Next Article in Journal
Fuzzy Neural Network PID-Based Constant Deceleration Control for Automated Mine Electric Vehicles Using EMB System
Next Article in Special Issue
A New Method for In-Situ Characterization of Solid-State Batteries Based on Optical Coherence Tomography
Previous Article in Journal
Efficient Sequential Detection of Two Antibiotics Using a Fiber-Optic Surface Plasmon Resonance Sensor
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Pressure-Insensitive Epidermal Thickness of Fingertip Skin for Optical Image Encryption

The Key Laboratory of Optoelectronic Science and Technology for Medicine of Ministry of Education, Fujian Provincial Key Laboratory of Photonics Technology, Fujian Provincial Engineering Technology Research Center for Photoelectric Sensing Application, College of Photonic and Electronic Engineering, Fujian Normal University, Fuzhou 350117, China
*
Authors to whom correspondence should be addressed.
Sensors 2024, 24(7), 2128; https://doi.org/10.3390/s24072128
Submission received: 28 February 2024 / Revised: 20 March 2024 / Accepted: 22 March 2024 / Published: 26 March 2024
(This article belongs to the Special Issue Advanced Sensing Technology in Optical Coherence Tomography)

Abstract

:
In this study, an internal fingerprint-guided epidermal thickness of fingertip skin is proposed for optical image encryption based on optical coherence tomography (OCT) combined with U-Net architecture of a convolutional neural network (CNN). The epidermal thickness of fingertip skin is calculated by the distance between the upper and lower boundaries of the epidermal layer in cross-sectional optical coherence tomography (OCT) images, which is segmented using CNN, and the internal fingerprint at the epidermis–dermis junction (DEJ) is extracted based on the maximum intensity projection (MIP) algorithm. The experimental results indicate that the internal fingerprint-guided epidermal thickness is insensitive to pressure due to normal correlation coefficients and the encryption process between epidermal thickness maps of fingertip skin under different pressures. In addition, the result of the numerical simulation demonstrates the feasibility and security of the encryption scheme by structural similarity index matrix (SSIM) analysis between the original image and the recovered image with the correct and error keys decryption, respectively. The robustness is analyzed based on the SSIM value in three aspects: different pressures, noise attacks, and data loss. Key randomness is valid by the gray histograms, and the average correlation coefficients of adjacent pixelated values in three directions and the average entropy were calculated. This study suggests that the epidermal thickness of fingertip skin could be seen as important biometric information for information encryption.

1. Introduction

Information in modern society has been closely connected with the Internet. People pay more and more attention to encryption for information protection with the rapid development of information technology [1,2,3,4]. At present, most information security technologies are based on the mathematical theory of cryptography [5,6,7]. However, these digital-based technologies have some limitations, including key generation, distribution, and storage, and malicious attacks still exist.
As a branch of information security research, non-traditional cryptographic theory based on optical principles and technology has played a very important role. It has become an important current research issue [8,9,10,11]. Optical image encryption technology came into being with low costs, high speed, and high parallelism. It is known that light has multiple properties, such as wavelength, amplitude, phase, and polarization state [12,13]. So light is a multi-dimensional information carrier that provides a variety of encryption options and great freedom for the key system of optical image encryption. In 1995, Refregier et al. [14] proposed double-random phase encoding technology. Subsequently, optical image encryption has obtained wide attention, and a large number of optical encryption techniques based on the double-random phase template have been proposed. For example, Situ et al. [15] applied double-random phase encoding technology to the Fresnel domain. Alfalouand et al. [16] used double-random phase encoding technology to realize the multiplexing of image encryption. Although the double-random phase encryption method has achieved some success, it is vulnerable to attack because the double-random phase is a symmetric encryption system, and its linearity reduces the security of the system.
To solve this problem, Qin and Peng [17] proposed an asymmetric encryption system based on the phase-truncated Fourier transform (PTFT). But this asymmetric cryptosystem (ACS) could not be considered a real ACS since the keys should be independent of the plaintext [18]. Vilardy et al. [19] presented a new experimental system for optical encryption using a nonlinear joint transform correlator (JTC) to implement the optical security technique of double-random phase encoding (DRPE). Guo et al. developed a Stokes cell hologram optical encryption scheme by combining visual cryptography with a cell surface-assisted pattern mask. An asymmetric encryption scheme based on Stokes vector rotation transformation is proposed to solve the inherent problem of sharing keys in symmetric encryption [20]. However, the encryption and decryption times have increased.
Biometric features such as fingerprints, iris, faces, and voices are unique to each person and can be used as keys. Thus, information encryption using human biometrics can improve the security of optical image encryption systems because the biometric key is independent of plaintext. In 1994, Tomko et al. applied biometrics to the public key encryption system and proposed the concept of biometric encryption for the first time [21]. The idea is to generate biometric templates by Fourier transform on biometric keys so that attackers cannot directly obtain the original biometric information. From then on, the human fingerprint was widely applied to cryptosystems [22,23,24]. However, surface fingerprints are easily destroyed and imitated. Surface fingerprints have been easily abused, resulting in reduced security. In addition, other existing technologies, such as faces, can be collected non-invasively without permission in daily life, which results in unsafety. Therefore, it is urgent to develop a new key with high security that is not easy to attack.
It has been reported that the internal fingerprint is located at the papillary junction within 220–550 μm of the surface and has the same topography as the surface fingerprint [25]. Optical coherence tomography (OCT) is a noninvasive imaging technique for internal fingerprint acquisition and reconstruction under the finger surface [26,27,28,29,30,31,32]. In our previous work, the 3D fingertip skin based on OCT can be extracted from the epidermal thickness [33], sweat ducts [34], and the internal fingerprint [35]. Therefore, the characteristics of 3D fingertip skin based on OCT have the potential for encryption with high security.
In this study, the internal fingerprint-guided epidermal thickness of fingertip skin based on OCT was proposed as a biometric key for optical image encryption. The algorithm employed in this study combines OCT with the U-Net architecture of a convolutional neural network (CNN) to extract internal fingerprint-guided epidermal thickness. The selection of this approach is motivated by the inherent advantages of U-Net, which include its effectiveness in producing accurate segmentation results and its relatively low demand for training data. Firstly, the influence of pressure on epidermal thickness is investigated since there was a different pressure on the glass when fingertip skin was imaged by OCT at different times. Then the performance of encryption is analyzed by simulating the whole encryption and decryption process [36]. Finally, grayscale histogram, adjacent pixel correlation, and image entropy were used to evaluate the imperceptibility level of the original and fake keys.

2. Methods

2.1. OCT System and Sample

A sketch of our spectral domain optical coherence tomography (SD-OCT) system is shown in Figure 1c. The light source is a 12 mw super luminescent diode (SLD) with a FWHM bandwidth of 85 nm centered at 1310 nm (S5FC1021P, Thorlabs, Newton, NC, USA). The light is delivered into a coupler and then split into the reference (50%) and sample (50%) arms. The optical length of the two arms was matched to the sample arm, and they were strictly equal to each other. A galvo scanning mirror and an achromatic lens with a focal length of 50 mm make up the scanning structure. The axial and lateral resolutions of the system in air are about 8.9 μm and 18.2 μm, respectively [37]. The detection arm consists of a spectrometer with a single line-scan camera (C-1235-1385, Wasatch Photonics, Logan, UT, USA), which contains 2048 pixels.
The BioTac sensor (SynTouch Inc., Montrose, CA, USA) is placed at the sample arm for measuring the pressure of a finger contacting a sensor, which is a commercially available fingertip-shaped sensor and sampled at a rate of 100 Hz [38]. In addition, a 3 mm thick piece of glass was placed at the fingertip to flatten it, just as a surface fingerprint scan using a traditional fingerprint scanner. To reduce noise, the glass was tilted at a small angle of 5 degrees. In order to construct the 3D image, as shown in Figure 1a, consecutively 400 cross-sectional OCT images were acquired, as shown in Figure 1b, with a beam position increment of 25 μm.

2.2. Key Algorithm Based on Internal Fingerprint-Guided Epidermal Thickness

Figure 2 demonstrates the flowchart of our new key generation process. A set of 400 OCT images of cross-sectional fingertip skin were fitted with U-Net of CNN and local interpolation to obtain the regions of interest (ROIs). These ROIs were projected with maximum intensity to obtain internal fingerprints. Then, we manually locate the central region of the internal fingerprint and select the corresponding ROIs. Finally, the epidermal fingerprints of the ROIs were binarized; the number of white pixels was counted by column, and then they were non-linearly converted into a grayscale image of 0–255. This is an optical image encryption key based on the internal fingerprint-guided epidermal thickness of fingertip skin. We describe each of the steps in detail in the following sections.
The method of extracting internal fingerprints is similar to our previous work [35]. The boundary of the epidermis–dermis junction (DEJ) was determined and segmented by U-net [33]. Firstly, the ridge tops and papillae valleys were located by searching for the local maxima and minima. Then, the envelope curves of the local maximum and minimum values of the ridge boundary were determined by the interpolation of the ridge part of the DEJ. Finally, the region between the local maximum and minimum was selected as the ROI, as shown in Figure 3a, and the maximum intensity projection (MIP) was then applied to the ROI to extract internal fingerprints. Consecutive 400 MIP images of the DEJ boundary were used to extract internal fingerprints, as shown in Figure 3b.
The coordinates of the inner fingerprint center point were manually located by a red circle. Since there is no open-source automatic detail extraction algorithm for OCT fingerprint images, manual detail labeling was chosen in our study. In addition, the robustness of the automatic algorithm is not enough, especially for fingerprint datasets with different modalities [39].
In the internal fingerprint image, the center coordinate point was taken as the origin, as shown in the red point in Figure 3b. A square area of 101 pixels × 101 pixels is formed by taking a distance of 50 pixels from the center point along the upper, lower, left, and right edges, as shown in the red square of Figure 3b, and then the magnification of the red square is shown in Figure 3c. In our study, the MIP principle was applied to select the strongest cross-sectional signal from multiple images for superposition. The MIP algorithm makes the internal fingerprint image not affected by depth. A set of 400 3D OCT images of fingertip skin of 345 pixels × 248 pixels was processed by MIP to obtain a 345 pixels × 400 pixels cross-sectional image of the fingertip skin, which is a fingerprint image. A total of 101 images out of the 400 3D OCT images were selected to be projected on the ROI images, corresponding to the 101 images with the maximum intensity, as displayed in Figure 3d. The results can be used to verify the accuracy of the selected area.
The corresponding part of the fingertip epidermis can be determined by the region of the internal fingerprint. The processing is similar to our previous work [33]. In detail, the boundaries of the upper and lower epidermal layers in fingertip skin were determined and segmented by U-Net, as shown in Figure 3e. The 101 ROI images selected above correspond to 101 3D OCT epidermal images of fingertip skin. Similarly, part of the corresponding 101 fingertip epidermal images can be captured, as displayed in Figure 3f.
After fingerprint epidermis extraction, the resolution of 101 cross-sectional fingertip epidermal images is 101 pixels × 248 pixels. And the obtained image is a binary image; that is, there are only black and white parts, and the gray values of the pixels are 0 and 255. The black area is the background with a gray value of 0, while the white area is the fingertip epidermis with a gray value of 255. Figure 4 shows the key generation method. The number of white pixels (the thickness of the fingerprint epidermis) of the 101 images in the column was counted, recorded, and saved as a 101 pixels × 101 pixels numpy matrix array. This matrix array was then converted into a linear image with a gray value of 0 to 255 and stretched non-linearly in gray scale. The resolution of the non-linear image is also 101 pixels × 101 pixels. Taking this non-linear image as a key, we defined the key as a fingerprint-guided 3D skin thickness map.
Non-linear stretching of image grayscale [40] is commonly used in digital image processing, which is defined as follows:
DB = (DA)2/255
where DA is the pixel value of each point in the image before the transformation, and DB is the pixel value of each point in the image after the transformation.

2.3. Image Encryption with MIP-Based Thickness Map

The 3D fingerprint-based epidermal thickness information has been applied to implement the image encryption scheme in the intensity domain [41] and spectral domain [42], respectively. In order to further illustrate the advantage of fingertip epidermal thickness based on MIP localization for image encryption, optical encryption technology based on spectral domain image fusion was employed in our study. Its principle is to perform a discrete cosine transform (DCT) on cat ordinary images and then compress the DCT information using a low-pass filter. The detailed processes of encryption and decryption are represented in Figure 5. Figure 5a is a plain image of a cat. Figure 5b shows the DCT of images of a cat. It is proven that the image can be developed from the encryption algorithm by multiplying the DCT image of the cat image with the key image of epidermal thickness. Figure 5c displays the encrypted key image of MIP-based thickness. Figure 5d shows an encrypted image of a cat using fusion. Decryption is the opposite process of encryption. Figure 5e–h display an encrypted cat image, a decryption key image of thickness, a DCT spectrum image, and a decrypted image of cat by inverse DCT, respectively.

2.4. Similarity Evaluation of Images

The structural similarity index matrix (SSIM) [43] and normalized cross-correlation (NCC) were applied to evaluate the similarity between two images I and I . SSIM was defined as follows:
S S I M I , I = 2 μ I μ I + C 1 · 2 σ I I + C 2 μ I 2 + μ I 2 + C 1 · σ I 2 + σ I 2 + C 1
where μ I = n = N I n / N , σ I 2 = n = N I n μ I 2 / N , μ I = n = N I n / N , σ I I = n = N I n μ I I n μ I / N , σ I 2 = n = N I n μ I 2 / N , C1 and C2 are two small normal numbers, N is the number of pixels in the image, I(n) and I′(n) represent the nth pixel corresponding to the two related images. And the NCC was expressed as follows:
NCC = n = N I n · I n / I n 2 I n 2

2.5. Random Analysis of Key

In optical encryption systems, the key is represented in the form of a random grayscale image. The pixel values in the faked image have high randomness. So, a faked key is difficult to distinguish from a real one. Three randomness parameters of image encryption, namely gray histogram, adjacent pixel correlation, and image entropy, are applied for a qualitative evaluation of the key in our study [44,45,46,47,48,49]. An image histogram is one of the important parameters for describing image features. It can intuitively display the number of pixels in each gray range of the image; that is, it can reflect the frequency of a certain gray intensity in the image. The gray histogram of the random image is uniformly distributed in the whole gray range. In an image, the degree of correlation between adjacent pixels is reflected by the correlation of adjacent pixels, which is defined [45] by the following:
C O R = i = 1 J x i 1 J i = 1 j x i y i 1 J i = 1 J y i i = 1 J x i 1 J i = 1 j x i 2 × i = 1 J y i 1 J i = 1 J y i 2
where J is the number of randomly selected adjacent pixel pairs and x i , y i are the intensity values of adjacent pixel pairs. In general, the correlations of horizontal, vertical, and diagonal adjacent pixels of a 2D-pixelated array of images should all be analyzed. The lower the correlation value, the greater the randomness. Image entropy is a statistical form of feature that reflects the average amount of information in an image. Entropy is a measure of chaos and disorder. The higher the entropy, the greater the disorder. For a 256-level grayscale image, the entropy is calculated by the following:
H G = i = 0 255 P G i log 2 P G i
where P G i is the probability of each grayscale value appearing in the pattern. And the theoretical maximum entropy value of an 8-bit image is 8. The higher entropy of the pattern indicates the higher randomness of the pattern.

3. Results

3.1. Pressure-Insensitive Epidermal Thickness of Fingertip Skin

Figure 6 shows the epidermal thickness maps of fingertip skin, which were constructed using the algorithm in Figure 2 at different pressures measured by a BioTac sensor. Table 1 demonstrates that there is a large similarity between epidermal thickness maps among different pressures. Pressure status I corresponds to an approximate pressure of 6 kPa, while pressure status II corresponds to approximately 10 kPa. Pressure status III corresponds to approximately 14 kPa.

3.2. Application for Optical Encryption

3.2.1. Feasibility Analysis

The feasibility of the image encryption method was demonstrated by numerical simulation in our study. The original image of a cat has a resolution of 256 pixels × 256 pixels. In the process of encryption and decryption, the key image with a resolution of 101 pixels × 101 pixels can be linearly transformed into an image with a resolution of 256 pixels × 256 pixels by bicuxic interpolation [50,51]. The important, relevant information of the original image can be successfully obtained through decryption when the image of internal fingerprint-guided epidermal thickness as a decryption template is completely consistent with the original key. In short, the original image can be well recovered with the correct key decryption. According to the calculation theory in Section 2.4, the SSIM value between Figure 7a and Figure 7b is 0.9670, which illustrates that the encrypted cat image information has been well extracted. That is, the image after decryption has a high similarity with that before encryption, so it can be said that the quality of the image after decryption is high.

3.2.2. Security Analysis

The security of the encryption scheme was also illustrated by numerical simulation. A different part of the previous MIP location was selected to generate another 3D image of internal fingerprint-guided epidermal thickness, which was taken as the decryption template. The SSIM value between the original cat image before encryption and the after decryption image is 0.0096. The result indicates that the decryption failed with the inconsistent decryption template. Figure 7c is the key obtained from an image of the same size in a different region by MIP. The thickness information of the fingertip epidermis changes in this case. And then the epidermal thickness map generated as a decryption template (as shown in Figure 7d) is different from the previous key (as shown in Figure 5c). Therefore, the useful information of the original cat image cannot be recovered from the inconsistent encrypted image, as shown in Figure 7e. The results further illustrate that the 3D image of internal fingerprint-guided epidermal thickness can be considered important biometric information due to the different epidermal thicknesses of each person’s fingertips.

3.2.3. Robustness Analysis

When fingertip skin was sampled, it suffered from the different pressures. In Section 3.1, the epidermal thickness maps were found to be insensitive to pressure. We used epidermal thickness maps at different pressures as the encrypted key and decrypted key for constructing the decrypted image, and then normalized cross-correlation between the original image and decrypted image was estimated for an analysis of image similarity for robustness. Table 2 indicates that there is high similarity between the original image and the decrypted image for the epidermal thickness map under different pressures during the encryption and decryption procedures.
In addition, keys and encrypted images may be disturbed by noise or data, and they may be lost during the process of network transmission. So the robustness of our encryption scheme against noise attacks and data loss was tested in this study. Gaussian random noise with a mean of 0 and a variance of 0.1 was added to the key as the decryption template, as shown in Figure 8a. Figure 8b shows the cat image decrypted from the encrypted image using the consistent decryption template with noise. The SSIM value between Figure 8b and Figure 7a is 0.7121. To further investigate the robustness of our image encryption scheme against data loss, we replaced the pixel value in the middle of the encrypted image with 0. The correct key was then applied to decrypt the original image from the encrypted images with varying data loss. Figure 8c–j display the encrypted images with data loss of 6.25%, 12.5%, 25%, 50%, 60%, 70%, 80%, and 90%, respectively. And the corresponding decrypted images are shown in Figure 8k–r. The SSIM values between Figure 8k–r and Figure 7a are 0.9661, 0.9645, 0.9605, 0.9411, 0.9206, 0.8974, 0.8610, and 0.7979, respectively, as shown in Figure 8s. The results demonstrate that the decrypted image becomes blurry with an increase in the data loss. These results clearly show that our proposed image encryption method is robust against noise attacks and data loss. Important information can be recovered from the original image despite data loss.

3.2.4. Key Randomness Analysis

The randomness of the key is a factor that affects the strength of the key. In a forgery attack, the randomness of the faked key directly affects the concealment of the deception action [45]. Grayscale histogram, adjacent pixel correlation, and image entropy were employed to evaluate the imperceptibility of faked keys. In our analysis, the key image of MIP-based epidermal thickness (shown in Figure 5c) generated from the fingerprint image (shown in Figure 3c) was taken as the original key, and the key image (shown in Figure 7d) generated from the fingerprint image (shown in Figure 7c) was considered the fake key.
Figure 9a–d displays the grayscale histograms of the original key and the fake key. From the figure, it has a similar statistical appearance between the gray histograms of the original key and the fake key. The pixel values of both the original key and the fake key are roughly evenly distributed between 0 and 255, except for 65. The result shows that the grayscale histograms are not completely uniform, which may be affected by human biological characteristics. Figure 9e–j shows the intensity distribution diagrams of adjacent pixels in the vertical, horizontal, and diagonal directions of the original key and the fake key. From the figure, the intensity distribution of the fake key and the original key is similar in three directions. The average correlation coefficients of adjacent pixelated values in three directions and the average entropy in the original key and fake key were extracted and displayed on Table 3. The absolute average correlation coefficients of adjacent pixelated values in horizontal, vertical, and diagonal directions are close to zero in both keys. From Table 3, it can also be observed that the average entropy of the image is 7.8201 in the fake key, while it is 7.8177 in the original key. These values are so close that they are indistinguishable between original and fake keys. The results demonstrate that the key generated by our proposed algorithm is very close to the random grayscale image without any information about the plaintext image. These keys are not only visually random, but they are also random quantitatively in statistics. Although a gray histogram is a little less than random digital encryption, the use of human biometric keys greatly improves the security of information encryption. The thickness of the epidermis as the key increases the complexity of the encryption structure and provides a reference for the new optical image encryption technology.

4. Discussion

Keys based on fingerprint images have been widely studied in optical image encryption schemes [8,34,35,36,52,53,54,55]. In this paper, we proposed a new key based on internal fingerprint-guided epidermal thickness for an encryption scheme. Compared to existing technologies, such as facial recognition, fingerprints, and iris recognition, the epidermal thickness map used in optical image encryption provides higher confidentiality due to binge informed and giving consent for obtaining the data by OCT, and it cannot be collected non-invasively without permission in daily life, meaning the privacy concerns related to the use of internal biometrics for encryption. Furthermore, some recent technological developments, such as metastructures [56], nanoparticles [57], near-zero-index materials [58], grapheme [59], and plasmonics [60], have also been applied for encryption. However, compared to the proposed OCT-based internal fingerprint-guided epidermal thickness map, the procedure for generating these structures or nanoparticles is complex and highly environmentally demanding.
Although the effects of changes in the inner layer due to external environmental factors, such as temperature, have not been discussed previously, it is worth noting that muscles typically have a coefficient of thermal expansion of 8.9 ± 1.7 × 10−4/°C [61]. This implies that a 1 °C increase in temperature corresponds to an approximately 0.1% increase in muscle volume. The temperature range for fingertips is not significantly large, usually around 25 ± 10 °C. As a result, the cumulative temperature-induced change in skin thickness is approximately ±1%, which is much smaller than the error discussed in the system’s robustness analysis.
The proposed encryption method, based on our new key, is applied to encrypt images. These encrypted images can be transmitted through existing digital security frameworks and protocols, achieving applications including the integration of digital certificates to verify the authenticity of encrypted images, the application of digital signatures to verify the source identity of encrypted images, and the implementation of a secure key management system to ensure the confidentiality of generated keys. Thus, the proposed method enhances the security and trustworthiness of encrypted images, allowing them to be transferred within existing digital security frameworks and protocols.
Additionally, the entire encryption and decryption process of the system can be completed within 10 s. The key image acquisition time by the OCT system is approximately 4 s, while image segmentation using U-Net takes around 4 s. Other computational times are negligible, and the system can generally meet real-time encryption/decryption requirements. Furthermore, with technological advancements, these times can be further reduced.

5. Conclusions

In summary, a new key based on the internal fingerprint-guided epidermal thickness of fingertip skin using OCT was proposed for optical encryption. There are three steps to the key generation algorithm. Firstly, U-Net was utilized to segment the upper and lower boundaries of the epidermal layer in cross-sectional OCT images of the fingertip skin. Secondly, the MIP algorithm was applied to extract the internal fingerprint at the DEJ of fingertip skin. Finally, the internal fingerprint-guided epidermal thickness was calculated and converted into a thickness map.
The experimental results demonstrate that the internal fingerprint-guided key based on OCT could be encrypted as important biometric information through feasibility, security, robustness analysis, and key randomness analysis. This key has the capability to address the security concerns arising from the non-invasive collection of biometric data, such as faces and fingerprints, without proper permission in daily life.
Therefore, the key formed by the internal fingerprint-guided epidermal thickness has a potential for information encryption, which can be transferred through existing digital security frameworks and protocols, such as transport layer security (TLS) and secure sockets layer (SSL). However, the potential barriers to the widespread adoption of this OCT-based biometric encryption technique are its high cost and the large volume of OCT data acquisition systems. Thus, the future research areas are cost optimization and miniaturization of OCT systems.

Author Contributions

Conceptualization, B.Z.; Methodology, H.L.; Software, B.L.; Validation, B.Z.; Investigation, W.L. and X.Z.; Resources, X.Z.; Data curation, W.L.; Writing—original draft, W.L. and B.Z.; Writing—review & editing, S.W.; Visualization, S.W.; Supervision, Z.L.; Project administration, Z.L.; Funding acquisition, Z.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China, grant number 61875038.

Data Availability Statement

The data presented in this study are available on request from the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Almehmadi, F.; Chatterjee, M. Secure Chaotic Transmission of Electrocardiography Signals with Acousto-Optic Modulation under Profiled Beam Propagation. Appl. Opt. 2015, 54, 195–203. [Google Scholar] [CrossRef] [PubMed]
  2. Matoba, O.; Nomura, T.; Perez-Cabre, E.; Millan, M.S.; Javidi, B. Optical Techniques for Information Security. Proc. IEEE 2009, 97, 1128–1148. [Google Scholar] [CrossRef]
  3. Li, X.; Kim, S. Optical 3D Watermark Based Digital Image Watermarking for Telemedicine. Opt. Lasers Eng. 2013, 51, 1310–1320. [Google Scholar] [CrossRef]
  4. Liu, S.; Guo, C.; Sheridan, J.T. A Review of Optical Image Encryption Techniques. Opt. Laser Technol. 2014, 57, 327–342. [Google Scholar] [CrossRef]
  5. Wu, Z.; Longwei, T.; Li, P.; Wu, T.; Jiang, M.; Wu, C. Generating Stable Biometric Keys for Flexible Cloud Computing Authentication Using Finger Vein. Inf. Sci. 2016, 433–434, 431–447. [Google Scholar] [CrossRef]
  6. Anees, A.; Chen, Y.-P.P. Discriminative Binary Feature Learning and Quantization in Biometric Key Generation. Pattern Recognit. 2017, 77, 289–305. [Google Scholar] [CrossRef]
  7. Leng, L.; Teoh, A. Alignment-Free Row-Co-Occurrence Cancelable Palmprint Fuzzy Vault. Pattern Recognit. 2015, 48, 2290–2303. [Google Scholar] [CrossRef]
  8. Zhao, T.; Ran, Q.; Yuan, L.; Chi, Y.; Ma, J. Image Encryption Using Fingerprint as Key Based on Phase Retrieval Algorithm and Public Key Cryptography. Opt. Lasers Eng. 2015, 72, 12–17. [Google Scholar] [CrossRef]
  9. Chen, Q.; Shen, X.; Cheng, Y.; Lin, C.; Liu, Y.; Zhou, B. A Security-Enhanced Joint Transform Correlator Optical Encryption System with Cropping Operation. Optik 2021, 245, 167654. [Google Scholar] [CrossRef]
  10. Chen, L.; Gan, W.; Chen, L.; Mao, H. Optical Encryption Technology Based on Spiral Phase Coherent Superposition and Vector Beam Generation System. Optik 2022, 253, 168599. [Google Scholar] [CrossRef]
  11. Du, J.; Xiong, Y.; Wu, C.; Quan, C. Optical Image Encryption with High Efficiency Based on Variable-Distance Ghost Imaging. Optik 2021, 252, 168484. [Google Scholar] [CrossRef]
  12. Javidi, B.; Carnicer, A.; Yamaguchi, M.; Nomura, T.; Pérez-Cabré, E.; Millán, M.S.; Nishchal, N.K.; Torroba, R.; Barrera, J.F.; He, W.; et al. Roadmap on Optical Security. J. Opt. 2016, 18, 093007. [Google Scholar] [CrossRef]
  13. Chen, W.; Javidi, B.; Chen, X. Advances in Optical Security Systems. Adv. Opt. Photonics 2014, 6, 120–155. [Google Scholar] [CrossRef]
  14. Refregier, P.; Javidi, B. Optical Image Encryption Based on Input Plane and Fourier Plane Random Encoding. Opt. Lett. 1995, 20, 767–769. [Google Scholar] [CrossRef] [PubMed]
  15. Situ, G.; Zhang, J. Double Random-Phase Encoding in the Fresnel Domain. Opt. Lett. 2004, 29, 1584–1586. [Google Scholar] [CrossRef] [PubMed]
  16. Alfalou, A.; Mansour, A. Double Random Phase Encryption Scheme to Multiplex and Simultaneous Encode Multiple Images. Appl. Opt. 2009, 48, 5933–5947. [Google Scholar] [CrossRef] [PubMed]
  17. Qin, W.; Peng, X. Asymmetric Cryptosystem Based on Phase-Truncated Fourier Transforms. Opt. Lett. 2010, 35, 118–120. [Google Scholar] [CrossRef] [PubMed]
  18. Liu, W.; Liu, Z.; Liu, S. Asymmetric Cryptosystem Using Random Binary Phase Modulation Based on Mixture Retrieval Type of Yang-Gu Algorithm: Reply. Opt. Lett. 2013, 38, 4045. [Google Scholar] [CrossRef] [PubMed]
  19. Vilardy, J.; Millán, M.; Pérez-Cabré, E. Experimental Optical Encryption Scheme for the Double Random Phase Encoding Using a Nonlinear Joint Transform Correlator. Optik 2020, 217, 164653. [Google Scholar] [CrossRef]
  20. Guo, X.; Li, P.; Zhong, J.; Wen, D.; Wei, B.; Liu, S.; Qi, S.; Zhao, J. Stokes Meta-Hologram toward Optical Cryptography. Nat. Commun. 2022, 13, 6687. [Google Scholar] [CrossRef]
  21. Tomko, G.J.; Soutar, C.; Schmidt, G.J. Fingerprint Controlled Public Key Cryptographic System. US Patent US5832091A, 14 March 1996. p. 5541994. [Google Scholar]
  22. Jain, A.; Hong, L.; Bolle, R. On-Line Fingerprint Verification. IEEE Trans. Pattern Anal. Mach. Intell. 1997, 19, 302–314. [Google Scholar] [CrossRef]
  23. Yeung, H.; Moon, Y.; Chen, J.; Chan, Y.; Ng, Y.; Chung, H.; Pun, K. A Comprehensive and Real-Time Fingerprint Verification System for Embedded Devices. Proc. SPIE 2005, 5779, 438–446. [Google Scholar] [CrossRef]
  24. Barman, S.; Samanta, D.; Chattopadhyay, S. Fingerprint-Based Crypto-Biometric System for Network Security. EURASIP J. Inf. Secur. 2015, 2015, 3. [Google Scholar] [CrossRef]
  25. Darlow, L.N.; Connan, J.; Akhoury, S.S. Internal Fingerprint Zone Detection in Optical Coherence Tomography Fingertip Scans. J. Electron. Imaging 2015, 24, 023027. [Google Scholar] [CrossRef]
  26. Cheng, Y.; Larin, K.V. In Vivo Two- and Three-Dimensional Imaging of Artificial and Real Fingerprints with Optical Coherence Tomography. IEEE Photonics Technol. Lett. 2007, 19, 1634–1636. [Google Scholar] [CrossRef]
  27. Liu, M.; Buma, T. Biometric Mapping of Fingertip Eccrine Glands with Optical Coherence Tomography. IEEE Photonics Technol. Lett. 2010, 22, 1677–1679. [Google Scholar] [CrossRef]
  28. Zam, A.; Dsouza, R.; Subhash, H.M.; O’Connell, M.-L.; Enfield, J.; Larin, K.; Leahy, M.J. Feasibility of Correlation Mapping Optical Coherence Tomography (cmOCT) for Anti-Spoof Sub-Surface Fingerprinting. J. Biophotonics 2013, 6, 663–667. [Google Scholar] [CrossRef] [PubMed]
  29. Aum, J.; Kim, J.-H.; Jeong, J. Live Acquisition of Internal Fingerprint with Automated Detection of Subsurface Layers Using OCT. IEEE Photonics Technol. Lett. 2016, 28, 163–166. [Google Scholar] [CrossRef]
  30. Yu, X.; Xiong, Q.; Luo, Y.; Wang, N.; Wang, L.; Tey, H.L.; Liu, L. Contrast Enhanced Subsurface Fingerprint Detection Using High-Speed Optical Coherence Tomography. IEEE Photonics Technol. Lett. 2017, 29, 70–73. [Google Scholar] [CrossRef]
  31. Raja, K.B.; Auksorius, E.; Raghavendra, R.; Boccara, A.C.; Busch, C. Robust Verification with Subsurface Fingerprint Recognition Using Full Field Optical Coherence Tomography. In Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), Honolulu, HI, USA, 21–26 July 2017; pp. 646–654. [Google Scholar]
  32. Ding, B.; Wang, H.; Chen, P.; Zhang, Y.; Guo, Z.; Feng, J.; Liang, R. Surface and Internal Fingerprint Reconstruction from Optical Coherence Tomography Through Convolutional Neural Network. IEEE Trans. Inf. Forensics. Secur. 2021, 16, 685–700. [Google Scholar] [CrossRef]
  33. Lin, Y.; Li, D.; Liu, W.; Zhong, Z.; Li, Z.; He, Y.; Wu, S. A Measurement of Epidermal Thickness of Fingertip Skin from OCT Images Using Convolutional Neural Network. J. Innov. Opt. Health Sci. 2021, 14, 2140005. [Google Scholar] [CrossRef]
  34. Kong, C.; Li, D.; Lin, Y.; Li, Z. Automatic Algorithm for the Characterization of Sweat Ducts in a Three-Dimensional Fingerprint. Opt. Express 2021, 29, 30706–30714. [Google Scholar] [CrossRef] [PubMed]
  35. Zhong, Z.; Zhang, J.; Li, Z.; Lin, Y.; Wu, S. Depth-Independent Internal Fingerprint Based on Optical Coherence Tomography. Opt. Express 2021, 29, 16991–17000. [Google Scholar] [CrossRef]
  36. Su, Y.; Xu, W.; Zhao, J. Optical Image Encryption Based on Chaotic Fingerprint Phase Mask and Pattern-Illuminated Fourier Ptychography. Opt. Lasers Eng. 2020, 128, 106042. [Google Scholar] [CrossRef]
  37. Li, D.; Li, Z.; Zhang, J.; Li, K.; Wu, S.; He, Y.; Lin, Y. Orthogonal-Polarization-Gating Optical Coherence Tomography for Human Sweat Ducts in Vivo. J. Biophotonics 2021, 14, e202000432. [Google Scholar] [CrossRef] [PubMed]
  38. Veiga, F.; Edin, B.; Peters, J. Grip Stabilization through Independent Finger Tactile Feedback Control. Sensors 2020, 20, 1748. [Google Scholar] [CrossRef] [PubMed]
  39. Liu, F.; Shen, C.; Liu, H.; Liu, G.; Liu, Y.; Guo, Z.; Wang, L. A Flexible Touch-Based Fingerprint Acquisition Device and a Benchmark Database Using Optical Coherence Tomography. IEEE Trans. Instrum. Meas. 2020, 69, 6518–6529. [Google Scholar] [CrossRef]
  40. Vyas, A.; Yu, S.; Paik, J. Fundamentals of Digital Image Processing. In Multiscale Transforms with Application to Image Processing; Signals and Communication Technology; Springer: Singapore, 2018; pp. 3–11. ISBN 978-981-10-7272-7. [Google Scholar]
  41. Hashad, F.G.; Zahran, O.; El-Rabaie, E.-S.M.; Elashry, I.F.; Abd El-Samie, F.E. Fusion-Based Encryption Scheme for Cancelable Fingerprint Recognition. Multimed. Tools Appl. 2019, 78, 27351–27381. [Google Scholar] [CrossRef]
  42. Alfalou, A.; Brosseau, C.; Abdallah, N.; Jridi, M. Simultaneous Fusion, Compression, and Encryption of Multiple Images. Opt. Express 2011, 19, 24023–24029. [Google Scholar] [CrossRef]
  43. Sampat, M.; Wang, Z.; Gupta, S.; Bovik, A.; Markey, M. Complex Wavelet Structural Similarity: A New Image Similarity Index. Image Processing, IEEE Trans. 2009, 18, 2385–2401. [Google Scholar] [CrossRef]
  44. Yasser, I.; Khalil, A.; Mohamed, M.; Samra, A.; Khalifa, F. A Robust Chaos-Based Technique for Medical Image Encryption. IEEE Access 2021, 10, 244–257. [Google Scholar] [CrossRef]
  45. Jun, F.; Wei, H.; Jiao, S.; Wang, X. Generalized Forgery Attack to Optical Encryption Systems. Opt. Express 2021, 29, 43580–43597. [Google Scholar] [CrossRef]
  46. Liu, Z.; Wu, C.; Wang, J.; Hu, Y. A Color Image Encryption Using Dynamic DNA and 4-D Memristive Hyper-Chaos. IEEE Access 2019, 7, 78367–78378. [Google Scholar] [CrossRef]
  47. Liu, H.; Wang, X. Color Image Encryption Based on One-Time Keys and Robust Chaotic Maps. Comput. Math. Appl. 2010, 59, 3320–3327. [Google Scholar] [CrossRef]
  48. Yasser, I.; Khalifa, F.; Mohamed, M.; Samrah, A. A New Image Encryption Scheme Based on Hybrid Chaotic Maps. Complexity 2020, 2020, 9597619. [Google Scholar] [CrossRef]
  49. Thiyagarajan, J.; Murugan, B.; Gounder, A. A Chaotic Image Encryption Scheme with Complex Diffusion Matrix for Plain Image Sensitivity. Serb. J. Electr. Eng. 2019, 16, 247–265. [Google Scholar] [CrossRef]
  50. Devi, R. Geometric Transformations and Thresholding of Images using Opencv-Python. GRD J. Eng. 2017, 2, 49–52. [Google Scholar]
  51. Sundararajan, D. Geometric Transformations and Image RegistrationGeometric Transformations. In Digital Image Processing: A Signal Processing and Algorithmic Approach; Springer: Singapore, 2017; pp. 163–188. ISBN 978-981-10-6113-4. [Google Scholar]
  52. Takeda, M.; Nakano, K.; Suzuki, H.; Yamaguchi, M. Encoding Plaintext by Fourier Transform Hologram in Double Random Phase Encoding Using Fingerprint Keys. J. Opt. 2012, 14, 094003. [Google Scholar] [CrossRef]
  53. Verma, G.; Sinha, A. Securing Information Using Optically Generated Biometric Keys. J. Opt. 2016, 18, 115701. [Google Scholar] [CrossRef]
  54. Shin, K.Y.; Park, Y.H.; Nguyen, D.T.; Park, K.R. Finger-Vein Image Enhancement Using a Fuzzy-Based Fusion Method with Gabor and Retinex Filtering. Sensors 2014, 14, 3095–3129. [Google Scholar] [CrossRef]
  55. Lee, E.C.; Park, K.R. Image Restoration of Skin Scattering and Optical Blurring for Finger Vein Recognition. Opt. Lasers Eng. 2011, 49, 816–828. [Google Scholar] [CrossRef]
  56. Mohammadi Estakhri, N.; Edwards, B.; Engheta, N. Inverse-Designed Metastructures That Solve Equations. Science 2019, 363, 1333–1338. [Google Scholar] [CrossRef] [PubMed]
  57. Lalegani, Z.; Seyyed Ebrahimi, S.A.; Hamawandi, B.; La Spada, L.; Batili, H.; Toprak, M.S. Targeted Dielectric Coating of Silver Nanoparticles with Silica to Manipulate Optical Properties for Metasurface Applications. Mater. Chem. Phys. 2022, 287, 126250. [Google Scholar] [CrossRef]
  58. Pacheco-Peña, V.; Beruete, M.; Rodríguez-Ulibarri, P.; Engheta, N. On the Performance of an ENZ-Based Sensor Using Transmission Line Theory and Effective Medium Approach. New J. Phys. 2019, 21, 043056. [Google Scholar] [CrossRef]
  59. Akbari, M.; Shahbazzadeh, M.J.; La Spada, L.; Khajehzadeh, A. The Graphene Field Effect Transistor Modeling Based on an Optimized Ambipolar Virtual Source Model for DNA Detection. Appl. Sci. 2021, 11, 8114. [Google Scholar] [CrossRef]
  60. Greybush, N.J.; Pacheco-Peña, V.; Engheta, N.; Murray, C.B.; Kagan, C.R. Plasmonic Optical and Chiroptical Response of Self-Assembled Au Nanorod Equilateral Trimers. ACS Nano 2019, 13, 1617–1624. [Google Scholar] [CrossRef]
  61. Morley, M.J.; Miles, C.A. Influence of the Degree of Hydration on the Thermal Expansion of Muscle Tissue. Int. J. Food Sci. Technol. 1988, 23, 177–184. [Google Scholar] [CrossRef]
Figure 1. (a) Typical 3D OCT image of fingertip skin; (b) cross-sectional OCT image of fingertip skin; and (c) OCT system combined with BioTac sensor.
Figure 1. (a) Typical 3D OCT image of fingertip skin; (b) cross-sectional OCT image of fingertip skin; and (c) OCT system combined with BioTac sensor.
Sensors 24 02128 g001
Figure 2. Flowchart for generating the new key.
Figure 2. Flowchart for generating the new key.
Sensors 24 02128 g002
Figure 3. The process of epidermal fingerprint thickness extraction: (a) ROI of the internal fingerprint in a cross-sectional OCT image; (b) projection of the DEJ boundary to acquire the internal fingerprint in an en-face OCT image; (c) magnification of the location area of the red square in (b); (d) location area in ROI; (e) the upper and lower boundaries of the epidermis; and (f) part of (e).
Figure 3. The process of epidermal fingerprint thickness extraction: (a) ROI of the internal fingerprint in a cross-sectional OCT image; (b) projection of the DEJ boundary to acquire the internal fingerprint in an en-face OCT image; (c) magnification of the location area of the red square in (b); (d) location area in ROI; (e) the upper and lower boundaries of the epidermis; and (f) part of (e).
Sensors 24 02128 g003
Figure 4. Flowchart of key generation.
Figure 4. Flowchart of key generation.
Sensors 24 02128 g004
Figure 5. The process of encryption and decryption (a) image of a cat, (b) DCT of a cat image, (c) encrypted key image of MIP-based thickness, (d) encrypted image of a cat using fusion, (e) encrypted image of a cat, (f) decrypted key image of thickness is the same as (e), (g) DCT spectrum, and (h) decrypted image of a cat by inverse DCT.
Figure 5. The process of encryption and decryption (a) image of a cat, (b) DCT of a cat image, (c) encrypted key image of MIP-based thickness, (d) encrypted image of a cat using fusion, (e) encrypted image of a cat, (f) decrypted key image of thickness is the same as (e), (g) DCT spectrum, and (h) decrypted image of a cat by inverse DCT.
Sensors 24 02128 g005
Figure 6. The epidermal thickness of fingertip skin at the different pressures measured by the BioTac sensor. (a) the epidermal thickness of fingertip skin at pressure of 6 kPa, (b) the epidermal thickness of fingertip skin at pressure of 10 kPa, (c) the epidermal thickness of fingertip skin at pressure of 14 kPa, (d) the three different states of pressure during sampling the fingertip skin. The three red rectangles denote the three different states of pressure during sampling the fingertip skin by OCT.
Figure 6. The epidermal thickness of fingertip skin at the different pressures measured by the BioTac sensor. (a) the epidermal thickness of fingertip skin at pressure of 6 kPa, (b) the epidermal thickness of fingertip skin at pressure of 10 kPa, (c) the epidermal thickness of fingertip skin at pressure of 14 kPa, (d) the three different states of pressure during sampling the fingertip skin. The three red rectangles denote the three different states of pressure during sampling the fingertip skin by OCT.
Sensors 24 02128 g006
Figure 7. (a) The original image of the cat; (b) the decrypted image of the cat by inverse DCT; (c) another area of the same size in MIP; (d) another key image of the thickness; and (e) the decrypted image.
Figure 7. (a) The original image of the cat; (b) the decrypted image of the cat by inverse DCT; (c) another area of the same size in MIP; (d) another key image of the thickness; and (e) the decrypted image.
Sensors 24 02128 g007
Figure 8. (a) Decryption template; (b) decrypted image; (cj) encrypted images with 6.25%, 12.5%, 25%, 50%, 60%, 70%, 80%, and 90% data loss; (kr) the corresponding decryption results of the original image; and (s) the relationship between the SSIM value and the data loss.
Figure 8. (a) Decryption template; (b) decrypted image; (cj) encrypted images with 6.25%, 12.5%, 25%, 50%, 60%, 70%, 80%, and 90% data loss; (kr) the corresponding decryption results of the original image; and (s) the relationship between the SSIM value and the data loss.
Sensors 24 02128 g008
Figure 9. (ad) Grayscale histograms of the original key and the fake key; intensity distribution diagrams of adjacent pixels in the vertical (e,f), horizontal (g,h), and diagonal (i,j) directions of the original key and the fake key.
Figure 9. (ad) Grayscale histograms of the original key and the fake key; intensity distribution diagrams of adjacent pixels in the vertical (e,f), horizontal (g,h), and diagonal (i,j) directions of the original key and the fake key.
Sensors 24 02128 g009
Table 1. Normal correlation coefficients of epidermal thickness maps at the different pressures.
Table 1. Normal correlation coefficients of epidermal thickness maps at the different pressures.
Different PressuresStatus IStatus IIStatus III
Status I10.88230.800
Status II0.882310.955
Status III0.8000.9551
Table 2. Normal correlation coefficients between the original image and the decrypted image.
Table 2. Normal correlation coefficients between the original image and the decrypted image.
Decryption Map
Encryption MapStatus IStatus IIStatus III
Status I10.90620.9048
Status II0.909810.9067
Status III0.90980.90811
Table 3. Average correlation coefficients of adjacent pixelated values in different directions and average entropy in the original key and the ones in the fake key.
Table 3. Average correlation coefficients of adjacent pixelated values in different directions and average entropy in the original key and the ones in the fake key.
Correlation CoefficientsEntropy
HorizontalVerticalDiagonal
Original key−0.0075−0.0354−0.04797.8177
Fake key−0.0058−0.0163−0.06647.8201
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Li, W.; Zhang, B.; Zhang, X.; Liu, B.; Li, H.; Wu, S.; Li, Z. Pressure-Insensitive Epidermal Thickness of Fingertip Skin for Optical Image Encryption. Sensors 2024, 24, 2128. https://doi.org/10.3390/s24072128

AMA Style

Li W, Zhang B, Zhang X, Liu B, Li H, Wu S, Li Z. Pressure-Insensitive Epidermal Thickness of Fingertip Skin for Optical Image Encryption. Sensors. 2024; 24(7):2128. https://doi.org/10.3390/s24072128

Chicago/Turabian Style

Li, Wangbiao, Bo Zhang, Xiaoman Zhang, Bin Liu, Hui Li, Shulian Wu, and Zhifang Li. 2024. "Pressure-Insensitive Epidermal Thickness of Fingertip Skin for Optical Image Encryption" Sensors 24, no. 7: 2128. https://doi.org/10.3390/s24072128

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop