• Opto-Electronic Advances
  • Vol. 4, Issue 5, 200016-1 (2021)
Meihua Liao1, Shanshan Zheng2、3, Shuixin Pan1, Dajiang Lu1, Wenqi He1, Guohai Situ2、3、4、*, and Xiang Peng1
Author Affiliations
  • 1Key Laboratory of Optoelectronic Devices and System of Ministry of Education and Guangdong Province, College of Physics and Optoelectronic Engineering, Shenzhen University, Shenzhen 518060, China
  • 2Shanghai Institute of Optics and Fine Mechanics, Chinese Academy of Sciences, Shanghai 201800, China
  • 3Center of Materials Science and Optoelectronics Engineering, University of Chinese Academy of Sciences, Beijing 100049, China
  • 4Hangzhou Institute for Advanced Study, University of Chinese Academy of Sciences, Hangzhou 310000, China
  • show less
    DOI: 10.29026/oea.2021.200016 Cite this Article
    Meihua Liao, Shanshan Zheng, Shuixin Pan, Dajiang Lu, Wenqi He, Guohai Situ, Xiang Peng. Deep-learning-based ciphertext-only attack on optical double random phase encryption[J]. Opto-Electronic Advances, 2021, 4(5): 200016-1 Copy Citation Text show less
    References

    [1] B Javidi, A Carnicer, M Yamaguchi, T Nomura, E Pérez-Cabré et al. Roadmap on optical security. J Opt, 18, 083001(2016).

    [2] A Carnicer, B Javidi. Optical security and authentication using nanoscale and thin-film structures. Adv Opt Photonics, 9, 218(2017).

    [3] P Refregier, B Javidi. Optical image encryption based on input plane and Fourier plane random encoding. Opt Lett, 20, 767-769(1995).

    [4] G Unnikrishnan, J Joseph, K Singh. Optical encryption by double-random phase encoding in the fractional Fourier domain. Opt Lett, 25, 887-889(2000).

    [5] BH Zhu, ST Liu, QW Ran. Optical image encryption based on multifractional Fourier transforms. Opt Lett, 25, 1159-1161(2000).

    [6] GH Situ, JJ Zhang. Double random-phase encoding in the Fresnel domain. Opt Lett, 29, 1584-1586(2004).

    [7] I Mehra, NK Nishchal. Image fusion using wavelet transform and its application to asymmetric cryptosystem and hiding. Opt Express, 22, 5474-5482(2014).

    [8] B Javidi, T Nomura. Securing information by use of digital holography. Opt Lett, 25, 28-30(2000).

    [9] DZ Kong, LC Cao, XJ Shen, H Zhang, GF Jin. Image encryption based on interleaved computer-generated holograms. IEEE Trans Ind Inform, 14, 673-678(2018).

    [10] T Nomura, B Javidi. Optical encryption using a joint transform correlator architecture. Opt Eng, 39, 2031-2035(2000).

    [11] Y Zhang, B Wang. Optical image encryption based on interference. Opt Lett, 33, 2443-2445(2008).

    [12] W Chen, XD Chen, CJR Sheppard. Optical image encryption based on diffractive imaging. Opt Lett, 35, 3817-3819(2010).

    [13] P Clemente, V Durán, V Torres-Company, E Tajahuerce, J Lancis. Optical encryption based on computational ghost imaging. Opt Lett, 35, 2391-2393(2010).

    [14] YS Shi, T Li, YL Wang, QK Gao, SG Zhang et al. Optical image encryption via ptychography. Opt Lett, 38, 1425-1427(2013).

    [15] Applied Cryptography: Protocols, Algorithms, and Source Code in C 2nd ed (Wiley, New York, 1996).

    [16] XC Cheng, LZ Cai, YR Wang, XF Meng, H Zhang et al. Security enhancement of double-random phase encryption by amplitude modulation. Opt Lett, 33, 1575-1577(2008).

    [17] MH Liao, WQ He, DJ Lu, JC Wu, X Peng. Security enhancement of the phase-shifting interferometry-based cryptosystem by independent random phase modulation in each exposure. Opt Lasers Eng, 89, 34-39(2017).

    [18] SK Sahoo, DL Tang, C Dang. Enhancing security of incoherent optical cryptosystem by a simple position-multiplexing technique and ultra-broadband illumination. Sci Rep, 7, 17895(2017).

    [19] X Peng, HZ Wei, P Zhang. Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain. Opt Lett, 31, 3261-3263(2006).

    [20] MH Liao, DJ Lu, WQ He, X Peng. Optical cryptanalysis method using wavefront shaping. IEEE Photonics J, 9, 2200513(2017).

    [21] X Peng, P Zhang, HZ Wei, B Yu. Known-plaintext attack on optical encryption based on double random phase keys. Opt Lett, 31, 1044-1046(2006).

    [22] U Gopinathan, DS Monaghan, TJ Naughton, JT Sheridan. A known-plaintext heuristic attack on the Fourier plane encryption algorithm. Opt Express, 14, 3181-3186(2006).

    [23] X Peng, HQ Tang, JD Tian. Ciphertext-only attack on double random phase encoding optical encryption system. Acta Phys Sin, 56, 2629-2636(2007).

    [24] CG Zhang, MH Liao, WQ He, X Peng. Ciphertext-only attack on a joint transform correlator encryption system. Opt Express, 21, 28523-28530(2013).

    [25] XL Liu, JC Wu, WQ He, MH Liao, CG Zhang et al. Vulnerability to ciphertext-only attack of optical encryption scheme based on double random phase encoding. Opt Express, 23, 18955-18968(2015).

    [26] JR Fienup. Reconstruction of an object from the modulus of its Fourier transform. Opt Lett, 3, 27-29(1978).

    [27] JR Fienup. Phase retrieval algorithms: a comparison. Appl Opt, 21, 2758-2769(1982).

    [28] M Hayes, J Lim, A Oppenheim. Signal reconstruction from phase or magnitude. IEEE Trans Acoust Speech Signal Process, 28, 672-680(1980).

    [29] Proceedings of the 8th IEEE International Conference on Electronics, Circuits and Systems 1403–1406 (IEEE, 2001). https://doi.org/10.1109/ICECS.2001.957477.

    [30] Proceedings of 2006 International Conference on Computational Inteligence for Modelling Control and Automation and International Conference on Intelligent Agents Web Technologies and International Commerce 56–56 (IEEE, 2006). http://doi.org/10.1109/CIMCA.2006.172.

    [31] T Isernia, V Pascazio, R Pierri, G Schirinzi. Image reconstruction from Fourier transform magnitude with applications to synthetic aperture radar imaging. J Opt Soc Am A, 13, 922-934(1996).

    [32] RW Gerchberg, WO Saxton. A practical algorithm for the determination of phase from image and diffraction plane pictures. Optik, 35, 237-246(1972).

    [33] D Griffin, J Lim. Signal estimation from modified short-time Fourier transform. IEEE Trans Acoust Speech Signal Process, 32, 236-243(1984).

    [34] Y Shechtman, YC Eldar, O Cohen, HN Chapman, JW Miao et al. Phase retrieval with application to optical imaging: a contemporary overview. IEEE Signal Process Mag, 32, 87-109(2015).

    [35] MH Liao, WQ He, DJ Lu, X Peng. Ciphertext-only attack on optical cryptosystem with spatially incoherent illumination: from the view of imaging through scattering medium. Sci Rep, 7, 41789(2017).

    [36] MH Liao, DJ Lu, WQ He, X Peng. Speckle-correlation-based ciphertext-only attack on the double random phase encoding scheme. Proc SPIE, 10250, 102502i(2017).

    [37] GW Li, WQ Yang, DY Li, GH Situ. Cyphertext-only attack on the double random-phase encryption: experimental demonstration. Opt Express, 25, 8690-8697(2017).

    [38] G Barbastathis, A Ozcan, GH Situ. On the use of deep learning for computational imaging. Optica, 6, 921-943(2019).

    [39] LW Chen, YM Yin, Y Li, MH Hong. Multifunctional inverse sensing by spatial distribution characterization of scattering photons. Opto-Electron Adv, 2, 190019(2019).

    [40] AV Saetchnikov, EA Tcherniavskaia, VA Saetchnikov, A Ostendorf. Deep-learning powered whispering gallery mode sensor based on multiplexed imaging at fixed frequency. Opto-Electron Adv, 3, 200048(2020).

    [41] US Kamilov, IN Papadopoulos, MH Shoreh, A Goy, C Vonesch et al. Learning approach to optical tomography. Optica, 2, 517-522(2015).

    [42] M Lyu, W Wang, H Wang, HC Wang, GW Li et al. Deep-learning-based ghost imaging. Sci Rep, 7, 17865(2017).

    [43] F Wang, H Wang, HC Wang, GW Li, GH Situ. Learning from simulation: an end-to-end deep-learning approach for computational ghost imaging. Opt Express, 27, 25560-25572(2019).

    [44] HR Zuo, ZY Xu, JL Zhang, G Jia. Visual tracking based on transfer learning of deep salience information. Opto-Electron Adv, 3, 190018(2020).

    [45] Y Rivenson, YB Zhang, H Günaydın, D Teng, A Ozcan. Phase recovery and holographic image reconstruction using deep learning in neural networks. Light Sci Appl, 7, 17141(2018).

    [46] H Wang, M Lyu, GH Situ. eHoloNet: a learning-based end-to-end approach for in-line digital holographic reconstruction. Opt Express, 26, 22603-22614(2018).

    [47] A Sinha, J Lee, S Li, G Barbastathis. Lensless computational imaging through deep learning. Optica, 4, 1117-1125(2017).

    [48] MJ Cherukara, YSG Nashed, RJ Harder. Real-time coherent diffraction inversion using deep generative networks. Sci Rep, 8, 16520(2018).

    [49] F Wang, YM Bian, HC Wang, M Lyu, G Pedrini et al. Phase imaging with an untrained neural network. Light Sci Appl, 9, 77(2020).

    [50] S Li, M Deng, J Lee, A Sinha, G Barbastathis. Imaging through glass diffusers using densely connected convolutional networks. Optica, 5, 803-813(2018).

    [51] YZ Li, YJ Xue, L Tian. Deep speckle correlation: a deep learning approach toward scalable imaging through scattering media. Optica, 5, 1181-1190(2018).

    [52] CA Metzler, F Heide, P Rangarajan, MM Balaji, A Viswanath et al. Deep-inverse correlography: towards real-time high-resolution non-line-of-sight imaging. Optica, 7, 63-71(2020).

    [53] M Lyu, H Wang, GW Li, SS Zheng, GH Situ. Learning-based lensless imaging through optically thick scattering media. Adv Photonics, 1, 036002(2019).

    [54] H Hai, SX Pan, MH Liao, DJ Lu, WQ He et al. Cryptanalysis of random-phase-encoding-based optical cryptosystem via deep learning. Opt Express, 27, 21204-21213(2019).

    [55] LN Zhou, Y Xiao, W Chen. Machine-learning attacks on interference-based optical encryption: experimental demonstration. Opt Express, 27, 26143-26154(2019).

    [56] LN Zhou, Y Xiao, W Chen. Vulnerability to machine learning attacks of optical encryption based on diffractive imaging. Opt Lasers Eng, 125, 105858(2020).

    [57] Y Qin, YH Wan, Q Gong. Learning-based chosen-plaintext attack on diffractive-imaging-based encryption scheme. Opt Lasers Eng, 127, 105979(2020).

    [58] LN Zhou, Y Xiao, W Chen. Learning-based attacks for detecting the vulnerability of computer-generated hologram based optical encryption. Opt Express, 28, 2499-2510(2020).

    [59] Proceedings of the 18th International Conference on Medical Image Computing and Computer-Assisted Intervention 234–241 (Springer, 2015). http://doi.org/10.1007/978-3-319-24574-4_28.

    [60] K Zhang, WM Zuo, YJ Chen, DY Meng, L Zhang. Beyond a Gaussian denoiser: residual learning of deep CNN for image denoising. IEEE Trans Image Process, 26, 3142-3155(2017).

    [61] Y LeCun, L Bottou, Y Bengio, P Haffner. Gradient-based learning applied to document recognition. Proc IEEE, 86, 2278-2324(1998).

    [62]

    [63] arXiv: 1704.03477 (2017).

    Meihua Liao, Shanshan Zheng, Shuixin Pan, Dajiang Lu, Wenqi He, Guohai Situ, Xiang Peng. Deep-learning-based ciphertext-only attack on optical double random phase encryption[J]. Opto-Electronic Advances, 2021, 4(5): 200016-1
    Download Citation