scispace - formally typeset
Journal ArticleDOI

Collision in optical image encryption based on interference and a method for avoiding this security leak

TLDR
A study of the collision property of the optical image encryption technique based on interference is presented and an efficient way to avoid this potential risk is provided by adding an extra unit in the original structure, which can be called a double-factor verification system.
Abstract
From the perspective of cryptography, collision is an undesirable situation that occurs when two or more distinct inputs into a security system produce undistinguishable outputs. In this paper we present a study of the collision property of the optical image encryption technique based on interference (Zhang et al. Optics Letters; 2008:33(21)). For an arbitrary secret image (output) to be encrypted, we can find various distinct pairs of phase-only masks (inputs), which yield almost the same outputs by use of a modified phase retrieval algorithm. Meanwhile, we also provide an efficient way to avoid this potential risk by adding an extra unit in the original structure, which can thus be called a double-factor verification system. A series of computer simulations were also carried out to demonstrate our concern and strategy.

read more

Citations
More filters
Journal ArticleDOI

Novel image compression–encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing

TL;DR: A new image compression–encryption hybrid algorithm is proposed to realize compression and encryption simultaneously, where the key is easily distributed, stored or memorized.
Journal ArticleDOI

Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform

TL;DR: A novel image compression–encryption scheme is proposed by combining 2D compressive sensing with nonlinear fractional Mellin transform to achieve compression and encryption simultaneously.
Journal ArticleDOI

Image compression-encryption algorithms by combining hyper-chaotic system with discrete fractional random transform

TL;DR: The proposed algorithm can compress and encrypt image signal, especially can encrypt multiple images once, and is of high security and good compression performance.
Journal ArticleDOI

Ciphertext-only attack on a joint transform correlator encryption system

TL;DR: The hybrid input-output (HIO) algorithm is employed to handle the issue to be solved in the COA scheme of a ciphertext-only attack on a joint transform correlator (JTC) encryption system with an inartificial signal domain support and a given frequency domain constraint.
Journal ArticleDOI

Security risk of diffractive-imaging-based optical cryptosystem.

TL;DR: This result is the first work to show the security risk of the diffractive-image cryptosystem, and provides a set of numerical simulations to demonstrate the feasibility and robustness of the presented method.
References
More filters
Journal ArticleDOI

Phase retrieval algorithms: a comparison.

TL;DR: Iterative algorithms for phase retrieval from intensity data are compared to gradient search methods and it is shown that both the error-reduction algorithm for the problem of a single intensity measurement and the Gerchberg-Saxton algorithm forThe problem of two intensity measurements converge.
Book

Applied Cryptography: Protocols, Algorithms, and Source Code in C

TL;DR: This document describes the construction of protocols and their use in the real world, as well as some examples of protocols used in the virtual world.
Journal ArticleDOI

Optical image encryption based on input plane and Fourier plane random encoding.

TL;DR: A new optical encoding method of images for security applications is proposed and it is shown that the encoding converts the input signal to stationary white noise and that the reconstruction method is robust.
Journal ArticleDOI

Known-plaintext attack on optical encryption based on double random phase keys

TL;DR: A new approach to known-plaintext attack on an optical encryption scheme based on double random phase keys that can be accessed with the help of the phase retrieval technique is demonstrated.
Journal ArticleDOI

Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys.

TL;DR: It is shown how optical encryption methods based on double random phase keys are vulnerable to an organized attack of the chosen-ciphertext type and cast doubts on the present security of these techniques.
Related Papers (5)