Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Next Article in Journal
Electricity, Heat, and Gas Load Forecasting Based on Deep Multitask Learning in Industrial-Park Integrated Energy System
Next Article in Special Issue
A Hyperspectral Image Classification Approach Based on Feature Fusion and Multi-Layered Gradient Boosting Decision Trees
Previous Article in Journal
Application of Dynamic Fragmentation Methods in Multimedia Databases: A Review
Previous Article in Special Issue
A Chaotic-Based Encryption/Decryption Framework for Secure Multimedia Communications
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Modified Gerchberg–Saxton (G-S) Algorithm and Its Application

Information Science Teaching and Research Section, Northeastern University at Qinhuangdao, Qinhuangdao 066004, China
*
Author to whom correspondence should be addressed.
Entropy 2020, 22(12), 1354; https://doi.org/10.3390/e22121354
Submission received: 30 October 2020 / Revised: 25 November 2020 / Accepted: 28 November 2020 / Published: 30 November 2020

Abstract

:
The Gerchberg–Saxton (G-S) algorithm is a phase retrieval algorithm that is widely used in beam shaping and optical information processing. However, the G-S algorithm has difficulty obtaining the exact solution after iterating, and an approximate solution is often obtained. In this paper, we propose a series of modified G-S algorithms based on the Fresnel transform domain, including the single-phase retrieval (SPR) algorithm, the double-phase retrieval (DPR) algorithm, and the multiple-phase retrieval (MPR) algorithm. The analysis results show that the convergence of the SPR algorithm is better than that of the G-S algorithm, but the exact solution is not obtained. The DPR and MPR algorithms have good convergence and can obtain exact solutions; that is, the information is recovered losslessly. We discuss the security advantages and verification reliability of the proposed algorithms in image encryption. A multiple-image encryption scheme is proposed, in which n plaintexts can be recovered from n ciphertexts, which greatly improves the efficiency of the system. Finally, the proposed algorithms are compared with the current phase retrieval algorithms, and future applications are discussed. We hope that our research can provide new ideas for the application of the G-S algorithm.

1. Introduction

Phase retrieval was first proposed to solve the imaging problem of an electron microscope. Gerchberg and Saxton addressed the issue of the wavefront phase of the light field via numerical iteration using the intensity of the image plane and the diffraction plane [1,2]. Since the successful solution of this problem, phase retrieval has aroused significant research interest and has been extended to many engineering fields, such as X-ray imaging, astronomical imaging, adaptive optics, and binary optical design [3,4,5,6,7,8,9]. Gerchberg and Saxton first proposed a numerical algorithm in 1972, known as the G-S algorithm [2]. The G-S algorithm has groundbreaking significance in addition to a number of shortcomings. Some of these shortcomings are inherent to the solution of inverse problems. For example, the Fourier transform amplitude of a function to a function is a many-to-one mapping, and finding a function from the Fourier transform amplitude will inevitably have multiple solutions. The other issue arises from the algorithm itself. For example, after the first few iterations, the convergence speed of the G-S algorithm slows down or even stagnates. Two important improvements to the G-S algorithm were made by Misell and Fienup. In 1973, Misell proposed that iterating between two images with different levels of defocus can improve the accuracy and convergence of the algorithm [10]. Misell’s algorithm is more practical, and provides a reference for the improvement of the G-S algorithm. In 1982, Fienup noted that G-S is an error descent algorithm, and its essence is the same as the fastest descent algorithm [11]. To solve the problem of stagnation of the G-S algorithm, Fienup proposed a hybrid input-output (HIO) algorithm based on nonlinear control. The HIO algorithm effectively improves the convergence effect and is widely used.
Due to the correlation of image pixels, the G-S algorithm can obtain a clear target image, and is thus widely used in image encryption. In 1996, Johnson et al. proposed a new optical image encryption scheme, which encrypts a plaintext image into two phases [12]. In the same year, Wang et al. used the G-S algorithm to encrypt a plaintext image into the phase of the Fourier spectrum [13]. In addition, Zalevsky et al. extended the G-S algorithm to the fractional Fourier transform domain, which further promoted the application of the algorithm [14]. Image encryption schemes based on the phase retrieval algorithm are generally implemented with the help of a photoelectric hybrid system so that both the optical system and the computer can be used in the recovery process of the plaintext [15,16,17,18,19,20,21]. Some multiple-image encryption schemes have been proposed to greatly improve the efficiency of the system [22,23]. Moreover, the G-S algorithm has been expanded to three-dimensional space with greater flexibility, which can achieve image encryption and identity verification to ensure security [24,25,26]. These developments mainly involve the application of the G-S algorithm in symmetric cryptosystems; however, it is also widely used in key distribution [27] and asymmetric cryptosystems [28,29,30,31]. In an asymmetric cryptosystem, the encryption key and the decryption key are independent of each other, which is more satisfactory for practical applications. In 2015, Zhao et al. proposed an asymmetric image encryption system using human biometrics combined with the G-S algorithm. A fingerprint can be used to verify the authenticity of the ciphertext in this system [32]. In addition, the G-S algorithm can be well combined with other encryption technologies to improve security [33,34]. Image encryption technology is time effective. To ensure the security of information, recently, some generalized G-S algorithms have been applied to image encryption [35,36,37,38].
The application of the G-S algorithm in image encryption has greatly promoted its theoretical development [39]. The obtained phase is an approximate solution due to the attributes of G-S, that is, lossless plaintext cannot be recovered. In this paper, we attempt to modify the G-S algorithm and apply it to image encryption. The research results are as follows:
(a) A single-phase retrieval algorithm based on the Fresnel transform domain is proposed and compared with the G-S algorithm.
(b) We further propose a double-phase retrieval algorithm and a multiple-phase retrieval algorithm, and prove that they have a good convergence effect.
(c) A multiple-image encryption scheme is proposed to greatly improve the efficiency of the system.
The remainder of this paper is organized as follows. The preliminary knowledge is described in Section 2. Section 3 proposes the modified G-S algorithm. The convergence is discussed in Section 4. Section 5 analyzes the security and reliability of the proposed algorithm, and further presents multiple-image encryption. The proposed algorithms are compared with the current phase retrieval algorithms, and the future applications are discussed in Section 6. Finally, the conclusions are presented in Section 7.

2. Preliminaries

2.1. G-S Algorithm

In 1972, Gerchberg and Saxton first proposed an algorithm for solving the phase recovery problem in the study of electron microscope imaging [2]. Here, we briefly introduce the process of the G-S algorithm, as shown in Figure 1. First, an initial guess g 0 ( x , y ) is input, and the amplitude | G ( u , v ) | is obtained by the Fourier transform. Next, the amplitude | G ( u , v ) | is replaced by a known function | F ( u , v ) | to form a new function. Then, the estimated square function g ( x , y ) is obtained by the inverse Fourier transform, and the input value g ( x , y ) of a new iteration is formed with known constraints.
In the given initial phase distribution, the amplitude distributions of the input and the output are successively iterated, which can determine the phase distribution of the input. The G-S algorithm can be implemented using Equations (1)–(4).
G k 1 ( u , v ) = F T [ g k 1 ( x , y ) ] = | G k 1 ( u , v ) | e i ϕ k 1 ( u , v ) ,
G k ( u , v ) = | F ( u , v ) | e i ϕ k 1 ( u , v ) ,
g k ( x , y ) = I F T [ G k ( u , v ) ] = | g k ( x , y ) | e i ϕ k ( x , y ) ,
g k ( x , y ) = | g ( x , y ) | e i ϕ k ( x , y ) .
k = 1 , 2 , , n
The iterations of the algorithm can be controlled using the mean squared error (MSE) or the correlation coefficient (CC). The main principle is to control the iterative process by calculating the difference between the amplitude of the spectrum surface and the preset amplitude. The iteration stops when the MSE or CC satisfies a certain preset condition; otherwise, the next iteration starts.
Next, we conducted a comparative analysis with a two-dimensional function graph. The function graph of the Gaussian beam is shown in Figure 2a, and Figure 2b is the function graph of the target light intensity. In the simulation experiment, the G-S algorithm performed 200 iterations in total, and the comparison results are shown in Figure 2c. The red curve is obtained again, and the green curve is the target function curve. Figure 2d is the CC curve. The closer the CC is to 1, the better the convergence effect of the algorithm. Figure 2d shows that the initial convergence speed is relatively fast. After 50 iterations, the convergence speed is very slow, and the phenomenon of stagnation occurs.
As in the above analysis, when the G-S algorithm is applied to beam shaping, the problem arises that the convergence stagnates.

2.2. Application of G-S Algorithm in Image Encryption

The G-S algorithm is widely used in image encryption. Due to the correlation between the pixels of an image, a plaintext image can be recovered well. Here, we introduce the most common and simplest encryption scheme. In the encryption process, the optical attributes involved usually include the wavelength, focal length, diffraction distance, phase, etc., which can be used as the keys.
The principle of image encryption based on the G-S algorithm is shown in Figure 3. Here, g is a known amplitude image, assuming there is phase e i · ϕ (ciphertext). Then, the light intensity detector at the receiving end can obtain the image q (plaintext).
Next, we used the G-S algorithm to obtain the phase e i · ϕ (ciphertext). In the encryption process, we used the G-S algorithm for 200 iterations, and the numerical simulation results are shown in Figure 4. Figure 4a,b are a known input amplitude image and a target amplitude image, respectively. The CC was selected as the criterion for judging the convergence of the iterations. The value of CC was 0.9984 after 200 iterations. The transformation curve of CC is shown in Figure 4c.
The phase e i · ϕ obtained is shown in Figure 4d, which is also ciphertext. The decryption process can be completed either by an optical system or by a computer. The phase e i · ϕ was placed in the optical system of Figure 3, and the plaintext can be obtained directly at the receiver. In the computer, the receiver can obtain the plaintext image via the operation | F T ( g · e i ϕ ) | . The recovered plaintext image is shown in Figure 4e.
It is well-known that the G-S algorithm has difficulty obtaining an exact solution, but the recovered image is no different from the original image visually. We attempted to recover the plaintext using the operation | F T ( e i ϕ ) | (only phase), and the result is shown in Figure 4f. The result shows that we can still recognize the plaintext image information, which indicates that the phase is dominant in image reconstruction.

2.3. The Importance of the Phase

The phase is very important in signal processing due to its ability to reconstruct a signal completely [40,41]. Similarly, the phase is also very important in image processing, as shown in Figure 5. The phase and the amplitude were extracted by applying the Fourier transform to the images. We combined the phase of one image with the amplitude of another. Then, the new image was obtained using the inverse Fourier transform, and we can recognize the image information. This shows the importance of the phase in image processing. Here, PT and PR denote the phase truncation and phase reservation operations, respectively. For any complex amplitude F = | F | e i · ϕ ,
P T ( F ) = | F | ,
P R ( F ) = e i · ϕ .
This analysis shows that the phase is dominant in image reconstruction. Inspired by this, we attempted to use the phase for image reconstruction, and then propose the modified G-S algorithm.

3. Modified G-S Algorithm

In this section, we propose three modified G-S algorithms in a progressive relationship. They are the single-phase retrieval (SPR) algorithm, the double-phase retrieval (DPR) algorithm, and the multiple-phase retrieval (MPR) algorithm.

3.1. Single-Phase Retrieval Algorithm

Our idea is shown in Figure 6. The modified G-S algorithm is applied to the Fresnel transform domain, which is more flexible; and the diffraction distance can be used as a key to improve security. We try to recover the target image using only a single phase during the iteration.
Obtaining the phase e i · ϕ is the core problem of our research. Therefore, we refer to the idea of the G-S algorithm to propose an SPR algorithm based on the Fresnel transform domain.
For the initial random phase mask e i · ϕ 0 with ϕ 0 ( π , π ) , the complex amplitude S 0 = | S 0 | · e i · arg ( S 0 ) is obtained after the Fresnel transform. Then, the amplitude | S 0 | is replaced to obtain a new complex amplitude S 1 = f · e i · arg ( S 0 ) . Next, the function F 1 = | F 1 | · e i · arg ( F 1 ) is obtained after the inverse Fresnel transform. The extracted phase e i · arg ( F 1 ) replaces the initial phase e i · ϕ 0 and enters the next iteration. The iterations continue until the iterative result meets the preset requirements. The SPR algorithm is shown in Equations (7)–(10):
S k 1 = F r T z 1 ( e i · ϕ k 1 ) = | S k 1 | · e i · arg ( S k 1 ) ,
S k = f · e i · arg ( S k 1 ) ,
F k = F r T z 1 ( S k ) = | F k | · e i · arg ( F k ) ,
e i ϕ k = e i · arg ( F k ) ,
k = 1 , 2 , , n
Here, F r T z 1 ( · ) denotes the Fresnel transform with distance z1, f denotes a known image, | · | is the modulus operation, and arg ( · ) is the argument function. It is known that image f is transformed into a phase encoding e i · ϕ through the above iterative process. When the phase encoding e i · ϕ passes through the optical system, the image can be directly captured by the light intensity detector, as shown in Figure 6. In addition, the image can also be obtained by the operation f = | F r T z 1 ( e i ϕ ) | . The flowchart of the SPR algorithm is shown in Figure 7.
We use the CC as a criterion for judging the iterative convergence. f ( x , y ) denotes the known image, and f ^ ( x , y ) denotes the recovered image. Then, the CC can be expressed as follows:
C C = C O V [ f ( x , y ) , f ^ ( x , y ) ] σ f · σ f ^ .
Here, C O V is the covariance, and σ is the variance. The closer the value of the correlation coefficient to 1, the better the convergence.
The simulation results are shown in Figure 8. Figure 8a is the target image. The phase obtained after the iterations is shown in Figure 8b. Figure 8c is the recovered image, and the reconstruction process can be completed using the optical system of Figure 6 or the operation | F r T z 1 ( e i ϕ ) | . Similar to the G-S algorithm, the SPR algorithm converges quickly in the early stages of the iterative process, but is slow in the later stages. The CC after 200 iterations is 0.9988.

3.2. Double-Phase Retrieval Algorithm

Here, we try to iterate using two phases, and our idea is shown in Figure 9. When the two phase encodings are arranged in order, the light intensity detector at the output can directly acquire the recovered image.
Based on the research in Section 3.1, we present the DPR algorithm. The mathematical expression of its detailed process is as follows.
The initial random phases are e i · ϕ 1 0 and e i · ϕ 2 0 , where ϕ 1 0 , ϕ 2 0 ( π , π ) are the random matrices. Then, the wavefront function of the CCD can be expressed as:
S 0 = F r T z 2 [ F r T z 1 ( e i · ϕ 1 0 ) · e i · ϕ 2 0 ] .
Assuming that there is a phase e i · ϕ 2 1 , it satisfies Equation (13):
f · S 0 | S 0 | = F r T z 2 [ F r T z 1 ( e i · ϕ 1 0 ) · e i · ϕ 2 1 ] ,
where f is a target image. We can further obtain:
e i · ϕ 2 1 = F r T z 2 [ f · S 0 | S 0 | ] / F r T z 1 ( e i · ϕ 1 0 ) ,
where F r T z 2 denotes the inverse Fresnel transform with the distance z 2 . Next, assuming that there is a phase e i · ϕ 1 1 , it satisfies Equation (15):
f · S 0 | S 0 | = F r T z 2 [ F r T z 1 ( e i · ϕ 1 1 ) · e i · ϕ 2 1 ] .
Therefore, we can obtain:
e i · ϕ 1 1 = F r T z 1 ( F r T z 2 ( f · S 0 | S 0 | ) · ( e i · ϕ 2 1 ) * ) ,
where * is complex conjugate. Substituting the obtained e i · ϕ 2 1 and e i · ϕ 1 1 into Equation (12), we obtain:
S 1 = F r T z 2 [ F r T z 1 ( e i · ϕ 1 1 ) · e i · ϕ 2 1 ] .
Then, the above operation can be repeated to obtain e i · ϕ 2 2 , e i · ϕ 1 2 , S 2 . When the k-th iteration stops, we can obtain e i · ϕ 1 k = e i · ϕ 1 and e i · ϕ 2 k = e i · ϕ 2 . Then, the target image can be obtained by Equation (18):
f = | F r T z 2 [ F r T z 1 ( e i · ϕ 1 ) · e i · ϕ 2 ] | .
Through the above mathematical derivation, we give the general mathematical expression of the DPR algorithm in Equations (19)–(21):
S k 1 = F r T z 2 [ F r T z 1 ( e i · ϕ 1 k 1 ) · e i · ϕ 2 k 1 ] ,
e i · ϕ 2 k = F r T z 2 [ f · S k 1 | S k 1 | ] / F r T z 1 ( e i · ϕ 1 k 1 ) ,
e i · ϕ 1 k = F r T z 1 ( F r T z 2 ( f · S k 1 | S k 1 | ) · ( e i · ϕ 2 k ) * ) ,
k = 1 , 2 , , n
where e i · ϕ 1 0 and e i · ϕ 2 0 are the initial random matrices. The flowchart of the DPR algorithm is shown in Figure 10.
The simulation results of the DPR algorithm are shown in Figure 11. Figure 11a is the target image. Figure 11b,c are the obtained phases, respectively. The recovered image is shown in Figure 11d. After 15 iterations, the value of CC is 1, as shown in Figure 11e. The results show that the DPR algorithm has good convergence, can obtain the exact solution, and can recover the image losslessly. We will further analyze the convergence in Section 4.

3.3. Multiple-Phase Retrieval Algorithm

Further, we present the MPR algorithm, and its principle is shown in Figure 12. When n phase encodings are arranged in a certain order, the output can directly obtain the recovered image using parallel light illumination. For image encryption, an image is encrypted into n phase encodings.
With the help of the derivation in Section 3.2, we present the mathematical expressions for the MPR algorithm:
S k 1 = F r T z n { F r T z n 1 [ F r T z 2 ( F r T z 1 ( e i · ϕ 1 k 1 ) · e i · ϕ 2 k 1 ) ] · e i · ϕ n k 1 } ,
e i · ϕ n k = F r T z n [ f · S k 1 | S k 1 | ] F r T z n 1 { F r T z n 2 [ F r T z 2 ( F r T z 1 ( e i · ϕ 1 k 1 ) · e i · ϕ 2 k 1 ) ] · e i · ϕ n 1 k 1 } ,
e i · ϕ n 1 k = F r T z n 1 { F r T z n [ f · S k 1 | S k 1 | ] · ( e i · ϕ n k ) * } F r T z n 2 { F r T z n 3 [ F r T z 2 ( F r T z 1 ( e i · ϕ 1 k 1 ) · e i · ϕ 2 k 1 ) ] · e i · ϕ n 2 k 1 } ,
e i · ϕ 1 k = arg ( F r T z 1 { F r T z 2 [ F r T z n 1 ( F r T z n ( f · S k 1 | S k 1 | ) · ( e i · ϕ n k ) * ) ] · ( e i · ϕ 2 k ) * } ) ,
k = 1 , 2 , , n
where e i · ϕ 1 0 , e i · ϕ 2 0 , , e i · ϕ n 1 0 and e i · ϕ n 0 are the initial random phase encodings. The flowchart of the MPR algorithm is shown in Figure 13.
The SPR and DRP algorithms are special examples of the algorithm proposed in this section. The convergence of these algorithms and the comparison with the G-S algorithm is analyzed in Section 4.

4. Convergence

4.1. G-S Algorithm and Single-Phase Retrieval Algorithm

The convergence of the G-S algorithm often stagnates, and the obtained solution is an approximate solution [11]. Next, we will perform an experiment by selecting two matrices A and B (both are 16 × 16). Here, matrix A is the magic matrix, and the corresponding imaging is shown in Figure 14a. The imaging corresponding to matrix B is shown in Figure 14b. We use Figure 14a as the input image and Figure 14b as the target image. The G-S algorithm performs 1000 iterations, and the obtained phase information is shown in Figure 14c. Figure 14d is the recovered image, and its corresponding pixel matrix is C. Figure 14e is the curve of the CC, which is closer to 1 as the number of iterations increases. However, the convergence is slow or even stagnant in the later stages of the iterative process. Our analysis shows that the G-S can recover the image well, but the exact solution is not obtained.
A = ( 256 2 3 253 252 6 7 249 248 10 11 245 244 14 15 241 17 239 238 20 21 235 234 24 25 231 230 28 29 227 226 32 33 223 222 36 37 219 218 40 41 215 214 44 45 211 210 48 208 50 51 205 204 54 55 201 200 58 59 197 196 62 63 193 192 66 67 189 188 70 71 185 184 74 75 181 180 78 79 177 81 175 174 84 85 171 170 88 89 167 166 92 93 163 162 96 97 159 158 100 101 155 154 104 105 151 150 108 109 147 146 112 144 114 115 141 140 118 119 137 136 122 123 133 132 126 127 129 128 130 131 125 124 134 135 121 120 138 139 117 116 142 143 113 145 111 110 148 149 107 106 152 153 103 102 156 157 99 98 160 161 95 94 164 165 91 90 168 169 87 86 172 173 83 82 176 80 178 179 77 76 182 183 73 72 186 187 69 68 190 191 65 64 194 195 61 60 198 199 57 56 202 203 53 52 206 207 49 209 47 46 212 213 43 42 216 217 39 38 220 221 35 34 224 225 31 30 228 229 27 26 232 233 23 22 236 237 19 18 240 16 242 243 13 12 246 247 9 8 250 251 5 4 254 255 1 )
B = ( 50 50 50 50 50 50 50 50 50 50 50 50 50 50 50 50 50 100 200 200 200 200 200 200 200 200 200 200 200 200 100 50 50 200 100 100 100 100 100 100 100 100 100 100 100 100 200 50 50 100 100 100 100 100 100 100 100 100 100 100 100 100 100 50 50 100 100 100 100 255 100 100 100 100 255 100 100 100 100 50 50 100 100 100 100 255 100 100 100 100 255 100 100 100 100 50 50 100 100 100 100 100 100 100 100 100 100 100 100 100 100 50 50 100 100 100 100 230 230 230 230 230 230 100 100 100 100 50 50 100 100 100 100 100 230 230 230 230 100 100 100 100 100 50 50 100 100 100 100 100 100 100 100 100 100 100 100 100 100 50 50 100 100 100 100 100 100 100 100 100 100 100 100 100 100 50 50 150 100 100 100 100 100 100 100 100 100 100 100 100 150 50 50 150 150 150 150 150 150 150 150 150 150 150 150 150 150 50 50 150 150 150 150 150 150 150 150 150 150 150 150 150 150 50 50 100 150 150 150 150 150 150 150 150 150 150 150 150 100 50 50 50 50 50 50 50 50 50 50 50 50 50 50 50 50 50 )
C = ( 56 50 50 57 44 52 45 50 54 52 52 51 52 46 50 53 47 97 195 198 189 192 188 187 194 193 186 190 195 198 104 53 51 186 97 98 101 96 102 108 98 97 103 100 100 98 185 58 53 101 91 95 94 102 97 103 98 96 106 100 96 103 97 52 53 100 96 97 94 255 96 104 102 108 251 92 94 94 99 52 53 100 101 96 96 236 101 94 100 92 242 102 100 98 99 51 50 100 101 94 97 101 98 95 101 95 92 101 96 99 99 51 50 95 106 92 96 225 221 221 228 229 215 101 95 99 100 46 51 100 98 101 99 99 226 214 227 224 102 97 92 94 98 50 52 105 98 92 94 101 103 98 99 95 99 91 97 100 106 53 51 93 96 101 94 96 103 98 98 99 102 97 96 95 107 54 48 144 96 95 95 97 98 99 95 101 101 96 91 101 148 53 52 144 141 147 145 149 142 142 151 149 151 144 151 142 143 55 52 143 134 144 142 145 140 147 140 146 148 146 143 144 149 43 53 89 145 142 146 147 145 143 144 148 148 143 147 140 98 44 50 56 51 48 44 53 56 51 48 51 54 49 50 51 49 61 )
Next, we analyze the proposed SPR algorithm. Figure 15a shows that a known image is selected (matrix B). The phase information obtained by the SPR algorithm is shown in Figure 15b. Figure 15c is the recovered image, which is visually indistinguishable from the original image. In the restoration process, we perform 1000 iterations, and the final correlation coefficient is 0.9999, which indicates that there is no lossless recovered image. The pixel matrix of Figure 15c is D, which further verifies that the SPR algorithm does not obtain the exact solution.
D = ( 50 50 50 50 50 50 51 50 51 50 51 51 50 49 51 50 50 100 199 200 199 200 199 200 200 200 199 299 200 199 100 50 50 200 99 100 99 100 99 100 100 99 99 100 99 100 200 50 49 101 100 100 100 100 100 101 101 100 100 100 101 99 100 50 50 100 100 101 100 255 101 100 99 100 255 100 100 99 100 50 51 101 100 100 100 255 100 101 100 100 254 99 100 100 100 51 50 100 99 100 99 99 100 99 100 100 99 100 100 102 101 50 52 100 100 100 99 229 229 229 230 229 229 101 100 100 101 50 50 100 100 99 100 101 229 229 230 229 100 99 100 101 100 50 50 99 101 100 100 99 101 101 101 100 100 100 101 100 99 51 51 100 101 101 100 100 99 100 100 99 99 100 100 99 100 50 50 150 100 100 99 101 100 100 100 100 101 100 100 101 149 50 50 149 149 149 150 149 150 149 150 149 150 150 150 150 150 52 50 150 150 149 150 150 151 151 151 150 150 149 150 149 150 51 50 100 149 149 150 150 149 149 149 150 149 151 150 149 99 51 50 50 50 50 49 51 50 51 51 50 50 50 50 49 51 51 )

4.2. Double-Phase Retrieval Algorithm and Multiple-Phase Retrieval Algorithm

The DPR algorithm is used to encrypt an image into two phase encodings. Figure 16a is a known image (matrix B). The obtained phase encodings are shown in Figure 16b,c. Figure 16d is the recovered image, and its pixel matrix is E. It can be clearly seen that the image is recovered losslessly. The CC curve is shown in Figure 16e, and the value is 1 for 13 iterations, which again verifies that the algorithm can restore information losslessly.
E = ( 50 50 50 50 50 50 50 50 50 50 50 50 50 50 50 50 50 100 200 200 200 200 200 200 200 200 200 200 200 200 100 50 50 200 100 100 100 100 100 100 100 100 100 100 100 100 200 50 50 100 100 100 100 100 100 100 100 100 100 100 100 100 100 50 50 100 100 100 100 255 100 100 100 100 255 100 100 100 100 50 50 100 100 100 100 255 100 100 100 100 255 100 100 100 100 50 50 100 100 100 100 100 100 100 100 100 100 100 100 100 100 50 50 100 100 100 100 230 230 230 230 230 230 100 100 100 100 50 50 100 100 100 100 100 230 230 230 230 100 100 100 100 100 50 50 100 100 100 100 100 100 100 100 100 100 100 100 100 100 50 50 100 100 100 100 100 100 100 100 100 100 100 100 100 100 50 50 150 100 100 100 100 100 100 100 100 100 100 100 100 150 50 50 150 150 150 150 150 150 150 150 150 150 150 150 150 150 50 50 150 150 150 150 150 150 150 150 150 150 150 150 150 150 50 50 100 150 150 150 150 150 150 150 150 150 150 150 150 100 50 50 50 50 50 50 50 50 50 50 50 50 50 50 50 50 50 )
The CC curve of the MPR algorithm is shown in Figure 17. The MPR algorithm can also recover information losslessly (the CC is 1), and its convergence is better than that of the DPR algorithm. Moreover, as the phase increases, the convergence speed is faster.
The G-S algorithm and the SPR algorithm are error reduction algorithms. One simply transforms back and forth between the two domains, satisfying the constraints in one before returning to the other. During the iterations, nonlinear operations are used to enforce the constraints on the amplitude to obtain the phase. It is difficult to obtain the exact solution for this kind of nonlinear operation, and the Fourier transform from one function to another is a many-to-one mapping. The DPR algorithm and the MPR algorithm proposed are linear operations in the iterative process, and the exact solution can be obtained. We take the DPR algorithm as example since it is the simplest form of MPR algorithm.
In the DPR algorithm, we finally determine the phases e i · ϕ 1 and e i · ϕ 2 . The k-th iteration stops to obtain the phases e i · ϕ 1 = e i · ϕ 1 k and e i · ϕ 2 = e i · ϕ 2 k , which satisfy Equation (18). In the iteration, the phase e i · ϕ 2 k is determined by Equations (14) and (15). In Equation (14), only the phase e i · ϕ 2 k is unknown, and all other terms are known. Thus, we can obtain the phase e i · ϕ 2 k in Equation (15) via a linear operation. The phase e i · ϕ 1 k can also be obtained via the linear operation of Equations (16) and (17). In this way, we finally obtained the exact solution by means of this linear operation. The MPR algorithm is an extension of the DPR algorithm, which can also obtain exact solutions. However, such a solution is not unique, and is related to the selection of the initial random phase encoding. When the initial phase encodings selected each time are different, the determined solutions are also different. This property can improve image encryption security.

5. Performance Analysis

5.1. Security and Reliability

It is well-known that the existing attack schemes can be divided into chosen ciphertext attacks, chosen plaintext attacks, known plaintext attacks, and ciphertext only attacks. In Section 4, we noted that the solution of the proposed algorithm is not unique, and this property can effectively improve the security of the system. That is, even for the same image, the ciphertexts obtained by each encryption are different. Figure 18 shows the simulation results of two encryptions. The ciphertexts P1, P2, and P3 are obtained by the first encryption. During the second encryption, we select a new set of initial phase encodings, and obtain ciphertexts P11, P22, and P33. Our research shows that only the combination of ciphertexts (P1, P2, P3) and (P11, P22, P33) can recover the plaintext while other combinations, such as (P1, P22, P3) and (P11, P2, P33), cannot recover the plaintext information.
A histogram is a function of the distribution of image pixels, and reflects the frequency of each pixel. The histogram of the ciphertext tends to be evenly distributed, which means that the frequency of each pixel in the ciphertext is very close, which can better cover the distribution law of the image pixels, and ensure that the algorithm can effectively resist statistical attacks. The histograms of Figure 18b–d are shown in Figure 19. The pixels of the ciphertext are evenly distributed, which means that they can resist statistical attacks.
Ciphertexts are often disturbed and lost during storage and transmission, thus, the reliability of the algorithm is particularly important. In Figure 20, we damage the ciphertexts, and then tried to recover the plaintext information from them. The recovery result is shown in Figure 20d. Even if the ciphertexts are damaged, the plaintext information can still be recovered by the proposed algorithm.
As unnecessary or redundant interference information in image data, noise seriously affects the image quality. In Figure 21, we added Gaussian noise (mean m = 0, variance var = 0.01) to the original image (Figure 21a), and the result is shown in Figure 21b. We add salt and pepper noise (noise density d = 0.05) to the original image, and the result is shown in Figure 21c. After the original image is encrypted, the ciphertexts are shown in Figure 21d–f. When the three ciphertexts are interfered by Gaussian noise, the decryption result can identify the information of the original image, as shown in Figure 21g. When the three ciphertexts are interfered by salt and pepper noise, the decryption result is shown in Figure 21h. We can still identify the original image information from the decryption result.

5.2. Multiple-Image Encryption

With the increasing speed of information exchange, single-image encryption has gradually become unable to meet practical needs. Therefore, multiple-image encryption technology has begun to attract attention. The traditional multiple-image encryption technology generally compresses multiple plaintexts into an image or superimposes multiple plaintexts into a composite image and then encrypts them. However, these methods have difficulties achieving optical system decryption. Here, we present a novel multiple-image encryption technology using the proposed algorithm. Our idea is shown in Figure 22. When the phase e i · ϕ 1 is placed separately in the system, the plaintext f 1 can be recovered. When phase e i · ϕ 1 and phase e i · ϕ 2 are placed in the system, the plaintext f 2 can be recovered. That is, as the phase increases, the recovered plaintext also increases. Finally, we can recover n plaintext images from n phase encodings.
To encrypt n images, it is necessary to perform N-stage iterations, and the detailed flow chart is shown in Figure 23. In the first stage, the initial random phase e i · ϕ 1 0 is input and the plaintext image f 1 is encrypted.
The CC is used to control the iteration process. When the k-th iteration meets certain conditions, the iteration stops and the system outputs the phase e i · ϕ 1 = e i · ϕ 1 k (ciphertext). Then, the plaintext image f 1 can be obtained by Equation (26) as:
f 1 = | F r T z 1 ( e i · ϕ 1 ) | .
In the second stage, the plaintext image f 2 is encrypted. The phase e i · ϕ 1 and phase e i · ϕ 2 0 (random phase encoding) are used as the initial inputs. The phase e i · ϕ 1 remains unchanged in the iteration process, and the phase e i · ϕ 2 = e i · ϕ 2 k is obtained when the iteration stops. The plaintext image f 2 can be obtained by Equation (27) as:
f 2 = | F r T z 2 ( ( F r T z 1 ( e i · ϕ 1 ) ) · e i · ϕ 2 ) | .
In stage N, the plaintext image f n is encrypted. The phases e i · ϕ 1 , e i · ϕ 2 , , e i · ϕ n 1 obtained in the previous N-1 stages remain unchanged as the initial phase while the initial random phase e i · ϕ n 0 is added. When the k-th iteration stops, the phase e i · ϕ n = e i · ϕ n k is obtained. Thus, the plaintext image f n can be obtained by Equation (28).
f n = | F r T z n { F r T z n 1 [ F r T z 2 ( F r T z 1 ( e i · ϕ 1 ) · e i · ϕ 2 ) ] · e i · ϕ n } | .
The simulation verification of multiple-image encryption is shown in Figure 24. Four ciphertext images are obtained as shown in Figure 24a–d. We decrypt the ciphertext image (Figure 24a) to obtain the plaintext, as shown in Figure 24e. Figure 24f can be recovered from the ciphertexts of Figure 24a,b. Figure 24g can be recovered from the ciphertexts of Figure 24a–c. Figure 24h can be recovered from the ciphertexts of Figure 24a–d.
We have successfully recovered four plaintexts from the four ciphertexts. The numerical simulation verifies that the proposed multiple-image encryption scheme is feasible, which will allow it to provide new ideas for the application of phase retrieval algorithms.
The multiple-image encryption scheme proposed in this paper avoids the problem of crosstalk because each encryption process is carried out in succession, and each plaintext in the decryption process is obtained successively.

6. Discussion and Prospect

The G-S algorithm is also widely used in beam shaping and binary optical element design. To improve the diffraction efficiency, many improved G-S algorithms have been proposed [42,43,44]. The main principle is to change the Gaussian beam into the desired ideal beam. Our algorithm does not need input amplitude in image encryption, so it is applied to beam shaping without a wavefront function. For our algorithm, it can be understood as turning a parallel light into an ideal beam. The waveform function we want to obtain is shown in Figure 25a. After 200 iterations with the G-S algorithm, the result is shown in Figure 25b. There is still a certain gap between this result and our objective function. The SPR algorithm is applied to 200 iterations, and the result is shown in Figure 25c, which is better than that of the G-S algorithm. Compared with the modified G-S algorithms [45,46], the SPR algorithm also improves the convergence effect. Unfortunately, these algorithms are based on a nonlinear operation, so cannot obtain accurate solutions. Our DPR and MPR algorithms are linear iterative methods based on the G-S algorithm, which can obtain accurate solutions. When the DPR algorithm is applied, the result is shown in Figure 25d, which can accurately obtain the objective function. Figure 25e shows the comparison results of the G-S, SPR, and DPR algorithms.
The G-S algorithm is sensitive to the initial value, that is, the different initial phase selection has a significant impact on the results. When the initial phase is given a fixed value, the iterative results are shown in Figure 26a,b. Figure 26c,d shows the results obtained by selecting random initial phase iterations. Compared with the results in Figure 26, it can be clearly seen that the G-S algorithm is extremely sensitive to the initial phase, which directly affects the convergence effect. We use the same method to test the SPR algorithm, and the results are shown in Figure 27. It is found that the sensitivity of SPR algorithm to the initial phase is weaker.
The G-S algorithm is applied to optical image encryption because its attributes can provide good security [47,48]. The initial phase is not used as the key of the system, so different initial phases can be selected for each encryption process, and different ciphertexts can be obtained. That is, a plaintext can have many different ciphertexts, which creates difficulties in cipher decoding. Our algorithm also has such a security property.
The G-S algorithm has been used in optical cryptanalysis [49,50,51,52], but the result is not ideal because it cannot obtain the exact solution. The DPR and MPR algorithms proposed in this paper can obtain the exact solution, which clearly provides a powerful tool for optical cryptanalysis.
We have previously proposed a key distribution scheme for optical cryptography, which is also restricted by the convergence of the algorithm, and thus makes the result unsatisfactory [27]. The algorithm proposed in this paper provides an idea for key distribution.
At present, for secret image sharing, the resolution of the restored image is reduced due to sharing and the large size of the recovery image. This problem has been considered by researchers. However, the algorithms proposed in this paper can overcome this problem, which provides a new idea for secret image sharing. This is a topic that we will study next.

7. Conclusions

In this paper, we modify the G-S algorithm to propose the SPR, DPR, and MPR algorithms. We analyze the convergence of the proposed algorithms, and the results show that the SPR algorithm also has the same problem as the G-S algorithm. The convergence is slow in later iterations, its convergence stagnates, and only an approximate solution can be obtained. However, our analysis shows that the DPR and MPR algorithms have good convergence, can recover the plaintext without loss, and can obtain exact solutions. Furthermore, we analyzed the security and reliability of the proposed image encryption algorithm. Because different initial phase encodings can be selected for each encryption, different ciphertexts can be obtained, which improves the security of the algorithm. The reliability analysis shows that the plaintext can be recovered even if the ciphertexts are damaged. Finally, we present the multiple-image encryption scheme based on the proposed algorithm. The n plaintexts can be recovered from n ciphertexts, which greatly improves the efficiency of the system. The proposed DPR and MPR algorithms can obtain exact solutions, that is, they can recover information losslessly, which means they have an important reference value for the application of the algorithms.

Author Contributions

Methodology, T.Z.; software, T.Z.; validation, T.Z. and Y.C.; writing—original draft preparation, Y.C.; writing—review and editing, T.Z.; supervision, T.Z.; funding acquisition, T.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This study was supported by Scientific Research Projects of Hebei colleges and universities (QN2020511).

Acknowledgments

On behalf of my co-authors, we would like to express our great appreciation to editor and reviewers.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Gerchberg, R.W. Phase determination for image and diffraction plane pictures in the electron microscope. Optik 1971, 34, 275–284. [Google Scholar]
  2. Gerchberg, R.W.; Saxton, W.O. A practical algorithm for the determination of phase from image and diffraction plane pictures. Optik 1972, 35, 237–246. [Google Scholar]
  3. Wilkins, S.W.; Gureyev, T.E.; Gao, D.; Pogany, A.; Stevenson, A.W. Phase-contrast imaging using polychromatic hard X-rays. Nature 1996, 384, 335–338. [Google Scholar] [CrossRef]
  4. Pogany, A.; Gao, D.; Wilkins, S.W. Contrast and resolution in imaging with a microfocus x-ray source. Rev. Sci. Instrum. 1997, 68, 2774–2782. [Google Scholar] [CrossRef]
  5. Millane, R.P. Phase retrieval in crystallography and optics. JOSA A 1990, 7, 394–411. [Google Scholar] [CrossRef]
  6. Gonsalves, R.A.; Chidlaw, R. Wavefront sensing by phase retrieval. Applications of Digital Image Processing III. Int. Soc. Opt. Photonics 1979, 207, 32–39. [Google Scholar]
  7. Gonsalves, R.A. Phase retrieval and diversity in adaptive optics. Opt. Eng. 1982, 21, 215829. [Google Scholar] [CrossRef]
  8. Chang, M.P.; Ersoy, O.K.; Dong, B.; Yang, G.; Gu, B. Iterative optimization of diffractive phase elements simultaneously implementing several optical functions. Appl. Opt. 1995, 34, 3069–3076. [Google Scholar] [CrossRef]
  9. Fienup, J.R. Iterative method applied to image reconstruction and to computer-generated holograms. Opt. Eng. 1980, 19, 193297. [Google Scholar] [CrossRef]
  10. Misell, D.L. A method for the solution of the phase problem in electron microscopy. J. Phys. D Appl. Phys. 1973, 6, L6–L9. [Google Scholar] [CrossRef]
  11. Fienup, J.R. Phase retrieval algorithms: A comparison. Appl. Opt. 1982, 21, 2758–2769. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  12. Johnson, E.G.; Brasher, J.D. Phase Encryption of Biometrics in Diffractive Optical Elements. Opt. Lett. 1996, 21, 1271–1273. [Google Scholar] [CrossRef] [PubMed]
  13. Wang, R.K.; Watson, I.A.; Chatwin, C. Random Phase Encoding for Optical Security. Opt. Eng. 1996, 35, 2464–2469. [Google Scholar] [CrossRef]
  14. Zalevsky, Z.; Mendlovic, D.; Dorsch, R.G. Gerchberg–Saxton algorithm applied in the fractional Fourier or the Fresnel domain. Opt. Lett. 1996, 21, 842–844. [Google Scholar] [CrossRef]
  15. Li, Y.Z.; Kreske, K.; Rosen, J. Security and encryption optical systems based on a correlator with significant output images. Appl. Opt. 2000, 39, 5295–5301. [Google Scholar] [CrossRef]
  16. Chang, H.T.; Lu, W.C.; Kuo, C.J. Multiple-phase retrieval for optical security systems by use of random-phase encoding. Appl. Opt. 2002, 41, 4825–4834. [Google Scholar] [CrossRef]
  17. Hennelly, B.; Sheridan, J.T. Fractional Fourier transform-based image encryption: Phase retrieval algorithm. Opt. Commun. 2003, 226, 61–80. [Google Scholar] [CrossRef] [Green Version]
  18. Situ, G.H.; Zhang, J.J. A Cascaded iterative Fourier transform algorithm for optical security applications. Optik 2003, 114, 473–477. [Google Scholar] [CrossRef] [Green Version]
  19. Niu, C.; Zhang, Y.; Gu, B. Optical encryption and verification technique for information coding in multiple-wavelengths in Fresnel domain. Optik 2006, 117, 516–524. [Google Scholar] [CrossRef]
  20. Zhang, F.; Pedrini, G.; Osten, W. Phase retrieval of arbitrary complex-valued fields through aperture-plane modulation. Phys. Rev. A 2007, 75, 0438054. [Google Scholar] [CrossRef]
  21. Liu, Z.; Liu, S. Double Image encryption based on iterative fractional Fourier transform. Opt. Commun. 2007, 275, 324–329. [Google Scholar] [CrossRef]
  22. Hwang, H.; Chang, H.T.; Lie, W. Multiple image encryption and multiplexing using a modified Gerchberg-Saxton algorithm and phase modulation in Fresnel-transform Domain. Opt. Lett. 2009, 34, 3917–3919. [Google Scholar] [CrossRef] [PubMed]
  23. Chang, H.T.; Hwang, H.-E.; Lee, C.-L.; Lee, M.-T. Wavelength multiplexing multiple-image encryption using cascaded phase-only masks in the Fresnel transform domain. Appl. Opt. 2011, 50, 710–716. [Google Scholar] [CrossRef] [PubMed]
  24. Chen, W.; Chen, X.; Sheppard, C.J.R. Optical image encryption based on phase retrieval combined with three-dimensional particle-like distribution. J. Opt. 2012, 14, 75402. [Google Scholar] [CrossRef]
  25. Chen, W.; Chen, X. Optical cryptography network topology based on 2D-to-3D conversion and phase-mask extraction. Opt. Lasers Eng. 2013, 51, 410–416. [Google Scholar] [CrossRef]
  26. Chen, W.; Chen, X. Optical multiple-image authentication based on modified Gerchberg–Saxton algorithm with random sampling. Opt. Commun. 2014, 318, 128–132. [Google Scholar] [CrossRef]
  27. Zhao, T.; Ran, Q.; Yuan, L.; Chi, Y.; Ma, J. Key distribution and changing key cryptosystem based on phase retrieval algorithm and RSA public-key algorithm. Math. Probl. Eng. 2015, 2015, 732609. [Google Scholar] [CrossRef]
  28. Rajput, S.K.; Nishchal, N.K. Fresnel domain nonlinear optical image encryption scheme based on Gerchberg–Saxton phase-retrieval algorithm. Appl. Opt. 2014, 53, 418–425. [Google Scholar] [CrossRef]
  29. Wang, Y.; Quan, C.; Tay, C.J. Nonlinear multiple-image encryption based on mixture retrieval algorithm in Fresnel domain. Opt. Commun. 2014, 330, 91–98. [Google Scholar] [CrossRef]
  30. Liu, W.; Xie, Z.; Liu, Z.; Zhang, Y.; Liu, S. Multiple-image encryption based on optical asymmetric key cryptosystem. Opt. Commun. 2015, 335, 205–211. [Google Scholar] [CrossRef]
  31. Zhao, T.; Ran, Q.; Chi, Y. Image encryption based on nonlinear encryption system and public-key cryptography. Opt. Commun. 2015, 338, 64–72. [Google Scholar] [CrossRef]
  32. Zhao, T.; Ran, Q.; Yuan, L.; Chi, Y.; Ma, J. Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography. Opt. Lasers Eng. 2015, 72, 12–17. [Google Scholar] [CrossRef]
  33. Zhao, T.; Ran, Q.; Yuan, L.; Chi, Y.; Ma, J. Optical image encryption using password key based on phase retrieval algorithm. J. Mod. Opt. 2016, 63, 771–776. [Google Scholar] [CrossRef]
  34. Wang, X.; Chen, W.; Chen, X. Optical information authentication using compressed double-random-phase-encoded images and Quick-response Codes. Opt. Express 2015, 23, 6239–6253. [Google Scholar] [CrossRef]
  35. Chen, W. Hierarchically optical double-image correlation using 3D phase retrieval algorithm in fractional Fourier transform domain. Opt. Commun. 2018, 427, 374–381. [Google Scholar] [CrossRef]
  36. Kumar, R.; Sheridan, J.T.; Bhaduri, B. Nonlinear double image encryption using 2D non-separable linear canonical transform and phase retrieval algorithm. Opt. Laser Technol. 2018, 107, 353–360. [Google Scholar] [CrossRef]
  37. Piao, M.L.; Liu, Z.X.; Piao, Y.L.; Wu, H.Y.; Yu, Z.; Kim, N. Multi-depth three-dimensional image encryption based on the phase retrieval algorithm in the Fresnel and fractional Fourier transform domains. Appl. Opt. 2018, 57, 7609–7617. [Google Scholar] [CrossRef]
  38. Abuturab, M.R. Securing multiple information using wavelet transform and Yang-Gu mixture amplitude-phase retrieval algorithm. Opt. Lasers Eng. 2019, 118, 42–51. [Google Scholar] [CrossRef]
  39. Nishchal, N.K. Optical Cryptosystems; IOP Publishing: Bristol, UK, 2019. [Google Scholar]
  40. Oppenheim, A.V.; Lim, J.S. The importance of phase in signals. Proc. IEEE 1981, 69, 529–541. [Google Scholar] [CrossRef]
  41. Skarbnik, N.; Zeevi, Y.Y.; Sagiv, C. The Importance of Phase in Image Processing; Technical Report; Technion—Israel Institute of Technology: Haifa, Israel, 2010; pp. 1–30. [Google Scholar]
  42. Fienup, J.R. Phase retrieval algorithms: A personal tour. Appl. Opt. 2013, 52, 45–56. [Google Scholar] [CrossRef] [Green Version]
  43. Chang, H.; Yin, X.; Cui, X.; Zhang, Z.; Ma, J.; Wu, G.; Zhang, L.; Xin, X. Adaptive optics compensation of orbital angular momentum beams with a modified Gerchberg–Saxton-based phase retrieval algorithm. Opt. Commun. 2017, 405, 271–275. [Google Scholar] [CrossRef]
  44. Wang, H.; Yue, W.; Song, Q.; Liu, J.; Situ, G. A hybrid Gerchberg–Saxton-like algorithm for DOE and CGH calculation. Opt. Lasers Eng. 2017, 89, 109–115. [Google Scholar] [CrossRef] [Green Version]
  45. Guo, C.; Liu, S.; Sheridan, J.T. Iterative phase retrieval algorithms. I: Optimization. Appl. Opt. 2015, 54, 4698–4708. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  46. Milster, T.D. The Gerchberg-Saxton Phase Retrieval Algorithm and Related Variations. In Optical Holography—Materials, Theory and Applications; Elsevier: Amsterdam, The Netherlands, 2020; pp. 61–72. [Google Scholar]
  47. Nakano, K.; Suzuki, H. Analysis of singular phase based on double random phase encoding using phase retrieval algorithm. Opt. Lasers Eng. 2020, 134, 106300. [Google Scholar] [CrossRef]
  48. Situ, G.; Suo, J.; Dai, Q. Generalized iterative phase retrieval algorithms and their applications. In Proceedings of the 2015 IEEE 13th International Conference on Industrial Informatics (INDIN), Cambridge, UK, 22–24 July 2015; pp. 713–720. [Google Scholar]
  49. Peng, X.; Zhang, P.; Wei, H.; Yu, B. Known-plaintext attack on optical encryption based on double random phase keys. Opt. Lett. 2006, 31, 1044–1046. [Google Scholar] [CrossRef]
  50. Barrera, J.F.; Vargas, C.; Tebaldi, M.; Torroba, R.; Bolognini, N. Known-plaintext attack on a joint transform correlator encrypting system. Opt. Lett. 2010, 35, 3553–3555. [Google Scholar] [CrossRef]
  51. Rajput, S.K.; Nishchal, N.K. Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform. Appl. Opt. 2013, 52, 871–878. [Google Scholar] [CrossRef]
  52. Zhao, T.; Ran, Q.; Yuan, L.; Chi, Y. Manipulative attack using the phase retrieval algorithm for double random phase encoding. Appl. Opt. 2015, 54, 7115–7119. [Google Scholar] [CrossRef]
Figure 1. Gerchberg–Saxton (G-S) algorithm. FT—Fourier transform, and IFT—inverse Fourier transform.
Figure 1. Gerchberg–Saxton (G-S) algorithm. FT—Fourier transform, and IFT—inverse Fourier transform.
Entropy 22 01354 g001
Figure 2. Numerical simulation of the G-S algorithm: (a) Gauss function curve, (b) target function curve, (c) comparative analysis, and (d) correlation coefficient curve.
Figure 2. Numerical simulation of the G-S algorithm: (a) Gauss function curve, (b) target function curve, (c) comparative analysis, and (d) correlation coefficient curve.
Entropy 22 01354 g002aEntropy 22 01354 g002b
Figure 3. The G-S algorithm applied to image encryption. f : the focal length. C C D : charge coupled device.
Figure 3. The G-S algorithm applied to image encryption. f : the focal length. C C D : charge coupled device.
Entropy 22 01354 g003
Figure 4. G-S algorithm applied to image encryption: (a) input amplitude image, (b) target amplitude image, (c) number of iterations, (d) ciphertext, (e) the recovered plaintext image, (f) the recovered plaintext image without amplitude.
Figure 4. G-S algorithm applied to image encryption: (a) input amplitude image, (b) target amplitude image, (c) number of iterations, (d) ciphertext, (e) the recovered plaintext image, (f) the recovered plaintext image without amplitude.
Entropy 22 01354 g004
Figure 5. The importance of the phase. P T denotes the phase truncation operation, P R —the phase reservation observation, F T —Fourier transform, and I F T —inverse Fourier transform.
Figure 5. The importance of the phase. P T denotes the phase truncation operation, P R —the phase reservation observation, F T —Fourier transform, and I F T —inverse Fourier transform.
Entropy 22 01354 g005
Figure 6. The optical system of single-phase modulation: z 1 is the diffraction distance; CCD—charge coupled device.
Figure 6. The optical system of single-phase modulation: z 1 is the diffraction distance; CCD—charge coupled device.
Entropy 22 01354 g006
Figure 7. The flowchart of the single-phase retrieval (SPR) algorithm.
Figure 7. The flowchart of the single-phase retrieval (SPR) algorithm.
Entropy 22 01354 g007
Figure 8. Simulation of the single-phase retrieval algorithm: (a) target amplitude image, (b) ciphertext, (c) the recovered plaintext image, (d) the transformation curve of the correlation coefficient (CC).
Figure 8. Simulation of the single-phase retrieval algorithm: (a) target amplitude image, (b) ciphertext, (c) the recovered plaintext image, (d) the transformation curve of the correlation coefficient (CC).
Entropy 22 01354 g008
Figure 9. The optical system of double-phase modulation.
Figure 9. The optical system of double-phase modulation.
Entropy 22 01354 g009
Figure 10. The flowchart of the double-phase retrieval (DPR) algorithm.
Figure 10. The flowchart of the double-phase retrieval (DPR) algorithm.
Entropy 22 01354 g010
Figure 11. Simulation of the double-phase retrieval algorithm: (a) target amplitude image; (b) ciphertext, (c) ciphertext, (d) the recovered plaintext image, (e) the transformation curve of the CC.
Figure 11. Simulation of the double-phase retrieval algorithm: (a) target amplitude image; (b) ciphertext, (c) ciphertext, (d) the recovered plaintext image, (e) the transformation curve of the CC.
Entropy 22 01354 g011
Figure 12. The optical system of multiple-phase modulation.
Figure 12. The optical system of multiple-phase modulation.
Entropy 22 01354 g012
Figure 13. The flowchart of the multiple-phase retrieval (MPR) algorithm.
Figure 13. The flowchart of the multiple-phase retrieval (MPR) algorithm.
Entropy 22 01354 g013
Figure 14. Application of the G-S algorithm: (a) input amplitude image, (b) target amplitude image, (c) ciphertext, (d) the recovered plaintext image, (e) the transformation curve of the CC.
Figure 14. Application of the G-S algorithm: (a) input amplitude image, (b) target amplitude image, (c) ciphertext, (d) the recovered plaintext image, (e) the transformation curve of the CC.
Entropy 22 01354 g014
Figure 15. Application of the single-phase retrieval algorithm: (a) target amplitude image, (b) ciphertext, (c) the recovered plaintext image, (d) the transformation curve of the CC.
Figure 15. Application of the single-phase retrieval algorithm: (a) target amplitude image, (b) ciphertext, (c) the recovered plaintext image, (d) the transformation curve of the CC.
Entropy 22 01354 g015
Figure 16. Application of the double-phase retrieval algorithm: (a) target amplitude image; (b) ciphertext, (c) ciphertext, (d) the recovered plaintext image, (e) the transformation curve of the CC.
Figure 16. Application of the double-phase retrieval algorithm: (a) target amplitude image; (b) ciphertext, (c) ciphertext, (d) the recovered plaintext image, (e) the transformation curve of the CC.
Entropy 22 01354 g016aEntropy 22 01354 g016b
Figure 17. The CC curves for different numbers of phases.
Figure 17. The CC curves for different numbers of phases.
Entropy 22 01354 g017
Figure 18. Numerical simulation of two encryptions: (a) plaintext; (b) ciphertext, (c) ciphertext, (d) ciphertext, (e) plaintext; (f) ciphertext, (g) ciphertext, (h) ciphertext.
Figure 18. Numerical simulation of two encryptions: (a) plaintext; (b) ciphertext, (c) ciphertext, (d) ciphertext, (e) plaintext; (f) ciphertext, (g) ciphertext, (h) ciphertext.
Entropy 22 01354 g018
Figure 19. Histogram of ciphertexts: (a) histogram of P1, (b) histogram of P2, (c) histogram of P3.
Figure 19. Histogram of ciphertexts: (a) histogram of P1, (b) histogram of P2, (c) histogram of P3.
Entropy 22 01354 g019
Figure 20. Reliability verification: (a) ciphertext damaged, (b) ciphertext damaged, (c) ciphertext damaged, (d) the recovered plaintext image.
Figure 20. Reliability verification: (a) ciphertext damaged, (b) ciphertext damaged, (c) ciphertext damaged, (d) the recovered plaintext image.
Entropy 22 01354 g020
Figure 21. Reliability verification: (a) plaintext, (b) Gaussian noise is added, (c) salt and pepper noise is added, (d) ciphertext, (e) ciphertext, (f) ciphertext, (g) the recovered plaintext image, (h) the recovered plaintext image.
Figure 21. Reliability verification: (a) plaintext, (b) Gaussian noise is added, (c) salt and pepper noise is added, (d) ciphertext, (e) ciphertext, (f) ciphertext, (g) the recovered plaintext image, (h) the recovered plaintext image.
Entropy 22 01354 g021
Figure 22. Multiple-image encryption/decryption.
Figure 22. Multiple-image encryption/decryption.
Entropy 22 01354 g022
Figure 23. Encryption process of multiple-image encryption.
Figure 23. Encryption process of multiple-image encryption.
Entropy 22 01354 g023
Figure 24. Numerical simulation of multiple-image encryption/decryption: (a) ciphertext, (b) ciphertext, (c) ciphertext, (d) ciphertext, (e) the recovered plaintext image by (a,f) the recovered plaintext image by (a,b,g) the recovered plaintext image by (ac,h) the recovered plaintext image by (ad).
Figure 24. Numerical simulation of multiple-image encryption/decryption: (a) ciphertext, (b) ciphertext, (c) ciphertext, (d) ciphertext, (e) the recovered plaintext image by (a,f) the recovered plaintext image by (a,b,g) the recovered plaintext image by (ac,h) the recovered plaintext image by (ad).
Entropy 22 01354 g024
Figure 25. Beam shaping: (a) target waveform, (b) G-S algorithm, (c) SPR algorithm, (d) DPR algorithm, (e) the algorithm comparison.
Figure 25. Beam shaping: (a) target waveform, (b) G-S algorithm, (c) SPR algorithm, (d) DPR algorithm, (e) the algorithm comparison.
Entropy 22 01354 g025
Figure 26. Sensitivity of initial phase based on the G-S algorithm: (a) the phase exp ( π i / 2 ) , (b) the phase exp ( π i ) , (c) the random phase, (d) the random phase.
Figure 26. Sensitivity of initial phase based on the G-S algorithm: (a) the phase exp ( π i / 2 ) , (b) the phase exp ( π i ) , (c) the random phase, (d) the random phase.
Entropy 22 01354 g026
Figure 27. Sensitivity of initial phase based on the SPR algorithm: (a) the phase exp ( π i / 2 ) , (b) the phase exp ( π i ) , (c) the random phase, (d) the random phase.
Figure 27. Sensitivity of initial phase based on the SPR algorithm: (a) the phase exp ( π i / 2 ) , (b) the phase exp ( π i ) , (c) the random phase, (d) the random phase.
Entropy 22 01354 g027
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Zhao, T.; Chi, Y. Modified Gerchberg–Saxton (G-S) Algorithm and Its Application. Entropy 2020, 22, 1354. https://doi.org/10.3390/e22121354

AMA Style

Zhao T, Chi Y. Modified Gerchberg–Saxton (G-S) Algorithm and Its Application. Entropy. 2020; 22(12):1354. https://doi.org/10.3390/e22121354

Chicago/Turabian Style

Zhao, Tieyu, and Yingying Chi. 2020. "Modified Gerchberg–Saxton (G-S) Algorithm and Its Application" Entropy 22, no. 12: 1354. https://doi.org/10.3390/e22121354

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop