2012
DOI: 10.1088/2040-8978/14/9/094004
|View full text |Cite
|
Sign up to set email alerts
|

Robustness against attacks of dual polarization encryption using the Stokes–Mueller formalism

Abstract: The security of our recently proposed dual polarization encryption scheme of images is evaluated by numerical simulations. This consists of testing the resistance of the scheme against brute force, known-plaintext, chosen-plaintext and video sequence attacks. While some attacks are ineffective (brute force, video sequence) others are effective (known-plaintext, chosen-plaintext), but only under certain assumptions. An optimization of the setup, which is based on a regular rotation of polarization optics angles… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
14
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(14 citation statements)
references
References 24 publications
0
14
0
Order By: Relevance
“…An optimization of the setup could be achieved by the use of high dynamic range for the key image or by using a phase only spatial light modulator in the target and in the key image channel [25]. In our proposed schemes chaotic maps have been used instead of random phases as random keys which achieved high dynamic range for the key image through the flexibility in changing the parameters as well as initial conditions of the proposed chaotic map which made it difficult for the attacker to decrypt an unknown image in a strong manner from the practical point of view.…”
Section: Introductionmentioning
confidence: 99%
“…An optimization of the setup could be achieved by the use of high dynamic range for the key image or by using a phase only spatial light modulator in the target and in the key image channel [25]. In our proposed schemes chaotic maps have been used instead of random phases as random keys which achieved high dynamic range for the key image through the flexibility in changing the parameters as well as initial conditions of the proposed chaotic map which made it difficult for the attacker to decrypt an unknown image in a strong manner from the practical point of view.…”
Section: Introductionmentioning
confidence: 99%
“…An encryption system is not considered secure unless it resists various attacks. Recently, cryptanalysis has been carried out in dual polarization encryption scheme using the Stokes-Mueller formalism [36].…”
Section: Introductionmentioning
confidence: 99%
“…Understanding and optimizing optical processing of information techniques is one of the fundamental issues in communication and information technologies [1][2][3][4][5][6][7][8] . Several methods based on spatial filtering have been used to encrypt images.…”
Section: Introductionmentioning
confidence: 99%