Resolution Adaptative Network for Cryptanalysis of Asymmetric Cryptosystems

The asymmetric optical cryptosystems have been widely concerned due to their prominent characteristics of high security and robustness against attacks. In this paper, a resolution adaptative network is proposed to attack the asymmetric optical cryptosystems, which solves the issue of requiring a lot of experiments to change the network structure and parameters for effectively attacking to ciphertexts with different resolutions. The proposed network of fixing the network structure and parameters can be trained by inputting plaintext-ciphertext pairs with different resolutions, and then the trained network model can generate the retrieved plaintexts with corresponding resolutions. Numerical simulation and analysis show that the classical asymmetric optical cryptosystems can be attacked by the proposed network successfully. Moreover, the excellent resolution adaptability of the proposed network is verified by training and testing the images with different resolutions. Furthermore, the generalization ability and robustness of the proposed network is verified. In general, the issue of the input resolution adaptability of the cryptanalysis network is addressed firstly to our best knowledge.

[1]  Feng Zhang,et al.  Asymmetric multiple-image encryption based on the cascaded fractional Fourier transform , 2015 .

[2]  Mingguang Shan,et al.  Asymmetric image encryption based on optical interference using modified error-reduction phase retrieval algorithm , 2020 .

[3]  Xiangyu Chang,et al.  Ciphertext-only attack on optical scanning cryptography , 2020 .

[4]  A He,et al.  Security analysis and enhancement of a cryptosystem based on phase truncation and a designed amplitude modulator. , 2019, Applied optics.

[5]  Osamu Matoba,et al.  Optical Techniques for Information Security , 2009, Proceedings of the IEEE.

[6]  Shuming Jiao,et al.  Does deep learning always outperform simple linear regression in optical imaging? , 2020, Optics express.

[7]  Wenqi He,et al.  Cryptanalysis of random-phase-encoding-based optical cryptosystem via deep learning. , 2019, Optics express.

[8]  Shuming Jiao,et al.  Visual cryptography in single-pixel imaging , 2020, Optics express.

[9]  Huijuan Li,et al.  Image encryption based on gyrator transform and two-step phase-shifting interferometry , 2009 .

[10]  Wen Chen,et al.  Security-enhanced interference-based optical image encryption , 2013 .

[11]  Daomu Zhao,et al.  Single-channel color image encryption based on asymmetric cryptosystem , 2012 .

[12]  John T. Sheridan,et al.  A review of optical image encryption techniques , 2014 .

[13]  Xia Li,et al.  Review on Optical Image Hiding and Watermarking Techniques , 2018, Optics & Laser Technology.

[14]  Peng Zhang,et al.  Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain. , 2006, Optics letters.

[15]  Wang Xing-Yuan,et al.  A secure key agreement protocol based on chaotic maps , 2013 .

[16]  Xiaolei Wang,et al.  Experimental study on optical image encryption with asymmetric double random phase and computer-generated hologram. , 2017, Optics express.

[17]  Xingyuan Wang,et al.  An anonymous key agreement protocol based on chaotic maps , 2011 .

[18]  George Papandreou,et al.  Encoder-Decoder with Atrous Separable Convolution for Semantic Image Segmentation , 2018, ECCV.

[19]  Wenqi He,et al.  Ciphertext-only attack on optical cryptosystem with spatially incoherent illumination: from the view of imaging through scattering medium , 2017, Scientific Reports.

[20]  Ming Lei,et al.  Asymmetric optical cryptosystem based on coherent superposition and equal modulus decomposition. , 2015, Optics letters.

[21]  Jesús Lancis,et al.  Optical encryption based on computational ghost imaging. , 2010, Optics letters.

[22]  Ross B. Girshick,et al.  Fast R-CNN , 2015, 1504.08083.

[23]  B Javidi,et al.  Optoelectronic information encryption with phase-shifting interferometry. , 2000, Applied optics.

[24]  Masashi Nishiyama,et al.  Protecting Personal Information using Homomorphic Encryption for Person Re-identification , 2018, 2018 IEEE 7th Global Conference on Consumer Electronics (GCCE).

[25]  Wen Chen,et al.  Optical color image encryption based on an asymmetric cryptosystem in the Fresnel domain , 2011 .

[26]  Ralph C. Merkle,et al.  Secure communications over insecure channels , 1978, CACM.

[27]  Gregory Cohen,et al.  EMNIST: an extension of MNIST to handwritten letters , 2017, CVPR 2017.

[28]  Shuming Jiao,et al.  Known-plaintext attack to optical encryption systems with space and polarization encoding. , 2020, Optics express.

[29]  Wen Chen,et al.  Learning-based attacks for detecting the vulnerability of computer-generated hologram based optical encryption. , 2020, Optics express.

[30]  François Chollet,et al.  Xception: Deep Learning with Depthwise Separable Convolutions , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[31]  Li-Hua Gong,et al.  Multi-image compression-encryption scheme based on quaternion discrete fractional Hartley transform and improved pixel adaptive diffusion , 2020, Signal Process..

[32]  Aichuan Li,et al.  Asymmetric Optical Image Encryption With Silhouette Removal Using Interference and Equal Modulus Decomposition , 2020, IEEE Photonics Journal.

[33]  Wen Chen,et al.  Machine-learning attacks on interference-based optical encryption: experimental demonstration. , 2019, Optics express.

[35]  Xing-yuan Wang,et al.  A switch-modulated method for chaos digital secure communication based on user-defined protocol , 2010 .

[36]  A W Lohmann,et al.  Binary fraunhofer holograms, generated by computer. , 1967, Applied optics.

[37]  Bahram Javidi,et al.  Advances in optical security systems , 2014 .

[38]  Xiang Peng,et al.  Asymmetric cryptosystem based on phase-truncated Fourier transforms. , 2010, Optics letters.

[39]  Ying Wang,et al.  Asymmetric encryption of multiple-image based on compressed sensing and phase-truncation in cylindrical diffraction domain , 2019, Optics Communications.

[40]  Daomu Zhao,et al.  Double images encryption method with resistance against the specific attack based on an asymmetric algorithm. , 2012, Optics express.

[41]  Pavel A. Cheremkhin,et al.  Asymmetric image optical encryption under spatially incoherent illumination , 2020, Laser Physics Letters.

[42]  G. Unnikrishnan,et al.  Optical encryption by double-random phase encoding in the fractional Fourier domain. , 2000, Optics letters.

[43]  Wen Chen,et al.  Interference-based optical image encryption using three-dimensional phase retrieval. , 2012, Applied optics.

[44]  Xing-yuan Wang,et al.  An improved key agreement protocol based on chaos , 2010 .

[45]  Siwei Wang,et al.  A new key agreement protocol based on Chebyshev chaotic maps , 2016, Secur. Commun. Networks.

[46]  Arturo Carnicer,et al.  Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. , 2005, Optics letters.

[47]  Bo Wang,et al.  Optical image encryption based on interference. , 2008, Optics letters.

[48]  B. Javidi Securing Information with Optical Technologies , 1997 .

[49]  Guigang Zhang,et al.  Deep Learning , 2016, Int. J. Semantic Comput..

[50]  Quanying Wu,et al.  Chosen-plaintext attack on the double random polarization encryption. , 2019, Optics express.

[51]  Roland Vollgraf,et al.  Fashion-MNIST: a Novel Image Dataset for Benchmarking Machine Learning Algorithms , 2017, ArXiv.

[52]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[53]  Jun Wang,et al.  Asymmetric Cryptosystem Using Improved Equal Modulus Decomposition in Cylindrical Diffraction Domain , 2019, IEEE Access.

[54]  Li Bing,et al.  Optical image encryption via high-quality computational ghost imaging using iterative phase retrieval , 2018, Laser Physics Letters.

[55]  Jingjuan Zhang,et al.  Double random-phase encoding in the Fresnel domain. , 2004, Optics letters.