OSA's Digital Library

Applied Optics

Applied Optics

APPLICATIONS-CENTERED RESEARCH IN OPTICS

  • Editor: Joseph N. Mait
  • Vol. 48, Iss. 12 — Apr. 20, 2009
  • pp: 2356–2363

Impulse attack-free four random phase mask encryption based on a 4-f optical system

Pramod Kumar, Joby Joseph, and Kehar Singh  »View Author Affiliations


Applied Optics, Vol. 48, Issue 12, pp. 2356-2363 (2009)
http://dx.doi.org/10.1364/AO.48.002356


View Full Text Article

Enhanced HTML    Acrobat PDF (2124 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

Optical encryption methods based on double random phase encryption (DRPE) have been shown to be vulnerable to different types of attacks. The Fourier plane random phase mask (RPM), which is the most important key, can be cracked with a single impulse function attack. Such an attack is viable because the Fourier transform of a delta function is a unity function. Formation of a unity function can be avoided if RPMs are placed in front of both lenses in a 4-f optical setup, thereby protecting the DRPE from an impulse attack. We have performed numerical simulations to verify the proposed scheme. Resistance of this scheme is checked against the brute force and the impulse function attacks. The experimental results validate the feasibility of the scheme.

© 2009 Optical Society of America

OCIS Codes
(070.0070) Fourier optics and signal processing : Fourier optics and signal processing
(100.0100) Image processing : Image processing

ToC Category:
Fourier Optics and Signal Processing

History
Original Manuscript: February 2, 2009
Revised Manuscript: March 31, 2009
Manuscript Accepted: April 1, 2009
Published: April 15, 2009

Citation
Pramod Kumar, Joby Joseph, and Kehar Singh, "Impulse attack-free four random phase mask encryption based on a 4-f optical system," Appl. Opt. 48, 2356-2363 (2009)
http://www.opticsinfobase.org/ao/abstract.cfm?URI=ao-48-12-2356


Sort:  Author  |  Year  |  Journal  |  Reset  

References

  1. B.Javidi, ed., Optical and Digital Techniques for Information Security, Vol. 1 of Advanced Science and Technologies for Security Applications (Springer, 2005). [CrossRef]
  2. P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767-769 (1995). [CrossRef] [PubMed]
  3. G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887-889 (2000). [CrossRef]
  4. B. M. Hennelly and J. T. Sheridan, “Random phase and jigsaw encryption in the Fresnel domain,” Opt. Eng. 43, 2239-2249(2004). [CrossRef]
  5. G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584-1586 (2004). [CrossRef] [PubMed]
  6. Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Security analysis of optical encryption,” Proc. SPIE 5986, 598603(2005). [CrossRef]
  7. Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15, 10253-10265 (2007). [CrossRef] [PubMed]
  8. D. S. Monaghan, U. Gopinathan, T. J. Naughton, and J. T. Sheridan, “Key-space analysis of double random phase encryption technique,” Appl. Opt. 46, 6641-6647 (2007). [CrossRef] [PubMed]
  9. A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys,” Opt. Lett. 30, 1644-1646 (2005). [CrossRef] [PubMed]
  10. U. Gopinathan, D. S. Monaghan, T. J. Naughton, J. T. Sheridan, and B. Javidi, “Strengths and weaknesses of optical encryption algorithms,” 18th Annual Meeting of the IEEE Lasers and Electro-Optics Society (IEEE, 2005), pp. 951-952.
  11. X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044-1046 (2006). [CrossRef] [PubMed]
  12. X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31, 3261-3263 (2006). [CrossRef] [PubMed]
  13. U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, “A known-plaintext heuristic attack on the Fourier plane encryption algorithm,” Opt. Express 14, 3181-3186(2006). [CrossRef] [PubMed]
  14. H. Wei, X. Peng, H. Liu, S. Feng, and B. Z. Gao, “Known-plaintext attack on the double phase encoding and its implementation with parallel hardware,” Proc. SPIE 6837, 683703(2007). [CrossRef]
  15. G. Situ, U. Gopinathan, D. S. Monaghan, and J. T. Sheridan, “Cryptanalysis of optical security systems with significant output images,” Appl. Opt. 46, 5257-5262 (2007). [CrossRef] [PubMed]
  16. G. Situ, D. S. Monaghan, T. J. Naughton, J. T. Sheridan, G. Pedrini, and W. Osten, “Collision in double random phase encoding,” Opt. Commun. 281, 5122-5125 (2008). [CrossRef]
  17. X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, “Security enhancement of double-random phase encryption by amplitude modulation,” Opt. Lett. 33, 1575-1577 (2008). [CrossRef] [PubMed]
  18. T. J. Naughton, B. M. Hennelly, and T. Dowling, “Introducing secure modes of operation for optical encryption,” J. Opt. Soc. Am. A 25, 2608-2617 (2008). [CrossRef]
  19. P. Kumar, A. Kumar, J. Joseph, and K. Singh, “Impulse attack free double-random-phase encryption scheme with randomized lens-phase functions,” Opt. Lett. 34, 331-333(2009). [CrossRef] [PubMed]
  20. G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption system that uses phase conjugation in a photorefractive crystal,” Appl. Opt. 37, 8181-8186 (1998). [CrossRef]
  21. J. Garcia, D. Mas, and R. G. Dorsch, “Fractional-Fourier-transform calculation through the fast-Fourier-transform algorithm,” Appl. Opt. 35, 7013-7018 (1996). [CrossRef] [PubMed]
  22. D. Mendlovic, Z. Zalesvsky, and N. Konforti, “Computation considerations and fast algorithms for calculating the diffraction integral,” J. Mod. Opt. 44, 407-414 (1997). [CrossRef]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited