Abstract

An advanced iterative phase retrieval algorithm is applied to perform a ciphertext-only attack on the fractional Fourier transform-based double random phase encryption system. With the given complex amplitude of ciphertext and definite support of the object image, the original object image can be recovered by estimating the energy of support area in the recovered image. The encryption system can be attacked by analyzing the sensibility of fractional Fourier transform order keys and evaluating the energy of the object image support area. The proposed algorithm can obtain encrypted fractional order and retrieve two random phase keys. Numerical results demonstrate the efficacy of the proposed attacking method.

© 2017 Optical Society of America

Full Article  |  PDF Article
OSA Recommended Articles
Phase-retrieval-based attacks on linear-canonical-transform-based DRPE systems

Changliang Guo, Inbarasan Muniraj, and John T. Sheridan
Appl. Opt. 55(17) 4720-4728 (2016)

Iterative phase retrieval algorithms. Part II: Attacking optical encryption systems

Changliang Guo, Shi Liu, and John T. Sheridan
Appl. Opt. 54(15) 4709-4719 (2015)

Vulnerability to ciphertext-only attack of optical encryption scheme based on double random phase encoding

Xiaoli Liu, Jiachen Wu, Wenqi He, Meihua Liao, Chenggong Zhang, and Xiang Peng
Opt. Express 23(15) 18955-18968 (2015)

References

You do not have subscription access to this journal. Citation lists with outbound citation links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Figures (13)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Equations (8)

You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Metrics

You do not have subscription access to this journal. Article level metrics are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription