Ex) Article Title, Author, Keywords
Current Optics
and Photonics
Ex) Article Title, Author, Keywords
Curr. Opt. Photon. 2023; 7(4): 362-377
Published online August 25, 2023 https://doi.org/10.3807/COPP.2023.7.4.362
Copyright © Optical Society of Korea.
Peiming Zhang1, Yahui Su2, Yiqiang Zhang3 , Leihong Zhang3, Runchu Xu3, Kaimin Wang3, Dawei Zhang3,4
Corresponding author: *222180382@st.usst.edu.cn, ORCID 0009-0006-1603-1647
This is an Open Access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.org/licenses/by-nc/4.0/) which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited.
Optical information processing technology is characterized by high speed and parallelism, and the light features short wavelength and large information capacity; At the same time, it has various attributes including amplitude, phase, wavelength and polarization, and is a carrier of multi-dimensional information. Therefore, optical encryption is of great significance in the field of information security transmission, and is widely used in the field of image encryption. For multi-image encryption, this paper proposes a multi-image encryption algorithm based on a modified Gerchberg–Saxton algorithm (MGSA) in the Fresnel-transform domain and computational ghost imaging. First, MGSA is used to realize “one code, one key”; Second, phase function superposition and normalization are used to reduce the amount of ciphertext transmission; Finally, computational ghost imaging is used to improve the security of the whole encryption system. This method can encrypt multiple images simultaneously with high efficiency, simple calculation, safety and reliability, and less data transmission. The encryption effect of the method is evaluated by using correlation coefficient and structural similarity, and the effectiveness and security of the method are verified by simulation experiments.
Keywords: Computational ghost imaging, Diffraction distance, Encryption of multiple images, Location multiplexing, Modified Gerchberg-Saxton algorithm (MGSA)
OCIS codes: (060.4785) Optical security and encryption; (100.3020) Image reconstructionrestoration; (100.5070) Phase retrieval
Optical information security technology has the characteristics of high dimension, high parallel processing speed, and fast realization of convolution and correlation operations [1–3]. Therefore, in the field of information security, the advantages of optical information security technology are becoming increasingly noticeable. In an optical encryption system, light wave transmission is accompanied by diffraction, which can provide parameters such as wavelength, amplitude, phase, polarization state, and spatial frequency. The system can use these parameters and diffraction distance as the encryption key of the system to achieve the purpose of information encryption by diffraction transformation [4–7].
As common methods of optical image encryption, double random phase coding, chaotic system, and computational ghost imaging have always been the research hotspots in the field of information security. One typical optical image encryption technology [8–11], double random phase coding, solves the selective plaintext attack to a certain extent and increases the security of the system. Chaotic signals are widely used in the field of information security because of their long-term unpredictability, initial value sensitivity, and randomness [12–18]. Information security technology based on the computational ghost imaging method has developed rapidly [19–21]. For example, to obtain greater security and robustness, someone proposes a computational ghost imaging encryption technology based on a QR code. In order to improve the storage and transmission efficiency of data and increase the security of the system, a computational ghost imaging encryption technology based on maze phase modulation and compressed sensing is proposed. As an important branch of optical encryption, multi-image optical encryption technology not only improves the encryption but also reduces the ciphertext transmission. Li
In this paper, a multi-image encryption method based on modified Gerchberg–Saxton algorithm (MGSA) and computational ghost imaging is proposed. In this encryption system, ciphertext transmission is reduced, and the security of the system is guaranteed. First, “one code, one key,” is realized by the distance multiplexing of Fresnel diffraction; Second, the method of phase superposition and normalization is used to reduce the transmission of ciphertext; Finally, the security of the whole encryption system is further enhanced by the computational ghost imaging algorithm. In this paper, simulation experiments are carried out to verify feasibility, security, and robustness. The experimental results show that the proposed encryption system not only has high security and encryption capacity, but can also resist attacks such as noise and cropping. More importantly, each image has a primary public key and an auxiliary private key. The potential risk of sharing a public key is eliminated.
The Gerchberg-Saxton algorithm (G-S algorithm) is a method to recover image phase information by using known light field intensity. The core idea of G-S algorithm encryption is that through repeated iterations and Fourier transformation of the image in the frequency and space domains, the phase distribution of an image to be recovered in the spatial domain can be maximized after a certain number of iterations [29]. A classical flow chart is shown in Fig. 1.
In Fig. 1, |
(1) Select a random phase
(2) The amplitude part of
(3) Inverse Fourier transform is performed on the calculation results
(4) The amplitude of the results calculated in the previous step is updated with the spatial amplitude |
Using the G-S algorithm to encrypt the image is also very simple. Let the amplitude value in the spatial domain be 1 and the distribution function
The principle of computational ghost imaging encryption is shown in Fig. 2. In the first place in the spatial light modulator input N random distribution in the space phase mask
where
In the imaging process, only one bucket detector (BD) is required to obtain ciphertext
where
where
After
Therefore, the phase mask key and distance parameter
where <•> is the average operation.
In the process of multi-image encryption based on MGSA and computational ghost imaging, the computational ghost imaging algorithm is combined with the MGSA algorithm. First, the image is transformed into pure phase information through MGSA to realize one code, one key; Second, different phase functions are superimposed and normalized to reduce ciphertext transmission. Finally, the ciphertext is encrypted twice, which improves the security of the whole encryption system and solves the problem of the large amount of data in the process of multi-image encryption.
In this system with a clear image for the amplitude of Fresnel transform to generate the function |
The multi-image encryption process based on MGSA and the computational ghost imaging algorithm is shown in Fig. 3. The main steps are as follows:
Step 1: For each secret image, arbitrarily given an initial random phase function exp[
Step 2: Perform the MGSA operation mentioned above on N images (Fresnel transform distance is
Step 3: Use the normalized ciphertext
The specific decryption process is as follows in Fig. 4:
Step 1: According to Eq. 6, the decoder needs to perform an associative calculation on ciphertext {
Step 2: Take the inverse Fresnel transform of the reconstructed combined phase function, whose distance is
The correlation coefficient, often abbreviated as CC, is a standard used to quantitatively measure the similarity between two images. CC is calculated by randomly selecting 10,000 pairs of adjacent pixels (horizontal, vertical, or diagonal) from the input image and the encrypted image. Then, calculate the CC of each pair of relationships using Eq. (8):
where
Peak signal-to-noise ratio (PSNR) is the most common and widely used objective measure of image quality. It is used to measure the level of distortion or noise in an image. The higher the value, the better the image quality.
In Eq. (9),
The structural similarity (SSIM) index is an index used to quantify the structural similarity between two images. SSIM is modeled on the human visual system (HVS) to realize the theory of structural similarity and is sensitive to the perception of local structural changes of images. SSIM quantifies image attributes from brightness, contrast and structure, uses mean values to estimate brightness, variance to estimate contrast, and covariance to estimate structural similarity. The SSIM value ranges from 0 to 1. The larger the SSIM value is, the more similar the images are. If two pictures are exactly the same, the SSIM value is 1.
For image
To verify the effectiveness of the encryption system, a numerical experiment was mainly implemented using MATLAB2016B software. We chose three aspects for verification and analysis: Feasibility, safety and robustness. In this paper, the Set12 image dataset [29] is used as an example, and 4 images are randomly selected as plaintext images with a size of 64 × 64. In the simulation of multiplexing of positions, wavelength
The MGSA algorithm is used to superimpose and normalize the information of the four pure phase functions, and the results are shown in Fig. 5. Figures 5(a)–5(d) shows the original pictures of the four secret images; Figures 5(e)–5(h) shows the decryption result under the condition that the key is completely correct; Figure 5(i) shows the combined phase function obtained after MGSA and superposition normalization.
By comparing the CCs and SSIM of the proposed method with the original image and decrypted image of the method [30, 31], in Fig. 6, it can be concluded that: (1) The CC and SSIM of images reconstructed by each algorithm gradually decrease with the increase in the number of encrypted images. The decrease rate of the algorithm used in this paper is relatively low compared with that in the literature [31], and CC and SSIM both decrease to varying degrees compared with that in the literature, but it also improves the security of the algorithm [30]. (2) With the same number of iterations, the improved MGSA algorithm proposed in this paper is superior to the method [28]. And with the increase in the number of iterations, the advantages of the proposed algorithm become more and more significant. (3) When the number of iterative frames in this method reaches four, the CC value is around 0.82 and SSIM value is around 0.85, indicating that the proposed method has a large amount of ciphertext transmission and is suitable for multi-image encryption.
To further prove the feasibility of the encryption system in this paper, we collect statistics on the CC value and SSIM value between the decrypted image and the original image with the change of sampling rate, and draw a broken line graph as shown in Fig. 7. For the sake of statistical analysis, no matter how many pictures are super-imposed in the stacking process, the image Lena must exist. In the line graph drawing, the image Lena is fixed as a statistical sample among different superimposed samples. The results in Fig. 7 are as follows: (1) With the increase in the number of superimposed images, the overall decryption quality of the image will drop. (2) With the increase in the sampling rate, the quality of the decrypted image continuously improves. (3) At the same time, under the condition of full image sampling, the CC values of decrypted images are all above 0.6 and the SSIM values are all above 0.65, indicating that the system has excellent multi-image encryption performance and good feasibility.
In the multi-image encryption system based on MGSA and computational ghost imaging, it is necessary to encrypt the image MGSA first, and then superimpose and normalize the obtained phase function to get the combined phase function. Coherent light passes through the spatial light modulator, and the modulated beam illuminates the phase function for secondary encryption. Finally, the beam information is collected by the bucket detector to obtain the final ciphertext. In this process, each image corresponds to two keys, of which the primary key is the phase generated by the phase iterative system in the iterative encryption process exp[
Results analysis: (1) The decryption quality of the image is good by combining the MGSA algorithm with the computational ghost imaging algorithm. Figure 8(b) shows the reconstructed image with the correct ciphertext and key. It can be seen that the information of the encrypted image can be reconstructed only when the decryptor has the correct key and ciphertext. (2) It can be seen in Fig. 8(c) that when the decryptor only contains the primary key, the obtained information is wrong even if the decryption algorithm is known. (3) Figure 8(d) shows that when the decryptor only uses the secondary key to decrypt the encryption system, no information of the encrypted image can be obtained. The encryption algorithm in this paper first realizes “one code, one key,” with distance multiplexing, then reduces the amount of transmitted data with phase function superposition and normalization, and finally carries out secondary encryption with image combination, which improves the security of the whole system.
On this basis, the sensitivity of diffraction distance of the primary key is analyzed. According to the decryption results, when the diffraction distance deviation is 0.1 m, 0.01 m, 0.001 m, 0.0001 m, 0.00001 m, 0.000001 m, and 0.0000001 m, the sensitivity of the key is analyzed and then the security of the key is analyzed. It can be seen from the decryption results that the decrypted image is very sensitive to the diffraction distance, which has different degrees of deviation. The amplitude of the Fresnel field is randomly disturbed due to the addition of an amplitude modulation template, and the decryption result is very sensitive to the deviation of diffraction distance, which enhances the security of the system. The influence of the diffraction distance
TABLE 1 Diffraction distance error, CC value and SSIM value table
Diffraction Distance Error (m) | 0 | 0.0000001 | 0.000001 | 0.00001 | 0.0001 | 0.001 | 0.01 | 0.1 | |
---|---|---|---|---|---|---|---|---|---|
CC | House | 0.8487 | 0.8287 | 0.8288 | 0.8269 | 0.7559 | 0.5383 | 0.3575 | 0.0328 |
Starfish | 0.9563 | 0.9564 | 0.9562 | 0.9562 | 0.8980 | 0.3975 | 0.3074 | 0.1068 | |
Pepper | 0.8858 | 0.8358 | 0.8357 | 0.8345 | 0.7909 | 0.4648 | 0.3681 | 0.0523 | |
Lena | 0.9410 | 0.9410 | 0.9311 | 0.9217 | 0.9123 | 0.4065 | 0.1646 | 0.0364 | |
SSIM | House | 0.8341 | 0.8341 | 0.8344 | 0.8331 | 0.6254 | 0.1838 | 0.0206 | 0.0055 |
Pepper | 0.6640 | 0.6640 | 0.6636 | 0.6616 | 0.5650 | 0.1830 | 0.1693 | 0.0136 | |
Starfish | 0.8502 | 0.8502 | 0.8501 | 0.8496 | 0.6898 | 0.1622 | 0.0591 | 0.0343 | |
Lena | 0.7069 | 0.7069 | 0.7072 | 0.7072 | 0.5733 | 0.3107 | 0.1160 | 0.0157 |
Figure 9 shows that (1) as the diffraction distance error grows, CC and SSIM values between the reconstructed image and the original image gradually increase. The lower the definition of the reconstructed image is, the more difficult it is to distinguish the information of the original image. (2) When the diffraction distance error reaches ±0.001 m, the CC value of the reconstructed image and the original image is less than 0.5, and the SSIM value is less than 0.32. The reconstructed image only contains very little useful information, and the original image cannot be clearly distinguished, resulting in a poor reconstruction effect. (3) When the diffraction distance error is within ±0.0001 m, the CC value of the reconstructed image and the original image is above 0.75, and the SSIM value is above 0.55. Most information of the original image can be distinguished, but some details are lost to a certain extent. The above results indicate that the decryption results are very sensitive to the diffraction distance deviation, and the security of the system is guaranteed.
Ciphertext-only attacks (COA) assume that a cipher analyst possesses the password algorithm and plaintext statistics feature, intercepts one or more ciphertexts encrypted with the same key, and obtains the plaintext or key by analyzing these ciphertexts. Only COA have the least known conditions. Passwords that cannot withstand COA are considered insecure. We use statistical analysis to verify the security of the encryption system to demonstrate the security of the method. The larger the CC is, the stronger the correlation between adjacent pixels of the image is; Otherwise, the correlation is lower. After an image is encrypted, the smaller the correlation of the ciphertext image is, the more destructive the encryption algorithm is to the gray correlation of the image, and it is difficult for an attacker to analyze the plaintext information based on the ciphertext or key obtained. In this sense, the encryption system has a certain degree of security.
In order to directly reveal the correlation between the adjacent pixels of the original image and the encrypted image, Fig. 10 analyzes the three-dimensional gray distribution of the four plaintext images and ciphertext images, as shown in Table 2. The table shows the three-dimensional gray distribution of house, pepper, starfish, Lena and ciphertext respectively. The gray values of adjacent pixels of the four original images all show highly correlated rows. However, the randomness of gray values between adjacent pixels is very noticeable in the 3D gray distribution of ciphertext images. The statistical feature of ciphertext makes it difficult for an attacker to obtain information about the encryption system with COA.
TABLE 2 Three-dimensional gray distribution of secret image and ciphertext image
Grayscale Image | Three-dimensional Grayscale Distribution | Grayscale Image | Three-dimensional Grayscale Distribution |
---|---|---|---|
![]() | ![]() | ![]() | ![]() |
![]() | ![]() | ![]() | ![]() |
![]() | ![]() |
At the same time, to directly demonstrate the correlation between the adjacent pixels of the original image and the encrypted image, the grayscale image starfish is used as an example, and MATLAB is used to draw a correlation distribution map of adjacent pixels (horizontal, vertical and diagonal directions) of the original image and the ciphertext image. As shown in Fig. 10, (1) there is a correlation between adjacent pixels of the original image, and whether there is a certain regularity in the horizontal, vertical or diagonal directions; And (2) there is no obvious regularity between adjacent pixels of ciphertext images. It also shows that the proposed encryption system is very destructive to the adjacent pixels of the original image, and it is difficult for attackers to obtain plaintext information based on the ciphertext. The encryption system has outstanding security. The autocorrelation coefficient of each original image and that of the encrypted image is one of the indicators used to evaluate statistical information. Generally speaking, for a good image encryption scheme, the distribution of image pixel autocorrelation features will be damaged to a considerable extent. Therefore, the system has remarkable security.
Thus, the CCs of different secret images in each direction are further calculated, as shown in Table 3. As can be seen in Table 3, the horizontal, vertical and diagonal CCs of the four original images are all more than 0.79, and the CCs of ciphertext images in all directions are less than 0.1. This indicates that the correlation between adjacent pixels of the original image is high, while the correlation between adjacent pixels of the ciphertext image is low. The encryption system is very destructive to the original image and it is difficult for the decryptor to analyze the plaintext information based on the ciphertext information obtained, indicating that the encryption system is secure.
TABLE 3 Correlation coefficients between adjacent pixels of the image to be encrypted and ciphertext
Direction | Starfish | Pepper | House | Lena | Ciphertext |
---|---|---|---|---|---|
Horizontal | 0.8679 | 0.8792 | 0.8524 | 0.8739 | 0.0123 |
Vertical | 0.8991 | 0.9026 | 0.8962 | 0.8970 | −0.0159 |
Diagonal | 0.7926 | 0.8127 | 0.8050 | 0.8100 | 0.0203 |
Assuming that the key is lost to different degrees in the process of transmission and the key is clipped to different degrees in different positions, we choose the similarity normalized correlation (NC) as an evaluation index to verify the anti-clipping attack performance of the encryption system.
As shown in Table 4, (1) as the key clipping area expands, the NC value between the reconstructed image and the original image gradually decreases. The lower the definition of the reconstructed image, the more difficult it is to distinguish the information of the original image. (2) When the clipping ratio is 30%, the CC values of the reconstructed image and the original image are both above 0.85, and the SSIM value is above 0.65, which can clearly distinguish the information of the original image, and the reconstruction result is good. (3) When the clipping ratio of the key is 50%, the CC values of the reconstructed image and the original image are both more than 0.65, the SSIM value is above 0.55, and part of the information of the encrypted image can still be distinguished, indicating that the method can resist clipping attacks well. To sum up, the encryption system proposed in this paper not only shows good robustness against noise attacks, but also can resist clipping attacks, indicating that the encryption system has superb robustness.
TABLE 4 Normalized correlation (NC) of different cropping proportions
Cropping Proportions | Reconstructed Images | |||
---|---|---|---|---|
Starfish | House | Pepper | Lena | |
10% | ![]() | ![]() | ![]() | ![]() |
CC | 0.8210 | 0.8405 | 0.8304 | 0.8510 |
SSIM | 0.8502 | 0.8341 | 0.6641 | 0.7069 |
20% | ![]() | ![]() | ![]() | ![]() |
CC | 0.8089 | 0.8014 | 0.7803 | 0.8289 |
SSIM | 0.8501 | 0.8338 | 0.6636 | 0.7072 |
30% | ![]() | ![]() | ![]() | ![]() |
CC | 0.7624 | 0.7755 | 0.7510 | 0.7624 |
SSIM | 0.8496 | 0.7938 | 0.6616 | 0.7073 |
40% | ![]() | ![]() | ![]() | ![]() |
CC | 0.7433 | 0.7060 | 0.7198 | 0.7433 |
SSIM | 0.7361 | 0.7127 | 0.6238 | 0.6536 |
50% | ![]() | ![]() | ![]() | ![]() |
CC | 0.7024 | 0.6902 | 0.6706 | 0.7024 |
SSIM | 0.6898 | 0.6095 | 0.5650 | 0.5733 |
By adding different types of noise with the same density to the ciphertext, we simulate the process where the ciphertext or key may be affected by noise in the transmission process. We select salt-and-pepper noise, gaussian noise and multiplicative noise, and carry out a simulation for each noise by using 10 different embedding strengths (0.01, 0.02, 0.03, 0.04, 0.05, 0.06, 0.07, 0.08, 0.09, 0.10). The results are shown in Fig. 11. Gaussian noise, salt-and-pepper noise and multiplicative noise are used to attack the four secret images. In Fig. 11, only four kinds of noise intensity are shown: 0.01 (upper left), 0.02 (upper right), 0.04 (lower left) and 0.08 (lower right).
As can be seen in Fig. 11, (1) when ciphertext is subjected to different types of noise attacks, the information of encrypted images can be reconstructed, indicating that the encryption system proposed in this paper can resist not only salt-and-pepper noise attacks, but also Gaussian noise attacks; (2) In a noise attack with the same density, the image reconstructed by salt-and-pepper noise is clearer, followed by Gaussian noise; (3) With the increase of noise embedding intensity, the quality of a decrypted image also decreases to varying degrees. For Gaussian noise, when the attack intensity reaches 0.08, the decryption result is poor and it is difficult to identify the image information. The decryption result of the salt-and-pepper noise attack is better than that of the Gaussian noise attack, but it also has a great influence on the visual effect. It shows that the encryption system is robust against noise attacks.
To further prove the robustness of the encryption system, a line chart of decrypted image CC, SSIM and PSNR with the embedding intensity of noise is drawn after the decryption of images with different noise in-tensities of different noise types, as shown in Fig. 12.
As can be seen in Fig. 12, the three indicators simultaneously show that gaussian noise has the greatest influence on image quality for the same embedding intensity. When the embedding intensity of multiplicative noise and salt-and-pepper noise is 5%, the CC value, SSIM and PSNR of the image can still reach above 0.57, 0.75 and 17, respectively, showing strong resistance to noise. The decryption quality of the image decreases with the increase of the noise embedding intensity, but for the noise of general intensity, the decryption quality of the encryption system is good and has strong robustness, which further confirms the robust performance of the encryption system.
To sum up, the encryption system proposed in this paper shows good robustness to noise attacks. Although the decryption results of images are lost to a certain extent with the enhancement of noise attacks, the image decryption quality is good when resisting noise attacks of general intensity. At the same time, the encryption system can resist clipping attacks to a certain extent. When the clipping information reaches 50%, the contour information of the image can still be observed, but the detailed information is seriously damaged. This shows that the encryption system has good robustness.
In this paper, a multi-image encryption method based on MGSA and computational ghost imaging is proposed. On the basis of MGSA optical image encryption, Fresnel diffraction distance multiplexing is used to stack the phase function obtained by phase superposition of a single secret image and normalize it so as to realize diffraction distance multiplexing, which facilitates the compression of encrypted multi-image information, and solves the problem of large amounts of ciphertext transmission in multi-image encryption. Finally, the combination of computational ghost imaging and MGSA improves the security and accuracy of the encryption system. Because the MGSA of the optical image encryption is very sensitive to the distance key, the information of the encrypted image can be reconstructed only when the key is completely correct or produces minimal error. Its encryption system is simple and easy to transmit and record. It has better practicability compared with double random phase encoding, and this method can send different keys to different authorized users, which guarantees that it has a broader application prospect.
There are no conflicts of interest in the submitted manuscript, and the manuscript was approved by all authors for publication. The lead author declares on behalf of my co-authors that the work described was original research that has not been published previously, and is not under consideration for publication elsewhere, in whole or in part. All the authors listed have approved the manuscript that is enclosed.
Data underlying the results presented in this paper are not publicly available at the time of publication, but may be obtained from the authors upon reasonable request.
National Natural Science Foundation of China (No. 62275153, 62005165); Shanghai Industrial Collaborative Innovation Project (HCXBCY-2022-006).
Curr. Opt. Photon. 2023; 7(4): 362-377
Published online August 25, 2023 https://doi.org/10.3807/COPP.2023.7.4.362
Copyright © Optical Society of Korea.
Peiming Zhang1, Yahui Su2, Yiqiang Zhang3 , Leihong Zhang3, Runchu Xu3, Kaimin Wang3, Dawei Zhang3,4
1School of Health Science and Engineering, University of Shanghai for Science and Technology, Shanghai 200093, China
2College of Communication and Art Design, University of Shanghai for Science and Technology, Shanghai 200093, China
3School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology, Shanghai 200093, China
4Shanghai Institute of Intelligent Science and Technology, Tongji University, Shanghai 200092, China
Correspondence to:*222180382@st.usst.edu.cn, ORCID 0009-0006-1603-1647
This is an Open Access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.org/licenses/by-nc/4.0/) which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited.
Optical information processing technology is characterized by high speed and parallelism, and the light features short wavelength and large information capacity; At the same time, it has various attributes including amplitude, phase, wavelength and polarization, and is a carrier of multi-dimensional information. Therefore, optical encryption is of great significance in the field of information security transmission, and is widely used in the field of image encryption. For multi-image encryption, this paper proposes a multi-image encryption algorithm based on a modified Gerchberg–Saxton algorithm (MGSA) in the Fresnel-transform domain and computational ghost imaging. First, MGSA is used to realize “one code, one key”; Second, phase function superposition and normalization are used to reduce the amount of ciphertext transmission; Finally, computational ghost imaging is used to improve the security of the whole encryption system. This method can encrypt multiple images simultaneously with high efficiency, simple calculation, safety and reliability, and less data transmission. The encryption effect of the method is evaluated by using correlation coefficient and structural similarity, and the effectiveness and security of the method are verified by simulation experiments.
Keywords: Computational ghost imaging, Diffraction distance, Encryption of multiple images, Location multiplexing, Modified Gerchberg-Saxton algorithm (MGSA)
Optical information security technology has the characteristics of high dimension, high parallel processing speed, and fast realization of convolution and correlation operations [1–3]. Therefore, in the field of information security, the advantages of optical information security technology are becoming increasingly noticeable. In an optical encryption system, light wave transmission is accompanied by diffraction, which can provide parameters such as wavelength, amplitude, phase, polarization state, and spatial frequency. The system can use these parameters and diffraction distance as the encryption key of the system to achieve the purpose of information encryption by diffraction transformation [4–7].
As common methods of optical image encryption, double random phase coding, chaotic system, and computational ghost imaging have always been the research hotspots in the field of information security. One typical optical image encryption technology [8–11], double random phase coding, solves the selective plaintext attack to a certain extent and increases the security of the system. Chaotic signals are widely used in the field of information security because of their long-term unpredictability, initial value sensitivity, and randomness [12–18]. Information security technology based on the computational ghost imaging method has developed rapidly [19–21]. For example, to obtain greater security and robustness, someone proposes a computational ghost imaging encryption technology based on a QR code. In order to improve the storage and transmission efficiency of data and increase the security of the system, a computational ghost imaging encryption technology based on maze phase modulation and compressed sensing is proposed. As an important branch of optical encryption, multi-image optical encryption technology not only improves the encryption but also reduces the ciphertext transmission. Li
In this paper, a multi-image encryption method based on modified Gerchberg–Saxton algorithm (MGSA) and computational ghost imaging is proposed. In this encryption system, ciphertext transmission is reduced, and the security of the system is guaranteed. First, “one code, one key,” is realized by the distance multiplexing of Fresnel diffraction; Second, the method of phase superposition and normalization is used to reduce the transmission of ciphertext; Finally, the security of the whole encryption system is further enhanced by the computational ghost imaging algorithm. In this paper, simulation experiments are carried out to verify feasibility, security, and robustness. The experimental results show that the proposed encryption system not only has high security and encryption capacity, but can also resist attacks such as noise and cropping. More importantly, each image has a primary public key and an auxiliary private key. The potential risk of sharing a public key is eliminated.
The Gerchberg-Saxton algorithm (G-S algorithm) is a method to recover image phase information by using known light field intensity. The core idea of G-S algorithm encryption is that through repeated iterations and Fourier transformation of the image in the frequency and space domains, the phase distribution of an image to be recovered in the spatial domain can be maximized after a certain number of iterations [29]. A classical flow chart is shown in Fig. 1.
In Fig. 1, |
(1) Select a random phase
(2) The amplitude part of
(3) Inverse Fourier transform is performed on the calculation results
(4) The amplitude of the results calculated in the previous step is updated with the spatial amplitude |
Using the G-S algorithm to encrypt the image is also very simple. Let the amplitude value in the spatial domain be 1 and the distribution function
The principle of computational ghost imaging encryption is shown in Fig. 2. In the first place in the spatial light modulator input N random distribution in the space phase mask
where
In the imaging process, only one bucket detector (BD) is required to obtain ciphertext
where
where
After
Therefore, the phase mask key and distance parameter
where <•> is the average operation.
In the process of multi-image encryption based on MGSA and computational ghost imaging, the computational ghost imaging algorithm is combined with the MGSA algorithm. First, the image is transformed into pure phase information through MGSA to realize one code, one key; Second, different phase functions are superimposed and normalized to reduce ciphertext transmission. Finally, the ciphertext is encrypted twice, which improves the security of the whole encryption system and solves the problem of the large amount of data in the process of multi-image encryption.
In this system with a clear image for the amplitude of Fresnel transform to generate the function |
The multi-image encryption process based on MGSA and the computational ghost imaging algorithm is shown in Fig. 3. The main steps are as follows:
Step 1: For each secret image, arbitrarily given an initial random phase function exp[
Step 2: Perform the MGSA operation mentioned above on N images (Fresnel transform distance is
Step 3: Use the normalized ciphertext
The specific decryption process is as follows in Fig. 4:
Step 1: According to Eq. 6, the decoder needs to perform an associative calculation on ciphertext {
Step 2: Take the inverse Fresnel transform of the reconstructed combined phase function, whose distance is
The correlation coefficient, often abbreviated as CC, is a standard used to quantitatively measure the similarity between two images. CC is calculated by randomly selecting 10,000 pairs of adjacent pixels (horizontal, vertical, or diagonal) from the input image and the encrypted image. Then, calculate the CC of each pair of relationships using Eq. (8):
where
Peak signal-to-noise ratio (PSNR) is the most common and widely used objective measure of image quality. It is used to measure the level of distortion or noise in an image. The higher the value, the better the image quality.
In Eq. (9),
The structural similarity (SSIM) index is an index used to quantify the structural similarity between two images. SSIM is modeled on the human visual system (HVS) to realize the theory of structural similarity and is sensitive to the perception of local structural changes of images. SSIM quantifies image attributes from brightness, contrast and structure, uses mean values to estimate brightness, variance to estimate contrast, and covariance to estimate structural similarity. The SSIM value ranges from 0 to 1. The larger the SSIM value is, the more similar the images are. If two pictures are exactly the same, the SSIM value is 1.
For image
To verify the effectiveness of the encryption system, a numerical experiment was mainly implemented using MATLAB2016B software. We chose three aspects for verification and analysis: Feasibility, safety and robustness. In this paper, the Set12 image dataset [29] is used as an example, and 4 images are randomly selected as plaintext images with a size of 64 × 64. In the simulation of multiplexing of positions, wavelength
The MGSA algorithm is used to superimpose and normalize the information of the four pure phase functions, and the results are shown in Fig. 5. Figures 5(a)–5(d) shows the original pictures of the four secret images; Figures 5(e)–5(h) shows the decryption result under the condition that the key is completely correct; Figure 5(i) shows the combined phase function obtained after MGSA and superposition normalization.
By comparing the CCs and SSIM of the proposed method with the original image and decrypted image of the method [30, 31], in Fig. 6, it can be concluded that: (1) The CC and SSIM of images reconstructed by each algorithm gradually decrease with the increase in the number of encrypted images. The decrease rate of the algorithm used in this paper is relatively low compared with that in the literature [31], and CC and SSIM both decrease to varying degrees compared with that in the literature, but it also improves the security of the algorithm [30]. (2) With the same number of iterations, the improved MGSA algorithm proposed in this paper is superior to the method [28]. And with the increase in the number of iterations, the advantages of the proposed algorithm become more and more significant. (3) When the number of iterative frames in this method reaches four, the CC value is around 0.82 and SSIM value is around 0.85, indicating that the proposed method has a large amount of ciphertext transmission and is suitable for multi-image encryption.
To further prove the feasibility of the encryption system in this paper, we collect statistics on the CC value and SSIM value between the decrypted image and the original image with the change of sampling rate, and draw a broken line graph as shown in Fig. 7. For the sake of statistical analysis, no matter how many pictures are super-imposed in the stacking process, the image Lena must exist. In the line graph drawing, the image Lena is fixed as a statistical sample among different superimposed samples. The results in Fig. 7 are as follows: (1) With the increase in the number of superimposed images, the overall decryption quality of the image will drop. (2) With the increase in the sampling rate, the quality of the decrypted image continuously improves. (3) At the same time, under the condition of full image sampling, the CC values of decrypted images are all above 0.6 and the SSIM values are all above 0.65, indicating that the system has excellent multi-image encryption performance and good feasibility.
In the multi-image encryption system based on MGSA and computational ghost imaging, it is necessary to encrypt the image MGSA first, and then superimpose and normalize the obtained phase function to get the combined phase function. Coherent light passes through the spatial light modulator, and the modulated beam illuminates the phase function for secondary encryption. Finally, the beam information is collected by the bucket detector to obtain the final ciphertext. In this process, each image corresponds to two keys, of which the primary key is the phase generated by the phase iterative system in the iterative encryption process exp[
Results analysis: (1) The decryption quality of the image is good by combining the MGSA algorithm with the computational ghost imaging algorithm. Figure 8(b) shows the reconstructed image with the correct ciphertext and key. It can be seen that the information of the encrypted image can be reconstructed only when the decryptor has the correct key and ciphertext. (2) It can be seen in Fig. 8(c) that when the decryptor only contains the primary key, the obtained information is wrong even if the decryption algorithm is known. (3) Figure 8(d) shows that when the decryptor only uses the secondary key to decrypt the encryption system, no information of the encrypted image can be obtained. The encryption algorithm in this paper first realizes “one code, one key,” with distance multiplexing, then reduces the amount of transmitted data with phase function superposition and normalization, and finally carries out secondary encryption with image combination, which improves the security of the whole system.
On this basis, the sensitivity of diffraction distance of the primary key is analyzed. According to the decryption results, when the diffraction distance deviation is 0.1 m, 0.01 m, 0.001 m, 0.0001 m, 0.00001 m, 0.000001 m, and 0.0000001 m, the sensitivity of the key is analyzed and then the security of the key is analyzed. It can be seen from the decryption results that the decrypted image is very sensitive to the diffraction distance, which has different degrees of deviation. The amplitude of the Fresnel field is randomly disturbed due to the addition of an amplitude modulation template, and the decryption result is very sensitive to the deviation of diffraction distance, which enhances the security of the system. The influence of the diffraction distance
TABLE 1. Diffraction distance error, CC value and SSIM value table.
Diffraction Distance Error (m) | 0 | 0.0000001 | 0.000001 | 0.00001 | 0.0001 | 0.001 | 0.01 | 0.1 | |
---|---|---|---|---|---|---|---|---|---|
CC | House | 0.8487 | 0.8287 | 0.8288 | 0.8269 | 0.7559 | 0.5383 | 0.3575 | 0.0328 |
Starfish | 0.9563 | 0.9564 | 0.9562 | 0.9562 | 0.8980 | 0.3975 | 0.3074 | 0.1068 | |
Pepper | 0.8858 | 0.8358 | 0.8357 | 0.8345 | 0.7909 | 0.4648 | 0.3681 | 0.0523 | |
Lena | 0.9410 | 0.9410 | 0.9311 | 0.9217 | 0.9123 | 0.4065 | 0.1646 | 0.0364 | |
SSIM | House | 0.8341 | 0.8341 | 0.8344 | 0.8331 | 0.6254 | 0.1838 | 0.0206 | 0.0055 |
Pepper | 0.6640 | 0.6640 | 0.6636 | 0.6616 | 0.5650 | 0.1830 | 0.1693 | 0.0136 | |
Starfish | 0.8502 | 0.8502 | 0.8501 | 0.8496 | 0.6898 | 0.1622 | 0.0591 | 0.0343 | |
Lena | 0.7069 | 0.7069 | 0.7072 | 0.7072 | 0.5733 | 0.3107 | 0.1160 | 0.0157 |
Figure 9 shows that (1) as the diffraction distance error grows, CC and SSIM values between the reconstructed image and the original image gradually increase. The lower the definition of the reconstructed image is, the more difficult it is to distinguish the information of the original image. (2) When the diffraction distance error reaches ±0.001 m, the CC value of the reconstructed image and the original image is less than 0.5, and the SSIM value is less than 0.32. The reconstructed image only contains very little useful information, and the original image cannot be clearly distinguished, resulting in a poor reconstruction effect. (3) When the diffraction distance error is within ±0.0001 m, the CC value of the reconstructed image and the original image is above 0.75, and the SSIM value is above 0.55. Most information of the original image can be distinguished, but some details are lost to a certain extent. The above results indicate that the decryption results are very sensitive to the diffraction distance deviation, and the security of the system is guaranteed.
Ciphertext-only attacks (COA) assume that a cipher analyst possesses the password algorithm and plaintext statistics feature, intercepts one or more ciphertexts encrypted with the same key, and obtains the plaintext or key by analyzing these ciphertexts. Only COA have the least known conditions. Passwords that cannot withstand COA are considered insecure. We use statistical analysis to verify the security of the encryption system to demonstrate the security of the method. The larger the CC is, the stronger the correlation between adjacent pixels of the image is; Otherwise, the correlation is lower. After an image is encrypted, the smaller the correlation of the ciphertext image is, the more destructive the encryption algorithm is to the gray correlation of the image, and it is difficult for an attacker to analyze the plaintext information based on the ciphertext or key obtained. In this sense, the encryption system has a certain degree of security.
In order to directly reveal the correlation between the adjacent pixels of the original image and the encrypted image, Fig. 10 analyzes the three-dimensional gray distribution of the four plaintext images and ciphertext images, as shown in Table 2. The table shows the three-dimensional gray distribution of house, pepper, starfish, Lena and ciphertext respectively. The gray values of adjacent pixels of the four original images all show highly correlated rows. However, the randomness of gray values between adjacent pixels is very noticeable in the 3D gray distribution of ciphertext images. The statistical feature of ciphertext makes it difficult for an attacker to obtain information about the encryption system with COA.
TABLE 2. Three-dimensional gray distribution of secret image and ciphertext image.
Grayscale Image | Three-dimensional Grayscale Distribution | Grayscale Image | Three-dimensional Grayscale Distribution |
---|---|---|---|
![]() | ![]() | ![]() | ![]() |
![]() | ![]() | ![]() | ![]() |
![]() | ![]() |
At the same time, to directly demonstrate the correlation between the adjacent pixels of the original image and the encrypted image, the grayscale image starfish is used as an example, and MATLAB is used to draw a correlation distribution map of adjacent pixels (horizontal, vertical and diagonal directions) of the original image and the ciphertext image. As shown in Fig. 10, (1) there is a correlation between adjacent pixels of the original image, and whether there is a certain regularity in the horizontal, vertical or diagonal directions; And (2) there is no obvious regularity between adjacent pixels of ciphertext images. It also shows that the proposed encryption system is very destructive to the adjacent pixels of the original image, and it is difficult for attackers to obtain plaintext information based on the ciphertext. The encryption system has outstanding security. The autocorrelation coefficient of each original image and that of the encrypted image is one of the indicators used to evaluate statistical information. Generally speaking, for a good image encryption scheme, the distribution of image pixel autocorrelation features will be damaged to a considerable extent. Therefore, the system has remarkable security.
Thus, the CCs of different secret images in each direction are further calculated, as shown in Table 3. As can be seen in Table 3, the horizontal, vertical and diagonal CCs of the four original images are all more than 0.79, and the CCs of ciphertext images in all directions are less than 0.1. This indicates that the correlation between adjacent pixels of the original image is high, while the correlation between adjacent pixels of the ciphertext image is low. The encryption system is very destructive to the original image and it is difficult for the decryptor to analyze the plaintext information based on the ciphertext information obtained, indicating that the encryption system is secure.
TABLE 3. Correlation coefficients between adjacent pixels of the image to be encrypted and ciphertext.
Direction | Starfish | Pepper | House | Lena | Ciphertext |
---|---|---|---|---|---|
Horizontal | 0.8679 | 0.8792 | 0.8524 | 0.8739 | 0.0123 |
Vertical | 0.8991 | 0.9026 | 0.8962 | 0.8970 | −0.0159 |
Diagonal | 0.7926 | 0.8127 | 0.8050 | 0.8100 | 0.0203 |
Assuming that the key is lost to different degrees in the process of transmission and the key is clipped to different degrees in different positions, we choose the similarity normalized correlation (NC) as an evaluation index to verify the anti-clipping attack performance of the encryption system.
As shown in Table 4, (1) as the key clipping area expands, the NC value between the reconstructed image and the original image gradually decreases. The lower the definition of the reconstructed image, the more difficult it is to distinguish the information of the original image. (2) When the clipping ratio is 30%, the CC values of the reconstructed image and the original image are both above 0.85, and the SSIM value is above 0.65, which can clearly distinguish the information of the original image, and the reconstruction result is good. (3) When the clipping ratio of the key is 50%, the CC values of the reconstructed image and the original image are both more than 0.65, the SSIM value is above 0.55, and part of the information of the encrypted image can still be distinguished, indicating that the method can resist clipping attacks well. To sum up, the encryption system proposed in this paper not only shows good robustness against noise attacks, but also can resist clipping attacks, indicating that the encryption system has superb robustness.
TABLE 4. Normalized correlation (NC) of different cropping proportions.
Cropping Proportions | Reconstructed Images | |||
---|---|---|---|---|
Starfish | House | Pepper | Lena | |
10% | ![]() | ![]() | ![]() | ![]() |
CC | 0.8210 | 0.8405 | 0.8304 | 0.8510 |
SSIM | 0.8502 | 0.8341 | 0.6641 | 0.7069 |
20% | ![]() | ![]() | ![]() | ![]() |
CC | 0.8089 | 0.8014 | 0.7803 | 0.8289 |
SSIM | 0.8501 | 0.8338 | 0.6636 | 0.7072 |
30% | ![]() | ![]() | ![]() | ![]() |
CC | 0.7624 | 0.7755 | 0.7510 | 0.7624 |
SSIM | 0.8496 | 0.7938 | 0.6616 | 0.7073 |
40% | ![]() | ![]() | ![]() | ![]() |
CC | 0.7433 | 0.7060 | 0.7198 | 0.7433 |
SSIM | 0.7361 | 0.7127 | 0.6238 | 0.6536 |
50% | ![]() | ![]() | ![]() | ![]() |
CC | 0.7024 | 0.6902 | 0.6706 | 0.7024 |
SSIM | 0.6898 | 0.6095 | 0.5650 | 0.5733 |
By adding different types of noise with the same density to the ciphertext, we simulate the process where the ciphertext or key may be affected by noise in the transmission process. We select salt-and-pepper noise, gaussian noise and multiplicative noise, and carry out a simulation for each noise by using 10 different embedding strengths (0.01, 0.02, 0.03, 0.04, 0.05, 0.06, 0.07, 0.08, 0.09, 0.10). The results are shown in Fig. 11. Gaussian noise, salt-and-pepper noise and multiplicative noise are used to attack the four secret images. In Fig. 11, only four kinds of noise intensity are shown: 0.01 (upper left), 0.02 (upper right), 0.04 (lower left) and 0.08 (lower right).
As can be seen in Fig. 11, (1) when ciphertext is subjected to different types of noise attacks, the information of encrypted images can be reconstructed, indicating that the encryption system proposed in this paper can resist not only salt-and-pepper noise attacks, but also Gaussian noise attacks; (2) In a noise attack with the same density, the image reconstructed by salt-and-pepper noise is clearer, followed by Gaussian noise; (3) With the increase of noise embedding intensity, the quality of a decrypted image also decreases to varying degrees. For Gaussian noise, when the attack intensity reaches 0.08, the decryption result is poor and it is difficult to identify the image information. The decryption result of the salt-and-pepper noise attack is better than that of the Gaussian noise attack, but it also has a great influence on the visual effect. It shows that the encryption system is robust against noise attacks.
To further prove the robustness of the encryption system, a line chart of decrypted image CC, SSIM and PSNR with the embedding intensity of noise is drawn after the decryption of images with different noise in-tensities of different noise types, as shown in Fig. 12.
As can be seen in Fig. 12, the three indicators simultaneously show that gaussian noise has the greatest influence on image quality for the same embedding intensity. When the embedding intensity of multiplicative noise and salt-and-pepper noise is 5%, the CC value, SSIM and PSNR of the image can still reach above 0.57, 0.75 and 17, respectively, showing strong resistance to noise. The decryption quality of the image decreases with the increase of the noise embedding intensity, but for the noise of general intensity, the decryption quality of the encryption system is good and has strong robustness, which further confirms the robust performance of the encryption system.
To sum up, the encryption system proposed in this paper shows good robustness to noise attacks. Although the decryption results of images are lost to a certain extent with the enhancement of noise attacks, the image decryption quality is good when resisting noise attacks of general intensity. At the same time, the encryption system can resist clipping attacks to a certain extent. When the clipping information reaches 50%, the contour information of the image can still be observed, but the detailed information is seriously damaged. This shows that the encryption system has good robustness.
In this paper, a multi-image encryption method based on MGSA and computational ghost imaging is proposed. On the basis of MGSA optical image encryption, Fresnel diffraction distance multiplexing is used to stack the phase function obtained by phase superposition of a single secret image and normalize it so as to realize diffraction distance multiplexing, which facilitates the compression of encrypted multi-image information, and solves the problem of large amounts of ciphertext transmission in multi-image encryption. Finally, the combination of computational ghost imaging and MGSA improves the security and accuracy of the encryption system. Because the MGSA of the optical image encryption is very sensitive to the distance key, the information of the encrypted image can be reconstructed only when the key is completely correct or produces minimal error. Its encryption system is simple and easy to transmit and record. It has better practicability compared with double random phase encoding, and this method can send different keys to different authorized users, which guarantees that it has a broader application prospect.
There are no conflicts of interest in the submitted manuscript, and the manuscript was approved by all authors for publication. The lead author declares on behalf of my co-authors that the work described was original research that has not been published previously, and is not under consideration for publication elsewhere, in whole or in part. All the authors listed have approved the manuscript that is enclosed.
Data underlying the results presented in this paper are not publicly available at the time of publication, but may be obtained from the authors upon reasonable request.
National Natural Science Foundation of China (No. 62275153, 62005165); Shanghai Industrial Collaborative Innovation Project (HCXBCY-2022-006).
TABLE 1 Diffraction distance error, CC value and SSIM value table
Diffraction Distance Error (m) | 0 | 0.0000001 | 0.000001 | 0.00001 | 0.0001 | 0.001 | 0.01 | 0.1 | |
---|---|---|---|---|---|---|---|---|---|
CC | House | 0.8487 | 0.8287 | 0.8288 | 0.8269 | 0.7559 | 0.5383 | 0.3575 | 0.0328 |
Starfish | 0.9563 | 0.9564 | 0.9562 | 0.9562 | 0.8980 | 0.3975 | 0.3074 | 0.1068 | |
Pepper | 0.8858 | 0.8358 | 0.8357 | 0.8345 | 0.7909 | 0.4648 | 0.3681 | 0.0523 | |
Lena | 0.9410 | 0.9410 | 0.9311 | 0.9217 | 0.9123 | 0.4065 | 0.1646 | 0.0364 | |
SSIM | House | 0.8341 | 0.8341 | 0.8344 | 0.8331 | 0.6254 | 0.1838 | 0.0206 | 0.0055 |
Pepper | 0.6640 | 0.6640 | 0.6636 | 0.6616 | 0.5650 | 0.1830 | 0.1693 | 0.0136 | |
Starfish | 0.8502 | 0.8502 | 0.8501 | 0.8496 | 0.6898 | 0.1622 | 0.0591 | 0.0343 | |
Lena | 0.7069 | 0.7069 | 0.7072 | 0.7072 | 0.5733 | 0.3107 | 0.1160 | 0.0157 |
TABLE 2 Three-dimensional gray distribution of secret image and ciphertext image
Grayscale Image | Three-dimensional Grayscale Distribution | Grayscale Image | Three-dimensional Grayscale Distribution |
---|---|---|---|
![]() | ![]() | ![]() | ![]() |
![]() | ![]() | ![]() | ![]() |
![]() | ![]() |
TABLE 3 Correlation coefficients between adjacent pixels of the image to be encrypted and ciphertext
Direction | Starfish | Pepper | House | Lena | Ciphertext |
---|---|---|---|---|---|
Horizontal | 0.8679 | 0.8792 | 0.8524 | 0.8739 | 0.0123 |
Vertical | 0.8991 | 0.9026 | 0.8962 | 0.8970 | −0.0159 |
Diagonal | 0.7926 | 0.8127 | 0.8050 | 0.8100 | 0.0203 |
TABLE 4 Normalized correlation (NC) of different cropping proportions
Cropping Proportions | Reconstructed Images | |||
---|---|---|---|---|
Starfish | House | Pepper | Lena | |
10% | ![]() | ![]() | ![]() | ![]() |
CC | 0.8210 | 0.8405 | 0.8304 | 0.8510 |
SSIM | 0.8502 | 0.8341 | 0.6641 | 0.7069 |
20% | ![]() | ![]() | ![]() | ![]() |
CC | 0.8089 | 0.8014 | 0.7803 | 0.8289 |
SSIM | 0.8501 | 0.8338 | 0.6636 | 0.7072 |
30% | ![]() | ![]() | ![]() | ![]() |
CC | 0.7624 | 0.7755 | 0.7510 | 0.7624 |
SSIM | 0.8496 | 0.7938 | 0.6616 | 0.7073 |
40% | ![]() | ![]() | ![]() | ![]() |
CC | 0.7433 | 0.7060 | 0.7198 | 0.7433 |
SSIM | 0.7361 | 0.7127 | 0.6238 | 0.6536 |
50% | ![]() | ![]() | ![]() | ![]() |
CC | 0.7024 | 0.6902 | 0.6706 | 0.7024 |
SSIM | 0.6898 | 0.6095 | 0.5650 | 0.5733 |