Collision in optical image encryption based on interference and a method for avoiding this security leak

Abstract From the perspective of cryptography, collision is an undesirable situation that occurs when two or more distinct inputs into a security system produce undistinguishable outputs. In this paper we present a study of the collision property of the optical image encryption technique based on interference (Zhang et al. Optics Letters; 2008:33(21)). For an arbitrary secret image (output) to be encrypted, we can find various distinct pairs of phase-only masks (inputs), which yield almost the same outputs by use of a modified phase retrieval algorithm. Meanwhile, we also provide an efficient way to avoid this potential risk by adding an extra unit in the original structure, which can thus be called a double-factor verification system. A series of computer simulations were also carried out to demonstrate our concern and strategy.

[1]  Bo Wang,et al.  Optical stream-cipher-like system for image encryption based on Michelson interferometer. , 2011, Optics express.

[2]  T-C Poon,et al.  Fast numerical generation and encryption of computer-generated Fresnel holograms. , 2011, Applied optics.

[3]  Kehar Singh,et al.  Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator. , 2011, Applied optics.

[4]  Bo Wang,et al.  Optical image encryption based on interference. , 2008, Optics letters.

[5]  Yujing Han,et al.  Optical image encryption based on two beams' interference , 2010 .

[6]  Pramod Kumar,et al.  Optical image encryption based on interference under convergent random illumination , 2010 .

[7]  Yu Fu,et al.  Color image encryption based on interference and virtual optics , 2010 .

[8]  Mohammad A. Karim,et al.  High-security optical integrated stream ciphers , 1999 .

[9]  Arturo Carnicer,et al.  Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. , 2005, Optics letters.

[10]  Liu Mingtang,et al.  Information hiding based on the optical interference principle , 2011 .

[11]  J R Fienup,et al.  Phase retrieval algorithms: a comparison. , 1982, Applied optics.

[12]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[13]  Wenqi He,et al.  The keyed optical Hash function based on cascaded phase-truncated Fourier transforms , 2010 .

[14]  Yan Zhang,et al.  Double images hiding based on optical interference , 2009 .

[15]  Juan Liu,et al.  Experimental verification of optical image encryption based on interference , 2011 .

[16]  Mohammad A. Karim,et al.  Color image encryption using double random phase encoding , 1999 .

[17]  Tom Dowling,et al.  Introducing secure modes of operation for optical encryption. , 2008, Journal of the Optical Society of America. A, Optics, image science, and vision.

[18]  Jianhua Wu,et al.  Novel image encryption algorithm based on multiple-parameter discrete fractional random transform , 2010 .

[19]  Yongtian Wang,et al.  Optical image encryption based on interference of polarized light. , 2009, Optics express.

[20]  John T. Sheridan,et al.  Collision in double random phase encoding , 2008 .

[21]  Peng Zhang,et al.  Known-plaintext attack on optical encryption based on double random phase keys. , 2006, Optics letters.

[22]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[23]  B Javidi,et al.  Encrypted optical memory system using three-dimensional keys in the Fresnel domain. , 1999, Optics letters.