Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Security analysis on an interference-based optical image encryption scheme

Not Accessible

Your library or personal account may give you access

Abstract

In this paper, the security strength of the improved optical cryptosystem based on interference has been evaluated. Compared to the previous interference-based cryptosystems in which the plaintext is encoded into two phase-only masks (POMs), here the plaintext is encoded into a POM and an amplitude mask (AM). Since the information of the plaintext cannot be recovered directly when one of the masks is released in the decryption process of the improved cryptosystem, it seems that it is free from the silhouette problem. However, we found that the random phase mask (RPM) serving as the encryption key is not related to the plaintext. Thus, it is possible to recover the RPM first by using the known-plaintext attack (KPA). Moreover, the POM and the AM generated in the encryption path only contains the phase and amplitude information, respectively. Thus, these can be utilized as additional constraints in the proposed iterative process. Based on these findings, two kinds of hybrid attacks, including a KPA and the iterative processes with different constraints, are proposed to crack the improved cryptosystem. In the designed KPA with a pair of the known plaintext and its corresponding masks, the RPM is recovered first. With the aid of the recovered RPM, two iterative processes with different released masks are proposed to recover the information of the plaintext without any knowledge of another mask. To the best of our knowledge, this is the first time that the existence of the silhouette problem in the cryptosystem under study has been reported. Numerical simulation has been carried out to validate the feasibility and effectiveness of the proposed hybrid attacks.

© 2022 Optica Publishing Group

Full Article  |  PDF Article
More Like This
Cryptoanalysis and enhancement of a binary image encryption system based on interference

Jiahui Du, Yi Xiong, and Chenggen Quan
Appl. Opt. 60(26) 8038-8045 (2021)

Hybrid plaintext attack for a cryptosystem based on interference and the phase-retrieval technique

Y. Xiong, J. Gu, and R. Kumar
Appl. Opt. 62(16) 4301-4309 (2023)

Data availability

Data underlying the results presented in this paper are not publicly available at this time but may be obtained from the authors upon reasonable request.

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Figures (10)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Equations (13)

You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.