Advances in Microelectronic Engineering (AIME) Volume 1 Issue 4, October 2013
www.seipub.org/aime
Robust Image Encryption Using Discrete
Fractional Fourier Transform with Eigen
Vector Decomposition Algorithm
Deepak Sharma* 1 , Rajiv Saxena 2 , Ashutosh Rajput 3
^Department of Electronics and Communication, Jay pee University of Engineering and Technology, Guna (M.P.)
Postcode - 473226, India
department of Electronics and Communication, Modern Institute of Technology and Research Centre, Alwar,
Postcode - 301028, India
Meepakforu23@rediffmail.com; 2 rajiv.saxena@juet.ac.in
Abstract
Numerous methods have been recently proposed in the
literature for the encryption of 2-D information using optical
systems based on the Fractional Fourier Transform.
Encryption is one of the well known techniques to provide
security in transmission of multimedia contents over the
internet and wireless networks. There is a vast use of image
in all areas so its security is of great concern nowadays.
Discrete Fractional Fourier Transform (DFRFT) generalization
of the Discrete Fourier transform (DFT) with an additional
parameter is incorporated in image encryption to achieve a
more robust encryption system. To focus on security aspect,
in this paper a novel method of image encryption has been
proposed based on discrete Fractional Fourier Transform
(DFRFT), using exponential random phase mask. Encryption
with this technique makes it almost impossible to retrieve an
image without using both the correct keys. The technique
has been implemented experimentally and parameters like
security, sensitivity and mean square error (MSE) are
discussed.
Keywords
Fourier Transform (FT); Discrete Fourier Transform (DFT);
Fractionl Fourier Transform (FRFT); Discrete Fractional Fourier
Transform (DFRFT).
Introduction
Fourier transform was first introduced by the French
scientist Jean Baptiste Joseph Fourier, in 1807 [17].
After that FT was applied in all the fields of science
and engineering. Fractional Fourier Transform was
introduced as the generalization of Fourier Transform,
thus creating a scope of improvement where Fourier
transform was applied along with time varying signal
analysis. It has been applied to various areas like
signal processing, optics and quantum mechanics. The
discrete fractional Fourier transform (DFRFT) is a
generalization of the DFT with additional free
parameters defined by Pei and Ozaktas. Pei and Yeh
defined the DFRFT based on the eigen decomposition
of the DFT matrix, and a DFRFT with one fractional
parameter was defined by taking fractional eigen
value powers of an eigen decomposition of the DFT
matrix. The DFT eigenvectors used are Hermit
Gaussian type. These eigenvectors are computed from
a DFT commuting matrix proposed by B. W.
Dickinson and K. Steiglitz. Pei et al. first proposed the
eigen decomposition- based definition of the DFRFT,
and then Candan et al. consolidated this definition .
In recent years, there has been great concern over
information security. Various optical encryption
methods have been proposed by researchers in the
past two decades. More robust encryption schemes are
always required to protect data. Which can be fulfilled
by proposing a more robust transform and applying
this transform in a model to achieve more
unauthorized user protected scheme for encryption.
In proposed encryption scheme, Discrete FRFT was
utilized with the double random phase encoding to
enhance its data security for input grayscale image. An
image was encrypted using DFRFT with double
random phase matrix and an image decrypted by
using same key utilized for encryption. In proposed
scheme, two keys are utilized to encrypt an image
which enhances the robustness and security of the
system. The security key is highly sensitivity to
deviation of correct keys and it has also been
investigated in simulated results.
The outline of this paper is as follows: In section II we
discuss the FRFT and DFRFT briefly. In section III we
discuss the proposed DFRFT based image encryption
model with double random phase matrix. In section IV
the security, sensitivity and MSE of for an image have
77
www. seipub .or g/ aime
Advances in Microelectronic Engineering (AIME) Volume 1 Issue 4, October 2013
been investigated. In section V the results are
summarized.
Preliminaries
Fourier transform is the rotation of a signal by an
angle of n/2 in time frequency plane. The fractional
Fourier transform removes the constraint of Fourier
transform and allows rotation of angle 'a' where it is a
multiple of n/2. The FRFT of signal x(t) of order 'p' can
be represented as,
X p (u) = jx(t)K p (u,t)dt.
(1)
There is a relation between the angle of rotation 'a'
and order given as a = prc/2. The kernel K P is defined as,
K p (u,t) =
1- /'cot a . J 2 + u 2
exp(y cot ot — jut esc ot) a^nn
In
S(t-u)
S(t + u)
a = Inn
a = (2n± n)
(2)
As the development goes on in the field of digital
signal processing, there is a need for discrete fractional
Fourier transform for all applications using fractional
Fourier transform because all the signals processed in
discrete form. DFRFT is the generalization of the
discrete Fourier transform (DFT) with an additional
parameter. Some basic properties of DFRFT are
1) Unitary
2) Additive
3) Reduction to DFT when order is equal to unity.
The MxM DFT matrix can be expressed as,
1 —y^-km
X=^=e M for K>0,m<M -1
VM ' (3)
Matrix X has only four distinct Eigen values 1,-1, j and
-j. Now a MxM matrix Z is defined whose entries are
Z m ,m = 2 COS
2/T
-n
Z = Z
m,m+l m+l,m
V M J0<n<M-l
= l 0<n<M-2
(4)
7 - 7 - 1
^M-1,0 ^0,M-1 1
Now as ZX=XZ, i.e. they commute with each other,
and have same value of eigen vector but different
eigen values. Now MxM DFRFT matrix can be defined
as,
X a =VD a V T
M-l
-j-ka
2> J ^v k v!
k=0
for M = odd
v k v[ + e ' 2 v M v T M for M = even
Here D is the diagonal matrix and T is the transpose.
The matrix V is defined as,
V = [v ,v p v M _ 2 ,v M _J for M = odd
V = [v ,v v v M _ 2 ,v M ] for M=even (g)
This is known as eigen decomposition form of DFRFT.
Proposed Model for Encryption and
Decryption
Encryption
Encryption, a very ancient technique, is a process in
which information is secured with the help of a key to
protect it from an unauthorized person. The
information which has to be encrypted can be in the
form of a text or an image etc. Encrypted information
should not give any idea about the original
information. In the proposed method, image
encryption of gray scale image is done using double
random discrete fractional Fourier transform. In Gray
scale image, the value of each pixel carries only
intensity information ranging from to 255. They also
known as black-and-white, are composed exclusively
of shades of gray, varying from black at the weakest
intensity to white at the strongest.
In double random matrix DFRFT method, the input
image is multiplied with the first exponential random
matrix S after that the DFRFT of order 'a! is applied
then, the resulting matrix is multiplied by the second
exponential random matrix C and again DFRFT of
order '|3' is applied to get the encrypted image. The
random matrices at encryption and decryption should
be orthogonal to each other.
Input
Image 'P ;
-A-
Encrypted
Image 'E ;
Random
Random
matrix- S
matrix- C
FIG. 1 IMAGE ENCRYPTION MODEL
Exponential random matrix S and C should be
independent of each other. The value of of S and C are.
S = e m , C
= e iPm
78
Advances in Microelectronic Engineering (AIME) Volume 1 Issue 4, October 2013
www.seipub.org/aime
Now let us understand the mathematics of the
proposed encryption process.
W' = P®e j<pn
(7)
where P is input image matrix multiplied by S, the
random matrix
(8)
W = X a (P®e Jgm )
DFRFT of order a is applied.
W m = (X a (Pxe im ))xe m (9)
Then it is multiplied by random matrix C.
E = X /] ((X a (Pxe jgm ))xe iPm ) (1Q)
Then DFRFT of order [3 is applied to get the encrypted
Image E.
Decryption Model
It is the process of retrieving the original information
from the encrypted form as well as reverse process of
the encryption part. Input is an encrypted image in
decrption model. Input image 'E' is taken then DFRFT
of order '-|3' is applied then to it, and random matrix
C* is multiplied which cancel out the effect of random
matrix C as they both are orthogonal to each other. To
the resulting matrix DFRFT of order '-a! is applied
then multiplied by the random matrix S* to get the
decrypted image.
Encrypted
Image E
DFRFT
Order 'f
-A
DFRFT
Order V
Random
Matrix C*
ft i Decrypted
li Image D
Random
Matrix S*
FIG. 2 IMAGE DECRYPTION MODEL
The Decryption model mathematically given as,
E' = X~ P (E)
= X- p (X p (X a (P®e j(pn )®e jPm ))
(11)
Then it is multiplied by the random matrix C* as it will
cancel out the effect of C as they are orthogonal.
E" = (X - p (X p ((X a (P ® )) <S> e iPm ))) <S> e~ j/im
Now, DFRFT of order -a is applied
E m = X~ a ((X - p (X 13 ((X a (P <g> e iv " )) ® e iPm ))) ® e~ iPm
(12)
(13)
Then random matrix S*, is multiplied
D = (X~ a ((X - p (X p ((X a (P®e j(pn )) <8> e jPm ))) ® e~ IPm )) ® e~ j<pn ^
Where D is the decrypted image and after solving it
gives original image T' as output.
Salient Features
Security
Security is the main aim. The key here is formed, by
the combination of the order of discrete fractional
Fourier transform and the random phase matrix. In
encryption model various possible combination
provides formidable key sets, thus providing higher
amount of security. This is also effective against brute
force attack i.e. if all the set of key are known. In this
case as the key set is large and the time taken is very
large in brute force attack thus making it impractical to
crack the correct key.
Sensitivity
The model of encryption and decryption should be
highly sensitive with respect to the variation of correct
key i..e. if the any key other than the correct key is
used, it will not decrypt the correct input image, result
with our simulation. It has been checked that our
image is much sensitive to the deviation in the original
key.
Complexity
If complexity of system increases it usually also
improves the security of system. There is a tradeoff
between the complexity and the security of a system
required. It is also analyzed based on the property of
the utilized discrete fractional Fourier transform
(DFRFT) that the encryption scheme can be realized by
the fast Fourier transform (FFT)-based algorithm. In
proposed algorithm encryption and the decryption
procedures are both realized by the matrix
multiplications. For an image with a size of A*B, the
complexity of the encryption and the decryption is
about equal to A 2 B + B 2 A complex multiplications.
Results
In this paper, an image has successfully encrypted and
decrypted using DFRFT with double random phase
matrix. Simulation of the proposed method has been
done on a grayscale image of Lena of dimension 300 x
300. The image was encrypted for the selected orders a
= 0.8, [3 = 1.2 by using two exponential random
matrices S and C which are independent to each other.
As it can be seen that fig. 3 (a) is the original image
and after encryption an encrypted image is obtained
as shown in the fig 3(b). In decryption process we have
to apply the order a = -0.8 and [3 = -1.2 to get the
79
www. seipub .or g/ aime
Advances in Microelectronic Engineering (AIME) Volume 1 Issue 4, October 2013
correct decrypted image observed in the figure 3(c)
and if the proper value of the order is not used then it
will not give the correct result as observed in fig 3(d).
Here the orders are a = 0.9, [3 = 1.1. The image can be
decrypted only by using the correct order.
FIG. 3(A) ORIGINAL IMAGE FIG. 3(B) ENCRYPTED IMAGE
FIG. 3(C) DECRYPTED IMAGE (CORRECT KEY)
FIG. 3(D) DECRYPTED IMAGE (WRONG KEY)
FIG.3 IMAGE ENCRYPTION USING DOUBLE RANDOM MATRIX
DFRFT METHOD (A) ORIGINAL IMAGE (B) ENCRYPTED IMAGE
FOR A = 0.8, B = 1.2. (C) DECRYPTED IMAGE WITH CORRECT
PARAMETER A =- 0.8, B = -1.2 (D) DECRYPTED IMAGE WITH
WRONG PARAMETER A=0.9,B=1.1.
As the result shows that encrypted image doesn't give
any idea about the original image and image can be
decrypted only by the use of correct key as shown in
Fig. 3(c) and if correct, it is not used, original image
cannot be retrieved as shown in fig. 3(b). Thus, the
proposed method encrypts and decrypts image
properly. Histogram of the image plots frequency of
each pixel value, and summarizes the intensity of an
image.
FIG. 4(A) HISTOGRAM OF ORIGINAL IMAGE
7000 -
6000 -
5000
^ 4000
ZD
o
o
3000
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
FIG. 4(B) HISTOGRAM OF AN ENCRYPTED IMAGE
FIG. 4 HISTOGRAM OF AN ORIGINAL AND ENCRYPTED
IMAGE
In fig 4. (a) and 4.(b), the histogram of an original
image and the encrypted image of Lena are shown. As
it can be seen that the histogram of the encrypted
image is completely different from that of original
image so it does not give any idea to unauthorized
person to carry on the attack.
MSE (mean square error) is calculated between the
original image and decrypted image given by,
MSE =
Where M and N indicate the size of the image while
P(m,n) and W indicate the original and decrypted
image of pixel (m,n) respectively.
TABLE-l MSE OF DEFFERENT IMAGES
IMAGE
MEAN SQUARE ERROR (MSE)
Min
Max
Aug
Lena
2.6754 x 10-13
4.3435 x 10-13
3.2457 x 10-13
Camera man
3.4593 x 10-13
5.7725 x 10-13
4.3491 x 10-13
Spine MRI
3.5514 x 10-13
4.7220 x 10-13
4.0645 x 10-13
MSE of different images are calculated to check the
consistency of the proposed technique. The size of
images can be different and tested for various size of
images with same scheme. The results are obtaind
over 201 iterations for each image to get the result as
shown in the table-1. The proposed scheme is quite
consistent with different images for encryption
/decryption verified with the results shown in table-1.
In fig. 5 the sensitivity of key is shown, and image will
be correctly decrypted only by the use of original key,
if there is small deviation from the original key then it
will show a sharp increase in the normalized MSE.
Comparison between the sensitivity of FRFT and
DFRFT is done. DFRFT is more sensitive to the
80
Advances in Microelectronic Engineering (AIME) Volume 1 Issue 4, October 2013
www.seipub.org/aime
deviation in the correct key. So proposed scheme is
highly sensitive with respect to their original key.
Small deviation from original key provides large error
and wrong detection of the image.
-0.06 -0.04 -0.02 0.02 0.04 0.06
Deviation
FIG.5 NORMALIZED MSE BETWEEN THE DECRYPTED IMAGE
AND ORIGINAL IMAGE AS A FUNCTION OF DEVIATION IN
THE FRACTIONAL ORDER USED FOR DECRYPTION FOR
DFRFT AND FRFT
Conclusions
In this paper, a novel method has been proposed for
image encryption using discrete fractional Fourier
transform with double random matrix. The DFRFT
used here is eigen vector decomposition type. The
minimum MSE achieved here is 2.6754 x 10 13 for Lena
image. The decryption is highly sensitive towards the
original key as shown in fig. 5 compared to the FRFT
based scheme. The system is more sensitive to the
correct key if the key deviate by more than .01 value
with their original key, MSE increases and original
image cannot be decrypted. The complexity of the
system increases with DFRFT comparatively using
FRFT in the same system. The histogram also verifies
our results that the encrypted image has almost
uniform distribution of data so original image cannot
be decoded successfully. The DFRFT based image
encryption schemes is better and more sensitive but
produces more complexity than FRFT based
encryption scheme.
ACKNOWLEDGMENT
The authors thankfully acknowledge all the authorities
of Jaypee University of Engineering & Technology,
Guna (M.P.) - 473226, INDIA.
REFERENCES
B. Hennelly, Sheridan JT: Optical image encryption by
random shifting in fractional Fourier domains. Opt. Lett.
28 (2003) :269-71.
B. Javidi, A. Sergent, G. Zhang, and L. Guibert, "Fault
tolerance properties of a double phase encoding
encryption technique/ Opt. Eng. 36, 1997:992-98.
B. M. Hennelly and J. T. Sheridan, "Image encryption based
on the fractional Fourier transform, " Proc. SPIE, vol. 5202,
2003: 76-87.
B. W. Dickinson and K. Steiglitz, "Eigenvectors and
functions of the discrete Fourier transform," IEEE Trans.
Acoust., Speech, Signal Process., vol. ASSP-30, Jan.
1982:25-31.
B. Zhu , Liu S, Ran Q: Optical image encryption based on
multifr actional Fourier transforms. Opt. Lett. 25 (2000):
1159-61.
C. Candan, M. A. Kutay, and H. M. Ozaktas, "The discrete
fractional Fourier transform," IEEE Trans. Signal Process.,
vol. 48, no. 5, May 2000:1329-37.
G Unnikrishnan, J. Joseph, and K. Singh, "Optical
encryption by double random phase encoding in the
fractional Fourier domain," Opt. Lett., vol. 25, no. 12,
2000: 887-89.
G Unnikrishnan and K. Singh, "Double random fractional
Fourier-domain encoding for optical security," Opt. Eng.,
vol. 39, 2000:2853-59.
G Unnikrishnan and K. Singh, "Optical encryption using
quadratic phase systems," Opt. Commun. 193, 2001:51-67.
H. Al-Qaheri, A. Mustafi, and S. Banerjee, "Digital
watermarking using ant colony optimization in fractional
Fourier domain," J. Inf. Hiding Multimedia Signal
Process., vol. 1, no. 3, Jul. 2010:179-89.
H. M. Ozaktas, Z. Zalevsky, and M. A. Kutay, The Fractional
Fourier Transform with Applications in Optics and
Signal Processing. New York: Wiley, 2000.
L. B. Almeida, "The fractional Fourier transform and time-
frequency representations," IEEE Trans. Signal Process.,
vol. 42, no. 11, Nov. 1994:3084-91.
L. J. Yan and J. S. Pan, "Generalized discrete fractional
Hadamard transformation and its application on the
image encryption," in Proc. Int. Conf. Intelligent
Information Hiding and Multimedia Signal Processing,
2007:457-60.
N. Towghi, B. Javidi, and Z. Luo, "Fully phase encrypted
image processor," J. Opt. Soc. Am. A 16, 1915 (1999).
81
www. seipub .or g/ aime
Advances in Microelectronic Engineering (AIME) Volume 1 Issue 4, October 2013
O. Matoba and B. Javidi, "Encrypted optical memory system
using three-dimensional keys in the Fresnel domain, "
Opt. Lett. 24, 1999: 762-64.
P. Refregier and B. Javidi, "Optical image encryption based
on input plane and Fourier plane random encoding, "
Opt. Lett. 20, 1995:767-69.
R. Tao, B. Deng, and Y. Wang, "Research progress of the
fractional Fourier transform in signal processing,"
Springer, vol. 49, Jan 2006: 1-25.
R. Tao, X. M. Li, and Y.Wang, "Generalization of the
fractional Hilbert transform," IEEE Signal Process. Lett.,
vol. 15, 2008:365-68.
R. Tao, Y. Xin, and Y. Wang, "Double image encryption
based on random phase encoding in the fractional
Fourier domain," Opt. Express, vol. 15, no. 24,
2007:16067-69.
S. C. Pei and M. H. Yeh, "Improved discrete fractional
Fourier transform," Opt. Lett., vol. 22, 1997:1047-49.
S. C. Pei and W.L.Hsue, "Random discrete fractional Fourier
transform," IEEE Signal Process. Lett., vol. 16, no. 12, Dec
2009:1015-18.
S. C. Pei and W. L. Hsue, "The multiple-parameter discrete
fractional Fourier transform," IEEE Signal Process. Lette.,
vol. 13, no. 6, Jun. 2006:329-32.
V. Namias, "The fractional order Fourier transform and its
application to quantum mechanics," J. Inst. Math. Appl.,
vol. 25, 1980:241-65.
Rajiv Saxena Dr. Saxena, born at Gwalior
in Madhya Pradesh in 1961, obtained B.E.
(Electronics & Telecommunication
Engineering) in the year 1982 from
Jabalpur University, Jabalpur.
Subsequently, Dr. Saxena joined the
Reliance Industries, Ahmedabad, as
Graduate Trainee. In 1984, Dr. Saxena joined Madhav
Institute of Technology & Science, Gwalior as Lecturer in
Electronics Engineering. He obtained his M.E. (Digital
Techniques & Data Processing) from Jiwaji University,
Gwalior in 1990. The Ph. D. degree was conferred on him in
1996-97 in Electronics & Computer Engineering from IIT,
Roorkee (erstwhile UOR, Roorkee). Currently Dr. Saxena is
head and professor in ECE department at JUET, Guna.
Deepak Sharma completed his M. Tech.
(Microwave Engineering) from Madhav
Institute of Technology and Science in
2006. Before joining JUET, he worked as a
Lecturer in Electronics Department,
MITS, Gwalior (M.P). His Research areas
include Antenna Theory, Radar System,
Signal processing and Integral Transforms .
82