OSA's Digital Library

Optics Express

Optics Express

  • Editor: Andrew M. Weiner
  • Vol. 21, Iss. 23 — Nov. 18, 2013
  • pp: 28523–28530

Ciphertext-only attack on a joint transform correlator encryption system

Chenggong Zhang, Meihua Liao, Wenqi He, and Xiang Peng  »View Author Affiliations


Optics Express, Vol. 21, Issue 23, pp. 28523-28530 (2013)
http://dx.doi.org/10.1364/OE.21.028523


View Full Text Article

Acrobat PDF (1446 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

A ciphertext-only attack (COA) on a joint transform correlator (JTC) encryption system is proposed. From the perspective view of optical cryptanalysis, we find out that the issue to be solved in the COA scheme could be transferred into a phase retrieval problem with single intensity measurement. And in this paper, the hybrid input-output (HIO) algorithm is employed to handle this issue with the help of an inartificial signal domain support and a given frequency domain constraint. Meanwhile, we provide a set of numerical simulations to demonstrate the validity and feasibility of the presented method.

© 2013 Optical Society of America

OCIS Codes
(070.0070) Fourier optics and signal processing : Fourier optics and signal processing
(060.4785) Fiber optics and optical communications : Optical security and encryption

ToC Category:
Fourier Optics and Signal Processing

History
Original Manuscript: October 14, 2013
Revised Manuscript: November 6, 2013
Manuscript Accepted: November 6, 2013
Published: November 13, 2013

Citation
Chenggong Zhang, Meihua Liao, Wenqi He, and Xiang Peng, "Ciphertext-only attack on a joint transform correlator encryption system," Opt. Express 21, 28523-28530 (2013)
http://www.opticsinfobase.org/oe/abstract.cfm?URI=oe-21-23-28523


Sort:  Author  |  Year  |  Journal  |  Reset

References

  1. B. Javidi, “Securing information with optical technologies,” Phys. Today50(3), 27 (1997). [CrossRef]
  2. P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett.20(7), 767–769 (1995). [CrossRef] [PubMed]
  3. G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett.25(12), 887–889 (2000). [CrossRef] [PubMed]
  4. G. H. Situ and J. J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett.29(14), 1584–1586 (2004). [CrossRef] [PubMed]
  5. X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, “Security enhancement of double-random phase encryption by amplitude modulation,” Opt. Lett.33(14), 1575–1577 (2008). [CrossRef] [PubMed]
  6. T. Nomura and B. Javidi, “Optical encryption using a joint transform correlator architecture,” Opt. Eng.39(8), 2031–2035 (2000). [CrossRef]
  7. Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett.33(21), 2443–2445 (2008). [CrossRef] [PubMed]
  8. B. Wang and Y. Zhang, “Double images hiding based on optical interference,” Opt. Commun.282(17), 3439–3443 (2009). [CrossRef]
  9. Y. Zhang, B. Wang, and Z. Dong, “Enhancement of image hiding by exchanging two phase masks,” J. Opt. A, Pure Appl. Opt.11(12), 125406 (2009). [CrossRef]
  10. W. He, X. Peng, and X. Meng, “Optical multiple-image hiding based on interference and grating modulation,” J. Opt.14(7), 075401 (2012). [CrossRef]
  11. W. He, X. Peng, X. Meng, and X. Liu, “Collision in optical image encryption based on interference and a method for avoiding this security leak,” Opt. Laser Technol.47, 31–36 (2013). [CrossRef]
  12. T. Nomura and B. Javidi, “Optical encryption system with a binary key code,” Appl. Opt.39(26), 4783–4787 (2000). [CrossRef] [PubMed]
  13. D. Abookasis, O. Arazi, J. Rosen, and B. Javidi, “Security optical systems based on a joint transform correlator with significant output images,” Opt. Eng.40(8), 1584–1589 (2001). [CrossRef]
  14. S. J. Park, J. Y. Kim, J. K. Bae, and S. J. Kim, “Fourier-plane encryption technique based on removing the effect of phase terms in a joint transform correlator,” Opt. Rev.8(6), 413–415 (2001). [CrossRef]
  15. M. Yamazaki and J. Ohtsubo, “Optimization of encrypted holograms in optical security systems,” Opt. Eng.40(1), 132–137 (2001). [CrossRef]
  16. T. Nomura, S. Mikan, Y. Morimoto, and B. Javidi, “Secure optical data storage with random phase key codes by use of a configuration of a joint transform correlator,” Appl. Opt.42(8), 1508–1514 (2003). [CrossRef] [PubMed]
  17. C. La Mela and C. Iemmi, “Optical encryption using phase-shifting interferometry in a joint transform correlator,” Opt. Lett.31(17), 2562–2564 (2006). [CrossRef] [PubMed]
  18. L. C. Lin and C. J. Cheng, “Optimal key mask design for optical encryption based on joint transform correlator architecture,” Opt. Commun.258(2), 144–154 (2006). [CrossRef]
  19. G. Situ, U. Gopinathan, D. S. Monaghan, and J. T. Sheridan, “Cryptanalysis of optical security systems with significant output images,” Appl. Opt.46(22), 5257–5262 (2007). [CrossRef] [PubMed]
  20. D. Amaya, M. Tebaldi, R. Torroba, and N. Bolognini, “Multichanneled encryption via a joint transform correlator architecture,” Appl. Opt.47(31), 5903–5907 (2008). [CrossRef] [PubMed]
  21. D. Amaya, M. Tebaldi, R. Torroba, and N. Bolognini, “Digital color encryption using a multi-wavelength approach and a joint transform correlator,” J. Opt. A, Pure Appl. Opt.10(10), 104031 (2008). [CrossRef]
  22. D. Amaya, M. Tebaldi, R. Torroba, and N. Bolognini, “Wavelength multiplexing encryption using joint transform correlator architecture,” Appl. Opt.48(11), 2099–2104 (2009). [CrossRef] [PubMed]
  23. E. Rueda, J. F. Barrera, R. Henao, and R. Torroba, “Optical encryption with a reference wave in a joint transform correlator architecture,” Opt. Commun.282(16), 3243–3249 (2009). [CrossRef]
  24. R. Henao, E. Rueda, J. F. Barrera, and R. Torroba, “Noise-free recovery of optodigital encrypted and multiplexed images,” Opt. Lett.35(3), 333–335 (2010). [CrossRef] [PubMed]
  25. C. A. Rios, E. Rueda, J. F. Barrera, R. Henao, and R. Torroba, “Optodigital protocol to avoid an external reference beam in a Jtc encrypting processor,” in OSA Technical Digest (CD) (Optical Society of America, 2010), JWA27.
  26. C. Lin and X. Shen, “Analysis and design of impulse attack free generalized joint transform correlator optical encryption scheme,” Opt. Laser Technol.44(7), 2032–2036 (2012). [CrossRef]
  27. J. F. Barrera, C. Vargas, M. Tebaldi, and R. Torroba, “Chosen-plaintext attack on a joint transform correlator encrypting system,” Opt. Commun.283(20), 3917–3921 (2010). [CrossRef]
  28. W. Qin, X. Peng, and X. Meng, “Cryptanalysis of optical encryption schemes based on joint transform correlator architecture,” Opt. Eng.50(2), 028201 (2011). [CrossRef]
  29. J. F. Barrera, C. Vargas, M. Tebaldi, R. Torroba, and N. Bolognini, “Known-plaintext attack on a joint transform correlator encrypting system,” Opt. Lett.35(21), 3553–3555 (2010). [CrossRef] [PubMed]
  30. M. Liao, W. He, X. Peng, X. Liu, and X. Meng, “Cryptanalysis of optical encryption with a reference wave in a joint transform correlator architecture,” Opt. Laser Technol.45, 763–767 (2013). [CrossRef]
  31. H. Tang, X. Peng, and J. Tian, “Ciphertext-only attack on double random phase encoding optical encryption system,” Acta Phys. Sin.56, 2629–2636 (2007).
  32. J. R. Fienup, “Phase retrieval algorithms: a comparison,” Appl. Opt.21(15), 2758–2769 (1982). [CrossRef] [PubMed]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited