Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Cryptoanalysis on optical image encryption systems based on the vector decomposition technique in the Fourier domain

Not Accessible

Your library or personal account may give you access

Abstract

In this paper, the security of optical cryptosystems based on the vector decomposition technique in the Fourier domain is analyzed. Compared to the conventional cryptosystem based on the equal modulus decomposition (EMD) technique, an additional EMD structure is introduced in the cascaded EMD-based cryptosystem; hence, the mask including the phase information of the Fourier spectrum is further encoded in the second EMD structure to enhance the security level. However, it is shown that the number of the private keys has not been increased in the cascaded EMD-based cryptosystem, which makes it possible to crack the cascaded EMD-based cryptosystem. Therefore, a chosen-plaintext attack (CPA) and a special attack with an arbitrarily given private key are proposed to retrieve information from encoded images obtained by the cascaded EMD-based cryptosystem. In addition, the security of the cryptosystem based on the random modulus decomposition (RMD) technique is also analyzed. Compared to the EMD-based cryptosystem in which the Fourier spectrum is decomposed into two vectors with equal moduli, the security level of the cryptosystem has been improved by using the RMD technique to decompose the spectrum into vectors with unequal moduli to decrease the number of the amplitude constraints. However, it is found that the arbitrarily given ciphertext provides the attackers enough information to retrieve the precise information of the plaintext without any knowledge of the private keys. A special attack is proposed to crack the RMD-based cryptosystem. This is the first time to report that these two cryptosystems based on the vector decomposition technique are attacked successfully. Numerical simulation is conducted to validate the feasibility and effectiveness of the proposed attacks.

© 2019 Optical Society of America

Full Article  |  PDF Article

Corrections

3 May 2019: A correction was made to Ref. 40.


More Like This
Cryptoanalysis and enhancement of a binary image encryption system based on interference

Jiahui Du, Yi Xiong, and Chenggen Quan
Appl. Opt. 60(26) 8038-8045 (2021)

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Figures (13)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Equations (36)

You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.