首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Known-plaintext attack on a joint transform correlator encrypting system   总被引:1,自引:0,他引:1  
We demonstrate in this Letter that a joint transform correlator shows vulnerability to known-plaintext attacks. An unauthorized user, who intercepts both an object and its encrypted version, can obtain the security key code mask. In this contribution, we conduct a hybrid heuristic attack scheme merge to a Gerchberg-Saxton routine to estimate the encrypting key to decode different ciphertexts encrypted with that same key. We also analyze the success of this attack for different pairs of plaintext-ciphertext used to get the encrypting code. We present simulation results for the decrypting procedure to demonstrate the validity of our analysis.  相似文献   

2.
In this paper, a method is proposed for encrypting an optical image onto a phase-only hologram, utilizing a single random phase mask as the private encryption key. The encryption process can be divided into 3 stages. First the source image to be encrypted is scaled in size, and pasted onto an arbitrary position in a larger global image. The remaining areas of the global image that are not occupied by the source image could be filled with randomly generated contents. As such, the global image as a whole is very different from the source image, but at the same time the visual quality of the source image is preserved. Second, a digital Fresnel hologram is generated from the new image, and converted into a phase-only hologram based on bi-directional error diffusion. In the final stage, a fixed random phase mask is added to the phase-only hologram as the private encryption key. In the decryption process, the global image together with the source image it contained, can be reconstructed from the phase-only hologram if it is overlaid with the correct decryption key. The proposed method is highly resistant to different forms of Plain-Text-Attacks, which are commonly used to deduce the encryption key in existing holographic encryption process. In addition, both the encryption and the decryption processes are simple and easy to implement.  相似文献   

3.
A new optical encryption method is proposed in this paper to achieve multiple images encryption. We introduce reference waves with different incident angles and random amplitude masks into a Fourier transform hologram configuration to encrypt multiple images. In the encryption procedure, different random amplitude masks (RAMs) which are placed into the reference arm vertically admit the multiplexing capability. When decrypting one of the original images, reference wave with the same incident angle as encrypting the target image is used to illuminate the encrypted hologram with the insertion of random amplitude mask whose transmissivity is reciprocal of that of the encrypting random amplitude mask in the reference arm. We also simulate and analyze the influence of partly wrong decrypting key on the decrypted results. Numerical simulation proves that the proposed encryption method is valid and of high security level.  相似文献   

4.
We propose a modified encryption joint transform correlator scheme that introduces an additional random phase mask. The positions of both the conventional and the new mask are crucial for successful recovery of the original data. Although the two random phase masks are 2D, variation of their relative distance constitutes an additional dimension. Consequently by including this notion, both random phase masks act as a 3-dimensional (3D) key code increasing thereby the security with respect to the conventional JTC encryption scheme. We employ this scheme to multiplex encrypted data, displacing the encoding masks. During decryption of the multiplexed information, we only reconstruct the object that matches the correct predetermined 3D key code, i.e. that matches the random masks positions in the encryption step. We present actual experimental results, by using BSO crystal as recording medium, as well as their respective analysis.  相似文献   

5.
We propose and demonstrate an encryption-selectable undercover multiplexing. We encrypt and multiplex images for storage by means of a random phase mask common to every image, covered with random amplitude masks different for each image. In order to get a correct decryption of the encoded information, we have to use the appropriate random amplitude mask; otherwise fake information is recovered. We employ a phase conjugation scheme to generate the recovering wavefronts. We analyze and compare the different alternatives and degrees of complexity this combination of masks brings to enhance the security of optical encrypting techniques. We also include an analysis on the advantages and disadvantages this undercover multiplexing protocol offers. We present digital simulations to demonstrate the soundness of the proposal.  相似文献   

6.
There exist several algorithms that deal with text encryption. However, there has been little research carried out to date on encrypting digital images or video files. This paper describes a novel way of encrypting digital images with password protection using 1D SHA-2 algorithm coupled with a compound forward transform. A spatial mask is generated from the frequency domain by taking advantage of the conjugate symmetry of the complex imagery part of the Fourier Transform. This mask is then XORed with the bit stream of the original image. Exclusive OR (XOR), a logical symmetric operation, that yields 0 if both binary pixels are zeros or if both are ones and 1 otherwise. This can be verified simply by modulus (pixel1, pixel2, 2). Finally, confusion is applied based on the displacement of the cipher’s pixels in accordance with a reference mask. Both security and performance aspects of the proposed method are analyzed, which prove that the method is efficient and secure from a cryptographic point of view. One of the merits of such an algorithm is to force a continuous tone payload, a steganographic term, to map onto a balanced bits distribution sequence. This bit balance is needed in certain applications, such as steganography and watermarking, since it is likely to have a balanced perceptibility effect on the cover image when embedding.  相似文献   

7.
The purpose of this research is to develop an undercover multiplexing technique to give additional protection for optical information encryption. We employ the double random phase mask as our basic optical encryption system. The holographic storage medium of choice is a photorefractive crystal. To achieve the multiplexing we use the aperture size of the pupil in the optical system, as it governs the speckle size. We introduce such variation in order to produce a decorrelation between two consecutively stored speckle patterns. Each stored speckle pattern is associated to an input encrypted image, thus producing a multiplexing of the encrypted information. We implement this operation without altering the setup architecture and the random phase masks. This multiplexing is our undercover operation to encipher a true code behind a fake code. Under this approach, the user can only recover the bulk information stored in the volume hologram. However, he cannot recover the true code without the additional information on the pupil size key, even if accessed in position of the original decoding mask.  相似文献   

8.
A random local phase encoding method is presented for encrypting a secret image. Some random polygons are introduced to control the local regions of random phase encoding. The data located in the random polygon is encoded by random phase encoding. The random phase data is the main key in this encryption method. The different random phases calculated by using a monotonous function are employed. The random data defining random polygon serves as an additional key for enhancing the security of the image encryption scheme. Numerical simulations are given for demonstrating the performance of the proposed encryption approach.  相似文献   

9.
Optical security and encryption with totally incoherent light   总被引:3,自引:0,他引:3  
We present a method for securing and encrypting information optically by use of totally incoherent illumination. Encryption is performed with a multichannel optical processor working under natural (both temporal and spatially incoherent) light. In this way, the information that is to be secured can be codified by use of color signals and self-luminous displays. The encryption key is a phase-only mask, providing high security from counterfeiting. Output encrypted information is recorded as an intensity image that can be easily stored and transmitted optically or electrically. Decryption or authentication can also be performed optically or digitally. Experimental results are presented.  相似文献   

10.
A novel optical architecture based on the random iteration algorithm to decode iterated function system (IFS) codes is presented. The optical part of this system performs the affine transformations of IFS. The code values in the affine transformations of IFS are first translated into the modulation voltages of the electro-optic modulators (EOMS), with a specific probability. Then, the multiplication and addition operations can easily be performed. With the O/E and A/D converters, the light intensity is converted into an electrical signal to address a specific pixel at the display device. A fractal image is then progressively decoded pixel by pixel and superimposed on the display device. The computer simulation and some experimental results for the proposed architecture are provided for verification. The decoding speed is fast, the image quality is high, and the resolution of the generated fractals depends on the resolution of the display device itself.  相似文献   

11.
A novel asymmetric single-channel color image encryption using Hartley transform and gyrator transform is proposed. A color image is segregated into R, G, and B channels and then each channel is independently Hartley transformed. The three transformed channels are multiplied and then phase- and amplitude truncated to obtain first encrypted image and first decryption key. The encoded image is modulated with a conjugate of random phase mask. The modulated image is gyrator transformed and then phase- and amplitude truncated to get second encrypted image and second decryption key. The asymmetric (decryption) keys, random phase mask, and transformation angle of gyrator transform serve as main keys. The optoelectronic encryption and decryption systems are suggested. Numerical simulation results have been demonstrated to verify the performance and security of the proposed security system.  相似文献   

12.
A new optical security system is proposed using a shifted phase-encoded joint transform correlation (JTC) architecture. In the proposed technique, at first, the address code is fed into two channels where one channel is shifted by 180°. The output signals from both the channels are phase-masked and then added with the input image to be encrypted. The joint power spectrum (JPS) obtained from one channel is subtracted from the JPS of the other channel, and the modified JPS is inverse Fourier transformed to yield the encrypted image. For decryption, the received signal is Fourier transformed and multiplied by the phase mask and the address code, which is then inverse Fourier transformed to generate the output signal. The proposed technique does not require complex conjugate of the address code otherwise required in the classical double random phase encryption. Also the decryption result is much more enhanced when compared to the output generated by alternate JTC techniques. Computer simulation results verify that the encryption and decryption are very much secure and efficient in both noise-free and noisy conditions.  相似文献   

13.
结合相位恢复和像素行、列循环移动置乱技术, 本文提出了一种基于复振幅场信息复用和RSA算法的非对称多幅图像认证方法, 通过菲涅耳域的相位恢复算法, 依次恢复并生成多幅图像各自所对应的输入平面的复振幅信息, 通过各自的行、列向量随机数对原始二值振幅模板进行行、列循环移动置乱操作来获得每幅图像的采样模板, 认证系统将多个复振幅场信息采样、叠加并空间复用, 同时, 行向量随机数和列向量随机数被RSA算法公钥编码成密文. 系统认证时, 认证方利用自己持有的私钥将密文解码成行向量随机数和列向量随机数, 通过行、列循环移动置乱变换后获得各自的采样模板, 合成的复振幅信息和采样模板等认证信息均放置在各自正确位置, 当认证系统被正确波长的平面波照射时, 在输出平面能获得输出图像, 通过计算、显示输出图像和对应认证图像的非线性相关系数峰值来判断认证是否成功.  相似文献   

14.
窦帅风  雷鸣  沈学举  林超 《应用光学》2016,37(5):693-699
为提高光学图像加密系统的安全性,利用双光楔联合菲涅耳变换相关器和矢量分解设计了一种非线性光学图像加密系统。通过矢量分解将原始图像分解为两个相位模板,其中一个相位模板f1(x)放置于双光楔联合菲涅耳变换相关器物窗口实现图像加密;携带另一相位模板f2(x)信息的光束与解密系统输出的携带f1(x)信息的光束相干叠加得到解密图像。数值模拟了加密系统的加、解密过程,对于灰度图像和二值图像,当光楔楔角为1.8°和相位模板f1(x)与密钥k(x)的中心间距为18 mm时,解密图像与原始图像的相关系数分别为0.812 7和0.810 9;分析了密钥模板相位分布错误对解密效果的影响,验证了加密方法的可行性。模拟分析表明,密钥k(x)的位置和光楔楔角作为附加的密钥参量,有效扩展了加密系统密钥空间,并能抵御唯密文攻击、已知明文攻击和选择明文攻击。  相似文献   

15.
In medical applications, infrared (IR) thermography is used to detect and examine the thermal signature of skin abnormalities by quantitatively analyzing skin temperature in steady state conditions or its evolution over time, captured in an image sequence. However, during the image acquisition period, the involuntary movements of the patient are unavoidable, and such movements will undermine the accuracy of temperature measurement for any particular location on the skin. In this study, a tracking approach using a template-based algorithm is proposed, to follow the involuntary motion of the subject in the IR image sequence. The motion tacking will allow to associate a temperature evolution to each spatial location on the body while the body moves relative to the image frame. The affine transformation model is adopted to estimate the motion parameters of the template image. The Lucas–Kanade algorithm is applied to search for the optimized parameters of the affine transformation. A weighting mask is incorporated into the algorithm to ensure its tracking robustness. To evaluate the feasibility of the tracking approach, two sets of IR image sequences with random in-plane motion were tested in our experiments. A steady-state (no heating or cooling) IR image sequence in which the skin temperature is in equilibrium with the environment was considered first. The thermal recovery IR image sequence, acquired when the skin is recovering from 60-s cooling, was the second case analyzed. By proper selection of the template image along with template update, satisfactory tracking results were obtained for both IR image sequences. The achieved tracking accuracies are promising in terms of satisfying the demands imposed by clinical applications of IR thermography.  相似文献   

16.
孙杰 《光学技术》2017,43(3):279-283
为了扩展双图像光学加密算法的密钥空间,克服双随机相位加密系统中随机相位掩模作为密钥难于存储、传输和重构的问题,突破传统图像加密的研究思路,提出了一种基于多混沌系统的双图像加密算法,构造了光学加密系统。系统增加混沌系统参数作为密钥,利用混沌加密密钥空间大和图像置乱隐藏性好的特点,构建基于Logistic混沌映射的图像置乱算法,利用Kent混沌映射生成的伪随机序列构造出一对随机相位掩模,分别放置在分数傅里叶变换光学装置的两端,图像经加密系统变换后得到密文。数值仿真结果表明,算法的密钥敏感性极高,能够有效地对抗统计攻击,具有较高的安全性。  相似文献   

17.
王晓雷  李智磊  翟宏琛  王明伟 《物理学报》2010,59(10):6994-7001
提出一种基于光学原理的Fourier频率域随机谱隐秘信息加载与增量补偿系统,并给出一种隐秘信息的加载方式,可实现光学图像信息隐藏.宿主图像经过随机相位调制后进行Fourier变换得到频率域的随机谱,在此随机谱上加载隐秘信息,同时,系统对由隐秘信息的加入所产生的影响进行补偿.利用该系统所得到的载体图像未经正确的密钥-随机相位-调制时,隐秘信息将弥散在载体图像的Fourier频率域空间,具有较好的不可检测性.此外,即使攻击者知道隐秘信息的存在甚至知道隐藏方法,但在不知道密钥的情况下,依然无法破解隐秘信息的内容  相似文献   

18.
We introduce the technique to get the undercover multiplexing of a set of encrypted data. We base the general encryption approach on the double-random phase encoding method. We made the encoding phase masks with scaled versions of a master speckle pattern. A fake object is encrypted using a master mask made with the master speckle pattern. Each subsequent object to be hidden is associated to a suitable different scaled version of the original master mask. We apply the term suitable referring to avoid a possible cross-talk in the final decrypted images. All encrypted data are multiplexed to form a single message. This operation enables the true information undercover. We openly send this undercover message along with the master mask. Via separated private channels, we send the information on the actual scaling for each encrypting mask to the authorized users. Unauthorized users attempting to recover the information by using the master mask alone, get the fake object. During decryption of the multiplexed message, we only reconstruct the object that matches the predetermined scaled version of the master mask used to encode it. We show results that confirm our approach.  相似文献   

19.
Zhengjun Liu  Jingmin Dai  Shutian Liu 《Optik》2010,121(19):1748-1751
We propose a single phase encoding scheme for encrypting image by using fractional Fourier transform. Single phase mask is designed in order to be symmetrical about certain direction, which can be used in the process of both encryption and decryption. A conjugate mask is not required in the image decryption process, which is very convenient for the practical application in optics. Moreover, the optical implementation of the image encryption and decryption is given. The implementing structure is composed of lens and spherical mirror. Numerical simulations have demonstrated the validity and security of the encryption algorithm.  相似文献   

20.
In this paper, we have described a simple and secure double random phase encoding and decoding system to encrypt and decrypt a two-dimensional gray scale image. We have used jigsaw transforms of the second random phase mask and the encrypted image. The random phase mask placed in the Fourier plane is broken into independent non-overlapping segments by applying the jigsaw transform. To make the system more secure, a jigsaw transform on the encrypted image is also carried out. The encrypted image is also broken into independent non-overlapping segments. The jigsaw transform indices of random phase code and the encrypted image form the keys for the successful retrieval of the data. Encrypting with this technique makes it almost impossible to retrieve the image without using both the right keys. Results of computer simulation have been presented in support of the proposed idea. Mean square error (MSE) between the decrypted and the original image has also been calculated in support of the technique.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号