OSA's Digital Library

Applied Optics

Applied Optics


  • Editor: James C. Wyant
  • Vol. 46, Iss. 22 — Aug. 1, 2007
  • pp: 5257–5262

Cryptanalysis of optical security systems with significant output images

Guohai Situ, Unnikrishnan Gopinathan, David S. Monaghan, and John T. Sheridan  »View Author Affiliations

Applied Optics, Vol. 46, Issue 22, pp. 5257-5262 (2007)

View Full Text Article

Enhanced HTML    Acrobat PDF (759 KB)

Browse Journals / Lookup Meetings

Browse by Journal and Year


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools



The security of the encryption and verification techniques with significant output images is examined by a known-plaintext attack. We introduce an iterative phase-retrieval algorithm based on multiple intensity measurements to heuristically estimate the phase key in the Fourier domain by several plaintext-cyphertext pairs. We obtain correlation output images with very low error by correlating the estimated key with corresponding random phase masks. Our studies show that the convergence behavior of this algorithm sensitively depends on the starting point. We also demonstrate that this algorithm can be used to attack the double random phase encoding technique.

© 2007 Optical Society of America

OCIS Codes
(070.2580) Fourier optics and signal processing : Paraxial wave optics
(070.4560) Fourier optics and signal processing : Data processing by optical means
(100.5070) Image processing : Phase retrieval
(200.4560) Optics in computing : Optical data processing

ToC Category:
Fourier Optics and Signal Processing

Original Manuscript: January 2, 2007
Manuscript Accepted: April 14, 2007
Published: July 9, 2007

Guohai Situ, Unnikrishnan Gopinathan, David S. Monaghan, and John T. Sheridan, "Cryptanalysis of optical security systems with significant output images," Appl. Opt. 46, 5257-5262 (2007)

Sort:  Author  |  Year  |  Journal  |  Reset  


  1. B. Javidi, ed., Optical and Digital Techniques for Information Security (Springer Verlag, 2005).
  2. P. Réfrégier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995).
  3. R. K. Wang, L. A. Watson, and C. Chatwin, "Random phase encoding for optical security," Opt. Eng. 35, 2464-2469 (1996). [CrossRef]
  4. P. C. Mogensen and J. Glückstad, "Phase-only optical encryption," Opt. Lett. 25, 566-568 (2000).
  5. G. Unnikrishnan, J. Joseph, and K. Singh, "Optical encryption by double-random phase encoding in the fractional Fourier domain," Opt. Lett. 25, 887-889 (2000).
  6. B. Hennelly and J. T. Sheridan, "Fractional Fourier transform-based image encryption: phase retrieval algorithm," Opt. Commun. 226, 61-80 (2003). [CrossRef]
  7. O. Matoba and B. Javidi, "Encrypted optical memory system using three-dimensional keys in the Fresnel domain," Opt. Lett. 24, 762-764 (1999).
  8. G. Situ and J. Zhang, "A lensless optical security system based on computer-generated phase only masks," Opt. Commun. 232, 115-122 (2004). [CrossRef]
  9. G. Situ and J. Zhang, "Double random-phase encoding in the Fresnel domain," Opt. Lett. 29, 1584-1586 (2004). [CrossRef]
  10. L. Chen and D. Zhao, "Optical image encryption with Hartley transforms," Opt. Lett. 31, 3438-3440 (2006). [CrossRef]
  11. J. Rosen and B. Javidi, "Hidden images in halftone pictures," Appl. Opt. 40, 3346-3353 (2001).
  12. J. J. Kim, J. H. Kim, and E. S. Kim, "Optodigital implementation of multiple information hiding and extraction system," Opt. Eng. 43, 113-125 (2004). [CrossRef]
  13. Y. Hayasaki, Y. Matsuba, A. Nagaoka, H. Yamamoto, and N. Nishida, "Hiding an image with a light-scattering medium and use of a contrast-discrimination method for readout," Appl. Opt. 43, 1552-1558 (2004). [CrossRef]
  14. G. Situ and J. Zhang, "Image hiding with computer-generated phase codes for optical authentication," Opt. Commun. 245, 55-65 (2005). [CrossRef]
  15. N. Takai and Y. Mifune, "Digital watermarking by a holographic technique," Appl. Opt. 43, 3078-3084 (2002).
  16. S. Kishk and B. Javidi, "3D object watermarking by a 3D hidden object," Opt. Express 11, 874-888 (2003).
  17. Y. Li, K. Kreske, and J. Rosen, "Security and encryption optical systems based on a correlator with significant output images," Appl. Opt. 39, 5295-5301 (2000).
  18. D. Abookasis, O. Arazi, J. Rosen, and B. Javidi, "Security optical systems based on a joint transform correlator with significant output images," Opt. Eng. 40, 1584-1589 (2001). [CrossRef]
  19. M. Yamazaki and J. Ohtsubo, "Optimization of encrypted holograms in optical security systems," Opt. Eng. 40, 132-137 (2001). [CrossRef]
  20. D. Abookasis, A. Batikoff, H. Famini, and J. Rosen, "Performance comparison of iterative algorithms for generating digital correlation holograms used in optical security systems," Appl. Opt. 45, 4617-4624 (2006). [CrossRef]
  21. H. T. Chang, W. C. Lu, and C. J. Kuo, "Multiple-phase retrieval for optical security systems by use of random-phase encoding," Appl. Opt. 41, 4815-4834 (2002).
  22. G. Situ and J. Zhang, "A cascaded iterative Fourier transform algorithm for optical security applications," Optik 114, 473-477 (2003).
  23. X. F. Meng, L. Z Cai, X. L. Yang, X. X. Shen, and G. Y. Dong, "Information security system by iterative multiple-phase retrieval and pixel random permutation," Appl. Opt. 45, 3289-3297 (2006). [CrossRef]
  24. G. Situ and J. Zhang, "Phase-retrieval algorithms applied in a 4-f system for optical image encryption--a comparison," in Information Optics and Photonics Technology, G. Mu, F. T. S. Yu, and S. Jutamulia, eds., Proc. SPIE 5642, 108-115 (2005). [CrossRef]
  25. A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, "Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys," Opt. Lett. 30, 1644-1646 (2005). [CrossRef]
  26. Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, "Security analysis of optical encryption," in Optics and Photonics for Defence and Security, E. M. Carapezza, ed., Proc. SPIE 5986, 25-34 (2005).
  27. U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, "A known-plaintext heuristic attack on the Fourier plane encryption algorithm," Opt. Express 14, 3181-3186 (2006). [CrossRef]
  28. X. Peng, P. Zhang, H. Wei, and B. Yu, "Known-plaintext attack on optical encryption based on double random phase keys," Opt. Lett. 31, 1044-1046 (2006). [CrossRef]
  29. D. C. Youla and H. Webb, "Image restoration by the method of convex projections: part 1--theory," IEEE Trans. Med. Imaging MI-1, 81-94 (1982).
  30. A. Levi and H. Stark, "Image restoration by the method of generalized projections with application to restoration from magnitude," J. Opt. Soc. Am. A 1, 932-943 (1984).
  31. R. W. Gerchberg and W. O. Saxton, "A practical algorithm for the determination of phase from image and diffraction-plane pictures," Optik 35, 237-246 (1972).
  32. J. R. Fienup, "Phase retrieval algorithms: a comparison," Appl. Opt. 21, 2758-2769 (1982).
  33. H. P. Herzig, "Design of refractive and diffractive micro-optics," in Micro-Optics, H. P. Herzig, ed. (Taylor & Francis, 1996), 1-29.
  34. H. Stark, Y. Yang, and D. Gurkan, "Factors affecting convergence in the design of diffractive optics by iterative vector-space methods," J. Opt. Soc. Am. A 16, 149-159 (1999).
  35. W. Stallings, Cryptography and Network Security, 3rd ed. (Prentice Hall, 2004).

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.

« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited