Cryptanalysis of optical security systems with significant output images

Files in This Item:
File Description SizeFormat 
Cryptanalysis of optical security systems with significant output images.pdf759.4 kBAdobe PDFDownload
Title: Cryptanalysis of optical security systems with significant output images
Authors: Situ, Guohai
Gopinathan, Unnikrishnan
Monaghan, David S.
Sheridan, John T.
Permanent link: http://hdl.handle.net/10197/3389
Date: 1-Aug-2007
Abstract: The security of the encryption and verification techniques with significant output images is examined by a known-plaintext attack. We introduce an iterative phase-retrieval algorithm based on multiple intensity measurements to heuristically estimate the phase key in the Fourier domain by several plaintext-cyphertext pairs. We obtain correlation output images with very low error by correlating the estimated key with corresponding random phase masks. Our studies show that the convergence behavior of this algorithm sensitively depends on the starting point. We also demonstrate that this algorithm can be used to attack the double random phase encoding technique.
Funding Details: Science Foundation Ireland
Irish Research Council for Science, Engineering and Technology
Type of material: Journal Article
Publisher: Optical Society of America
Journal: Applied Optics
Volume: 46
Issue: 22
Start page: 5257
End page: 5262
Copyright (published version): 2007 Optical Society of America
Subject LCSH: Data encryption (Computer science)
Fourier transform optics
Optical data processing
DOI: 10.1364/AO.46.005257
Other versions: http://dx.doi.org/10.1364/AO.46.005257
Language: en
Status of Item: Not peer reviewed
Appears in Collections:Electrical and Electronic Engineering Research Collection

Show full item record

SCOPUSTM   
Citations 5

72
Last Week
0
Last month
checked on Oct 19, 2018

Google ScholarTM

Check

Altmetric


This item is available under the Attribution-NonCommercial-NoDerivs 3.0 Ireland. No item may be reproduced for commercial purposes. For other possible restrictions on use please refer to the publisher's URL where this is made available, or to notes contained in the item itself. Other terms may apply.