4.6 Article

Learning-based attacks for detecting the vulnerability of computer-generated hologram based optical encryption

Journal

OPTICS EXPRESS
Volume 28, Issue 2, Pages 2499-2510

Publisher

Optica Publishing Group
DOI: 10.1364/OE.380004

Keywords

-

Categories

Funding

  1. National Natural Science Foundation of China [61605165]
  2. Hong Kong Research Grants Council, University Grants Committee [25201416]
  3. Shenzhen Science and Technology Innovation Commission [JCYJ20160531184426473]
  4. Hong Kong Polytechnic University [4-BCDY, G-YBVU]

Ask authors/readers for more resources

Optical encryption has attracted wide attention for its remarkable characteristics. Inspired by the development of double random phase encoding, many researchers have developed a number of optical encryption systems for practical applications. It has also been found that computer-generated hologram (CGH) is highly promising for optical encryption, and the CGH-based optical encryption possesses remarkable advantages of simplicity and high feasibility for practical implementations. An input image, i.e., plaintext, can be iteratively or non-iteratively encoded into one or several phase-only masks via phase retrieval algorithms. Without security keys, it is impossible for unauthorized receivers to correctly extract the input image from ciphertext. However, cryptoanalysis of CGH-based optical encryption systems has not been effectively carried out before, and it is also concerned whether CGH-based optical encryption is sufficiently secure for practical applications. In this paper, learning-based attack is proposed to demonstrate the vulnerability of CGH-based optical security system without the direct retrieval of optical encryption keys for the first time to our knowledge. Many pairs of the extracted CGH patterns and their corresponding input images (i.e., ciphertext-plaintext pairs) are used to train a designed learning model. After training, it is straightforward to directly retrieve unknown plaintexts from the given ciphertexts (i.e., phase-only masks) by using the trained learning model without subsidiary conditions. Moreover, the proposed learning-based attacks are also feasible and effective for the cryptoanalysis of CGH-based optical security systems with multiple cascaded phase-only masks. The proposed learning-based attacking method paves the way for the cryptoanalysis of CGH-based optical encryption. (C) 2020 Optical Society of America under the terms of the OSA Open Access Publishing Agreement

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available