Learning-based attacks for detecting the vulnerability of computer-generated hologram based optical encryption.

Optical encryption has attracted wide attention for its remarkable characteristics. Inspired by the development of double random phase encoding, many researchers have developed a number of optical encryption systems for practical applications. It has also been found that computer-generated hologram (CGH) is highly promising for optical encryption, and the CGH-based optical encryption possesses remarkable advantages of simplicity and high feasibility for practical implementations. An input image, i.e., plaintext, can be iteratively or non-iteratively encoded into one or several phase-only masks via phase retrieval algorithms. Without security keys, it is impossible for unauthorized receivers to correctly extract the input image from ciphertext. However, cryptoanalysis of CGH-based optical encryption systems has not been effectively carried out before, and it is also concerned whether CGH-based optical encryption is sufficiently secure for practical applications. In this paper, learning-based attack is proposed to demonstrate the vulnerability of CGH-based optical security system without the direct retrieval of optical encryption keys for the first time to our knowledge. Many pairs of the extracted CGH patterns and their corresponding input images (i.e., ciphertext-plaintext pairs) are used to train a designed learning model. After training, it is straightforward to directly retrieve unknown plaintexts from the given ciphertexts (i.e., phase-only masks) by using the trained learning model without subsidiary conditions. Moreover, the proposed learning-based attacks are also feasible and effective for the cryptoanalysis of CGH-based optical security systems with multiple cascaded phase-only masks. The proposed learning-based attacking method paves the way for the cryptoanalysis of CGH-based optical encryption.

[1]  Chris Chatwin,et al.  Random phase encoding for optical security , 1996 .

[2]  G. Unnikrishnan,et al.  Optical encryption by double-random phase encoding in the fractional Fourier domain. , 2000, Optics letters.

[3]  Wen Chen,et al.  Space-based optical image encryption. , 2010, Optics express.

[4]  B Javidi,et al.  Optoelectronic information encryption with phase-shifting interferometry. , 2000, Applied optics.

[5]  Geoffrey E. Hinton,et al.  Deep Learning , 2015, Nature.

[6]  B. Javidi Securing Information with Optical Technologies , 1997 .

[7]  A W Lohmann,et al.  Binary fraunhofer holograms, generated by computer. , 1967, Applied optics.

[8]  Bahram Javidi,et al.  Advances in optical security systems , 2014 .

[9]  Osamu Matoba,et al.  Optical Techniques for Information Security , 2009, Proceedings of the IEEE.

[10]  Aloka Sinha,et al.  Gyrator transform-based optical image encryption, using chaos , 2009 .

[11]  Xudong Chen,et al.  Optical image encryption based on diffractive imaging. , 2010, Optics letters.

[12]  Linfei Chen,et al.  Optical image encryption with Hartley transforms. , 2006, Optics letters.

[13]  Zhengjun Liu,et al.  A new kind of double image encryption by using a cutting spectrum in the 1-D fractional Fourier transform domains , 2009 .

[14]  Ran Tao,et al.  Double image encryption based on random phase encoding in the fractional Fourier domain. , 2007, Optics express.

[15]  Peng Zhang,et al.  Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain. , 2006, Optics letters.

[16]  Roberto Torroba,et al.  Optical encryption and QR codes: secure and noise-free information retrieval. , 2013, Optics express.

[17]  Wenqi He,et al.  Cryptanalysis of random-phase-encoding-based optical cryptosystem via deep learning. , 2019, Optics express.

[18]  Muhammad Rafiq Abuturab,et al.  Color image security system based on discrete Hartley transform in gyrator transform domain , 2013 .

[19]  Zhengjun Liu,et al.  Double image encryption based on iterative fractional Fourier transform , 2007 .

[20]  Jesús Lancis,et al.  Optical encryption based on computational ghost imaging. , 2010, Optics letters.

[21]  Kehar Singh,et al.  Double random fractional Fourier domain encoding for optical security , 2000 .

[22]  Wen Chen,et al.  Machine-learning attacks on interference-based optical encryption: experimental demonstration. , 2019, Optics express.

[23]  Ayman Alfalou,et al.  Optical image compression and encryption methods , 2009 .

[24]  Jingjuan Zhang,et al.  Double random-phase encoding in the Fresnel domain. , 2004, Optics letters.

[25]  Aloka Sinha,et al.  Chaos based multiple image encryption using multiple canonical transforms , 2010 .

[26]  B. Javidi,et al.  Encrypted optical storage with wavelength-key and random phase codes. , 1999, Applied optics.

[27]  Wen-Nung Lie,et al.  Multiple-image encryption and multiplexing using a modified Gerchberg-Saxton algorithm and phase modulation in Fresnel-transform domain. , 2009, Optics letters.

[28]  Zhang Xiao,et al.  Double-image encryption based on interference and logistic map under the framework of double random phase encoding , 2019, Optics and Lasers in Engineering.

[29]  Anand Asundi,et al.  Single-pixel correlated imaging with high-quality reconstruction using iterative phase retrieval algorithm , 2018, Optics and Lasers in Engineering.

[30]  Shi Liu,et al.  Iterative phase retrieval algorithms. Part II: Attacking optical encryption systems. , 2015, Applied optics.

[31]  E G Johnson,et al.  Phase encryption of biometrics in diffractive optical elements. , 1996, Optics letters.

[32]  B Javidi,et al.  Encrypted optical memory system using three-dimensional keys in the Fresnel domain. , 1999, Optics letters.

[33]  Bo Wang,et al.  Optical image encryption based on interference. , 2008, Optics letters.

[34]  Sanguo Zhang,et al.  Optical image encryption via ptychography. , 2013, Optics letters.

[35]  Xiaolei Wang,et al.  Experimental study on optical image encryption with asymmetric double random phase and computer-generated hologram. , 2017, Optics express.

[36]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[37]  L. Deng,et al.  The MNIST Database of Handwritten Digit Images for Machine Learning Research [Best of the Web] , 2012, IEEE Signal Processing Magazine.

[38]  Ralph C. Merkle,et al.  Secure communications over insecure channels , 1978, CACM.

[39]  Peng Zhang,et al.  Known-plaintext attack on optical encryption based on double random phase keys. , 2006, Optics letters.

[40]  Chenggong Zhang,et al.  Vulnerability to ciphertext-only attack of optical encryption scheme based on double random phase encoding. , 2015, Optics express.

[41]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[42]  Arturo Carnicer,et al.  Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. , 2005, Optics letters.