Journal ArticleDOI
Collision in optical image encryption based on interference and a method for avoiding this security leak
TLDR
A study of the collision property of the optical image encryption technique based on interference is presented and an efficient way to avoid this potential risk is provided by adding an extra unit in the original structure, which can be called a double-factor verification system.Abstract:
From the perspective of cryptography, collision is an undesirable situation that occurs when two or more distinct inputs into a security system produce undistinguishable outputs. In this paper we present a study of the collision property of the optical image encryption technique based on interference (Zhang et al. Optics Letters; 2008:33(21)). For an arbitrary secret image (output) to be encrypted, we can find various distinct pairs of phase-only masks (inputs), which yield almost the same outputs by use of a modified phase retrieval algorithm. Meanwhile, we also provide an efficient way to avoid this potential risk by adding an extra unit in the original structure, which can thus be called a double-factor verification system. A series of computer simulations were also carried out to demonstrate our concern and strategy.read more
Citations
More filters
Journal ArticleDOI
Novel image compression–encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing
TL;DR: A new image compression–encryption hybrid algorithm is proposed to realize compression and encryption simultaneously, where the key is easily distributed, stored or memorized.
Journal ArticleDOI
Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform
TL;DR: A novel image compression–encryption scheme is proposed by combining 2D compressive sensing with nonlinear fractional Mellin transform to achieve compression and encryption simultaneously.
Journal ArticleDOI
Image compression-encryption algorithms by combining hyper-chaotic system with discrete fractional random transform
TL;DR: The proposed algorithm can compress and encrypt image signal, especially can encrypt multiple images once, and is of high security and good compression performance.
Journal ArticleDOI
Ciphertext-only attack on a joint transform correlator encryption system
TL;DR: The hybrid input-output (HIO) algorithm is employed to handle the issue to be solved in the COA scheme of a ciphertext-only attack on a joint transform correlator (JTC) encryption system with an inartificial signal domain support and a given frequency domain constraint.
Journal ArticleDOI
Security risk of diffractive-imaging-based optical cryptosystem.
TL;DR: This result is the first work to show the security risk of the diffractive-image cryptosystem, and provides a set of numerical simulations to demonstrate the feasibility and robustness of the presented method.
References
More filters
Journal ArticleDOI
Phase retrieval algorithms: a comparison.
TL;DR: Iterative algorithms for phase retrieval from intensity data are compared to gradient search methods and it is shown that both the error-reduction algorithm for the problem of a single intensity measurement and the Gerchberg-Saxton algorithm forThe problem of two intensity measurements converge.
Book
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Bruce Schneier,Phil Sutherland +1 more
TL;DR: This document describes the construction of protocols and their use in the real world, as well as some examples of protocols used in the virtual world.
Journal ArticleDOI
Optical image encryption based on input plane and Fourier plane random encoding.
Philippe Réfrégier,Bahram Javidi +1 more
TL;DR: A new optical encoding method of images for security applications is proposed and it is shown that the encoding converts the input signal to stationary white noise and that the reconstruction method is robust.
Journal ArticleDOI
Known-plaintext attack on optical encryption based on double random phase keys
TL;DR: A new approach to known-plaintext attack on an optical encryption scheme based on double random phase keys that can be accessed with the help of the phase retrieval technique is demonstrated.
Journal ArticleDOI
Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys.
TL;DR: It is shown how optical encryption methods based on double random phase keys are vulnerable to an organized attack of the chosen-ciphertext type and cast doubts on the present security of these techniques.
Related Papers (5)
Optical image encryption based on input plane and Fourier plane random encoding.
Philippe Réfrégier,Bahram Javidi +1 more