Forgery attack on optical encryption based on computational ghost imaging.

Attack techniques on a cryptosystem include not only cryptanalysis, but also forgery and modification of messages, deception and confusion on both sender and receiver sides, and so on. In this Letter, we show that an optical encryption system based on computational ghost imaging (CGI) has security vulnerability owing to its high tolerance for error deviation of ciphertext. It leaves a chance for a forgery attack in which attackers can forge a set of fake keys according to the intercepted ciphertext. If the forged key can be transmitted to the receiver by some disguised means, he/she may be cheated or confused by the retrieved fake images. The discovery of this vulnerability may also help upgrade the CGI-based encryption system.

[1]  Kang Yi,et al.  Optical encryption based on ghost imaging and public key cryptography , 2018, Optics and Lasers in Engineering.

[2]  Yonghui Tian,et al.  Simulation and Demonstration of Directed XOR/XNOR Logic Gates Using Two Cascaded Microring Resonators , 2016 .

[3]  Wenqi He,et al.  Two-level image authentication by two-step phase-shifting interferometry and compressive sensing , 2018 .

[4]  Guohua Wu,et al.  Binary sampling ghost imaging: add random noise to fight quantization caused image quality decline , 2017, 1702.08687.

[5]  Le Wang,et al.  High performance optical encryption based on computational ghost imaging with QR code and compressive sensing technique , 2015 .

[6]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[7]  Wen Chen,et al.  Object authentication in computational ghost imaging with the realizations less than 5% of Nyquist limit. , 2013, Optics letters.

[8]  C. Zhang,et al.  Simultaneously performing optical and electrical responses from a plasmonic sensor based on gold/silicon Schottky junction. , 2019, Optics express.

[9]  Xiang Peng,et al.  Asymmetric cryptosystem based on phase-truncated Fourier transforms. , 2010, Optics letters.

[10]  Ting Lei,et al.  Known-Plaintext Attack and Ciphertext-Only Attack for Encrypted Single-Pixel Imaging , 2019, IEEE Access.

[11]  Jingjuan Zhang,et al.  Double random-phase encoding in the Fresnel domain. , 2004, Optics letters.

[12]  Jesús Lancis,et al.  Optical encryption based on computational ghost imaging. , 2010, Optics letters.

[13]  Wen Chen,et al.  Ghost imaging using labyrinth-like phase modulation patterns for high-efficiency and high-security optical encryption , 2015 .

[14]  Shuming Jiao,et al.  Visual cryptography in single-pixel imaging , 2020, Optics express.

[15]  Zhengjun Liu,et al.  Double image encryption by using iterative random binary encoding in gyrator domains. , 2010, Optics express.

[16]  O. Katz,et al.  Ghost imaging with a single detector , 2008, 0812.2633.

[17]  Wen Chen,et al.  Ghost imaging for three-dimensional optical security , 2013 .

[18]  Zhongyang Li,et al.  Cryptanalysis and security enhancement of optical cryptography based on computational ghost imaging , 2016 .

[19]  Yan Zhang,et al.  Multiple-image encryption based on computational ghost imaging , 2016 .

[20]  Anand Asundi,et al.  An optical watermarking scheme with two-layer framework based on computational ghost imaging , 2018, Optics and Lasers in Engineering.

[21]  Wen Chen,et al.  Grayscale object authentication based on ghost imaging using binary signals , 2015 .

[22]  Hong Guo,et al.  Image quality recovery in binary ghost imaging by adding random noise. , 2017, Optics letters.

[23]  Jeffrey H. Shapiro,et al.  Computational ghost imaging , 2008, 2009 Conference on Lasers and Electro-Optics and 2009 Conference on Quantum electronics and Laser Science Conference.

[24]  Ayman Alfalou,et al.  Optical image compression and encryption methods , 2009 .

[25]  Xiquan Fu,et al.  Binary detection in ghost imaging with preserved grayscale , 2019, The European Physical Journal D.

[26]  Xiang Peng,et al.  Multiple-Image Encryption Based on Compressive Ghost Imaging and Coordinate Sampling , 2016, IEEE Photonics Journal.