OSA's Digital Library

Optics Express

Optics Express

  • Editor: C. Martijn de Sterke
  • Vol. 18, Iss. 13 — Jun. 21, 2010
  • pp: 13772–13781

Known plaintext attack on double random phase encoding using fingerprint as key and a method for avoiding the attack

Hideaki Tashima, Masafumi Takeda, Hiroyuki Suzuki, Takashi Obi, Masahiro Yamaguchi, and Nagaaki Ohyama  »View Author Affiliations


Optics Express, Vol. 18, Issue 13, pp. 13772-13781 (2010)
http://dx.doi.org/10.1364/OE.18.013772


View Full Text Article

Enhanced HTML    Acrobat PDF (4124 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

We have shown that the application of double random phase encoding (DRPE) to biometrics enables the use of biometrics as cipher keys for binary data encryption. However, DRPE is reported to be vulnerable to known-plaintext attacks (KPAs) using a phase recovery algorithm. In this study, we investigated the vulnerability of DRPE using fingerprints as cipher keys to the KPAs. By means of computational experiments, we estimated the encryption key and restored the fingerprint image using the estimated key. Further, we propose a method for avoiding the KPA on the DRPE that employs the phase retrieval algorithm. The proposed method makes the amplitude component of the encrypted image constant in order to prevent the amplitude component of the encrypted image from being used as a clue for phase retrieval. Computational experiments showed that the proposed method not only avoids revealing the cipher key and the fingerprint but also serves as a sufficiently accurate verification system.

© 2010 OSA

OCIS Codes
(070.0070) Fourier optics and signal processing : Fourier optics and signal processing
(070.4560) Fourier optics and signal processing : Data processing by optical means
(200.4740) Optics in computing : Optical processing
(060.4785) Fiber optics and optical communications : Optical security and encryption

ToC Category:
Fourier Optics and Signal Processing

History
Original Manuscript: March 31, 2010
Revised Manuscript: May 20, 2010
Manuscript Accepted: June 4, 2010
Published: June 11, 2010

Citation
Hideaki Tashima, Masafumi Takeda, Hiroyuki Suzuki, Takashi Obi, Masahiro Yamaguchi, and Nagaaki Ohyama, "Known plaintext attack on double random phase encoding using fingerprint as key and a method for avoiding the attack," Opt. Express 18, 13772-13781 (2010)
http://www.opticsinfobase.org/oe/abstract.cfm?URI=oe-18-13-13772


Sort:  Author  |  Year  |  Journal  |  Reset  

References

  1. P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20(7), 767–769 (1995). [CrossRef] [PubMed]
  2. B. Javidi, A. Sergent, and E. Ahouzi, “Performance of double phase encoding encryption technique using binarized encrypted images,” Opt. Eng. 37(2), 565–569 (1998). [CrossRef]
  3. B. Wang, C.-C. Sun, W.-C. Su, and A. E. T. Chiou, “Shift-tolerance property of an optical double-random phase-encoding encryption system,” Appl. Opt. 39(26), 4788–4793 (2000). [CrossRef]
  4. H. Suzuki, T. Yamaya, T. Obi, M. Yamaguchi, and N. Ohyama, “Fingerprint verification for smart card holders identification based on optical image encryption,” Jpn. J. Opt . 33, 37–44 (2004) in Japanese.
  5. H. Suzuki, M. Yamaguchi, M. Yachida, N. Ohyama, H. Tashima, and T. Obi, “Experimental evaluation of fingerprint verification system based on double random phase encoding,” Opt. Express 14(5), 1755–1766 (2006). [CrossRef] [PubMed]
  6. H. Suzuki, H. Tashima, M. Yamaguchi, T. Obi, M. Yachida, and N. Ohyama, “File encryption software using fingerprint keys based on double random encoding,” in Frontiers in Optics, OSA Technical Digest Series (Optical Society of America, 2005), paper JWA50. http://www.opticsinfobase.org/abstract.cfm?URI=FiO-2005-JWA50
  7. A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys,” Opt. Lett. 30(13), 1644–1646 (2005). [CrossRef] [PubMed]
  8. X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31(22), 3261–3263 (2006). [CrossRef] [PubMed]
  9. X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31(8), 1044–1046 (2006). [CrossRef] [PubMed]
  10. U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, “A known-plaintext heuristic attack on the Fourier plane encryption algorithm,” Opt. Express 14(8), 3181–3186 (2006). [CrossRef] [PubMed]
  11. Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15(16), 10253–10265 (2007). [CrossRef] [PubMed]
  12. R. W. Gerchberg and W. O. Saxton, “A practical algorithm for the determination of the phase from image and diffraction plane pictures,” Optik (Stuttg.) 35, 237–246 (1972).
  13. J. R. Fienup, “Phase retrieval algorithms: a comparison,” Appl. Opt. 21(15), 2758–2769 (1982). [CrossRef] [PubMed]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.

Multimedia

Multimedia FilesRecommended Software
» Media 1: AVI (2367 KB)      QuickTime

« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited