Journal ArticleDOI
Improved method of attack on an asymmetric cryptosystem based on phase-truncated Fourier transform
TLDR
An improved method of attack on an asymmetric cryptosystem based on a phase-truncated Fourier transform is proposed, which not only enhances the security of the system but also does not require truncated phases.Abstract:
We propose an improved method of attack on an asymmetric cryptosystem based on a phase-truncated Fourier transform. With the proposed method of attack, an attacker is able to access the exact decryption keys and obtain precise attack results. The method is based on a novel median-filtering phase-retrieval algorithm. Compared with existing attacks, the proposed attack has the following advantages: (1) exact information of the original image can be obtained in gray-scale and binary forms; (2) better computing efficiency; (3) more robust against noise and occlusion contaminations. Numerical simulation results show the effectiveness and robustness of the proposed method. Based on the proposed method of attack, we further propose a new cryptosystem, which not only enhances the security of the system but also does not require truncated phases.read more
Citations
More filters
Journal ArticleDOI
Asymmetric optical image encryption based on an improved amplitude–phase retrieval algorithm
Yan Wang,Chenggen Quan,C.J. Tay +2 more
TL;DR: The results illustrate that the computing efficiency of the proposed method is improved and the number of iterations required is much less than that of the cryptosystem based on the Yang–Gu algorithm.
Journal ArticleDOI
Asymmetric optical cryptosystem for color image based on equal modulus decomposition in gyrator transform domains
TL;DR: An enhanced asymmetric cryptosystem for color image is proposed by using equal modulus decomposition (EMD) in the gyrator transform domains by using the Baker mapping for scrambling the RGB components of the color image.
Journal ArticleDOI
Devil׳s vortex Fresnel lens phase masks on an asymmetric cryptosystem based on phase-truncation in gyrator wavelet transform domain
TL;DR: The mother wavelet family, DVFL and gyrator transform orders associated with the GWT are extra keys that cause difficulty to an attacker so the scheme is more secure as compared to conventional techniques.
Journal ArticleDOI
New method of attack and security enhancement on an asymmetric cryptosystem based on equal modulus decomposition
TL;DR: This paper has shown that the proposed asymmetric cryptosystem is vulnerable to a newly designed attack that is able to access the exact private key and obtain precise attack results using a phase retrieval algorithm.
Journal ArticleDOI
Double image encryption using 3D Lorenz chaotic system, 2D non-separable linear canonical transform and QR decomposition
TL;DR: The independent parameters of the 2D non-separable canonical transform enlarge the key-space of the proposed scheme and enhance robustness against brute-force attack.
References
More filters
Journal ArticleDOI
Optical image encryption based on input plane and Fourier plane random encoding.
Philippe Réfrégier,Bahram Javidi +1 more
TL;DR: A new optical encoding method of images for security applications is proposed and it is shown that the encoding converts the input signal to stationary white noise and that the reconstruction method is robust.
Journal ArticleDOI
Optical encryption by double-random phase encoding in the fractional Fourier domain.
TL;DR: An optical architecture that encodes a primary image to stationary white noise by using two statistically independent random phase codes that has an enhanced security value compared with earlier methods is proposed.
Journal ArticleDOI
Double random-phase encoding in the Fresnel domain
Guohai Situ,Jingjuan Zhang +1 more
TL;DR: A lensless optical security system based on double random-phase encoding in the Fresnel domain is proposed, which can encrypt a primary image to random noise by use of two statistically independent random- phase masks in the input and transform planes, respectively.
Journal ArticleDOI
Known-plaintext attack on optical encryption based on double random phase keys
TL;DR: A new approach to known-plaintext attack on an optical encryption scheme based on double random phase keys that can be accessed with the help of the phase retrieval technique is demonstrated.
Journal ArticleDOI
Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys.
TL;DR: It is shown how optical encryption methods based on double random phase keys are vulnerable to an organized attack of the chosen-ciphertext type and cast doubts on the present security of these techniques.
Related Papers (5)
Optical image encryption based on input plane and Fourier plane random encoding.
Philippe Réfrégier,Bahram Javidi +1 more