Abstract

We have shown that the application of double random phase encoding (DRPE) to biometrics enables the use of biometrics as cipher keys for binary data encryption. However, DRPE is reported to be vulnerable to known-plaintext attacks (KPAs) using a phase recovery algorithm. In this study, we investigated the vulnerability of DRPE using fingerprints as cipher keys to the KPAs. By means of computational experiments, we estimated the encryption key and restored the fingerprint image using the estimated key. Further, we propose a method for avoiding the KPA on the DRPE that employs the phase retrieval algorithm. The proposed method makes the amplitude component of the encrypted image constant in order to prevent the amplitude component of the encrypted image from being used as a clue for phase retrieval. Computational experiments showed that the proposed method not only avoids revealing the cipher key and the fingerprint but also serves as a sufficiently accurate verification system.

© 2010 OSA

PDF Article

References

  • View by:
  • |
  • |
  • |

  1. P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20(7), 767–769 (1995).
    [CrossRef]
  2. B. Javidi, A. Sergent, and E. Ahouzi, “Performance of double phase encoding encryption technique using binarized encrypted images,” Opt. Eng. 37(2), 565–569 (1998).
    [CrossRef]
  3. B. Wang, C.-C. Sun, W.-C. Su, and A. E. T. Chiou, “Shift-tolerance property of an optical double-random phase-encoding encryption system,” Appl. Opt. 39(26), 4788–4793 (2000).
    [CrossRef]
  4. H. Suzuki, T. Yamaya, T. Obi, M. Yamaguchi, and N. Ohyama, “Fingerprint verification for smart card holders identification based on optical image encryption,” Jpn. J. Opt . 33, 37–44 (2004) in Japanese.
  5. H. Suzuki, M. Yamaguchi, M. Yachida, N. Ohyama, H. Tashima, and T. Obi, “Experimental evaluation of fingerprint verification system based on double random phase encoding,” Opt. Express 14(5), 1755–1766 (2006).
    [CrossRef]
  6. H. Suzuki, H. Tashima, M. Yamaguchi, T. Obi, M. Yachida, and N. Ohyama, “File encryption software using fingerprint keys based on double random encoding,” in Frontiers in Optics, OSA Technical Digest Series (Optical Society of America, 2005), paper JWA50. http://www.opticsinfobase.org/abstract.cfm?URI=FiO-2005-JWA50
  7. A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys,” Opt. Lett. 30(13), 1644–1646 (2005).
    [CrossRef]
  8. X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31(22), 3261–3263 (2006).
    [CrossRef]
  9. X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31(8), 1044–1046 (2006).
    [CrossRef]
  10. U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, “A known-plaintext heuristic attack on the Fourier plane encryption algorithm,” Opt. Express 14(8), 3181–3186 (2006).
    [CrossRef]
  11. Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15(16), 10253–10265 (2007).
    [CrossRef]
  12. R. W. Gerchberg and W. O. Saxton, “A practical algorithm for the determination of the phase from image and diffraction plane pictures,” Optik (Stuttg.) 35, 237–246 (1972).
  13. J. R. Fienup, “Phase retrieval algorithms: a comparison,” Appl. Opt. 21(15), 2758–2769 (1982).
    [CrossRef]

2007 (1)

2006 (4)

2005 (1)

2004 (1)

H. Suzuki, T. Yamaya, T. Obi, M. Yamaguchi, and N. Ohyama, “Fingerprint verification for smart card holders identification based on optical image encryption,” Jpn. J. Opt . 33, 37–44 (2004) in Japanese.

2000 (1)

1998 (1)

B. Javidi, A. Sergent, and E. Ahouzi, “Performance of double phase encoding encryption technique using binarized encrypted images,” Opt. Eng. 37(2), 565–569 (1998).
[CrossRef]

1995 (1)

1982 (1)

1972 (1)

R. W. Gerchberg and W. O. Saxton, “A practical algorithm for the determination of the phase from image and diffraction plane pictures,” Optik (Stuttg.) 35, 237–246 (1972).

Ahouzi, E.

B. Javidi, A. Sergent, and E. Ahouzi, “Performance of double phase encoding encryption technique using binarized encrypted images,” Opt. Eng. 37(2), 565–569 (1998).
[CrossRef]

Arcos, S.

Carnicer, A.

Castro, A.

Chiou, A. E. T.

Fienup, J. R.

Frauel, Y.

Gerchberg, R. W.

R. W. Gerchberg and W. O. Saxton, “A practical algorithm for the determination of the phase from image and diffraction plane pictures,” Optik (Stuttg.) 35, 237–246 (1972).

Gopinathan, U.

Javidi, B.

Juvells, I.

Monaghan, D. S.

Montes-Usategui, M.

Naughton, T. J.

Obi, T.

H. Suzuki, M. Yamaguchi, M. Yachida, N. Ohyama, H. Tashima, and T. Obi, “Experimental evaluation of fingerprint verification system based on double random phase encoding,” Opt. Express 14(5), 1755–1766 (2006).
[CrossRef]

H. Suzuki, T. Yamaya, T. Obi, M. Yamaguchi, and N. Ohyama, “Fingerprint verification for smart card holders identification based on optical image encryption,” Jpn. J. Opt . 33, 37–44 (2004) in Japanese.

Ohyama, N.

H. Suzuki, M. Yamaguchi, M. Yachida, N. Ohyama, H. Tashima, and T. Obi, “Experimental evaluation of fingerprint verification system based on double random phase encoding,” Opt. Express 14(5), 1755–1766 (2006).
[CrossRef]

H. Suzuki, T. Yamaya, T. Obi, M. Yamaguchi, and N. Ohyama, “Fingerprint verification for smart card holders identification based on optical image encryption,” Jpn. J. Opt . 33, 37–44 (2004) in Japanese.

Peng, X.

Refregier, P.

Saxton, W. O.

R. W. Gerchberg and W. O. Saxton, “A practical algorithm for the determination of the phase from image and diffraction plane pictures,” Optik (Stuttg.) 35, 237–246 (1972).

Sergent, A.

B. Javidi, A. Sergent, and E. Ahouzi, “Performance of double phase encoding encryption technique using binarized encrypted images,” Opt. Eng. 37(2), 565–569 (1998).
[CrossRef]

Sheridan, J. T.

Su, W.-C.

Sun, C.-C.

Suzuki, H.

H. Suzuki, M. Yamaguchi, M. Yachida, N. Ohyama, H. Tashima, and T. Obi, “Experimental evaluation of fingerprint verification system based on double random phase encoding,” Opt. Express 14(5), 1755–1766 (2006).
[CrossRef]

H. Suzuki, T. Yamaya, T. Obi, M. Yamaguchi, and N. Ohyama, “Fingerprint verification for smart card holders identification based on optical image encryption,” Jpn. J. Opt . 33, 37–44 (2004) in Japanese.

Tashima, H.

Wang, B.

Wei, H.

Yachida, M.

Yamaguchi, M.

H. Suzuki, M. Yamaguchi, M. Yachida, N. Ohyama, H. Tashima, and T. Obi, “Experimental evaluation of fingerprint verification system based on double random phase encoding,” Opt. Express 14(5), 1755–1766 (2006).
[CrossRef]

H. Suzuki, T. Yamaya, T. Obi, M. Yamaguchi, and N. Ohyama, “Fingerprint verification for smart card holders identification based on optical image encryption,” Jpn. J. Opt . 33, 37–44 (2004) in Japanese.

Yamaya, T.

H. Suzuki, T. Yamaya, T. Obi, M. Yamaguchi, and N. Ohyama, “Fingerprint verification for smart card holders identification based on optical image encryption,” Jpn. J. Opt . 33, 37–44 (2004) in Japanese.

Yu, B.

Zhang, P.

Appl. Opt. (2)

Jpn. J. Opt (1)

H. Suzuki, T. Yamaya, T. Obi, M. Yamaguchi, and N. Ohyama, “Fingerprint verification for smart card holders identification based on optical image encryption,” Jpn. J. Opt . 33, 37–44 (2004) in Japanese.

Opt. Eng. (1)

B. Javidi, A. Sergent, and E. Ahouzi, “Performance of double phase encoding encryption technique using binarized encrypted images,” Opt. Eng. 37(2), 565–569 (1998).
[CrossRef]

Opt. Express (3)

Opt. Lett. (4)

Optik (Stuttg.) (1)

R. W. Gerchberg and W. O. Saxton, “A practical algorithm for the determination of the phase from image and diffraction plane pictures,” Optik (Stuttg.) 35, 237–246 (1972).

Other (1)

H. Suzuki, H. Tashima, M. Yamaguchi, T. Obi, M. Yachida, and N. Ohyama, “File encryption software using fingerprint keys based on double random encoding,” in Frontiers in Optics, OSA Technical Digest Series (Optical Society of America, 2005), paper JWA50. http://www.opticsinfobase.org/abstract.cfm?URI=FiO-2005-JWA50

Supplementary Material (1)

» Media 1: AVI (2367 KB)     

Cited By

OSA participates in CrossRef's Cited-By Linking service. Citing articles from OSA journals and other participating publishers are listed here.

Alert me when this article is cited.


Metrics