OSA's Digital Library

Optics Express

Optics Express

  • Editor: C. Martijn de Sterke
  • Vol. 17, Iss. 16 — Aug. 3, 2009
  • pp: 13928–13938

A hybrid heuristic algorithm to improve known-plaintext attack on Fourier plane encryption

Wensi Liu, Guanglin Yang, and Haiyan Xie  »View Author Affiliations


Optics Express, Vol. 17, Issue 16, pp. 13928-13938 (2009)
http://dx.doi.org/10.1364/OE.17.013928


View Full Text Article

Enhanced HTML    Acrobat PDF (677 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

A hybrid heuristic attack scheme that combines the hill climbing algorithm and the simulated annealing algorithm is proposed to speed up the search procedure and to obtain a more accurate solution to the original key in the Fourier plane encryption algorithm. And a unit cycle is adopted to analyze the value space of the random phase. The experimental result shows that our scheme can obtain more accurate solution to the key that can achieve better decryption result both for the selected encrypted image and another unseen ciphertext image. The searching time is significantly reduced while without any exceptional case in searching procedure. For an image of 64×64 pixels, our algorithm costs a comparatively short computing time, about 1 minute, can retrieve the approximated key with the normalized root mean squared error 0.1, therefore, our scheme makes the known-plaintext attack on the Fourier plane image encryption more practical, stable, and effective.

© 2009 Optical Society of America

OCIS Codes
(070.4560) Fourier optics and signal processing : Data processing by optical means
(200.3050) Optics in computing : Information processing
(200.4560) Optics in computing : Optical data processing
(060.4785) Fiber optics and optical communications : Optical security and encryption

ToC Category:
Fiber Optics and Optical Communications

History
Original Manuscript: April 24, 2009
Revised Manuscript: June 25, 2009
Manuscript Accepted: July 8, 2009
Published: July 27, 2009

Citation
Wensi Liu, Guanglin Yang, and Haiyan Xie, "A hybrid heuristic algorithm to improve known-plaintext attack on Fourier plane encryption," Opt. Express 17, 13928-13938 (2009)
http://www.opticsinfobase.org/oe/abstract.cfm?URI=oe-17-16-13928


Sort:  Author  |  Year  |  Journal  |  Reset  

References

  1. Ph. Réfrégier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995) [CrossRef] [PubMed]
  2. L. G. Neto and Y. Sheng, "Optical implementation of image encryption using random phase encoding," Opt. Eng. 35, 2459-2463 (1996). [CrossRef]
  3. O. Matoba and B. Javidi, "Encrypted optical memory system using three-dimensional keys in the Fresnel domain," Opt. Lett. 24, 762-764 (1999). [CrossRef]
  4. O. Matoba and B. Javidi, "Encrypted optical storage with wavelength-key and random phase codes," Appl. Opt. 38, 6785-6790 (1999). [CrossRef]
  5. E. Tajahuerce and B. Javidi, "Encrypting three-dimensional information with digital holography," Appl. Opt. 39, 6595-6601 (2000). [CrossRef]
  6. G. Unnikrishnan, J. Joseph, and K. Singh, "Optical encryption by double-random phase encoding in the fractional Fourier domain," Opt. Lett. 25, 887-889 (2000). [CrossRef]
  7. S. Liu, L. Yu, and B. Zhu, "Optical image encryption by cascaded fractional Fourier transforms with random phase filtering," Opt. Commun. 187, 57-63 (2001). [CrossRef]
  8. J. Ohtsubo and A. Fujimoto, "Practical image encryption and decryption by phase-coding technique for optical security systems," Appl. Opt. 41, 4848-4855 (2002). [CrossRef] [PubMed]
  9. G. Situ and J. Zhang, "Double random-phase encoding in the Fresnel domain," Opt. Lett. 29, 1584-1586 (2004). [CrossRef] [PubMed]
  10. H. Suzuki, M. Yamaguchi, M. Yachida, N. Ohyama, H. Tashima, and T. Obi, "Experimental evaluation of fingerprint verification system based on double random phase encoding," Opt. Express 14, 1755-1766 (2006). http://www.opticsexpress.org/abstract.cfm?URI=OPEX-14-5-1755. [CrossRef] [PubMed]
  11. R. Tao, Y. Xin, and Y. Wang, "Double image encryption based on random phase encoding in the fractional Fourier domain," Opt. Express 15, 16067-16079 (2007). http://www.opticsexpress.org/abstract.cfm?URI=OPEX-15-24-16067. [CrossRef] [PubMed]
  12. X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, "Security enhancement of double-random phase encryption by amplitude modulation," Opt. Lett. 33, 1575-1577 (2008). [CrossRef] [PubMed]
  13. P. Kumar, A. Kumar, J. Joseph, and K. Singh, "Impulse attack free double-random-phase encryption scheme with randomized lens-phase functions," Opt. Lett. 34, 331-333 (2009) [CrossRef] [PubMed]
  14. W. Stallings, Cryptography and Network Security: Principles and Practice, 3rd ed. (Prentice Hall, 2004).
  15. A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, "Vulnerability to chosen-ciphertext attacks of optical encryption schemes based on double random phase keys," Opt. Lett. 30, 1644-1646 (2005). [CrossRef] [PubMed]
  16. U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J.T. Sheridan, "A known-plaintext heuristic attack on the Fourier plane encryption algorithm," Opt. Express 14, 3181-3186 (2006). http://www.opticsexpress.org/abstract.cfm?URI=OPEX-14-8-3181. [CrossRef] [PubMed]
  17. X. Peng, P. Zhang, H. Wei, and B. Yu, "Known-plaintext attack on optical encryption based on double random phase keys," Opt. Lett. 31, 1044-1046, (2006). [CrossRef] [PubMed]
  18. X. Peng, H. Wei, and P. Zhang, "Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain," Opt. Lett. 31, 3261-3263 (2006). [CrossRef] [PubMed]
  19. Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, "Resistance of the double random phase encryption against various attacks," Opt. Express 15, 10253-10265 (2007). http://www.opticsexpress.org/abstract.cfm?URI=OPEX-15-16-10253. [CrossRef] [PubMed]
  20. S. Kirkpatrick, C. D. Gelatt, and M. P. Vecchi, "Optimization by Simulated Annealing," Science 220, 671-680 (1983). [CrossRef] [PubMed]
  21. S. Nahar, S. Sahni, and E. Shragowitz, "Simulated annealing and combinatorial optimization," in Proceedings of ACM/IEEE Conference on Design Automation (Institute of Electrical and Electronics Engineers, New York, 1986), pp. 293-299.
  22. M. Nieto-Vesperinas, R. Navarro, and F. J. Fuentes, "Performance of a simulated annealing algorithm for phase retrieval," J. Opt. Soc. Am. A 5, 30-38 (1988). [CrossRef]
  23. F. J. O. Martinez, J. S. Gonzalez, and I. Stojmenovic, "A parallel hill climbing algorithm for pushing dependent data in clients-providers-servers systems," in Proceedings of IEEE International Symposium on Computers and Communications (Institute of Electrical and Electronics Engineers, New York, 2002), pp. 611-616.

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited