Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Security analysis on the interference-based optical image cryptosystem with a designed amplitude modulator

Not Accessible

Your library or personal account may give you access

Abstract

The security strength of an interference-based optical image cryptosystem with a designed amplitude modulator (AM) is evaluated. Compared to previous improved interference-based cryptosystems in which iterative or post-processing algorithms are involved, to remove the silhouette problem, a pre-designed AM is placed at the image plane to modulate the plaintext directly, which eliminates this drawback. Moreover, the AM is used as an additional private key, which enlarges the key space and further enhances the security system. However, we have noticed that one of the designed parameters in the AM has a low key sensitivity, which is fault-tolerant and is not required for precise reconstruction. Additionally, the AM is plaintext-independent, which means that the AM can be recovered first by using a pair of chosen plaintexts and the corresponding ciphertext. Based on these findings, we propose a hybrid algorithm that includes two chosen-plaintext attacks (CPAs) and a ciphertext-only attack (COA) to break the enhanced cryptosystem. Specially, CPAs with an impulse function and an arbitrarily given plaintext are proposed to retrieve two parameters in the AM. With the retrieved AM, information on the plaintext can be recovered from the corresponding ciphertext by two kinds of COAs without any knowledge of the private keys. To the best of our knowledge, this is the first time that the interference-based cryptosystem with a designed AM has been cracked successfully, which may provide potential evidence for further security improvements. Numerical simulations are carried out to validate the feasibility of the proposed attacks.

© 2022 Optica Publishing Group

Full Article  |  PDF Article
More Like This
Security analysis on an interference-based optical image encryption scheme

Y. Xiong, J. Gu, and R. Kumar
Appl. Opt. 61(30) 9045-9051 (2022)

Cryptoanalysis and enhancement of a binary image encryption system based on interference

Jiahui Du, Yi Xiong, and Chenggen Quan
Appl. Opt. 60(26) 8038-8045 (2021)

Hybrid plaintext attack for a cryptosystem based on interference and the phase-retrieval technique

Y. Xiong, J. Gu, and R. Kumar
Appl. Opt. 62(16) 4301-4309 (2023)

Data availability

Data underlying the results presented in this paper are not publicly available at this time but may be obtained from the authors upon reasonable request.

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Figures (10)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Equations (19)

You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.