2007
DOI: 10.1364/ao.46.005257
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of optical security systems with significant output images

Abstract: The security of the encryption and verification techniques with significant output images is examined by a known-plaintext attack. We introduce an iterative phase-retrieval algorithm based on multiple intensity measurements to heuristically estimate the phase key in the Fourier domain by several plaintextcyphertext pairs. We obtain correlation output images with very low error by correlating the estimated key with corresponding random phase masks. Our studies show that the convergence behavior of this algorith… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
34
0

Year Published

2007
2007
2021
2021

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 86 publications
(34 citation statements)
references
References 32 publications
0
34
0
Order By: Relevance
“…In general it is difficult to recover the watermark, f ðx; yÞ, directly from the cyphertext gðx; yÞ without using these two keys. The purpose of the cryptanalysis presented in [4][5][6][7][8] is to retrieve part, or all, of the information of these keys with a priori but incomplete knowledge of the plaintext and/or the cyphertext, and eventually retrieve any plaintext encrypted using the same key-set ½/ðx; yÞ; wðu; vÞ. Collision, on the other hand, involves finding another key-set, ½/ 0 ðx; yÞ; w 0 ðu; vÞ, which will encrypt a different f 0 ðx; yÞ to the same gðx; yÞ, the cyphertext of f ðx; yÞ.…”
Section: Collision Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…In general it is difficult to recover the watermark, f ðx; yÞ, directly from the cyphertext gðx; yÞ without using these two keys. The purpose of the cryptanalysis presented in [4][5][6][7][8] is to retrieve part, or all, of the information of these keys with a priori but incomplete knowledge of the plaintext and/or the cyphertext, and eventually retrieve any plaintext encrypted using the same key-set ½/ðx; yÞ; wðu; vÞ. Collision, on the other hand, involves finding another key-set, ½/ 0 ðx; yÞ; w 0 ðu; vÞ, which will encrypt a different f 0 ðx; yÞ to the same gðx; yÞ, the cyphertext of f ðx; yÞ.…”
Section: Collision Algorithmmentioning
confidence: 99%
“…Recently there have been several studies pointing out that random phase encoding systems are vulnerable to chosen-cyphertext, chosenplaintext and known-plaintext attacks [4][5][6][7][8]. However, to date there is no study on the collision resistance of this technique.…”
Section: Introductionmentioning
confidence: 99%
“…The most famous and important work in this area must be the image encryption scheme based on Double Random Phase Encoding (DRPE), which is reported by Refregier and Javidi in 1995 [1]. Up to now, plenty of relevant works have been studied and developed, and they mainly concentrate on the aspects of image encryption/hiding and optical cryptanalysis [2][3][4][5][6][7][8][9][10][11][12][13][14][15].…”
Section: Introductionmentioning
confidence: 99%
“…Phase-retrieval techniques (PRTs) have found important applications in various fields such as in astronomy, radiography, crystallography [1], microscopy [2,3], and security [4,5]. The determination of the phase of a scattered wave field is of interest because it carries important information about the object surface or inner structure.…”
mentioning
confidence: 99%
“…Generally, PRTs fall into two main categories: interferometric (InF) and noninterferometric (NInF) approaches. The latter category can be further classified into methods based on iterative technique [1,[3][4][5], transport-of-intensity equation (TIE) [2,6], phase-space tomography [7,8], and moments of phase-space distributions [9]. All of these NInF approaches essentially use intensity measurements of the scattered field at various domains to retrieve the object phase.…”
mentioning
confidence: 99%