期刊文献+

使用参考光波光学联合变换相关加密系统的选择明文攻击 被引量:2

Chosen-plaintext attack on optical encryption with reference wave in joint transform correlator architecture
下载PDF
导出
摘要 证实了一种使用参考光波的光学联合相关变换加密系统对于选择明文攻击的脆弱性。在该加密系统中,通过选择一个透过率为零的特殊明文图像,记录其对应的联合功率谱,之后再通过遮挡输入面获取参考光波强度、遮挡参考光和明文获得加密密钥的傅里叶变换强度,根据获得的3幅图像,攻击者可以准确地获取加密所用的密钥,进而可以恢复出原始图像。理论分析和计算机模拟结果均证明所提攻击方法的有效性。 In this paper we demonstrate that the optical encryption scheme with a reference wave in joint transform correlator (JTC) is vulnerable to the chosenplaintext attack (KPA) from the point of view of cryptanalysis. First of all, we selected a dark image as the plaintext and recorded its joint power spectrum, then we recorded the intensity of the reference wave by keeping the input plane out, thereafter we recorded the intensity of the Fourier transform of the encrypting key by sheltering the reference wave and the plaintext. With the obtained three images, the intruder could retrieve the encryption key with the help of several skillful steps. Consequently, the intruder could further access the plaintext with the retrieved key. The theo retical analysis and a set of numerical simulations were carried out to demonstrate how the se cret key of the encryption system could be derived out with our proposed strategy.
出处 《应用光学》 CAS CSCD 北大核心 2014年第1期76-80,共5页 Journal of Applied Optics
基金 国家自然科学基金(10947020) 南阳师范学院青年基金(QN2013035 QN2013036)
关键词 图像加密 选择明文攻击 联合变换相关 参考光波 image encryption chosen-plaintext attack joint transform correlator reference wave
  • 相关文献

参考文献14

  • 1秦怡,巩琼,吕晓东,马毛粉.基于干涉原理的双图像加密系统[J].应用光学,2013,34(2):260-266. 被引量:9
  • 2QIN Wan,PENG Xiang.Asymmetric cryptosystem based on phase-truncated Fourier transforms[J].Opt.Lett.,2010,35(2):118-120.
  • 3黄静,郑珍珠.一种光电器件加密方法的安全性分析[J].应用光学,2011,32(3):456-459. 被引量:1
  • 4VILARDY J M,MILL(A)N M S,P(E)REZ-CABR(E) E.Improved decryption quality and security of a joint transform correlator-based encryption system[J].Journal of Optics,2013,15(2):025401.
  • 5BARRERA J F,VARGAS C,TEBALDI M,et al.Chosen-plaintext attack on a joint transform correlator encrypting system[J].Optics Communications,2010,283(20):3917-3921.
  • 6HE M Z,CAI L Z,LIU Q,et al.Multiple image encryption and watermarking by random phase matching[J].Opt.Comm.,2005,247:29-37.
  • 7WANG Xiao-gang,ZHAO Dao-mu.Security enhancement of a phase-truncation based image encryption algorithm[J].Appl.Opt.,2011,50(36):6645-6651.
  • 8ZHANG Yan,WANG Bo.Optical image encryption based on interference[J].Opt.Lett.,2008,33(21):2443-2445.
  • 9RUEDA E,TEBALDI M,TORROBA R N.Threedimensional key in a modified joint transform correlator encryption scheme[J].Opt.Comm.,2011,284:4321-4326.
  • 10REFREGIER P,JAVIDI B.Optical image encryption based on input plane and Fourier plane random encoding[J].Opt.Lett.,1995,20(7):767-769.

二级参考文献43

  • 1杨晓苹,翟宏琛.双随机相位加密中相息图的优化设计[J].物理学报,2005,54(4):1578-1582. 被引量:9
  • 2于斌,彭翔.基于级联相位恢复算法的光学图像加密[J].光学学报,2005,25(7):881-884. 被引量:17
  • 3位恒政,彭翔,张鹏,刘海涛,封松林.双随机相位加密系统的选择明文攻击[J].光学学报,2007,27(5):824-829. 被引量:15
  • 4NOMURA T. Optical encryption using a joint tra- nsform correlator architecture[J]. Opt. Eng. ,2000, 39(8) :2031-2035.
  • 5UNNIKISHNAN G, JOSEPH J, SINGH K. Optical encryption by double random phase encoding in the fractional Fourier domain[J]. Opt. Lett. , 1995,25 : 887-889.
  • 6HE M Z, CAI L Z. Phase-only encryption and wa- termarking based on phase-shifting interfer-ometry [J]. Appl. Opt., 2005,44(13):2600-2606.
  • 7JONG W H, CHOON S P, DAE H R, et al. Optical image encryption based on XOR operations[J]. Opt. Eng. ,1999,38(1) :47-54.
  • 8Refregier P,Javidi B 1995 Opt.Lett.20 767
  • 9Mogensen C P,Gluckstad J 2000 Opt.Lett.25 566
  • 10Unnikrishnan G,Joseph J,Singh K 2000 Opt.Lett.25 887

共引文献47

同被引文献22

  • 1Refregier P. Javidi B. Optical image encryption bas~input plane and Fourier plane random encoding[J]. Optics Letters, 1995,20(7) : 767-769.
  • 2Situ G, Zhang J. Double random-phase encoding in the Fresnel domain[J]. Optics Letters, 2004,29 (14) : 1584- 1586.
  • 3Unnikrishnan G, Joseph J, Singh K. Optical encryption by double-random phase encoding in the fractional Fourier domain[J]. Optics Letters, 2000,25 (12) : 887-889.
  • 4LIU Shu-tian, MI Quan-lin, ZHU Bang-he. Optical image encryption with multistage and multichannel fractional Fourier-domain filtering [J]. Optics Letters, 2001, 2,6 (16) : 1242-1244.
  • 5Hennelly B, Sheridan J. Image encryption and the fraction- al Fourier transform [J]. Optik-lnternational Journal for Light and Electron Optics,2003,114(6):251-265.
  • 6Tajahuerce E, Javidi B. Encrypting three-dimensional in- formation with digital holography E J]. Applied Optics, 2000,39(35) :6595-6601.
  • 7Javidi B,Nomura T. Securing information by use of digital hclography[J]. Optics Letters, 2000,25 ( ] ) : 28-30.
  • 8Wang B, Sun C O, Su W C. Shift-Tolerance property of an optical double-random phase-encoding encryption system [J]. Applied Optics,2000,39(26) :4788-4793.
  • 9Javidi B, Sergent A, Zhang G S, et al. Fault tolerance properties of a double phase encoding encryption tech- nique[J]. Optical Engineering, 1997,36(4) : 992-998.
  • 10Nomura T, Javidi B. Optical encryption using a joint trans- form correlator architecture [J]. Optical Engineering,2000,39(8):2031-2035.

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部