Resistance of the double random phase encryption against various attacks

被引:430
作者
Frauel, Yann
Castro, Albertina
Naughton, Thomas J.
Javidi, Bahram
机构
[1] Univ Connecticut, Dept Elect & Comp Engn, Storrs, CT 06269 USA
[2] Inst Nacl Astrofis Opt & Electr, Puebla 72000, Mexico
[3] Natl Univ Ireland, Dept Comp Sci, Maynooth, Kildare, Ireland
[4] Univ Oulu, RF Media Lab, Oulu So Inst, FIN-84100 Ylivieska, Finland
[5] Univ Nacl Autonoma Mexico, Dept Ciencias Computac, Inst Invest Matemat Aplicadas & Sistemas, Mexico City 04510, DF, Mexico
关键词
D O I
10.1364/OE.15.010253
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Several attacks are proposed against the double random phase encryption scheme. These attacks are demonstrated on computer-generated ciphered images. The scheme is shown to be resistant against brute force attacks but susceptible to chosen and known plaintext attacks. In particular, we describe a technique to recover the exact keys with only two known plain images. We compare this technique to other attacks proposed in the literature. (c) 2007 Optical Society of America.
引用
收藏
页码:10253 / 10265
页数:13
相关论文
共 32 条
[1]  
[Anonymous], NUMERICAL RECIPES FO
[2]  
BEKER H, 1982, CIPHER SYSTEMS
[3]   Theory and applications of cellular automata in cryptography - Comment [J].
Blackburn, SR ;
Murphy, S ;
Paterson, KG .
IEEE TRANSACTIONS ON COMPUTERS, 1997, 46 (05) :637-638
[4]   Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys [J].
Carnicer, A ;
Montes-Usategui, M ;
Arcos, S ;
Juvells, I .
OPTICS LETTERS, 2005, 30 (13) :1644-1646
[5]   Multiple-phase retrieval for optical security systems by use of random-phase encoding [J].
Chang, HT ;
Lu, WC ;
Kuo, CJ .
APPLIED OPTICS, 2002, 41 (23) :4825-4834
[6]  
FRAUEL Y, 2005, P SOC PHOTO-OPT INS, V5986, P25
[7]   A known-plaintext heuristic attack on the Fourier plane encryption algorithm [J].
Gopinathan, U ;
Monaghan, DS ;
Naughton, TJ ;
Sheridan, JT .
OPTICS EXPRESS, 2006, 14 (08) :3181-3186
[8]   Optical image encryption based on XOR operations [J].
Han, JW ;
Park, CS ;
Ryu, DH ;
Kim, ES .
OPTICAL ENGINEERING, 1999, 38 (01) :47-54
[9]   Image encryption and the fractional Fourier transform [J].
Hennelly, BM ;
Sheridan, JT .
OPTIK, 2003, 114 (06) :251-265
[10]   Optical security [J].
Horner, JL ;
Javidi, B .
OPTICAL ENGINEERING, 1999, 38 (01) :8-8