OSA's Digital Library

Optics Express

Optics Express

  • Editor: C. Martijn de Sterke
  • Vol. 17, Iss. 25 — Dec. 7, 2009
  • pp: 22462–22473

Security enhanced optical encryption system by random phase key and permutation key

Mingzhao He, Qiaofeng Tan, Liangcai Cao, Qingsheng He, and Guofan Jin  »View Author Affiliations


Optics Express, Vol. 17, Issue 25, pp. 22462-22473 (2009)
http://dx.doi.org/10.1364/OE.17.022462


View Full Text Article

Enhanced HTML    Acrobat PDF (1133 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

Conventional double random phase encoding (DRPE) encrypts plaintext to white noise-like ciphertext which may attract attention of eavesdroppers, and recent research reported that DRPE is vulnerable to various attacks. Here we propose a security enhanced optical encryption system that can hide the existence of secret information by watermarking. The plaintext is encrypted using iterative fractional Fourier transform with random phase key, and ciphertext is randomly permuted with permutation key before watermarking. Cryptanalysis shows that linearity of the security system has been broken and the permutation key prevent the attacker from accessing the ciphertext in various attacks. A series of simulations have shown the effectiveness of this system and the security strength is enhanced for invisibility, nonlinearity and resistance against attacks.

© 2009 OSA

OCIS Codes
(070.0070) Fourier optics and signal processing : Fourier optics and signal processing
(100.5070) Image processing : Phase retrieval
(070.2575) Fourier optics and signal processing : Fractional Fourier transforms

ToC Category:
Fourier Optics and Signal Processing

History
Original Manuscript: September 8, 2009
Revised Manuscript: October 19, 2009
Manuscript Accepted: November 13, 2009
Published: November 23, 2009

Citation
Mingzhao He, Qiaofeng Tan, Liangcai Cao, Qingsheng He, and Guofan Jin, "Security enhanced optical encryption system by random phase key and permutation key," Opt. Express 17, 22462-22473 (2009)
http://www.opticsinfobase.org/oe/abstract.cfm?URI=oe-17-25-22462


Sort:  Author  |  Year  |  Journal  |  Reset  

References

  1. Ph. Réfrégier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20(7), 767–769 (1995). [CrossRef] [PubMed]
  2. T. Nomura and B. Javidi, “Optical encryption using a joint transform correlator architecture,” Opt. Eng. 39(8), 2031–2035 (2000). [CrossRef]
  3. B. Javidi and T. Nomura, “Securing information by use of digital holography,” Opt. Lett. 25(1), 28–30 (2000). [CrossRef] [PubMed]
  4. P. C. Mogensen and J. Glückstad, “Phase-only optical encryption,” Opt. Lett. 25(8), 566–568 (2000). [CrossRef] [PubMed]
  5. G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25(12), 887–889 (2000). [CrossRef] [PubMed]
  6. G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29(14), 1584–1586 (2004). [CrossRef] [PubMed]
  7. X. F. Meng, L. Z. Cai, X. L. Yang, X. X. Shen, and G. Y. Dong, “Information security system by iterative multiple-phase retrieval and pixel random permutation,” Appl. Opt. 45(14), 3289–3297 (2006). [CrossRef] [PubMed]
  8. X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, “Security enhancement of double-random phase encryption by amplitude modulation,” Opt. Lett. 33(14), 1575–1577 (2008). [CrossRef] [PubMed]
  9. A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys,” Opt. Lett. 30(13), 1644–1646 (2005). [CrossRef] [PubMed]
  10. U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, “A known-plaintext heuristic attack on the Fourier plane encryption algorithm,” Opt. Express 14(8), 3181–3186 (2006), http://www.opticsinfobase.org/abstract.cfm?URI=oe-14-8-3181 . [CrossRef] [PubMed]
  11. X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31(8), 1044–1046 (2006). [CrossRef] [PubMed]
  12. H. Wei and X. Peng, “Known-Plaintext Attack on Optical Cryptosystem Based on Projection-Onto-Constraint-Sets Algorithm and a 4f Correlator,” Acta Opt. Sin. 28(3), 429–434 (2008). [CrossRef]
  13. X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31(22), 3261–3263 (2006). [CrossRef] [PubMed]
  14. Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15(16), 10253–10265 (2007), http://www.opticsinfobase.org/oe/abstract.cfm?URI=oe-15-16-10253 . [CrossRef] [PubMed]
  15. T. J. Naughton, B. M. Hennelly, and T. Dowling, “Introducing secure modes of operation for optical encryption,” J. Opt. Soc. Am. A 25(10), 2608–2617 (2008). [CrossRef]
  16. D. S. Monaghan, U. Gopinathan, G. Situ, T. J. Naughton, and J. T. Sheridan, “Statistical investigation of the double random phase encoding technique,” J. Opt. Soc. Am. A 26(9), 2033–2042 (2009). [CrossRef]
  17. S. Kishk and B. Javidi, “Information hiding technique with double phase encoding,” Appl. Opt. 41(26), 5462–5470 (2002). [CrossRef] [PubMed]
  18. Y. Shi, G. Situ, and J. Zhang, “Optical image hiding in the Fresnel domain,” J. Opt. A, Pure Appl. Opt. 8(6), 569–577 (2006). [CrossRef]
  19. Y. Shi, G. Situ, and J. Zhang, “Multiple-image hiding in the Fresnel domain,” Opt. Lett. 32(13), 1914–1916 (2007). [CrossRef] [PubMed]
  20. N. Takai and Y. Mifune, “Digital watermarking by a holographic technique,” Appl. Opt. 41(5), 865–873 (2002). [CrossRef] [PubMed]
  21. S. Kishk and B. Javidi, “Watermarking of three-dimensional objects by digital holography,” Opt. Lett. 28(3), 167–169 (2003). [CrossRef] [PubMed]
  22. H. Zhang, L. Z. Cai, X. F. Meng, X. F. Xu, X. L. Yang, X. X. Shen, and G. Y. Dong, “Image watermarking based on an iterative phase retrieval algorithm and sine–cosine modulation in the discrete-cosine-transform domain,” Opt. Commun. 278(2), 257–263 (2007). [CrossRef]
  23. J. R. Fienup, “Phase retrieval algorithms: a comparison,” Appl. Opt. 21(15), 2758–2769 (1982). [CrossRef] [PubMed]
  24. B. Schneier, Applied Cryptography, 2nd ed. (John Wiley & Sons, 1996).
  25. B. Hennelly and J. T. Sheridan, “Optical image encryption by random shifting in fractional Fourier domains,” Opt. Lett. 28(4), 269–271 (2003). [CrossRef] [PubMed]
  26. J. N. Mait, “Understanding diffractive optic design in the scalar domain,” J. Opt. Soc. Am. A 12(10), 2145–2158 (1995). [CrossRef]
  27. G. K. Wallace, “The JPEG still picture compression standard,” IEEE Trans. Consum. Electron. 38(1), 18–34 (1992). [CrossRef]
  28. R. C. Gonzalez, and R. E. Woods, Digital Image Processing, 2nd ed. (Prentice Hall, 2002).
  29. http://www.mathworks.com
  30. http://en.wikipedia.org/wiki/Kerckhoffs'_principle
  31. J. W. Goodman, Introduction to Fourier Optics, 2nd ed. (McGraw-Hill, 1996).

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited