Iterative phase retrieval algorithms. Part II: Attacking optical encryption systems.

The modified iterative phase retrieval algorithms developed in Part I [Guo et al., Appl. Opt.54, 4698 (2015)] are applied to perform known plaintext and ciphertext attacks on amplitude encoding and phase encoding Fourier-transform-based double random phase encryption (DRPE) systems. It is shown that the new algorithms can retrieve the two random phase keys (RPKs) perfectly. The performances of the algorithms are tested by using the retrieved RPKs to decrypt a set of different ciphertexts encrypted using the same RPKs. Significantly, it is also shown that the DRPE system is, under certain conditions, vulnerable to ciphertext-only attack, i.e., in some cases an attacker can decrypt DRPE data successfully when only the ciphertext is intercepted.

[1]  John T. Sheridan,et al.  Optical image encryption by random shifting in fractional Fourier domains. , 2003, Optics letters.

[2]  B Javidi,et al.  Spread-space spread-spectrum technique for secure multiplexing. , 2007, Optics letters.

[3]  Louise Poissant Part I , 1996, Leonardo.

[4]  Unnikrishnan Gopinathan,et al.  Role of phase key in the double random phase encoding technique: an error analysis. , 2008, Applied optics.

[5]  Peng Zhang,et al.  Known-plaintext attack on optical encryption based on double random phase keys. , 2006, Optics letters.

[6]  John T. Sheridan,et al.  Image encryption and the fractional Fourier transform , 2003, SPIE OPTO-Ireland.

[7]  Unnikrishnan Gopinathan,et al.  A known-plaintext heuristic attack on the Fourier plane encryption algorithm. , 2006, Optics express.

[8]  John T. Sheridan,et al.  Fractional Fourier transform-based image encryption: phase retrieval algorithm , 2003 .

[9]  James R. Fienup,et al.  Reconstruction of the support of an object from the support of its autocorrelation , 1982 .

[10]  Jingjuan Zhang,et al.  Double random-phase encoding in the Fresnel domain. , 2004, Optics letters.

[11]  John T. Sheridan,et al.  Optical encryption by combining image scrambling techniques in fractional Fourier domains , 2013 .

[12]  Guanglin Yang,et al.  A hybrid heuristic algorithm to improve known-plaintext attack on Fourier plane encryption. , 2009, Optics express.

[13]  John T. Sheridan,et al.  A review of optical image encryption techniques , 2014 .

[14]  R. J.,et al.  Reconstruction of objects having latent reference points , 2004 .

[15]  James R. Fienup,et al.  Improved bounds on object support from autocorrelation support and application to phase retrieval , 1990 .

[16]  Shi Liu,et al.  Iterative phase retrieval algorithms. I: optimization. , 2015, Applied optics.

[17]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[18]  Kehar Singh,et al.  Optical encryption using quadratic phase systems , 2001 .

[19]  Peng Xiang,et al.  Ciphertext-only attack on double random phase encoding optical encryption system , 2007 .

[20]  Jingjuan Zhang,et al.  Multiple-image encryption by wavelength multiplexing. , 2005, Optics letters.

[21]  Thomas F. Quatieri,et al.  Recursive phase retrieval using boundary conditions , 1983 .

[22]  James R. Fienup,et al.  Reconstruction of a complex-valued object from the modulus of its Fourier transform using a support constraint , 1987 .

[23]  Aloka Sinha,et al.  Gyrator transform-based optical image encryption, using chaos , 2009 .

[24]  Arturo Carnicer,et al.  Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. , 2005, Optics letters.

[25]  James R. Fienup,et al.  Phase-retrieval stagnation problems and solutions , 1986 .

[26]  John T. Sheridan,et al.  Optical double image encryption employing a pseudo image technique in the Fourier domain , 2014 .

[27]  J. Glückstad,et al.  A phase-based optical encryption system with polarisation encoding , 2000 .