• Acta Optica Sinica
  • Vol. 27, Issue 5, 824 (2007)
[in Chinese]1、*, [in Chinese]2, [in Chinese]3, [in Chinese]4, and [in Chinese]4
Author Affiliations
  • 1[in Chinese]
  • 2[in Chinese]
  • 3[in Chinese]
  • 4[in Chinese]
  • show less
    DOI: Cite this Article Set citation alerts
    [in Chinese], [in Chinese], [in Chinese], [in Chinese], [in Chinese]. Chosen-Plaintext Attack on Double Phase Encoding Encryption Technique[J]. Acta Optica Sinica, 2007, 27(5): 824 Copy Citation Text show less
    References

    [1] P. Refregier, B. Javidi. Optical image encryption based on input plane and Fourier plane random encoding[J]. Opt. Lett., 1995, 20(7): 767~769

    [2] Xiang Peng, Lingfeng Yu, Lilong Cai. Double-lock for image encryption with virtual optical wavelength[J]. Opt. Express, 2002, 10(1): 41~45

    [3] Xiang Peng, Zhiyong Cui, Tieniu Tan. Information encryption with virtual-optics imaging system[J]. Opt. Commun., 2002, 212(4~6): 235~245

    [9] Y. Frauel, A. Castro, T. J. Naughton et al.. Security analysis of optical encryption[C]. Proc. SPIE, 2005, 5986: 25~34

    [10] A. Carnicer, M. Montes-Usategui, S. Arcos et al.. Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys[J]. Opt. Lett., 2005, 30(13): 1644~1646

    [11] U. Gopinathan, D. S. Monaghan, T. J. Naughton et al.. A known-plaintext heuristic attack on the Fourier plane encryption algorithm[J]. Opt. Express, 2006, 14(8): 3181~3186

    [12] Xiang Peng, Peng Zhang, Hengzheng Wei et al.. Known-plaintext attack on optical encryption based on double random phase keys[J]. Opt. Lett., 2006, 31(8): 1044~1046

    [13] J. R. Fienup. Phase retrieval algorithms: a comparison[J]. Appl. Opt., 1982, 21(15): 2758~2769

    [14] W. Stallings. Cryptography and Network Security: Principles and Practice[M]. 2nd edition, New Jersey: Prentice Hall, 1999. 24~26

    CLP Journals

    [1] GONG Qiong, WANG Zhipeng, YANG Xingqiang, ZHANG Ping, CUI Mingyue, QIN Yi. An Encryption Method Based on Diffraction Imaging Principle and Phase Mask Removal Method[J]. Opto-Electronic Engineering, 2016, 43(1): 88

    [2] Chen Yixiang, Wang Xiaogang. Image Encryption Based on Iterative Amplitude-Phase Retrieval and Nonlinear Double Random Phase Encoding[J]. Acta Optica Sinica, 2014, 34(8): 810003

    [3] Zhu Zhuqing, Feng Shaotong, Nie Shouping, Sun Min. Complex Valued Encrypted Image Hiding Technology Based on Discrete Cosine Transform[J]. Chinese Journal of Lasers, 2009, 36(1): 177

    [4] LI Jun-chang, GUAN Yi-hong, CAI Guang-cheng, FAN Ze-bin. A Fast Method for Pixel Random Mapping and Application on the Hiding Technology of LSB[J]. Acta Photonica Sinica, 2010, 39(8): 1345

    [5] Pan Wu, Wu Wenwen, Zhang Xuelian. Encryption Algorithm of Virtual Optical Based on Computer-Generated Hologram and Double Random Phase[J]. Chinese Journal of Lasers, 2009, 36(s2): 312

    [6] Xie Qingkun, Jiang Yanru, Zhang Wenfei, Wang Jing, Qu Enshi. Information Encryption Technology Based on Digital Watermarking and Iteration Algorithm[J]. Acta Optica Sinica, 2016, 36(6): 607001

    [7] Shi Yishi, Zhang Jingjuan. Research on the Phase Retrieval Algorithm Used for Multiple-Image Encryption with Region Multiplexing[J]. Acta Optica Sinica, 2009, 29(10): 2705

    [8] Kong Dezhao, Shen Xueju, Zhao Yan, Cao Liangcai, Jin Guofan. Encryption and Display of Three-Dimensional Information Based Computer Generated Hologram and Random Phase Encoding[J]. Laser & Optoelectronics Progress, 2015, 52(10): 100902

    [in Chinese], [in Chinese], [in Chinese], [in Chinese], [in Chinese]. Chosen-Plaintext Attack on Double Phase Encoding Encryption Technique[J]. Acta Optica Sinica, 2007, 27(5): 824
    Download Citation