Abstract
We analyze and present an attack scheme of the asymmetric optical cryptosystem proposed recently based on coherent superposition and equal modulus decomposition [Opt. Lett. 40, 475 (2015) [CrossRef] ]. We prove that the attacker can recover the original image with the ciphertext and public keys through the amplitude-phase retrieval algorithm by using two constraints. One constraint of the amplitude-phase retrieval algorithm is the public key and the other is obtained through the analysis of the cryptosystem. The simulation results demonstrate the feasibility of the attack method.
© 2015 Optical Society of America
Full Article | PDF ArticleMore Like This
Yong Wang, Chenggen Quan, and Cho Jui Tay
Appl. Opt. 55(4) 679-686 (2016)
Xiaopeng Deng
Opt. Lett. 40(16) 3913-3913 (2015)
Jianjun Cai, Xueju Shen, Ming Lei, Chao Lin, and Shuaifeng Dou
Opt. Lett. 40(4) 475-478 (2015)