2020
DOI: 10.1364/oe.380004
|View full text |Cite
|
Sign up to set email alerts
|

Learning-based attacks for detecting the vulnerability of computer-generated hologram based optical encryption

Abstract: Optical encryption has attracted wide attention for its remarkable characteristics. Inspired by the development of double random phase encoding, many researchers have developed a number of optical encryption systems for practical applications. It has also been found that computer-generated hologram (CGH) is highly promising for optical encryption, and the CGH-based optical encryption possesses remarkable advantages of simplicity and high feasibility for practical implementations. An input image, i.e., plaintex… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 37 publications
(13 citation statements)
references
References 45 publications
(64 reference statements)
0
11
0
Order By: Relevance
“…Reconstructing images through scattering media with highly scalable CNN approaches , have been demonstrated to exhibit optical encryption transmission. Different from some studies , on using the CNN in the decryption process, which might suffer from the known-plaintext attacks (KPA), our designed transfer system has very high security due to the fact that the diffuser is dynamically shaken instead of being steady. Traditional phase retrieval or transfer matrix calibration techniques can hardly recover the encoded information when the diffuser is changing randomly with time.…”
Section: Discussionmentioning
confidence: 99%
“…Reconstructing images through scattering media with highly scalable CNN approaches , have been demonstrated to exhibit optical encryption transmission. Different from some studies , on using the CNN in the decryption process, which might suffer from the known-plaintext attacks (KPA), our designed transfer system has very high security due to the fact that the diffuser is dynamically shaken instead of being steady. Traditional phase retrieval or transfer matrix calibration techniques can hardly recover the encoded information when the diffuser is changing randomly with time.…”
Section: Discussionmentioning
confidence: 99%
“…The security of the CDPE scheme itself has been sufficiently investigated in [9][10][11], so we will focus on the security enhancement contributed by the compression procedure. According to the Kerckhoffs' assumption [30], the attacker has the total knowledge of the cryptosystem except the secret keys.…”
Section: Security Analysismentioning
confidence: 99%
“…Among the existing optical encryption schemes, the ones that encrypt the primary image into phase-only masks (POMs) are quite attractive, as the decoded image can be directly captured by the intensity sensitive devices in such schemes [5,8,9]. In particular, a cascaded double phase encryption (CDPE) scheme is worthy of noting due to its high security [9], and some variants of it were also reported and studied recently [10,11]. In addition to developing new optical cryptosystems, people also make efforts to compress the ciphertext to facilitate its transmission and storage [12].…”
Section: Introductionmentioning
confidence: 99%
“…Recently, deep learning (DL) has achieved widespread use in various fields, such as image denoising, image inpainting, natural language processing, to name a few 15 . DL has also made a comprehensive application in computational imaging 16 such as digital holography 17 , lensless imaging 18 , imaging through scattering media and turbid media 19 21 , optical encryption 22 , 23 and ghost imaging 24 28 . The term of ghost imaging using deep learning (GIDL) was first proposed by Lyu et al 24 .…”
Section: Introductionmentioning
confidence: 99%