2009
DOI: 10.1364/oe.17.013928
|View full text |Cite
|
Sign up to set email alerts
|

A hybrid heuristic algorithm to improve known-plaintext attack on Fourier plane encryption

Abstract: A hybrid heuristic attack scheme that combines the hill climbing algorithm and the simulated annealing algorithm is proposed to speed up the search procedure and to obtain a more accurate solution to the original key in the Fourier plane encryption algorithm. And a unit cycle is adopted to analyze the value space of the random phase. The experimental result shows that our scheme can obtain more accurate solution to the key that can achieve better decryption result both for the selected encrypted image and anot… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
13
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 34 publications
(13 citation statements)
references
References 20 publications
0
13
0
Order By: Relevance
“…The KPA tries to find the RPM key of the encryption system. This KPA is an iterative process that is based on a heuristic hybrid algorithm [39,40] and the Gerchberg-Saxton (GS) algorithm [41]. The heuristic hybrid algorithm produces a first key based on an initial guess of the RPM key and a plaintext with its corresponding ciphertext (encrypted image).…”
Section: B Known-plaintext Attackmentioning
confidence: 99%
“…The KPA tries to find the RPM key of the encryption system. This KPA is an iterative process that is based on a heuristic hybrid algorithm [39,40] and the Gerchberg-Saxton (GS) algorithm [41]. The heuristic hybrid algorithm produces a first key based on an initial guess of the RPM key and a plaintext with its corresponding ciphertext (encrypted image).…”
Section: B Known-plaintext Attackmentioning
confidence: 99%
“…In addition to this conventional technique, some of its extensions have also been examined in the fractional Fourier domain [8], the Fresnel transform domain [9], the Hartley transform [10], and the Arnold transform based encoding systems [11]. Furthermore, optical encryption techniques can also be implemented as a cryptographic algorithm (i.e., numerical approximations) and such implementations were shown to be vulnerable to some organized attacks [12][13][14][15].…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, two dimensional optical encryption processing has been extended into a three dimensional spacebased encryption processing, where each pixel of the image is axially considered as one particle and phase-shifting digital holography technique is applied to the diffraction of all pixels in space (particles) [71][72][73][74]. In the context of cryptography and cryptoanalysis, both chosen-plaintext [60] and known-plaintext attack [75][76][77] on DRPE have been examined, as have several other attacking methods [78][79][80][81][82] and the key space of DRPE technique itself [83][84][85][86] has also been analysed.…”
Section: Introductionmentioning
confidence: 99%