OSA's Digital Library

Applied Optics

Applied Optics

APPLICATIONS-CENTERED RESEARCH IN OPTICS

  • Editor: Joseph N. Mait
  • Vol. 52, Iss. 4 — Feb. 1, 2013
  • pp: 871–878

Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform

Sudheesh K. Rajput and Naveen K. Nishchal  »View Author Affiliations


Applied Optics, Vol. 52, Issue 4, pp. 871-878 (2013)
http://dx.doi.org/10.1364/AO.52.000871


View Full Text Article

Enhanced HTML    Acrobat PDF (1327 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

In this paper, we propose a scheme for information security under the basic double random phase encoding framework but with enhanced complexity and immunity against the known-plaintext attack. Modified Gerchberg–Saxton algorithm is used to convert a primary image into a phase-only mask (POM). The POM is used as a Fresnel domain key for encrypting an arbitrary data, called random intensity mask (RIM) bonded with a random phase mask. With phase- and amplitude-truncation, asymmetric keys are generated from the RIM. For decryption, the main target is to get the POM, for which the concept of known-plaintext attack has been used. The conventional schemes for attack use known-plaintext for key generation, but in this study it refers to the asymmetric keys. Obtaining Fresnel transform with the same parameters of the POM gives the primary image. We present the computer simulation results of multiple gray-scale images without any cross talk and also for a color image. The decryption is simple and straightforward and can be done digitally or optically. An optical setup for decryption has been suggested.

© 2013 Optical Society of America

OCIS Codes
(070.0070) Fourier optics and signal processing : Fourier optics and signal processing
(100.2000) Image processing : Digital image processing
(100.5070) Image processing : Phase retrieval
(060.4785) Fiber optics and optical communications : Optical security and encryption

ToC Category:
Image Processing

History
Original Manuscript: October 22, 2012
Revised Manuscript: January 3, 2013
Manuscript Accepted: January 3, 2013
Published: February 1, 2013

Citation
Sudheesh K. Rajput and Naveen K. Nishchal, "Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform," Appl. Opt. 52, 871-878 (2013)
http://www.opticsinfobase.org/ao/abstract.cfm?URI=ao-52-4-871


Sort:  Author  |  Year  |  Journal  |  Reset  

References

  1. P. Refregier and B. Javidi, “Optical image encryption based on input plane encoding and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995). [CrossRef]
  2. Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33, 2443–2445 (2008). [CrossRef]
  3. P. Clemente, V. Durán, V. T. Company, E. Tajahuerce, and J. Lancis, “Optical encryption based on computational ghost imaging,” Opt. Lett. 35, 2391–2393 (2010). [CrossRef]
  4. W. Chen and X. Chen, “Space-based optical image encryption,” Opt. Express 18, 27095–27104 (2010). [CrossRef]
  5. W. Chen, X. Chen, and J. R. Sheppard, “Optical image encryption based on diffractive imaging,” Opt. Lett. 35, 3817–3819 (2010). [CrossRef]
  6. A. Alfalou, and C. Brosseau, “Dual encryption scheme of images using polarized light,” Opt. Lett. 35, 2185–2187 (2010). [CrossRef]
  7. A. Alfalou and C. Brosseau, “Optical image compression and encryption methods,” Opt. Photonics News 1, 589–636 (2009). [CrossRef]
  8. N. K. Nishchal and T. J. Naughton, “Flexible optical encryption with multiple users and multiple security levels,” Opt. Commun. 284, 735–739 (2011). [CrossRef]
  9. B. Hennelly and J. T. Sheridan, “Optical image encryption by random shifting in fractional Fourier domains,” Opt. Lett. 28, 269–271 (2003). [CrossRef]
  10. G. Situ and J. Zhang, “Double random phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584–1586 (2004). [CrossRef]
  11. J. A. Rodrigo, T. Alieva, and M. L. Calvo, “Applications of gyrator transform for image processing,” Opt. Commun. 278, 279–284 (2007). [CrossRef]
  12. A. Carnicer, M. M. Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of the optical encryption schemes based on double random phase keys,” Opt. Lett. 30, 1644–1646 (2005). [CrossRef]
  13. X. Peng, P. Zhang, H. Wei, and B. Yu, “Known plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044–1046 (2006). [CrossRef]
  14. X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double random phase encoding in Fresnel domain,” Opt. Lett. 31, 3261–3263 (2006). [CrossRef]
  15. W. Qin and X. Peng, “Vulnerability to known-plaintext attack of optical encryption schemes based on two fractional Fourier transform order keys and double random phase keys,” J. Opt. 11, 075402 (2009). [CrossRef]
  16. Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15, 10253–10265 (2007). [CrossRef]
  17. P. Kumar, A. Kumar, J. Joseph, and K. Singh, “Impulse attack free double random-phase encryption scheme with randomized lens-phase function,” Opt. Lett. 34, 331–333 (2009). [CrossRef]
  18. X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, “Security enhancement of double-random phase encryption by amplitude modulation,” Opt. Lett. 33, 1575–1577 (2008). [CrossRef]
  19. P. Kumar, J. Joseph, and K. Singh, “Vulnerability of the security enhanced double random phase-amplitude encryption scheme to point spread function attack,” Opt. Lasers Eng. 50, 1196–1201 (2012). [CrossRef]
  20. W. Qin and X. Peng, “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35, 118–120(2010). [CrossRef]
  21. S. K. Rajput and N. K. Nishchal, “Image encryption based on interference that uses fractional Fourier domains asymmetric keys,” Appl. Opt. 51, 1446–1452 (2012). [CrossRef]
  22. X. Wang and D. Zhao, “Multiple-image encryption based on nonlinear amplitude-truncation and phase-truncation in Fourier domain,” Opt. Commun. 284, 148–152 (2011). [CrossRef]
  23. X. Wang and D. Zhao, “A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Commun. 285, 1078–1081 (2012). [CrossRef]
  24. G. Situ and J. Zhang, “Multiple image encryption by wavelength multiplexing,” Opt. Lett. 30, 1306–1308 (2005). [CrossRef]
  25. J. F. Barrera, R. Henao, R. Torroba, M. Tebaldi, and N. Bolognini, “Multiplexing encryption–decryption via lateral shifting of a random phase mask,” Opt. Commun. 259, 532–536 (2006). [CrossRef]
  26. H.-E. Hwang, H. T. Chang, and W. N. Lie, “Multiple-image encryption and multiplexing using a modified Gerchberg–Saxton algorithm and phase modulation in Fresnel-transform domain,” Opt. Lett. 34, 3917–3919 (2009). [CrossRef]
  27. H. T. Chang, H.-E. Wang, and C.-L. Lee, “Position multiplexing multiple image encryption using cascaded phase only masks in Fresnel transform domain,” Opt. Commun. 284, 4146–4151 (2011). [CrossRef]
  28. X. Deng and D. Zhao, “Multiple-image encryption using phase retrieval algorithm and intermodulation in Fourier domain,” Opt. Laser Technol. 44, 374–377 (2012). [CrossRef]
  29. A. Alfalou and A. Mansour, “Double random phase encryption scheme to multiplex and simultaneous encode multiple image,” Appl. Opt. 48, 5933–5947 (2009). [CrossRef]
  30. A. Alfalou and C. Brosseau, “Exploiting root-mean-square time-frequency structure for multiple-image optical compression and encryption,” Opt. Lett. 35, 1914–1916 (2010). [CrossRef]
  31. A. E. Shortt, T. J. Naughton, and B. Javidi, “Compression of optically encrypted digital holograms using artificial neural networks,” J. Disp. Technol. 2, 401–410 (2006). [CrossRef]
  32. L. Chen and D. Zhao, “Optical color image encryption by wavelength multiplexing and lensless Fresnel transform holograms,” Opt. Express 14, 8552–8560 (2006). [CrossRef]
  33. M. Joshi, C. Shakher, and K. Singh, “Color image encryption and decryption using fractional Fourier transform,” Opt. Commun. 279, 35–42 (2007). [CrossRef]
  34. C. J. Tay, C. Quan, W. Chen, and Y. Fu, “Color image encryption based on interference and virtual optics,” Opt. Laser Technol. 42, 409–415 (2010). [CrossRef]
  35. H.-E. Hwang, “Optical color image encryption based on the wavelength multiplexing using cascaded phase-only masks in Fresnel transform domain,” Opt. Commun. 285, 567–573 (2012). [CrossRef]
  36. S. K. Rajput and N. K. Nishchal, “Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask,” Appl. Opt. 51, 5377–5386(2012). [CrossRef]
  37. Z. Zalevsky, D. Mendlovic, and R. G. Dorsch, “Gerchberg–Saxton algorithm applied in fractional Fourier or Fresnel domain,” Opt. Lett. 21, 842–844 (1996). [CrossRef]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited