Ciphertext-only attack on optical cryptosystem with spatially incoherent illumination: from the view of imaging through scattering medium

Security analysis is important and necessary for a new cryptosystem. In this paper, we evaluate the security risk of the optical cryptosystem with spatially incoherent illumination from the view of imaging through scattering medium and then demonstrate that it is vulnerable to ciphertext-only attack. The proposed ciphertext-only attack method relies on the optical memory effect for speckle correlations, which reveals a fact that the ciphertext’s autocorrelation is essentially identical to the plaintext’s own autocorrelation. Furthermore, by employing of an improved dynamic hybrid input-output phase-retrieval algorithm, we show that a plaintext image can be directly reconstructed from the autocorrelation of its corresponding ciphertext without any prior knowledge about the plaintext or the phase keys. Meanwhile, the theory analysis and experiment results will also be provided to verify the validity and feasibility of our proposed ciphertext-only attack method. To the best of our knowledge, this is the first time to report optical cryptanalysis from the point of view of imaging through scattering medium and we believe this contribution will open up an avenue to deepen the investigation of optical cryptosystems.

[1]  H. Johnson,et al.  A comparison of 'traditional' and multimedia information systems development practices , 2003, Inf. Softw. Technol..

[2]  J R Fienup,et al.  Phase retrieval algorithms: a comparison. , 1982, Applied optics.

[3]  M. Hayes The reconstruction of a multidimensional sequence from the phase or magnitude of its Fourier transform , 1982 .

[4]  Feng,et al.  Correlations and fluctuations of coherent wave transmission through disordered media. , 1988, Physical review letters.

[5]  James R. Fienup,et al.  Improved bounds on object support from autocorrelation support and application to phase retrieval , 1990 .

[6]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[7]  Bahram Javidi,et al.  Polarization encoding for optical security systems , 2000 .

[8]  G. Unnikrishnan,et al.  Optical encryption by double-random phase encoding in the fractional Fourier domain. , 2000, Optics letters.

[9]  Bahram Javidi,et al.  Optical encryption using a joint transform correlator architecture , 2000 .

[10]  Yan Zhang,et al.  Optical encryption based on iterative fractional Fourier transform , 2002 .

[11]  øöö Blockinø Phase retrieval, error reduction algorithm, and Fienup variants: A view from convex optimization , 2002 .

[12]  C T Koch,et al.  Iterative phase retrieval without support. , 2004, Optics letters.

[13]  Jingjuan Zhang,et al.  Double random-phase encoding in the Fresnel domain. , 2004, Optics letters.

[14]  Arturo Carnicer,et al.  Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. , 2005, Optics letters.

[15]  Peng Zhang,et al.  Known-plaintext attack on optical encryption based on double random phase keys. , 2006, Optics letters.

[16]  Haifeng He Simple constraint for phase retrieval with high efficiency. , 2006, Journal of the Optical Society of America. A, Optics, image science, and vision.

[17]  Unnikrishnan Gopinathan,et al.  A known-plaintext heuristic attack on the Fourier plane encryption algorithm. , 2006, Optics express.

[18]  Unnikrishnan Gopinathan,et al.  Cryptanalysis of optical security systems with significant output images. , 2007, Applied optics.

[19]  Bahram Javidi,et al.  Resistance of the double random phase encryption against various attacks. , 2007, Optics express.

[20]  Bo Wang,et al.  Optical image encryption based on interference. , 2008, Optics letters.

[21]  X C Cheng,et al.  Security enhancement of double-random phase encryption by amplitude modulation. , 2008, Optics letters.

[22]  Ayman Alfalou,et al.  Optical image compression and encryption methods , 2009 .

[23]  Qiaofeng Tan,et al.  Security enhanced optical encryption system by random phase key and permutation key. , 2009, Optics express.

[24]  Jesús Lancis,et al.  Optical encryption based on computational ghost imaging. , 2010, Optics letters.

[25]  Xudong Chen,et al.  Optical image encryption based on diffractive imaging. , 2010, Optics letters.

[26]  Zhengjun Liu,et al.  Double image encryption by using iterative random binary encoding in gyrator domains. , 2010, Optics express.

[27]  Xiaogang Wang,et al.  Security enhancement of a phase-truncation based image encryption algorithm. , 2011, Applied optics.

[28]  Li-Hua Gong,et al.  Novel optical image encryption scheme based on fractional Mellin transform , 2011 .

[29]  O. Katz,et al.  Looking around corners and through thin turbid layers in real time with scattered incoherent light , 2012, Nature Photonics.

[30]  Wenqi He,et al.  Optical hierarchical authentication based on interference and hash function. , 2012, Applied optics.

[31]  J. Bertolotti,et al.  Non-invasive imaging through opaque scattering layers , 2012, Nature.

[32]  Chenggong Zhang,et al.  Ciphertext-only attack on a joint transform correlator encryption system. , 2013, Optics express.

[33]  Muhammad Rafiq Abuturab Security enhancement of color image cryptosystem by optical interference principle and spiral phase encoding. , 2013, Applied optics.

[34]  Yefeng Guan,et al.  Image restoration through thin turbid layers by correlation with a known object. , 2013, Optics express.

[35]  Yan Zhang,et al.  Optical image encryption with spatially incoherent illumination. , 2013, Optics letters.

[36]  Sanguo Zhang,et al.  Optical image encryption via ptychography. , 2013, Optics letters.

[37]  J. Bertolotti Non-invasive imaging: Peeking through the curtain , 2014 .

[38]  Si-Min Li,et al.  Security enhancement of double-random phase encryption by iterative algorithm , 2014 .

[39]  M. Fink,et al.  Non-invasive single-shot imaging through scattering layers and around corners via speckle correlations , 2014, Nature Photonics.

[40]  Bahram Javidi,et al.  Advances in optical security systems , 2014 .

[41]  Wen Chen,et al.  Optically secured information retrieval using two authenticated phase-only masks , 2015, Scientific Reports.

[42]  S. Gigan,et al.  Characterization of the angular memory effect of scattered light in biological tissues. , 2015, Optics express.

[43]  Tuo Li,et al.  Security risk of diffractive-imaging-based optical cryptosystem. , 2015, Optics express.

[44]  Jun Li,et al.  Compressive Optical Image Encryption , 2015, Scientific Reports.

[45]  Chenggong Zhang,et al.  Vulnerability to ciphertext-only attack of optical encryption scheme based on double random phase encoding. , 2015, Optics express.

[46]  Yan Zhang,et al.  Multiple-image encryption based on computational ghost imaging , 2016 .

[47]  S. Sahoo,et al.  Enhancing security of incoherent optical cryptosystem by a simple position-multiplexing technique and ultra-broadband illumination , 2017, Scientific Reports.