Acta Optica Sinica, Volume. 28, Issue 3, 429(2008)
Known-Plaintext Attack on Optical Cryptosystem Based on Projection-Onto-Constraint-Sets Algorithm and a 4f Correlator
[1] [1] Philippe Refregier, Bahram Javidi. Optical image encryption based on input plane and Fourier plane random encoding[J]. Opt. Lett., 1995, 20(7): 767~769
[2] [2] Xiang Peng, Lingfeng Yu, Lilong Cai. Double-lock for image encryption with virtual optical wavelength[J]. Opt. Exp., 2001, 10(1): 41~45
[3] [3] Xiang Peng, Zhiyong Cui, Tieniu Tan. Information encryption with virtual-optics imaging system[J]. Opt. Commun., 2002, 212(4~6): 235~245
[9] [9] Arturo Carnicer, Mario Montes-Usategui, Sergio Arcos et al.. Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys[J]. Opt. Lett., 2005, 30(13): 1644~1646
[10] [10] Xiang Peng, Peng Zhang, Hengzheng Wei et al.. Known-plaintext attack on optical encryption based on double random phase keys[J]. Opt. Lett., 2006, 31(8): 1044~1046
[11] [11] Unnikrishnan Gopinathan, David S. Monaghan, Thanas J. Naughton et al.. A known-plaintext heuristic attack on the Fourier plane encryption algorithm[J]. Opt. Exp., 2006, 14(8): 3181~3186
[13] [13] Joseph Rosen. Learning in correlators based on projections onto constraint sets[J]. Opt. Lett., 1993, 18(14): 1183~1185
[14] [14] Youzhi Li, Kathi Kreske, Joseph Rosen. Security and encryption optical systems based on a correlator with significant output images[J]. Appl. Opt., 2000, 39(29): 5295~5301
[15] [15] Joseph Rosen, Bahram Javidi. Hidden images in halftone pictures[J]. Appl. Opt., 2001, 40(20): 3346~3353
[16] [16] Guohai Situ, Unnikrishnan Gopinathan, David Monaghan et al.. Cryptanalysis of optical security systems with significant output images[J]. Appl. Opt., 2007, 46(22): 5275~5262
[17] [17] Bruce Schneier. Applied Cryptography and Network Security: Principle, Algorithms, and Source Code in C[M]. New York: John Wiley & Sons Inc., 1996. 5~7
Get Citation
Copy Citation Text
Wei Hengzheng, Peng Xiang. Known-Plaintext Attack on Optical Cryptosystem Based on Projection-Onto-Constraint-Sets Algorithm and a 4f Correlator[J]. Acta Optica Sinica, 2008, 28(3): 429