{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T04:36:12Z","timestamp":1760243772235,"version":"build-2065373602"},"reference-count":42,"publisher":"MDPI AG","issue":"10","license":[{"start":{"date-parts":[[2012,10,1]],"date-time":"2012-10-01T00:00:00Z","timestamp":1349049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>In this paper, a double-random phase-encoding technique-based text encryption and hiding method is proposed. First, the secret text is transformed into a 2-dimensional array and the higher bits of the elements in the transformed array are used to store the bit stream of the secret text, while the lower bits are filled with specific values. Then, the transformed array is encoded with double-random phase-encoding technique. Finally, the encoded array is superimposed on an expanded host image to obtain the image embedded with hidden data. The performance of the proposed technique, including the hiding capacity, the recovery accuracy of the secret text, and the quality of the image embedded with hidden data, is tested via analytical modeling and test data stream. Experimental results show that the secret text can be recovered either accurately or almost accurately, while maintaining the quality of the host image embedded with hidden data by properly selecting the method of transforming the secret text into an array and the superimposition coefficient. By using optical information processing techniques, the proposed method has been found to significantly improve the security of text information transmission, while ensuring hiding capacity at a prescribed level.<\/jats:p>","DOI":"10.3390\/s121013441","type":"journal-article","created":{"date-parts":[[2012,10,2]],"date-time":"2012-10-02T02:39:08Z","timestamp":1349145548000},"page":"13441-13457","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Efficient Text Encryption and Hiding with Double-Random Phase-Encoding"],"prefix":"10.3390","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8703-7310","authenticated-orcid":false,"given":"Jun","family":"Sang","sequence":"first","affiliation":[{"name":"School of Software Engineering, Chongqing University, Chongqing 401331, China"}]},{"given":"Shenggui","family":"Ling","sequence":"additional","affiliation":[{"name":"School of Software Engineering, Chongqing University, Chongqing 401331, China"}]},{"given":"Mohammad S.","family":"Alam","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of South Alabama, Mobile, AL 36688, USA"}]}],"member":"1968","published-online":{"date-parts":[[2012,10,1]]},"reference":[{"key":"ref_1","unstructured":"Schneier, B. (1996). Applied Cryptography, John Wiley & Sons. [2nd ed.]."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"767","DOI":"10.1364\/OL.20.000767","article-title":"Optical image encryption based on input plane and Fourier plane random encoding","volume":"20","author":"Refregier","year":"1995","journal-title":"Opt. Lett."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Lu, P., Xu, Z., Lu, X., and Liu, X. (2012). Digital image information encryption based on compressive sensing and double random-phase encoding technique. Optik.","DOI":"10.1016\/j.ijleo.2011.06.027"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"3006","DOI":"10.1364\/AO.51.003006","article-title":"Color image security system using double random-structured phase encoding in gyrator transform domain","volume":"51","author":"Abuturab","year":"2012","journal-title":"Appl. Opt."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"584","DOI":"10.1016\/j.optcom.2011.11.025","article-title":"Double image encryption using double pixel scrambling and random phase encoding","volume":"285","author":"Zhong","year":"2012","journal-title":"Opt. Commun."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"1592","DOI":"10.1016\/j.ijleo.2011.08.033","article-title":"Color image encryption based on orthogonal composite grating and double random phase encoding technique","volume":"123","author":"He","year":"2012","journal-title":"Optik"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1016\/j.ijleo.2010.03.018","article-title":"Double random phase encoding method using a key code generated by affine transformation","volume":"122","author":"Mosso","year":"2011","journal-title":"Optik"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"887","DOI":"10.1364\/OL.25.000887","article-title":"Optical encryption by double random phase encoding in the fractional Fourier domain","volume":"25","author":"Unnikrishnan","year":"2000","journal-title":"Opt. Lett."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1016\/j.ijleo.2006.01.015","article-title":"Optical image encryption based on multichannel fractional Fourier transform and double random phase encoding technique","volume":"118","author":"Jin","year":"2007","journal-title":"Optik"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"4317","DOI":"10.1016\/j.optcom.2012.07.033","article-title":"Double image encryption based on linear blend operation and random phase encoding in fractional Fourier domain","volume":"285","author":"Wang","year":"2012","journal-title":"Optics Commun."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Liu, Z., Li, S., Liu, W., Wang, Y., and Liu, S. (2012). Image encryption algorithm by using fractional Fourier transform and pixel scrambling operation based on double random phase encoding. Opt. Laser Eng.","DOI":"10.1016\/j.optlaseng.2012.08.004"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1016\/j.ijleo.2011.04.022","article-title":"Image encryption by using local random phase encoding in fractional Fourier transform domains","volume":"123","author":"Liu","year":"2012","journal-title":"Optik"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1584","DOI":"10.1364\/OL.29.001584","article-title":"Double random phase encoding in the Fresnel domain","volume":"29","author":"Situ","year":"2004","journal-title":"Opt. Lett."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.optlastec.2011.05.015","article-title":"An improved method to enhance the security of double random-phase encoding in the Fresnel domain","volume":"44","author":"Yuan","year":"2012","journal-title":"Opt. Laser Eng."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1364\/OL.25.000028","article-title":"Securing information by use of digital holography","volume":"25","author":"Javidi","year":"2000","journal-title":"Opt. Lett."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"4262","DOI":"10.1016\/j.optcom.2012.06.056","article-title":"Dual-channel in-line digital holographic double random phase encryption","volume":"285","author":"Das","year":"2012","journal-title":"Opt. Commun."},{"key":"ref_17","unstructured":"Katzenbeisser, S., and Petitcolas, F. (1999). Information Hiding Techniques for Steganography and Digital Watermarking, Artech House."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1117\/12.205315","article-title":"Techniques for data hiding","volume":"2420","author":"Bender","year":"1995","journal-title":"Proc. SPIE"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1049\/ip-vis:20000104","article-title":"Spatial-domain image hiding using image differencing","volume":"147","author":"Wu","year":"2000","journal-title":"IEE Proc. Vis. Image Signal Process."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1673","DOI":"10.1109\/83.650120","article-title":"Secure spread spectrum watermarking for multimedia","volume":"6","author":"Cox","year":"1997","journal-title":"IEEE Trans. Image Process"},{"key":"ref_21","unstructured":"Ruanaidh, J.J.K.O., Dowling, W.J., and Boland, F.M. (1996, January 16\u201319). Phase watermarking of digital images. Lausanne, Switzerland."},{"key":"ref_22","unstructured":"Piva, A., Barni, M., Bartolini, F., and Cappellini, V. (1997, January 26\u201329). DCT-based watermark recovering without resorting to the uncorrupted original images. Santa Barbara, CA, USA."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1016\/S0165-1684(98)00015-2","article-title":"DCT-domain system for robust image watermarking","volume":"66","author":"Barni","year":"1998","journal-title":"Signal Process"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1364\/OE.3.000497","article-title":"Wavelet transform based watermark for digital images","volume":"3","author":"Xia","year":"1998","journal-title":"Opt. Express"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"783","DOI":"10.1109\/83.918570","article-title":"Improved wavelet-based watermarking through pixel-wise masking","volume":"10","author":"Barni","year":"2001","journal-title":"IEEE Trans. Image Process."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"3346","DOI":"10.1364\/AO.40.003346","article-title":"Hidden Images in Halftone Pictures","volume":"40","author":"Rosen","year":"2001","journal-title":"Appl. Opt."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"5462","DOI":"10.1364\/AO.41.005462","article-title":"Information hiding technique with double phase encoding","volume":"41","author":"Kishk","year":"2002","journal-title":"Appl. Opt."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"1360","DOI":"10.1016\/j.optlastec.2006.11.002","article-title":"A method for hiding information utilizing double-random phase encoding technique","volume":"39","author":"Zhou","year":"2007","journal-title":"Opt. Laser Tech."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"865","DOI":"10.1364\/AO.41.000865","article-title":"Digital watermarking by a holographic technique","volume":"41","author":"Takai","year":"2002","journal-title":"Appl. Opt."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"3078","DOI":"10.1364\/AO.43.003078","article-title":"Digital Image Encryption and Watermarking by Phase-Shifting Interferometry","volume":"43","author":"Cai","year":"2004","journal-title":"Appl. Opt."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"2600","DOI":"10.1364\/AO.44.002600","article-title":"Phase-only encryption and watermarking based on phase-shifting interferometry","volume":"44","author":"He","year":"2005","journal-title":"Appl. Opt."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"6211","DOI":"10.1364\/AO.44.006211","article-title":"Image watermarking by use of digital holography embedded in the discrete-cosine-transform domain","volume":"44","author":"Chang","year":"2005","journal-title":"Appl. Opt."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Zhou, X., Chen, L., and Shao, J. (2005). Investigation of digital hologram watermarking with double binary phase encoding. Opt. Eng., 44.","DOI":"10.1117\/1.1935268"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"569","DOI":"10.1088\/1464-4258\/8\/6\/012","article-title":"Optical image hiding in the Fresnel domain","volume":"8","author":"Shi","year":"2006","journal-title":"J. Opt. Pure Appl. Opt."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"1914","DOI":"10.1364\/OL.32.001914","article-title":"Multiple-image hiding in the Fresnel domain","volume":"32","author":"Shi","year":"2007","journal-title":"Opt. Lett."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"2489","DOI":"10.1117\/1.1410104","article-title":"Multiple information hiding technique using random sequence and Hadamard matrix","volume":"40","author":"Kim","year":"2001","journal-title":"Opt. Eng."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1117\/1.1627341","article-title":"Optodigital implementation of multiple information hiding and extraction system","volume":"43","author":"Kim","year":"2004","journal-title":"Opt. Eng."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.optcom.2004.11.034","article-title":"Multiple image encryption and watermarking by random phase matching","volume":"247","author":"He","year":"2005","journal-title":"Opt. Commun."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Salomon, D. (2003). Data Privacy and Security: Encryption and Information Hiding, Springer.","DOI":"10.1007\/978-0-387-21707-9"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"3814","DOI":"10.1364\/AO.49.003814","article-title":"Hybrid encoding method for hiding information by assembling double-random phase-encoding technique and binary encoding method","volume":"49","author":"Lin","year":"2010","journal-title":"Appl. Opt."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"2713","DOI":"10.1016\/j.optcom.2009.03.069","article-title":"Increasing the data hiding capacity and improving the security of a double-random phase-encoding technique based information hiding scheme","volume":"282","author":"Sang","year":"2009","journal-title":"Opt. Commun."},{"key":"ref_42","unstructured":"USC-SIPI Image Database Available online: http:\/\/sipi.usc.edu\/database\/ (accessed on 28 September 2012)."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/12\/10\/13441\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T21:52:40Z","timestamp":1760219560000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/12\/10\/13441"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,1]]},"references-count":42,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2012,10]]}},"alternative-id":["s121013441"],"URL":"https:\/\/doi.org\/10.3390\/s121013441","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2012,10,1]]}}}