{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T23:00:25Z","timestamp":1762642825791,"version":"build-2065373602"},"reference-count":50,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2023,2,2]],"date-time":"2023-02-02T00:00:00Z","timestamp":1675296000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"the Universidad de La Guajira (Riohacha)"},{"name":"the Universidad Popular del Cesar (Valledupar)"},{"name":"the Universitat Polit\u00e8cnica de Catalunya \u00b7 BarcelonaTech"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>In this work, we present a new nonlinear joint transform correlator (JTC) architecture in the Fourier domain (FD) for the encryption and decryption of two simultaneous images. The main features of the proposed system are its increased level of security, the obtention of a single real-valued encrypted signal that contains the ciphered information of the two primary images and, additionally, a high image quality for the two final decrypted signals. The two images to be encrypted can be either related to each other, or independent signals. The encryption system is based on the double random phase encoding (DRPE), which is implemented by using a nonlinear JTC in the FD. The input plane of the JTC has four non-overlapping data distributions placed side-by-side with no blank spaces between them. The four data distributions are phase-only functions defined by the two images to encrypt and four random phase masks (RPMs). The joint power spectrum (JPS) is produced by the intensity of the Fourier transform (FT) of the input plane of the JTC. One of the main novelties of the proposal consists of the determination of the appropriate two nonlinear operations that modify the JPS distribution with a twofold purpose: to obtain a single real-valued encrypted image with a high level of security and to improve the quality of the decrypted images. The security keys of the encryption system are represented by the four RPMs, which are all necessary for a satisfactory decryption. The decryption system is implemented using a 4f-processor where the encrypted image and the security keys given by the four RPMs are introduced in the proper plane of the processor. The double image encryption system based on a nonlinear JTC in the FD increases the security of the system because there is a larger key space, and we can simultaneously validate two independent information signals (original images to encrypt) in comparison to previous similar proposals. The feasibility and performance of the proposed double image encryption and decryption system based on a nonlinear JTC are validated through computational simulations. Finally, we additionally comment on the proposed security system resistance against different attacks based on brute force, plaintext and deep learning.<\/jats:p>","DOI":"10.3390\/s23031641","type":"journal-article","created":{"date-parts":[[2023,2,2]],"date-time":"2023-02-02T03:47:33Z","timestamp":1675309653000},"page":"1641","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Double Image Encryption System Using a Nonlinear Joint Transform Correlator in the Fourier Domain"],"prefix":"10.3390","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3382-6960","authenticated-orcid":false,"given":"Ronal A.","family":"Perez","sequence":"first","affiliation":[{"name":"Grupo de Investigaci\u00f3n en F\u00edsica del Estado S\u00f3lido (GIFES), Faculties of Basic and Applied Sciences, and Engineering, Universidad de La Guajira, Riohacha 440007, La Guajira, Colombia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4244-4235","authenticated-orcid":false,"given":"Elisabet","family":"P\u00e9rez-Cabr\u00e9","sequence":"additional","affiliation":[{"name":"Applied Optics and Image Processing Group, Universitat Polit\u00e8cnica de Catalunya \u00b7 BarcelonaTech, 08222 Terrassa, Barcelona, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2180-2822","authenticated-orcid":false,"given":"Juan M.","family":"Vilardy","sequence":"additional","affiliation":[{"name":"Grupo de Investigaci\u00f3n en F\u00edsica del Estado S\u00f3lido (GIFES), Faculties of Basic and Applied Sciences, and Engineering, Universidad de La Guajira, Riohacha 440007, La Guajira, Colombia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6950-2373","authenticated-orcid":false,"given":"Mar\u00eda S.","family":"Mill\u00e1n","sequence":"additional","affiliation":[{"name":"Applied Optics and Image Processing Group, Universitat Polit\u00e8cnica de Catalunya \u00b7 BarcelonaTech, 08222 Terrassa, Barcelona, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5779-2115","authenticated-orcid":false,"given":"Cesar O.","family":"Torres","sequence":"additional","affiliation":[{"name":"Grupo de \u00d3ptica e Inform\u00e1tica, Department of Physics, Universidad Popular del Cesar, Valledupar 200001, Cesar, Colombia"}]}],"member":"1968","published-online":{"date-parts":[[2023,2,2]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Muniraj, I., and Sheridan, J.T. (2019). Optical Encryption and Decryption, SPIE Press. [1st ed.].","DOI":"10.1117\/3.2523506.ch1"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Crist\u00f3bal, G., Schelkens, P., and Thienpont, H. (2011). Optical and Digital Image Processing: Fundamentals and Applications, Wiley-VCH Verlag GmbH & Co.","DOI":"10.1002\/9783527635245"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1364\/AOP.6.000120","article-title":"Advances in optical security systems","volume":"6","author":"Chen","year":"2014","journal-title":"Adv. Opt. Photonics"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"083001","DOI":"10.1088\/2040-8978\/18\/8\/083001","article-title":"Roadmap on optical security","volume":"18","author":"Javidi","year":"2016","journal-title":"J. Opt."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Al Falou, A. (2018). Advanced Secure Optical Image Processing for Communications, IOP Publishing.","DOI":"10.1088\/978-0-7503-1457-2"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"164653","DOI":"10.1016\/j.ijleo.2020.164653","article-title":"Experimental optical encryption scheme for the double random phase encoding using a nonlinear joint transform correlator","volume":"217","author":"Vilardy","year":"2020","journal-title":"Optik"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"767","DOI":"10.1364\/OL.20.000767","article-title":"Optical image encryption based on input plane and Fourier plane random encoding","volume":"20","author":"Javidi","year":"1995","journal-title":"Opt. Lett."},{"key":"ref_8","unstructured":"Goodman, J.W. (2005). Introduction to Fourier Optics, Roberts & Company Publishers. [3rd ed.]."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"2031","DOI":"10.1117\/1.1304844","article-title":"Optical encryption using a joint transform correlator architecture","volume":"39","author":"Nomura","year":"2000","journal-title":"Opt. Eng."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"3243","DOI":"10.1016\/j.optcom.2009.05.022","article-title":"Optical encryption with a reference wave in a joint transform correlator architecture","volume":"282","author":"Rueda","year":"2009","journal-title":"Opt. Commun."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"055404","DOI":"10.1088\/2040-8978\/15\/5\/055404","article-title":"Experimental multiplexing protocol to encrypt messages of any length","volume":"15","author":"Barrera","year":"2013","journal-title":"J. Opt."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"163742","DOI":"10.1016\/j.ijleo.2019.163742","article-title":"Security-enhanced optical encryption based on JTC architecture with confused ciphertext","volume":"206","author":"Cai","year":"2020","journal-title":"Optik"},{"key":"ref_13","first-page":"1","article-title":"Image Encryption System Based on Joint Transformation Correlation and Ptychography","volume":"12","author":"Zhong","year":"2020","journal-title":"IEEE Photonics J."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"167654","DOI":"10.1016\/j.ijleo.2021.167654","article-title":"A security-enhanced joint transform correlator optical encryption system with cropping operation","volume":"245","author":"Chen","year":"2021","journal-title":"Optik"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"3917","DOI":"10.1016\/j.optcom.2010.06.009","article-title":"Chosen-plaintext attack on a joint transform correlator encrypting system","volume":"283","author":"Barrera","year":"2010","journal-title":"Opt. Commun."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"3553","DOI":"10.1364\/OL.35.003553","article-title":"Known-plaintext attack on a joint transform correlator encrypting system","volume":"35","author":"Barrera","year":"2010","journal-title":"Opt. Lett."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"163274","DOI":"10.1016\/j.ijleo.2019.163274","article-title":"Known-plaintext attack on JTC-based linear cryptosystem","volume":"198","author":"Dou","year":"2019","journal-title":"Optik"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"28523","DOI":"10.1364\/OE.21.028523","article-title":"Ciphertext-only attack on a joint transform correlator encryption system","volume":"21","author":"Zhang","year":"2013","journal-title":"Opt. Express"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"21204","DOI":"10.1364\/OE.27.021204","article-title":"Cryptanalysis of random-phase-encoding-based optical cryptosystem via deep learning","volume":"27","author":"Hai","year":"2019","journal-title":"Opt. Express"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"025401","DOI":"10.1088\/2040-8978\/15\/2\/025401","article-title":"Improved decryption quality and security of a joint transform correlator-based encryption system","volume":"15","author":"Vilardy","year":"2013","journal-title":"J. Opt."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"1674","DOI":"10.1364\/AO.53.001674","article-title":"Nonlinear optical security system based on a joint transform correlator in the Fresnel domain","volume":"53","author":"Vilardy","year":"2014","journal-title":"Appl. Opt."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"87853J","DOI":"10.1117\/12.2020912","article-title":"Joint transform correlator-based encryption system using the Fresnel transform and nonlinear filtering","volume":"8785","author":"Vilardy","year":"2013","journal-title":"Proc. SPIE"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1016\/j.optlaseng.2016.03.010","article-title":"Experimental analysis of a joint free space cryptosystem","volume":"83","author":"Barrera","year":"2016","journal-title":"Opt. Lasers Eng."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1016\/j.optlastec.2018.11.004","article-title":"Experimental research on optical image encryption system based on joint Fresnel transform correlator","volume":"112","author":"Dou","year":"2019","journal-title":"Opt. Laser Technol."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"125405","DOI":"10.1088\/2040-8978\/16\/12\/125405","article-title":"Generalized formulation of an encryption system based on a joint transform correlator and fractional Fourier transform","volume":"16","author":"Vilardy","year":"2014","journal-title":"J. Opt."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"35","DOI":"10.7149\/OPA.47.1.35","article-title":"Images encryption system based on a fractional joint transform correlator and nonlinear filtering","volume":"47","author":"Vilardy","year":"2014","journal-title":"Opt. Pura Apl."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1016\/j.optlaseng.2017.10.008","article-title":"Fractional optical cryptographic protocol for data containers in a noise-free multiuser environment","volume":"102","author":"Jaramillo","year":"2018","journal-title":"Opt. Lasers Eng."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1016\/j.optlaseng.2016.02.013","article-title":"Nonlinear image encryption using a fully phase nonzero-order joint transform correlator in the Gyrator domain","volume":"89","author":"Vilardy","year":"2017","journal-title":"Opt. Lasers Eng."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Vilardy, J.M., Perez, R.A., and Torres, C.O. (2019). Optical image encryption using a nonlinear joint transform correlator and the Collins diffraction transform. Photonics, 6.","DOI":"10.3390\/photonics6040115"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"4709","DOI":"10.1364\/AO.54.004709","article-title":"Iterative phase retrieval algorithms. Part II: Attacking optical encryption systems","volume":"54","author":"Guo","year":"2015","journal-title":"Appl. Opt."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"87851R","DOI":"10.1117\/12.2022216","article-title":"Double image encryption method using the Arnold transform in the fractional Hartley domain","volume":"8785","author":"Vilardy","year":"2013","journal-title":"Proc. SPIE"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"1704","DOI":"10.1016\/j.optcom.2011.11.115","article-title":"Double-image encryption on joint transform correlator using two-step-only quadrature phase-shifting digital holography","volume":"285","author":"Li","year":"2012","journal-title":"Opt. Commun."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1016\/j.optcom.2013.01.072","article-title":"Double images hiding by using joint transform correlator architecture adopting two-step phase-shifting digital holography","volume":"297","author":"Shi","year":"2013","journal-title":"Opt. Commun."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1016\/j.optlaseng.2014.10.011","article-title":"Double phase-image encryption using gyrator transforms, and structured phase mask in the frequency plane","volume":"67","author":"Singh","year":"2015","journal-title":"Opt. Lasers Eng."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1016\/j.ijleo.2018.09.144","article-title":"Double images encryption in optical image subtraction\/addition 4F system","volume":"178","author":"Yu","year":"2019","journal-title":"Optik"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"012043","DOI":"10.1088\/1742-6596\/2307\/1\/012043","article-title":"Correlation operation in the Fresnel domain and truncation operations applied to the simultaneous encryption of two images","volume":"2307","author":"Vilardy","year":"2022","journal-title":"J. Physics Conf. Ser."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"1248","DOI":"10.1364\/AO.449580","article-title":"Asymmetric double-image encryption via wavelength multiplexing","volume":"61","author":"Zhang","year":"2022","journal-title":"Appl. Opt."},{"key":"ref_38","unstructured":"Li, W., Kim, N., and Shan, M. (2014). Imaging and Applied Optics 2014, Optica Publishing Group. paper JTu4A.41."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"026108","DOI":"10.1117\/1.OE.53.2.026108","article-title":"Asymmetric double-image encryption method by using iterative phase retrieval algorithm in fractional Fourier transform domain","volume":"53","author":"Sui","year":"2014","journal-title":"Opt. Eng."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1016\/j.optcom.2016.11.002","article-title":"Optical double image security using random phase fractional Fourier domain encoding and phase-retrieval algorithm","volume":"388","author":"Rajput","year":"2017","journal-title":"Opt. Commun."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1016\/j.optlastec.2018.06.014","article-title":"Nonlinear double image encryption using 2D non-separable linear canonical transform and phase retrieval algorithm","volume":"107","author":"Kumar","year":"2018","journal-title":"Opt. Laser Technol."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"11994","DOI":"10.1364\/OE.20.011994","article-title":"Double images encryption method with resistance against the specific attack based on an asymmetric algorithm","volume":"20","author":"Wang","year":"2012","journal-title":"Opt. Express"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1016\/j.optcom.2013.11.055","article-title":"A hybrid attack on `double images encryption method with resistance against the specific attack based on an asymmetric algorithm\u2019","volume":"317","author":"Xiaopeng","year":"2014","journal-title":"Opt. Commun."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Vilardy, J.M., Mill\u00e1n, M.S., and P\u00e9rez-Cabr\u00e9, E. (2019). Image encryption system based on a nonlinear joint transform correlator for the simultaneous authentication of two users. Photonics, 6.","DOI":"10.3390\/photonics6040128"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"093109","DOI":"10.1117\/1.OE.55.9.093109","article-title":"Double-image encryption using chaotic maps and nonlinear non-DC joint fractional Fourier transform correlator","volume":"55","author":"Zhao","year":"2016","journal-title":"Opt. Eng."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1016\/j.optlastec.2012.09.007","article-title":"Double image encryption scheme by using random phase encoding and pixel exchanging in the gyrator transform domains","volume":"47","author":"Liu","year":"2013","journal-title":"Opt. Laser Technol."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1016\/j.optlaseng.2019.06.005","article-title":"Double-image encryption based on interference and logistic map under the framework of double random phase encoding","volume":"122","author":"Liansheng","year":"2019","journal-title":"Opt. Lasers Eng."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"7608","DOI":"10.1364\/AO.465876","article-title":"Asymmetric double-image encryption based on chaotic random phase encoding","volume":"61","author":"Su","year":"2022","journal-title":"Appl. Opt."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1117\/1.601856","article-title":"Nonzero-order joint transform correlator","volume":"37","author":"Li","year":"1998","journal-title":"Opt. Eng."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"10253","DOI":"10.1364\/OE.15.010253","article-title":"Resistance of the double random phase encryption against various attacks","volume":"15","author":"Frauel","year":"2007","journal-title":"Opt. Express"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/3\/1641\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T18:22:05Z","timestamp":1760120525000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/3\/1641"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,2]]},"references-count":50,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2023,2]]}},"alternative-id":["s23031641"],"URL":"https:\/\/doi.org\/10.3390\/s23031641","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2023,2,2]]}}}