OSA's Digital Library

Applied Optics

Applied Optics

APPLICATIONS-CENTERED RESEARCH IN OPTICS

  • Editor: Joseph N. Mait
  • Vol. 52, Iss. 6 — Feb. 20, 2013
  • pp: 1276–1283

Evaluations of phase-only double random phase encoding based on key-space analysis

Kazuya Nakano, Masafumi Takeda, Hiroyuki Suzuki, and Masahiro Yamaguchi  »View Author Affiliations


Applied Optics, Vol. 52, Issue 6, pp. 1276-1283 (2013)
http://dx.doi.org/10.1364/AO.52.001276


View Full Text Article

Enhanced HTML    Acrobat PDF (1297 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

Although initial research shows that double-random phase encoding (DRPE) is vulnerable to known-plaintext attacks that use phase retrieval algorithms, subsequent research has shown that phase-only DRPE, in which the Fourier amplitude component of an image encrypted with classical DRPE remains constant, is resistant to attacks that apply phase retrieval algorithms. Herein, we numerically analyze the key-space of DRPE and investigate the distribution property of decryption keys for classical and phase-only DRPE. We determine the difference in the distribution property of successful decryption keys for these DRPE techniques from the numerical analysis results and then discuss the security offered by them.

© 2013 Optical Society of America

OCIS Codes
(000.4430) General : Numerical approximation and analysis
(060.5060) Fiber optics and optical communications : Phase modulation
(070.0070) Fourier optics and signal processing : Fourier optics and signal processing
(100.2000) Image processing : Digital image processing
(200.4740) Optics in computing : Optical processing
(060.4785) Fiber optics and optical communications : Optical security and encryption

ToC Category:
Fiber Optics and Optical Communications

History
Original Manuscript: October 31, 2012
Revised Manuscript: January 23, 2013
Manuscript Accepted: January 24, 2013
Published: February 15, 2013

Citation
Kazuya Nakano, Masafumi Takeda, Hiroyuki Suzuki, and Masahiro Yamaguchi, "Evaluations of phase-only double random phase encoding based on key-space analysis," Appl. Opt. 52, 1276-1283 (2013)
http://www.opticsinfobase.org/ao/abstract.cfm?URI=ao-52-6-1276


Sort:  Author  |  Year  |  Journal  |  Reset  

References

  1. P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995). [CrossRef]
  2. B. M. Hennelly and J. T. Sheridan, “Image encryption and the fractional Fourier transform,” Optik (Jena) 114, 251–265 (2003). [CrossRef]
  3. O. Matoba and B. Javidi, “Encrypted optical memory using three dimensional keys in the Fresnel domain,” Opt. Lett. 24, 762–764 (1999). [CrossRef]
  4. X. Wang, H. Zhai, Z. Li, and Q. Ge, “Double random phase encryption based on discrete quaternion Fourier transforms,” Optik 122, 1856–1859 (2011). [CrossRef]
  5. Data Encryption Standard (DES) http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf .
  6. Advanced Encryption Standard (AES) http://csrc.nist.gov/archive/aes/index.html .
  7. D. S. Monaghan, G. Situ, U. Gopinathan, T. J. Naughton, and J. T. Sheridan, “Role of phase key in the double random phase encoding technique: an error analysis,” Appl. Opt. 47, 3808–3816 (2008). [CrossRef]
  8. H. Suzuki, T. Yamaya, T. Obi, M. Yamaguchi, and N. Ohyama, “Fingerprint verification for smart card holders identification based on optical image encryption,” Jpn. J. Opt. 33, 37–44 (2004) (in Japanese).
  9. H. Suzuki, H. Tashima, M. Yamaguchi, T. Obi, M. Yachida, and N. Ohyama, “File encryption software using fingerprint keys based on double random encoding,” in Frontiers in Optics, OSA Technical Digest Series (Optical Society of America, 2005), paper JWA50. http://www.opticsinfobase.org/abstract.cfm?URI=FiO-2005-JWA50 .
  10. H. Suzuki, M. Yamaguchi, M. Yachida, N. Ohyama, H. Tashima, and T. Obi, “Experimental evaluation of fingerprint verification system based on double random phase encoding,” Opt. Express 14, 1755–1766 (2006). [CrossRef]
  11. N. Takai and Y. Mifune, “Digital watermarking by a holographic technique,” Appl. Opt. 43, 3078–3084 (2002).
  12. S. Kishk and B. Javidi, “3D object watermarking by a 3D hidden object,” Opt. Express 11, 874–888 (2003). [CrossRef]
  13. M. He, Q. Tan, L. Cao, Q. He, and G. Jin, “Security enhanced optical encryption system by random phase key and permutation key,” Opt. Express 17, 22462–22473 (2009).
  14. J. Rosen and B. Javidi, “Hidden images in halftone pictures,” Appl. Opt. 40, 3346–3353 (2001). [CrossRef]
  15. S. Kishk and B. Javidi, “Information hiding technique with double phase encoding,” Appl. Opt. 41, 5462–5470 (2002). [CrossRef]
  16. Y. Hayasaki, Y. Matsuba, A. Nagaoka, H. Yamamoto, and N. Nishida, “Hiding an image with a light scattering medium and use of a contrast-discrimination method for readout,” Appl. Opt. 43, 1552–1558 (2004). [CrossRef]
  17. Y. Sheng, Z. Xin, M. S. Alam, L. Xi, and L. Xiao-feng, “Information hiding based on double random-phase encoding and public-key cryptography,” Opt. Express 17, 3270–3284 (2009). [CrossRef]
  18. O. Matoba and B. Javidi, “Encrypted optical storage with wavelength key and random codes,” Appl. Opt. 38, 6785–6790 (1999). [CrossRef]
  19. Z. Liu and S. Liu, “Double image encryption based on iterative fractional Fourier transform,” Opt. Commun. 275, 324–329 (2007). [CrossRef]
  20. R. Tao, Y. Xin, and Y. Wang, “Double image encryption based on random phase encoding in the fractional Fourier domain,” Opt. Express 15, 16067–16079 (2007). [CrossRef]
  21. H. Li and Y. Wang, “Double-image encryption based on iterative gyrator transform,” Opt. Commun. 281, 5745–5749 (2008). [CrossRef]
  22. Z. Liu, J. Dai, X. Sun, and S. Liu, “Triple image encryption scheme in fractional Fourier transform domains,” Opt. Commun. 282, 518–522 (2009). [CrossRef]
  23. Z. Liu, H. Chen, T. Liu, P. Li, J. Dai, X. Sun, and S. Liu, “Double-image encryption based on the affine transform and the gyrator transform,” J. Opt. 12, 035407 (2010). [CrossRef]
  24. X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31, 1044–1046 (2006). [CrossRef]
  25. A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys,” Opt. Lett. 30, 1644–1646 (2005). [CrossRef]
  26. X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31, 3261–3263 (2006). [CrossRef]
  27. U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, “A known-plaintext heuristic attack on the Fourier plane encryption algorithm,” Opt. Express 14, 3181–3186 (2006). [CrossRef]
  28. W. Lu, G. Yang, and H. Xie, “A hybrid heuristic algorithm to improve known-plaintext attack on Fourier plane encryption,” Opt. Express 17, 13928–13938 (2009).
  29. H. Tashima, M. Takeda, H. Suzuki, T. Obi, M. Yamaguchi, and N. Ohyama, “Known plaintext attack on double random phase encoding using fingerprint as key and a method for avoiding the attack,” Opt. Express 18, 13772–13781 (2010). [CrossRef]
  30. D. S. Monaghan, U. Gopinathan, T. J. Naughton, and J. T. Sheridan, “Key-space analysis of double random phase encryption technique,” Appl. Opt. 46, 6641–6647 (2007). [CrossRef]
  31. E. Perez-Cabre, M. Cho, and B. Javidi, “Information authentication using photon-counting double-random-phase encrypted images,” Opt. Lett. 36, 22–24 (2011). [CrossRef]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited