OSA's Digital Library

Optics Express

Optics Express

  • Editor: C. Martijn de Sterke
  • Vol. 15, Iss. 16 — Aug. 6, 2007
  • pp: 10253–10265

Resistance of the double random phase encryption against various attacks

Yann Frauel, Albertina Castro, Thomas J. Naughton, and Bahram Javidi  »View Author Affiliations

Optics Express, Vol. 15, Issue 16, pp. 10253-10265 (2007)

View Full Text Article

Enhanced HTML    Acrobat PDF (320 KB)

Browse Journals / Lookup Meetings

Browse by Journal and Year


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools



Several attacks are proposed against the double random phase encryption scheme. These attacks are demonstrated on computer-generated ciphered images. The scheme is shown to be resistant against brute force attacks but susceptible to chosen and known plaintext attacks. In particular, we describe a technique to recover the exact keys with only two known plain images. We compare this technique to other attacks proposed in the literature.

© 2007 Optical Society of America

OCIS Codes
(070.2580) Fourier optics and signal processing : Paraxial wave optics
(070.4560) Fourier optics and signal processing : Data processing by optical means
(200.4740) Optics in computing : Optical processing

ToC Category:
Fourier Optics and Signal Processing

Original Manuscript: February 23, 2007
Revised Manuscript: April 27, 2007
Manuscript Accepted: May 10, 2007
Published: July 30, 2007

Yann Frauel, Albertina Castro, Thomas J. Naughton, and Bahram Javidi, "Resistance of the double random phase encryption against various attacks," Opt. Express 15, 10253-10265 (2007)

Sort:  Year  |  Journal  |  Reset  


  1. Ph. Réfrégier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett. 20,767-769 (1995). [CrossRef] [PubMed]
  2. B. Javidi and E. Ahouzi, "Optical security system with Fourier plane encoding," Appl. Opt. 37,6247-6255 (1998). [CrossRef]
  3. J.-W. Han, C.-S. Park, D.-H. Ryu, and E.-S. Kim, "Optical image encryption based on XOR operations," Opt. Eng. 38,47-54 (1999). [CrossRef]
  4. J. L. Horner and B. Javidi, Opt. Eng. 38, Special issue on Optical security, 1999. [CrossRef]
  5. S. Lai and M. A. Neifeld, "Digital wavefront reconstruction and its application to image encryption," Opt. Commun. 178,283-289 (2000). [CrossRef]
  6. Y. Li, K. Kreske, and J. Rosen, "Security and encryption optical systems based on a correlator with significant output images," Appl. Opt. 39,5295-5301 (2000). [CrossRef]
  7. X. Peng, Z. Cui and T. Tan, "Information encryption with virtual-optics imaging system," Opt. Commun. 212,235-245 (2002). [CrossRef]
  8. B. M. Hennelly and J. T. Sheridan, "Image encryption and the fractional Fourier transform," Optik 114,251-265 (2003). [CrossRef]
  9. O. Matoba and B. Javidi, "Secure three-dimensional data transmission and display," Appl. Opt. 43,2285-2291 (2004). [CrossRef] [PubMed]
  10. B. Javidi, ed., Optical and Digital Techniques for Information Security (Springer Verlag, New York, 2005). [CrossRef]
  11. L. G. Neto, and Y. Sheng, "Optical implementation of image encryption using random phase encoding," Opt. Eng. 35,2459-2463 (1996). [CrossRef]
  12. N. Towghi, B. Javidi, and Z. Luo, "Fully phase encrypted image processor," J. Opt. Soc. Am. A 16,1915-1927 (1999). [CrossRef]
  13. O. Matoba and B. Javidi, "Encrypted optical storage with wavelength-key and random phase codes," Appl. Opt. 38,6785-6790 (1999). [CrossRef]
  14. O. Matoba and B. Javidi, "Encrypted optical memory system using three-dimensional keys in the Fresnel domain," Opt. Lett. 24,762-764 (1999). [CrossRef]
  15. E. Tajahuerce and B. Javidi, "Encrypting three-dimensional information with digital holography," Appl. Opt. 39,6595-6601 (2000). [CrossRef]
  16. G. Unnikrishnan, J. Joseph, and K. Singh, "Optical encryption by double-random phase encoding in the fractional Fourier domain," Opt. Lett. 25, 887-889 (2000). [CrossRef]
  17. G. Unnikrishnan and K. Singh, "Optical encryption using quadratic phase systems," Opt. Commun. 193,51-67 (2001). [CrossRef]
  18. S. Liu, L. Yu, B. Zhu, "Optical image encryption by cascaded fractional Fourier transforms with random phase filtering, " Opt. Commun. 18757-63 (2001). [CrossRef]
  19. J. Ohtsubo and A. Fujimoto, "Practical image encryption and decryption by phase-coding technique for optical security systems," Appl. Opt. 41,4848-4855 (2002). [CrossRef] [PubMed]
  20. H. T. Chang, W. C. Lu, and C. L. Kuo, "Multiple-phase retrieval for optical security systems by use of randomphase encoding," Appl. Opt. 41,4825-4834 (2002). [CrossRef] [PubMed]
  21. B. Zhu, H. Zhao, and S. Liu, "Image encryption based on pure intensity random coding and digital holography technique," Optik 114,95-99 (2003). [CrossRef]
  22. G. Situ and J. Zhang, "Double random-phase encoding in the Fresnel domain," Opt. Lett. 29,1584-1586 (2004). [CrossRef] [PubMed]
  23. X. Wang, D. Zhao, L. Chen, "Image encryption based on extended fractional Fourier transform and digital holography technique," Opt. Commun. 260, 449-453 (2006). [CrossRef]
  24. H. Suzuki, M. Yamaguchi, M. Yachida, N. Ohyama, H. Tashima, and T. Obi, "Experimental evaluation of fingerprint verification system based on double random phase encoding," Opt. Express 14,1755-1766 (2006). [CrossRef] [PubMed]
  25. A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, "Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys," Opt. Lett. 30,1644-1646 (2005). [CrossRef] [PubMed]
  26. Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, "Security analysis of optical encryption," in Unmanned/Unattended Sensors and Sensor Networks II, E. M. Carapezza, ed., Proc. SPIE 5986, 25-34 (2005).
  27. U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, "A known-plaintext heuristic attack on the Fourier plane encryption algorithm," Opt. Express 14,3181-3186 (2006). [CrossRef] [PubMed]
  28. X. Peng, P. Zhang, H. Wei, and B. Yu, "Known-plaintext attack on optical encryption based on double random phase keys," Opt. Lett. 31,1044-1046 (2006). [CrossRef] [PubMed]
  29. X. Peng, H. Wei, and P. Zhang, "Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain," Opt. Lett. 31,3261-3263 (2006). [CrossRef] [PubMed]
  30. H. Beker and F. Piper, Cipher systems (Van Nostrand, London, 1982).
  31. S. R. Blackburn, S. Murphy, and K. G. Paterson, "Comments on ’Theory and applications of cellular automata in cryptography’," IEEE Trans. Comp. 46,637-638 (1997). [CrossRef]
  32. W. H. Press, S. A. Teukolsky, W. T. Vetterling, and B. P. Flannery, Numerical recipes in C (Cambridge University Press, Cambridge, 1992), Chap. 2.

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.

« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited