OSA's Digital Library

Optics Express

Optics Express

  • Editor: Andrew M. Weiner
  • Vol. 21, Iss. 23 — Nov. 18, 2013
  • pp: 28523–28530
« Show journal navigation

Ciphertext-only attack on a joint transform correlator encryption system

Chenggong Zhang, Meihua Liao, Wenqi He, and Xiang Peng  »View Author Affiliations


Optics Express, Vol. 21, Issue 23, pp. 28523-28530 (2013)
http://dx.doi.org/10.1364/OE.21.028523


View Full Text Article

Acrobat PDF (1446 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

A ciphertext-only attack (COA) on a joint transform correlator (JTC) encryption system is proposed. From the perspective view of optical cryptanalysis, we find out that the issue to be solved in the COA scheme could be transferred into a phase retrieval problem with single intensity measurement. And in this paper, the hybrid input-output (HIO) algorithm is employed to handle this issue with the help of an inartificial signal domain support and a given frequency domain constraint. Meanwhile, we provide a set of numerical simulations to demonstrate the validity and feasibility of the presented method.

© 2013 Optical Society of America

1. Introduction

Optical encryption technique has drawn a lot of attentions due to its inherent capability for parallel processing [1

1. B. Javidi, “Securing information with optical technologies,” Phys. Today 50(3), 27 (1997). [CrossRef]

]. Since the double random phase encoding (DRPE) with a 4-f optical processor was invented by Refregier and Javidi in 1995 [2

2. P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20(7), 767–769 (1995). [CrossRef] [PubMed]

], a lot of optical cryptographic techniques have been studied extensively, such as the DRPE scheme in Fractional Fourier domain [3

3. G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25(12), 887–889 (2000). [CrossRef] [PubMed]

], Fresnel transform domain [4

4. G. H. Situ and J. J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29(14), 1584–1586 (2004). [CrossRef] [PubMed]

] as well as the security-enhanced method [5

5. X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, “Security enhancement of double-random phase encryption by amplitude modulation,” Opt. Lett. 33(14), 1575–1577 (2008). [CrossRef] [PubMed]

], etc. Besides, some other optical setups have been introduced to this research area, such as the joint transformation correlator [6

6. T. Nomura and B. Javidi, “Optical encryption using a joint transform correlator architecture,” Opt. Eng. 39(8), 2031–2035 (2000). [CrossRef]

] and the interference-based architecture [7

7. Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33(21), 2443–2445 (2008). [CrossRef] [PubMed]

11

11. W. He, X. Peng, X. Meng, and X. Liu, “Collision in optical image encryption based on interference and a method for avoiding this security leak,” Opt. Laser Technol. 47, 31–36 (2013). [CrossRef]

]. The DRPE-based schemes use two independent random phase masks, regarded as secret keys, to encrypt an image (plaintext) into a stationary white noise (ciphertext). For decryption, the DRPE method requires extremely accurate alignment in the optical setups, and needs to generate an extra complex conjugate of the phase mask in order to recover the plaintext. Besides, the ciphertext is a complex function which is difficult for storage and transmission. To overcome the deficiency of the DRPE scheme, Nomura and Javidi proposed an alternative approach for optical encryption based on the joint transformation correlator (JTC) architecture [6

6. T. Nomura and B. Javidi, “Optical encryption using a joint transform correlator architecture,” Opt. Eng. 39(8), 2031–2035 (2000). [CrossRef]

]. In this scheme, the plaintext bonded with a random phase mask is placed side by side with a key code on the input plane, and the outcome of the JTC scheme, a joint power spectrum (JPS), is taken as a ciphertext and could be stored and transmitted conveniently since it is an intensity distribution. In addition, the JTC scheme does not require accurate optical alignment and there is also no need to create the conjugate of the key code because the decryption procedure can be implemented with exact the same key code just as used in the encryption process. For this reason the JTC scheme has been widely studied and spawned several variation techniques [12

12. T. Nomura and B. Javidi, “Optical encryption system with a binary key code,” Appl. Opt. 39(26), 4783–4787 (2000). [CrossRef] [PubMed]

26

26. C. Lin and X. Shen, “Analysis and design of impulse attack free generalized joint transform correlator optical encryption scheme,” Opt. Laser Technol. 44(7), 2032–2036 (2012). [CrossRef]

]. Recently, researchers have also performed an extensive security assessment of the JTC encryption scheme by adopting various strategies, and they could be classified as two categories: one is the chosen-plaintext attack (CPA) [27

27. J. F. Barrera, C. Vargas, M. Tebaldi, and R. Torroba, “Chosen-plaintext attack on a joint transform correlator encrypting system,” Opt. Commun. 283(20), 3917–3921 (2010). [CrossRef]

, 28

28. W. Qin, X. Peng, and X. Meng, “Cryptanalysis of optical encryption schemes based on joint transform correlator architecture,” Opt. Eng. 50(2), 028201 (2011). [CrossRef]

]; the other is the know-plaintext attack (KPA) [29

29. J. F. Barrera, C. Vargas, M. Tebaldi, R. Torroba, and N. Bolognini, “Known-plaintext attack on a joint transform correlator encrypting system,” Opt. Lett. 35(21), 3553–3555 (2010). [CrossRef] [PubMed]

, 30

30. M. Liao, W. He, X. Peng, X. Liu, and X. Meng, “Cryptanalysis of optical encryption with a reference wave in a joint transform correlator architecture,” Opt. Laser Technol. 45, 763–767 (2013). [CrossRef]

]. Both the CPA and the KPA have revealed the weakness of the JTC scheme from different perspectives. Nevertheless, we would like to emphasize that the CPA and the KPA still require too many resources in order to make an attack to the optical encryption scheme based on the JTC scheme. In this paper, we will show how the JTC encryption scheme is vulnerable to the ciphertext-only attack (COA) and how an attacker can retrieve an arbitrary plaintext by using only a ciphertext. As far as we know, this would be the first work to make a cryptanalysis of the JTC encryption system by employing a COA method, and the only other similar work, in the research field of optical cryptanalysis, was focused on the DRPE system and it was reported in 2007 by Tang and Peng et al. [31

31. H. Tang, X. Peng, and J. Tian, “Ciphertext-only attack on double random phase encoding optical encryption system,” Acta Phys. Sin. 56, 2629–2636 (2007).

].

The rest of this paper is organized as follows. In section 2, we give a brief review to the principle of the JTC-based optical encryption system. Section 3 describes the method of the COA on JTC encryption system with support by a series of simulations, and a conclusion is made in section 4.

2. Overview of the joint transform correlator encryption scheme

The JTC encryption technique was first reported by Nomura and Javidi in 2000 [6

6. T. Nomura and B. Javidi, “Optical encryption using a joint transform correlator architecture,” Opt. Eng. 39(8), 2031–2035 (2000). [CrossRef]

], and its encryption and decryption processes could be illustrated by Fig. 1.
Fig. 1 Schematic diagrams of optical encryption based on the JTC architecture (a) encryption and (b) decryption.
Let f(x,y), b(x,y) and h(x,y) denote the plaintext, random phase mask (RPM) and secret key code, respectively. The plaintext f(x,y) bonded with b(x,y) is placed side by side with h(x,y) on the front focal plane of the Fourier transform lens at coordinates x=a and x=a, respectively. On the back focal plane, the joint power spectrum is recorded as a ciphertext by an intensity detector such as CCD. The ciphertext can be formulated in Eq. (1).
E(ξ,η)=|FT[f(x+a,y)b(x+a,y)+h(xa,y)]|2=|F(ξ,η)B(ξ,η)|2+|H(ξ,η)|2+[F(ξ,η)B(ξ,η)]H(ξ,η)exp[j4πaξ]+[F(ξ,η)B(ξ,η)]H(ξ,η)exp[j4πaξ]
(1)
Where FT denotes the Fourier transformation, F(ξ,η), B(ξ,η) and H(ξ,η) denote the Fourier transforms of f(x,y), b(x,y) and h(x,y), respectively. The symbol “*” denotes the convolution operation, and the superscript asterisk “*” denotes complex conjugation. And γ represents the light blue point set, which is also regarded as the signal domain support in our COA scheme, it will be further clarified in the Section 3.

For decryption, the secret key code h(x,y) is placed at x=a on the input plane and then Fourier transformed and multiplied by the ciphertext, which is located at the Fourier transform plane as shown in Fig. 1(b). Then the product term is inverse Fourier transformed to obtain the plaintext. Meanwhile, it is important to point out that there are two general choices for the secret key codeh(x,y): (a) it is designed to be the inverse Fourier transform of a random phase-only mask just as the situation in [6

6. T. Nomura and B. Javidi, “Optical encryption using a joint transform correlator architecture,” Opt. Eng. 39(8), 2031–2035 (2000). [CrossRef]

] by Nomura and Javidi; (b) it is a random phase-only mask in itself just as the situation in [24

24. R. Henao, E. Rueda, J. F. Barrera, and R. Torroba, “Noise-free recovery of optodigital encrypted and multiplexed images,” Opt. Lett. 35(3), 333–335 (2010). [CrossRef] [PubMed]

] by Barrera et al. In this contribution, the two versions of JTC-based cryptosystem are named as Scheme A and B, respectively, and we will demonstrated their weakness to our proposed COA method for both of them.

3. Cryptanalysis and simulation results

For the COA method, as previously mentioned, an attacker is supposed to have only the ciphertexts, and how to retrieve the corresponding plaintexts comes to be the key issue. In the JTC encryption scheme, the ciphertext E(ξ,η) is a joint power spectrum of the multiple-input as shown in Eq. (1). In order to simplify the following description of our COA scheme, we would like to first calculate the modulus of the Fourier transform of the multiple-input by taking the square root of the ciphertext, which is presumed to be known by an attacker.

|FT[f(x+a,y)b(x+a,y)+h(xa,y)]|=E(ξ,η)
(2)

Gk(ξ,η)=FT{gk(x,y)}=|Gk(ξ,η)|exp[iΦk(ξ,η)]Gk(ξ,η)=E(ξ,η)exp[iΦk(ξ,η)]gk(x,y)=FT1{Gk(ξ,η)}=|gk(x,y)|exp[iφk(x,y)]gk+1(x,y)={gk(x,y),x,yγgk(x,y)βgk(x,y),x,yγ
(3)

Where γ represents a point set at which gk(x) violates the signal domain support, β is an experienced constant value and it is set as 0.7 in our numerical simulations. It’s worth to point out that, according to the Kerckhoffs’ principle (a fundamental assumption in cryptanalysis), an attacker could know all the details of a cryptosystem, including the algorithms and implementations except the secret keys. Therefore, in this work, it is reasonable to suppose that all the parameters of the cryptosystem including the sizes and locations of the plaintext and the key code are known to the attacker, and these parameters are together regarded as the signal domain support.
Fig. 3 The simulation results. (a)-(h) and (i)-(p) are the results of scheme A and scheme B, respectively. Specifically, (a) gray-scale image ‘Lena’, (b) multiple-input corresponding to (a), (c) ciphertext corresponding to (b), (d) retrieved plaintext with COA. (e) Binary image ‘SZU’, (f) multiple-input corresponding to (e), (g) ciphertext corresponding to (f), (h) retrieved plaintext with COA. (i) Gray-scale image ‘Baboon’, (j) multiple-input corresponding to (i), (k) ciphertext corresponding to (j), (l) retrieved plaintext with COA. (m) Binary image ‘Chinese characters’, (n) multiple-input corresponding to (m), (o) ciphertext corresponding to (n), (p) retrieved plaintext with COA.
For the JTC cryptosystem, the parameters of the multiple-input (shown in Figs. 3(b), 3(f), 3(j) and 3(n)) are inartificial support in the signal domain, therefore the point set γ can be determined directly (also shown in Fig. 1(a)). In this paper, we choose the MSE as a criterion to decide whether or not to terminate the iterative process, and the MSE is conventionally defined as:
MSE=1M×Ni=1,j=1M,N[|gk+1(xi,yj)|f(xi,yj)]2
(4)
where f(xi,yj) represents the original image and gk+1(xi,yj) stands for an estimated one after k + 1 iterations.

To verify our approach, we illustrate the COA strategy with numerical simulations in Matlab2010a environment. As mentioned in section 2, the JTC encryption system normally involves two architectures, scheme A and scheme B. For each one, we prepare two plaintexts (a gray-scale image and a binary one) to verify the validity of proposed COA method and each plaintext (Figs. 3(a), 3(e), 3(i) and 3(m)) has a size of 256 × 256 pixels. According to the characteristics of the JTC architecture, the plaintext and the key code are placed in the input plane (896 × 896 pixels) as shown in Figs. 3(b), 3(f), 3(j) and 3(n). Let us assume that an attacker has already known all the corresponding ciphertexts (Figs. 3(c), 3(g), 3(k) and 3(o)), the image sizes and the locations of the plaintexts in the input plane. By using of the presented COA method, one can obtain the retrieved plaintexts, which are shown in Figs. 3(d), 3(h), 3(l) and 3(p). It is obvious that all retrieved images look extremely similar with the original plaintext images, and the corresponding MSE values are as follows: 2.3634 × 10−5, 3.2553 × 10−5, 2.1801 × 10−5 and 6.9501 × 10−5, respectively. For a COA scheme, it could be regarded as a successful break if the plaintext has been obtained from its corresponding ciphertext, or even better if the secret key code has also been retrieved. In our proposed method, the plaintexts can be retrieved successfully as the simulation result shows, but it’s not true for the RPM b(x,y) and the secret key code h(x,y).

Furthermore, to evaluate the performance of the proposed method, we also provide the convergence curve of the retrieved plaintext with the original one. The MSE as a function of the iteration times for both gray-scale image (red line) and binary image (blue line) is shown in Fig. 4.
Fig. 4 The convergence of the (a) scheme A and (b) scheme B for both gray-scale image and binary image, respectively.

4. Conclusion

In summary, we proposed a COA scheme to evaluate the security strength of optical encryption based on the JTC scheme. The proposed COA strategy converts the COA into a phase retrieval problem with single intensity measurement. Therefore the HIO iterative phase retrieval technique can be used to solve this problem. To the best of our knowledge, this should be the first work to attack the JTC encryption system with a COA method. From the point of view of cryptanalysis it is also reasonable to acquire the parameters of the encryption architecture, which are then used to construct the signal domain support. In such a way, a ciphertext of JTC encryption scheme can be successfully retrieved with sufficient precision. A set of numerical simulation results have demonstrated the feasibility and validity of the proposed method and show that the JTC encryption scheme is vulnerable to the COA scheme. Moreover, we would also like to point out that the described COA scheme would fail if the plaintext is a phase-only distribution or a phase-only version of a gray-scale image. It is almost impossible to attack such an architecture due to the hardness of retrieving the phase information from single intensity for the phase retrieval algorithm.

Acknowledgments

This work is supported by the National Natural Science Foundation of China (61171073 and 61307003), the Sino-German Center for Research Promotion (GZ 760) and China Postdoctoral Science Foundation (2013M540662).

References and links

1.

B. Javidi, “Securing information with optical technologies,” Phys. Today 50(3), 27 (1997). [CrossRef]

2.

P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20(7), 767–769 (1995). [CrossRef] [PubMed]

3.

G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett. 25(12), 887–889 (2000). [CrossRef] [PubMed]

4.

G. H. Situ and J. J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29(14), 1584–1586 (2004). [CrossRef] [PubMed]

5.

X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, “Security enhancement of double-random phase encryption by amplitude modulation,” Opt. Lett. 33(14), 1575–1577 (2008). [CrossRef] [PubMed]

6.

T. Nomura and B. Javidi, “Optical encryption using a joint transform correlator architecture,” Opt. Eng. 39(8), 2031–2035 (2000). [CrossRef]

7.

Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett. 33(21), 2443–2445 (2008). [CrossRef] [PubMed]

8.

B. Wang and Y. Zhang, “Double images hiding based on optical interference,” Opt. Commun. 282(17), 3439–3443 (2009). [CrossRef]

9.

Y. Zhang, B. Wang, and Z. Dong, “Enhancement of image hiding by exchanging two phase masks,” J. Opt. A, Pure Appl. Opt. 11(12), 125406 (2009). [CrossRef]

10.

W. He, X. Peng, and X. Meng, “Optical multiple-image hiding based on interference and grating modulation,” J. Opt. 14(7), 075401 (2012). [CrossRef]

11.

W. He, X. Peng, X. Meng, and X. Liu, “Collision in optical image encryption based on interference and a method for avoiding this security leak,” Opt. Laser Technol. 47, 31–36 (2013). [CrossRef]

12.

T. Nomura and B. Javidi, “Optical encryption system with a binary key code,” Appl. Opt. 39(26), 4783–4787 (2000). [CrossRef] [PubMed]

13.

D. Abookasis, O. Arazi, J. Rosen, and B. Javidi, “Security optical systems based on a joint transform correlator with significant output images,” Opt. Eng. 40(8), 1584–1589 (2001). [CrossRef]

14.

S. J. Park, J. Y. Kim, J. K. Bae, and S. J. Kim, “Fourier-plane encryption technique based on removing the effect of phase terms in a joint transform correlator,” Opt. Rev. 8(6), 413–415 (2001). [CrossRef]

15.

M. Yamazaki and J. Ohtsubo, “Optimization of encrypted holograms in optical security systems,” Opt. Eng. 40(1), 132–137 (2001). [CrossRef]

16.

T. Nomura, S. Mikan, Y. Morimoto, and B. Javidi, “Secure optical data storage with random phase key codes by use of a configuration of a joint transform correlator,” Appl. Opt. 42(8), 1508–1514 (2003). [CrossRef] [PubMed]

17.

C. La Mela and C. Iemmi, “Optical encryption using phase-shifting interferometry in a joint transform correlator,” Opt. Lett. 31(17), 2562–2564 (2006). [CrossRef] [PubMed]

18.

L. C. Lin and C. J. Cheng, “Optimal key mask design for optical encryption based on joint transform correlator architecture,” Opt. Commun. 258(2), 144–154 (2006). [CrossRef]

19.

G. Situ, U. Gopinathan, D. S. Monaghan, and J. T. Sheridan, “Cryptanalysis of optical security systems with significant output images,” Appl. Opt. 46(22), 5257–5262 (2007). [CrossRef] [PubMed]

20.

D. Amaya, M. Tebaldi, R. Torroba, and N. Bolognini, “Multichanneled encryption via a joint transform correlator architecture,” Appl. Opt. 47(31), 5903–5907 (2008). [CrossRef] [PubMed]

21.

D. Amaya, M. Tebaldi, R. Torroba, and N. Bolognini, “Digital color encryption using a multi-wavelength approach and a joint transform correlator,” J. Opt. A, Pure Appl. Opt. 10(10), 104031 (2008). [CrossRef]

22.

D. Amaya, M. Tebaldi, R. Torroba, and N. Bolognini, “Wavelength multiplexing encryption using joint transform correlator architecture,” Appl. Opt. 48(11), 2099–2104 (2009). [CrossRef] [PubMed]

23.

E. Rueda, J. F. Barrera, R. Henao, and R. Torroba, “Optical encryption with a reference wave in a joint transform correlator architecture,” Opt. Commun. 282(16), 3243–3249 (2009). [CrossRef]

24.

R. Henao, E. Rueda, J. F. Barrera, and R. Torroba, “Noise-free recovery of optodigital encrypted and multiplexed images,” Opt. Lett. 35(3), 333–335 (2010). [CrossRef] [PubMed]

25.

C. A. Rios, E. Rueda, J. F. Barrera, R. Henao, and R. Torroba, “Optodigital protocol to avoid an external reference beam in a Jtc encrypting processor,” in OSA Technical Digest (CD) (Optical Society of America, 2010), JWA27.

26.

C. Lin and X. Shen, “Analysis and design of impulse attack free generalized joint transform correlator optical encryption scheme,” Opt. Laser Technol. 44(7), 2032–2036 (2012). [CrossRef]

27.

J. F. Barrera, C. Vargas, M. Tebaldi, and R. Torroba, “Chosen-plaintext attack on a joint transform correlator encrypting system,” Opt. Commun. 283(20), 3917–3921 (2010). [CrossRef]

28.

W. Qin, X. Peng, and X. Meng, “Cryptanalysis of optical encryption schemes based on joint transform correlator architecture,” Opt. Eng. 50(2), 028201 (2011). [CrossRef]

29.

J. F. Barrera, C. Vargas, M. Tebaldi, R. Torroba, and N. Bolognini, “Known-plaintext attack on a joint transform correlator encrypting system,” Opt. Lett. 35(21), 3553–3555 (2010). [CrossRef] [PubMed]

30.

M. Liao, W. He, X. Peng, X. Liu, and X. Meng, “Cryptanalysis of optical encryption with a reference wave in a joint transform correlator architecture,” Opt. Laser Technol. 45, 763–767 (2013). [CrossRef]

31.

H. Tang, X. Peng, and J. Tian, “Ciphertext-only attack on double random phase encoding optical encryption system,” Acta Phys. Sin. 56, 2629–2636 (2007).

32.

J. R. Fienup, “Phase retrieval algorithms: a comparison,” Appl. Opt. 21(15), 2758–2769 (1982). [CrossRef] [PubMed]

OCIS Codes
(070.0070) Fourier optics and signal processing : Fourier optics and signal processing
(060.4785) Fiber optics and optical communications : Optical security and encryption

ToC Category:
Fourier Optics and Signal Processing

History
Original Manuscript: October 14, 2013
Revised Manuscript: November 6, 2013
Manuscript Accepted: November 6, 2013
Published: November 13, 2013

Citation
Chenggong Zhang, Meihua Liao, Wenqi He, and Xiang Peng, "Ciphertext-only attack on a joint transform correlator encryption system," Opt. Express 21, 28523-28530 (2013)
http://www.opticsinfobase.org/oe/abstract.cfm?URI=oe-21-23-28523


Sort:  Author  |  Year  |  Journal  |  Reset  

References

  1. B. Javidi, “Securing information with optical technologies,” Phys. Today50(3), 27 (1997). [CrossRef]
  2. P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett.20(7), 767–769 (1995). [CrossRef] [PubMed]
  3. G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Opt. Lett.25(12), 887–889 (2000). [CrossRef] [PubMed]
  4. G. H. Situ and J. J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett.29(14), 1584–1586 (2004). [CrossRef] [PubMed]
  5. X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, “Security enhancement of double-random phase encryption by amplitude modulation,” Opt. Lett.33(14), 1575–1577 (2008). [CrossRef] [PubMed]
  6. T. Nomura and B. Javidi, “Optical encryption using a joint transform correlator architecture,” Opt. Eng.39(8), 2031–2035 (2000). [CrossRef]
  7. Y. Zhang and B. Wang, “Optical image encryption based on interference,” Opt. Lett.33(21), 2443–2445 (2008). [CrossRef] [PubMed]
  8. B. Wang and Y. Zhang, “Double images hiding based on optical interference,” Opt. Commun.282(17), 3439–3443 (2009). [CrossRef]
  9. Y. Zhang, B. Wang, and Z. Dong, “Enhancement of image hiding by exchanging two phase masks,” J. Opt. A, Pure Appl. Opt.11(12), 125406 (2009). [CrossRef]
  10. W. He, X. Peng, and X. Meng, “Optical multiple-image hiding based on interference and grating modulation,” J. Opt.14(7), 075401 (2012). [CrossRef]
  11. W. He, X. Peng, X. Meng, and X. Liu, “Collision in optical image encryption based on interference and a method for avoiding this security leak,” Opt. Laser Technol.47, 31–36 (2013). [CrossRef]
  12. T. Nomura and B. Javidi, “Optical encryption system with a binary key code,” Appl. Opt.39(26), 4783–4787 (2000). [CrossRef] [PubMed]
  13. D. Abookasis, O. Arazi, J. Rosen, and B. Javidi, “Security optical systems based on a joint transform correlator with significant output images,” Opt. Eng.40(8), 1584–1589 (2001). [CrossRef]
  14. S. J. Park, J. Y. Kim, J. K. Bae, and S. J. Kim, “Fourier-plane encryption technique based on removing the effect of phase terms in a joint transform correlator,” Opt. Rev.8(6), 413–415 (2001). [CrossRef]
  15. M. Yamazaki and J. Ohtsubo, “Optimization of encrypted holograms in optical security systems,” Opt. Eng.40(1), 132–137 (2001). [CrossRef]
  16. T. Nomura, S. Mikan, Y. Morimoto, and B. Javidi, “Secure optical data storage with random phase key codes by use of a configuration of a joint transform correlator,” Appl. Opt.42(8), 1508–1514 (2003). [CrossRef] [PubMed]
  17. C. La Mela and C. Iemmi, “Optical encryption using phase-shifting interferometry in a joint transform correlator,” Opt. Lett.31(17), 2562–2564 (2006). [CrossRef] [PubMed]
  18. L. C. Lin and C. J. Cheng, “Optimal key mask design for optical encryption based on joint transform correlator architecture,” Opt. Commun.258(2), 144–154 (2006). [CrossRef]
  19. G. Situ, U. Gopinathan, D. S. Monaghan, and J. T. Sheridan, “Cryptanalysis of optical security systems with significant output images,” Appl. Opt.46(22), 5257–5262 (2007). [CrossRef] [PubMed]
  20. D. Amaya, M. Tebaldi, R. Torroba, and N. Bolognini, “Multichanneled encryption via a joint transform correlator architecture,” Appl. Opt.47(31), 5903–5907 (2008). [CrossRef] [PubMed]
  21. D. Amaya, M. Tebaldi, R. Torroba, and N. Bolognini, “Digital color encryption using a multi-wavelength approach and a joint transform correlator,” J. Opt. A, Pure Appl. Opt.10(10), 104031 (2008). [CrossRef]
  22. D. Amaya, M. Tebaldi, R. Torroba, and N. Bolognini, “Wavelength multiplexing encryption using joint transform correlator architecture,” Appl. Opt.48(11), 2099–2104 (2009). [CrossRef] [PubMed]
  23. E. Rueda, J. F. Barrera, R. Henao, and R. Torroba, “Optical encryption with a reference wave in a joint transform correlator architecture,” Opt. Commun.282(16), 3243–3249 (2009). [CrossRef]
  24. R. Henao, E. Rueda, J. F. Barrera, and R. Torroba, “Noise-free recovery of optodigital encrypted and multiplexed images,” Opt. Lett.35(3), 333–335 (2010). [CrossRef] [PubMed]
  25. C. A. Rios, E. Rueda, J. F. Barrera, R. Henao, and R. Torroba, “Optodigital protocol to avoid an external reference beam in a Jtc encrypting processor,” in OSA Technical Digest (CD) (Optical Society of America, 2010), JWA27.
  26. C. Lin and X. Shen, “Analysis and design of impulse attack free generalized joint transform correlator optical encryption scheme,” Opt. Laser Technol.44(7), 2032–2036 (2012). [CrossRef]
  27. J. F. Barrera, C. Vargas, M. Tebaldi, and R. Torroba, “Chosen-plaintext attack on a joint transform correlator encrypting system,” Opt. Commun.283(20), 3917–3921 (2010). [CrossRef]
  28. W. Qin, X. Peng, and X. Meng, “Cryptanalysis of optical encryption schemes based on joint transform correlator architecture,” Opt. Eng.50(2), 028201 (2011). [CrossRef]
  29. J. F. Barrera, C. Vargas, M. Tebaldi, R. Torroba, and N. Bolognini, “Known-plaintext attack on a joint transform correlator encrypting system,” Opt. Lett.35(21), 3553–3555 (2010). [CrossRef] [PubMed]
  30. M. Liao, W. He, X. Peng, X. Liu, and X. Meng, “Cryptanalysis of optical encryption with a reference wave in a joint transform correlator architecture,” Opt. Laser Technol.45, 763–767 (2013). [CrossRef]
  31. H. Tang, X. Peng, and J. Tian, “Ciphertext-only attack on double random phase encoding optical encryption system,” Acta Phys. Sin.56, 2629–2636 (2007).
  32. J. R. Fienup, “Phase retrieval algorithms: a comparison,” Appl. Opt.21(15), 2758–2769 (1982). [CrossRef] [PubMed]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.

Figures

Fig. 1 Fig. 2 Fig. 3
 
Fig. 4 Fig. 5
 

« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited