Cryptanalysis of optical security systems with significant output images

DSpace/Manakin Repository

Show simple item record

dc.contributor.author Situ, Guohai
dc.contributor.author Gopinathan, Unnikrishnan
dc.contributor.author Monaghan, David S.
dc.contributor.author Sheridan, John T.
dc.date.accessioned 2011-12-08T16:25:47Z
dc.date.available 2011-12-08T16:25:47Z
dc.date.copyright 2007 Optical Society of America en
dc.date.issued 2007-08-01
dc.identifier.citation Applied Optics en
dc.identifier.issn 0003-6935
dc.identifier.issn 1539-4522
dc.identifier.uri http://hdl.handle.net/10197/3389
dc.description.abstract The security of the encryption and verification techniques with significant output images is examined by a known-plaintext attack. We introduce an iterative phase-retrieval algorithm based on multiple intensity measurements to heuristically estimate the phase key in the Fourier domain by several plaintext-cyphertext pairs. We obtain correlation output images with very low error by correlating the estimated key with corresponding random phase masks. Our studies show that the convergence behavior of this algorithm sensitively depends on the starting point. We also demonstrate that this algorithm can be used to attack the double random phase encoding technique. en
dc.description.sponsorship Science Foundation Ireland en
dc.description.sponsorship Irish Research Council for Science, Engineering and Technology en
dc.format.extent 777628 bytes
dc.format.extent 1072 bytes
dc.format.mimetype application/pdf
dc.format.mimetype text/plain
dc.language.iso en en
dc.publisher Optical Society of America en
dc.rights This paper was published in Applied Optics and is made available as an electronic reprint with the permission of OSA. The paper can be found at the following URL on the OSA website: http://www.opticsinfobase.org/abstract.cfm?URI=ao-46-22-5257. Systematic or multiple reproduction or distribution to multiple locations via electronic or other means is prohibited and is subject to penalties under law. en
dc.subject.lcsh Data encryption (Computer science) en
dc.subject.lcsh Fourier transform optics en
dc.subject.lcsh Optical data processing en
dc.title Cryptanalysis of optical security systems with significant output images en
dc.type Journal Article en
dc.internal.availability Full text available en
dc.internal.webversions Publisher's version en
dc.internal.webversions http://dx.doi.org/10.1364/AO.46.005257 en
dc.status Not peer reviewed en
dc.identifier.volume 46 en
dc.identifier.issue 22 en
dc.identifier.startpage 5257 en
dc.identifier.endpage 5262 en
dc.identifier.doi 10.1364/AO.46.005257
dc.neeo.contributor Situ|Guohai|aut| en
dc.neeo.contributor Gopinathan|Unnikrishnan|aut| en
dc.neeo.contributor Monaghan|David S.|aut| en
dc.neeo.contributor Sheridan|John T.|aut| en
dc.description.othersponsorship Enterprise Ireland en
dc.description.admin da, pe, la, sp, ke, ab, is, en -kpw5/12/11 en


Files in this item

This item appears in the following Collection(s)

Show simple item record

This item is available under the Attribution-NonCommercial-NoDerivs 3.0 Ireland. No item may be reproduced for commercial purposes. For other possible restrictions on use please refer to the publisher's URL where this is made available, or to notes contained in the item itself. Other terms may apply.

If you are a publisher or author and have copyright concerns for any item, please email research.repository@ucd.ie and the item will be withdrawn immediately. The author or person responsible for depositing the article will be contacted within one business day.

Search Research Repository


Advanced Search

Browse