2019
DOI: 10.1109/access.2019.2936119
|View full text |Cite
|
Sign up to set email alerts
|

Known-Plaintext Attack and Ciphertext-Only Attack for Encrypted Single-Pixel Imaging

Abstract: In many previous works, a single-pixel imaging (SPI) system is constructed as an optical image encryption system. Unauthorized users are not able to reconstruct the plaintext image from the ciphertext intensity sequence without knowing the illumination pattern key. However, little cryptanalysis about encrypted SPI has been investigated in the past. In this work, we propose a known-plaintext attack scheme and a ciphertext-only attack scheme to an encrypted SPI system for the first time. The known-plaintext atta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
1
1

Relationship

1
9

Authors

Journals

citations
Cited by 28 publications
(15 citation statements)
references
References 49 publications
0
15
0
Order By: Relevance
“…In our proposal, multi-dimensional and multichannel optical encryption is realized by manipulating the light field with multiple DoFs, and an asymmetric encryption scheme is exploited, in which both security and capacity are well addressed. As proofs of principle, ciphertext-only attack (COA) 54 , 55 , and known-plaintext attack (KPA) 56 , 57 are employed to evaluate the security performance (detailed in Supplementary Note 7 ), of which the results show that the Stokes meta-hologram can effectively avoid brute force attack and the security level can be increasingly improved by polarization mask, carrier conversion, and eigenstate transformation.…”
Section: Discussionmentioning
confidence: 99%
“…In our proposal, multi-dimensional and multichannel optical encryption is realized by manipulating the light field with multiple DoFs, and an asymmetric encryption scheme is exploited, in which both security and capacity are well addressed. As proofs of principle, ciphertext-only attack (COA) 54 , 55 , and known-plaintext attack (KPA) 56 , 57 are employed to evaluate the security performance (detailed in Supplementary Note 7 ), of which the results show that the Stokes meta-hologram can effectively avoid brute force attack and the security level can be increasingly improved by polarization mask, carrier conversion, and eigenstate transformation.…”
Section: Discussionmentioning
confidence: 99%
“…In our proposal, multi-dimensional and multichannel optical encryption is realized by manipulating the light field with multiple DoFs, and an asymmetric encryption scheme is exploited, in which both security and capacity are well addressed. As proofs of principle, ciphertext-only attack (COA) 54,55 , and knownplaintext attack (KPA) 56,57 are employed to evaluate the security performance (detailed in Supplementary Note 7), of which the results show that the Stokes meta-hologram can effectively avoid brute force attack and the security level can be increasingly improved by polarization mask, carrier conversion, and eigenstate transformation.…”
Section: Discussionmentioning
confidence: 99%
“…Assuming that τ K represents the ID of the data information to be encrypted in the management of education and correction for problem teenagers, V 1 represents the randomly selected symmetric key, τ 1 represents the time stamp of the encryption process, and ς represents the user permission type of education and correction for problem teenagers, the encrypted cipher-text [16] is expressed as…”
Section: Setting Of User Permission List For Education and Correction...mentioning
confidence: 99%