• Acta Optica Sinica
  • Vol. 28, Issue 3, 429 (2008)
Wei Hengzheng1、2、* and Peng Xiang1、2
Author Affiliations
  • 1[in Chinese]
  • 2[in Chinese]
  • show less
    DOI: Cite this Article Set citation alerts
    Wei Hengzheng, Peng Xiang. Known-Plaintext Attack on Optical Cryptosystem Based on Projection-Onto-Constraint-Sets Algorithm and a 4f Correlator[J]. Acta Optica Sinica, 2008, 28(3): 429 Copy Citation Text show less
    References

    [1] Philippe Refregier, Bahram Javidi. Optical image encryption based on input plane and Fourier plane random encoding[J]. Opt. Lett., 1995, 20(7): 767~769

    [2] Xiang Peng, Lingfeng Yu, Lilong Cai. Double-lock for image encryption with virtual optical wavelength[J]. Opt. Exp., 2001, 10(1): 41~45

    [3] Xiang Peng, Zhiyong Cui, Tieniu Tan. Information encryption with virtual-optics imaging system[J]. Opt. Commun., 2002, 212(4~6): 235~245

    [9] Arturo Carnicer, Mario Montes-Usategui, Sergio Arcos et al.. Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys[J]. Opt. Lett., 2005, 30(13): 1644~1646

    [10] Xiang Peng, Peng Zhang, Hengzheng Wei et al.. Known-plaintext attack on optical encryption based on double random phase keys[J]. Opt. Lett., 2006, 31(8): 1044~1046

    [11] Unnikrishnan Gopinathan, David S. Monaghan, Thanas J. Naughton et al.. A known-plaintext heuristic attack on the Fourier plane encryption algorithm[J]. Opt. Exp., 2006, 14(8): 3181~3186

    [13] Joseph Rosen. Learning in correlators based on projections onto constraint sets[J]. Opt. Lett., 1993, 18(14): 1183~1185

    [14] Youzhi Li, Kathi Kreske, Joseph Rosen. Security and encryption optical systems based on a correlator with significant output images[J]. Appl. Opt., 2000, 39(29): 5295~5301

    [15] Joseph Rosen, Bahram Javidi. Hidden images in halftone pictures[J]. Appl. Opt., 2001, 40(20): 3346~3353

    [16] Guohai Situ, Unnikrishnan Gopinathan, David Monaghan et al.. Cryptanalysis of optical security systems with significant output images[J]. Appl. Opt., 2007, 46(22): 5275~5262

    [17] Bruce Schneier. Applied Cryptography and Network Security: Principle, Algorithms, and Source Code in C[M]. New York: John Wiley & Sons Inc., 1996. 5~7

    CLP Journals

    [1] Lin Chao, Shen Xueju, Lei Ming, Dou Shuaifeng, Zou Xiao. Optical Security Validation Based on Orthogonal Polarization Multiplexing in Three-Dimensional Space[J]. Acta Optica Sinica, 2016, 36(3): 307001

    [2] Kong Dezhao, Shen Xueju, Zhao Yan, Cao Liangcai, Jin Guofan. Encryption and Display of Three-Dimensional Information Based Computer Generated Hologram and Random Phase Encoding[J]. Laser & Optoelectronics Progress, 2015, 52(10): 100902

    Wei Hengzheng, Peng Xiang. Known-Plaintext Attack on Optical Cryptosystem Based on Projection-Onto-Constraint-Sets Algorithm and a 4f Correlator[J]. Acta Optica Sinica, 2008, 28(3): 429
    Download Citation