF, Cai LZ, Yang XL, Shen XX, Dong GY. Information security system by iterative multiple-phase retrieval and pixel random permutation. APPLIED OPTICS 2006; 45:3289-97. [PMID: 16676034 DOI: 10.1364/ao.45.003289] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/09/2023]
Abstract
A novel information security system based on multiple-phase retrieval by an iterative Fresnel-transform algorithm and pixel random permutation (PRP) technique is proposed. In this method a series of phase masks cascaded in free space are employed and the phase distributions of all the masks are adjusted simultaneously in each iteration. It can achieve faster convergence and better quality of the recovered image compared with double-phase encoding and a similar approach in the spatial-frequency domain with the same number of phase masks and can provide a higher degree of freedom in key space with more geometric parameters as supplementary keys. Furthermore, the security level of this method is greatly improved by the introduction of the PRP technique. The feasibility of this method and its robustness against occlusion and additional noise attacks are verified by computer simulations. The performance of this technique for different numbers of phase masks and quantized phase levels is investigated systematically with the correlation coefficient and mean square error as convergence criterions.
Collapse
|
11
|
Meng XF, Cai LZ, He MZ, Dong GY, Shen XX. Cross-talk-free double-image encryption and watermarking with amplitude–phase separate modulations. ACTA ACUST UNITED AC 2005. [DOI: 10.1088/1464-4258/7/11/002] [Citation(s) in RCA: 35] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/11/2022]
|
12
|
Abookasis D, Montal O, Abramson O, Rosen J. Watermarks encrypted in a concealogram and deciphered by a modified joint-transform correlator. APPLIED OPTICS 2005; 44:3019-23. [PMID: 15929293 DOI: 10.1364/ao.44.003019] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/02/2023]
Abstract
We describe an electro-optical method of deciphering a watermark from a recently invented encoded image termed a concealogram. The watermark is revealed as a result of spatial correlation between two concealograms, one containing the watermark and the other containing the deciphering key. The two are placed side by side on the input plane of a modified joint-transform correlator. When the input plane is illuminated by a plane wave, the watermark image is reconstructed on part of the correlator's output plane. The key function deciphers the concealed watermark from the visible picture only when the two specific concealograms are matched. To illustrate the system's performance, both simulation and experimental results are presented.
Collapse
Affiliation(s)
- David Abookasis
- Department of Electrical and Computer Engineering, Ben-Gurion University of the Negev, P.O. Box 653, Beer-Sheva 84105, Israel
| | | | | | | |
Collapse
|
13
|
Kishk S, Javidi B. Watermarking of three-dimensional objects by digital holography. OPTICS LETTERS 2003; 28:167-169. [PMID: 12656320 DOI: 10.1364/ol.28.000167] [Citation(s) in RCA: 14] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/24/2023]
Abstract
We present an optical method for information watermarking of three-dimensional (3D) objects by digital holography. A hidden image is embedded by double phase encoding in a phase-shift digital hologram of the 3D object. We decode the watermarked hologram to reconstruct the hidden image and the 3D object. We use either the entire hologram or a part of it to decode the hidden image. Experiments are presented to illustrate the ability to recover both the 3D object and the decoded hidden image. Digital holograms of the 3D object are obtained by optical experiments. The watermarking process, 3D object reconstruction, and hidden image recovery are performed digitally. To the best of our knowledge, this is the first report of 3D object watermarking by use of a phase encoding technique and digital holography.
Collapse
Affiliation(s)
- Sherif Kishk
- Department of Electrical and Computer Engineering, University of Connecticut, Storrs, Connecticut 06269-2157, USA
| | | |
Collapse
|
14
|
Kishk S, Javidi B. Information hiding technique with double phase encoding. APPLIED OPTICS 2002; 41:5462-5470. [PMID: 12224768 DOI: 10.1364/ao.41.005462] [Citation(s) in RCA: 40] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/23/2023]
Abstract
We propose a technique for information hiding using double phase encoding. The proposed method uses a weighted double phase-encoded hidden image added to a host image referred to as the transmitted image. We develop an analytical presentation for the system performance using the statistical properties of double phase encoding. The peak signal-to-noise-ratio metric is used as a measure for the degradation in the quality of the host image and the recovered hidden image. We test, analytically, the distortion of the hidden image that is due to the host image and the effect of occlusion of the pixels of the transmitted image (that is, the host image containing the hidden image). Moreover, we discuss the effect of using only the real part of the transmitted image to recover the hidden image. Computer simulations are presented to test the system performance against these types of distortion. The simulations illustrate the system ability to recover the hidden image under distortions and the robustness of the hidden image against removal trials.
Collapse
Affiliation(s)
- Sherif Kishk
- Department of Electrical and Computer Engineering, University of Connecticut, Storrs 06269-2157, USA
| | | |
Collapse
|