scispace - formally typeset
Search or ask a question
Author

Xiang Peng

Bio: Xiang Peng is an academic researcher from Shenzhen University. The author has contributed to research in topics: Encryption & Ciphertext. The author has an hindex of 31, co-authored 269 publications receiving 4802 citations. Previous affiliations of Xiang Peng include Chinese Ministry of Education & Tianjin University.


Papers
More filters
Journal ArticleDOI
TL;DR: A new approach to known-plaintext attack on an optical encryption scheme based on double random phase keys that can be accessed with the help of the phase retrieval technique is demonstrated.
Abstract: We demonstrate a new approach to known-plaintext attack on an optical encryption scheme based on double random phase keys. With this attack an opponent can access both random phase keys with the help of the phase retrieval technique. This demonstration shows that an optical encryption scheme based on double random encoding is vulnerable to known-plaintext attack.

608 citations

Journal ArticleDOI
Wan Qin1, Xiang Peng1
TL;DR: Owing to the nonlinear operation of phase truncation, high robustness against existing attacks could be achieved and a set of simulation results shows the validity of proposed asymmetric cryptosystem.
Abstract: We propose an asymmetric cryptosystem based on a phase-truncated Fourier transform. With phase truncation in Fourier transform, one is able to produce an asymmetric ciphertext as real-valued and stationary white noise by using two random phase keys as public keys, while a legal user can retrieve the plaintext using another two different private phase keys in the decryption process. Owing to the nonlinear operation of phase truncation, high robustness against existing attacks could be achieved. A set of simulation results shows the validity of proposed asymmetric cryptosystem.

478 citations

Journal ArticleDOI
TL;DR: A method of chosen-plaintext attack on lensless double-random phase encoding (L-DRPE) in the Fresnel domain is demonstrated, showing that a lensless optical encryption scheme based on DRPE is vulnerable to chosen- Plaintext attack.
Abstract: We demonstrate a method of chosen-plaintext attack on lensless double-random phase encoding (L-DRPE) in the Fresnel domain. With this attack an opponent can access two encryption keys with help of the impulse functions as chosen plaintexts. This shows that a lensless optical encryption scheme based on DRPE is vulnerable to chosen-plaintext attack. Cryptoanalysis also indicates that the security worry originates from the linearity of the encryption and decryption mechanism of the L-DRPE scheme. One of the interesting features of the proposed attack is that the decryption process is lossless. Numerical simulations show good agreement with theoretical analysis.

388 citations

Journal ArticleDOI
TL;DR: An overview of the potential, recent advances, and challenges of optical security and encryption using free space optics is presented, highlighting the need for more specialized hardware and image processing algorithms.
Abstract: Information security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information security, encryption, and authentication. The main motivation for using optics and photonics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make information encryption more secure and more difficult to attack. This roadmap article presents an overview of the potential, recent advances, and challenges of optical security and encryption using free space optics. The roadmap on optical security is comprised of six categories that together include 16 short sections written by authors who have made relevant contributions in this field. The first category of this roadmap describes novel encryption approaches, including secure optical sensing which summarizes double random phase encryption applications and flaws [Yamaguchi], the digital holographic encryption in free space optical technique which describes encryption using multidimensional digital holography [Nomura], simultaneous encryption of multiple signals [Perez-Cabre], asymmetric methods based on information truncation [Nishchal], and dynamic encryption of video sequences [Torroba]. Asymmetric and one-way cryptosystems are analyzed by Peng. The second category is on compression for encryption. In their respective contributions, Alfalou and Stern propose similar goals involving compressed data and compressive sensing encryption. The very important area of cryptanalysis is the topic of the third category with two sections: Sheridan reviews phase retrieval algorithms to perform different attacks, whereas Situ discusses nonlinear optical encryption techniques and the development of a rigorous optical information security theory. The fourth category with two contributions reports how encryption could be implemented at the nano- or micro-scale. Naruse discusses the use of nanostructures in security applications and Carnicer proposes encoding information in a tightly focused beam. In the fifth category, encryption based on ghost imaging using single-pixel detectors is also considered. In particular, the authors [Chen, Tajahuerce] emphasize the need for more specialized hardware and image processing algorithms. Finally, in the sixth category, Mosk and Javidi analyze in their corresponding papers how quantum imaging can benefit optical encryption systems. Sources that use few photons make encryption systems much more difficult to attack, providing a secure method for authentication.

317 citations

Journal ArticleDOI
TL;DR: Fractional optical vortex beams with fractional topological charges, which are coupled in an optical tweezers system, are experimentally demonstrate optical rotation and manipulation of microscopic particles by use of optical vortex beam's orbital angular momentum and radial opening.
Abstract: We experimentally demonstrate optical rotation and manipulation of microscopic particles by use of optical vortex beams with fractional topological charges, namely fractional optical vortex beams, which are coupled in an optical tweezers system. Like the vortex beams with integer topological charges, the fractional optical vortex beams are also capable of rotating particles induced by the transfer of orbital angular momentum. However, the unique radial opening (low-intensity gap) in the intensity ring encompassing the dark core, due to the fractional nature of the beam, hinders the rotation significantly. The fractional vortex beam’s orbital angular momentum and radial opening are exploited to guide and transport microscopic particles.

229 citations


Cited by
More filters
Journal Article
TL;DR: In this article, a fast Fourier transform method of topography and interferometry is proposed to discriminate between elevation and depression of the object or wave-front form, which has not been possible by the fringe-contour generation techniques.
Abstract: A fast-Fourier-transform method of topography and interferometry is proposed. By computer processing of a noncontour type of fringe pattern, automatic discrimination is achieved between elevation and depression of the object or wave-front form, which has not been possible by the fringe-contour-generation techniques. The method has advantages over moire topography and conventional fringe-contour interferometry in both accuracy and sensitivity. Unlike fringe-scanning techniques, the method is easy to apply because it uses no moving components.

3,742 citations

Journal ArticleDOI
TL;DR: The fact that light carries both linear and angular momentum is well-known to physicists as discussed by the authors, and one application of the linear momentum of light is for optical tweezers, in which the refraction of a laser beam through a particle provides a reaction force that draws the particle towards the centre of the beam.
Abstract: The fact that light carries both linear and angular momentum is well-known to physicists. One application of the linear momentum of light is for optical tweezers, in which the refraction of a laser beam through a particle provides a reaction force that draws the particle towards the centre of the beam. The angular momentum of light can also be transfered to particles, causing them to spin. In fact, the angular momentum of light has two components that act through different mechanisms on various types of particle. This Review covers the creation of such beams and how their unusual intensity, polarization and phase structure has been put to use in the field of optical manipulation.

1,679 citations

Journal Article
TL;DR: In this article, a self-scanned 1024 element photodiode array and a minicomputer are used to measure the phase (wavefront) in the interference pattern of an interferometer to lambda/100.
Abstract: A self-scanned 1024 element photodiode array and minicomputer are used to measure the phase (wavefront) in the interference pattern of an interferometer to lambda/100. The photodiode array samples intensities over a 32 x 32 matrix in the interference pattern as the length of the reference arm is varied piezoelectrically. Using these data the minicomputer synchronously detects the phase at each of the 1024 points by a Fourier series method and displays the wavefront in contour and perspective plot on a storage oscilloscope in less than 1 min (Bruning et al. Paper WE16, OSA Annual Meeting, Oct. 1972). The array of intensities is sampled and averaged many times in a random fashion so that the effects of air turbulence, vibrations, and thermal drifts are minimized. Very significant is the fact that wavefront errors in the interferometer are easily determined and may be automatically subtracted from current or subsequent wavefrots. Various programs supporting the measurement system include software for determining the aperture boundary, sum and difference of wavefronts, removal or insertion of tilt and focus errors, and routines for spatial manipulation of wavefronts. FFT programs transform wavefront data into point spread function and modulus and phase of the optical transfer function of lenses. Display programs plot these functions in contour and perspective. The system has been designed to optimize the collection of data to give higher than usual accuracy in measuring the individual elements and final performance of assembled diffraction limited optical systems, and furthermore, the short loop time of a few minutes makes the system an attractive alternative to constraints imposed by test glasses in the optical shop.

1,300 citations

Journal ArticleDOI
TL;DR: This paper presents a meta-analyses of Fourier-Transform Profilometry and its applications in 3-D Shape Measurement and Surface Profile Measurement for Structured Light Pattern and 4-Core Optical-Fiber.

1,110 citations

Journal ArticleDOI
TL;DR: The authors survey the steady refinement of techniques used to create optical vortices, and explore their applications, which include sophisticated optical computing processes, novel microscopy and imaging techniques, the creation of ‘optical tweezers’ to trap particles of matter, and optical machining using light to pattern structures on the nanoscale.
Abstract: Thirty years ago, Coullet et al. proposed that a special optical field exists in laser cavities bearing some analogy with the superfluid vortex. Since then, optical vortices have been widely studied, inspired by the hydrodynamics sharing similar mathematics. Akin to a fluid vortex with a central flow singularity, an optical vortex beam has a phase singularity with a certain topological charge, giving rise to a hollow intensity distribution. Such a beam with helical phase fronts and orbital angular momentum reveals a subtle connection between macroscopic physical optics and microscopic quantum optics. These amazing properties provide a new understanding of a wide range of optical and physical phenomena, including twisting photons, spin-orbital interactions, Bose-Einstein condensates, etc., while the associated technologies for manipulating optical vortices have become increasingly tunable and flexible. Hitherto, owing to these salient properties and optical manipulation technologies, tunable vortex beams have engendered tremendous advanced applications such as optical tweezers, high-order quantum entanglement, and nonlinear optics. This article reviews the recent progress in tunable vortex technologies along with their advanced applications.

1,016 citations