과제정보
This work was supported by the University of Suwon in 2018.
참고문헌
- P. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995). https://doi.org/10.1364/OL.20.000767
- G. Unnikrishnan and K. Singh, "Double random fractional Fourier domain encoding for optical security," Opt. Eng. 39, 2853-2859 (2000). https://doi.org/10.1117/1.1313498
- G. Situ and J. Zhang, "Double random-phase encoding in the Fresnel domain," Opt. Lett. 29, 1584-1586 (2004). https://doi.org/10.1364/OL.29.001584
- Z. Liu, L. Xu, C. Lin, and S. Liu, "Image encryption by encoding with a nonuniform optical beam in gyrator transform domains," Appl. Opt. 49, 5632-5637 (2010). https://doi.org/10.1364/AO.49.005632
- D. C. Weber and J. D. Trolinger, "Novel implementation of nonlinear joint transform correlators in optical security and validation," Opt. Eng. 38, 62-68 (1999) https://doi.org/10.1117/1.602062
- Y. Li, K. Kreske, and J. Rosen, "Security and encryption optical systems based on a correlator with significant output images," Appl. Opt. 39, 5295-5301 (2000). https://doi.org/10.1364/AO.39.005295
- E. Cuche, F. Bevilacqua, and C. Depeursinge, "Digital holography for quantitative phase-contrast imaging," Opt. Lett. 24, 291-293 (1999). https://doi.org/10.1364/OL.24.000291
- J.-W. Han, C.-S. Park, D.-H. Ryu, and E.-S. Kim, "Optical image encryption based on XOR operations," Opt. Eng. 38, 47-54 (1999). https://doi.org/10.1117/1.602060
- S. K. Gil, "Optical CBC block encryption method using free space parallel processing of XOR operations," Korea J. Opt. Photon. 24, 262-270 (2013). https://doi.org/10.3807/KJOP.2013.24.5.262
- B. Javidi and T. Nomura, "Securing information by use of digital holography," Opt. Lett. 25, 28-30 (2000). https://doi.org/10.1364/OL.25.000028
- O. Matoba and B. Javidi, "Optical retrieval of encrypted digital holograms for secure real-time display," Opt. Lett. 27, 321-323 (2002). https://doi.org/10.1364/OL.27.000321
- E. Tajahuerce, O. Matoba, S. C. Verrall, and B. Javidi, "Optoelectronic information encryption with phase-shifting interferometry," Appl. Opt. 39, 2313-2320 (2000). https://doi.org/10.1364/AO.39.002313
- L.-Z Cai, M.-Z He, Q. Liu, and X.-L Yang, "Digital image encryption and watermarking by phase-shifting interferometry," Appl. Opt. 43, 3078-3084 (2004). https://doi.org/10.1364/AO.43.003078
- X. F. Meng, L. Z. Cai, X. L. Yang, X. X. Shen, and G. Y. Dong, and Y. R. Wang, "Two-step phase-shifting interferometry and its application in image encryption," Opt. Lett. 31, 1414-1416 (2006). https://doi.org/10.1364/OL.31.001414
- X. Peng, H. Wei, and P. Zhang, "Asymmetric cryptography based on wave front sensing," Opt. Lett. 31, 3579-3581 (2006). https://doi.org/10.1364/OL.31.003579
- W. Liu, Z. Liu, and S. Liu, "Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang-Gu algorithm," Opt. Lett. 38, 1651-1653 (2013). https://doi.org/10.1364/OL.38.001651
- Y. Xiong, A. He, and C. Quan, "Security analysis of a double-image encryption technique based on an asymmetric algorithm," J. Opt. Soc. Am. A 35, 320-326 (2018). https://doi.org/10.1364/josaa.35.000320
- G. Luan, A. Li, D. Zhang, and D. Wang, "Asymmetric image encryption and authentication based on equal modulus decomposition in the Fresnel transform domain," IEEE Photon. J. 11, 1-7 (2019).
- D. Fan, X. Meng, Y. Wang, X. Yang, X. Peng, W. He, G. Dong, and H. Chen, "Asymmetric cryptosystem and software design based on two-step phase-shifting interferometry and elliptic curve algorithm," Opt. Commun. 309, 50-56 (2013). https://doi.org/10.1016/j.optcom.2013.06.044
- D. Fan, X. Meng, Y. Wang, X. Yang, X. Peng, W. He, G. Dong, and H. Chen, "Optical identity authentication scheme based on elliptic curve digital signature algorithm and phase retrieval algorithm," Appl. Opt. 52, 5645-5652 (2013). https://doi.org/10.1364/AO.52.005645
- S. K. Rajput and N. K. Nishchal, "An optical encryption and authentication scheme using asymmetric keys," J. Opt. Soc. Am. A 31, 1233-1238 (2014). https://doi.org/10.1364/JOSAA.31.001233
- X. Peng, P. Zhang, H. Wei, and B. Yu, "Known-plaintext attack on optical encryption based on double random phase keys," Opt. Lett. 31, 1044-1046 (2006) https://doi.org/10.1364/OL.31.001044
- S. K. Rajput and N. K. Nishchal, "Known-plaintext attack on encryption domain independent optical asymmetric cryptosystem," Opt. Commun. 309, 231-235 (2013). https://doi.org/10.1016/j.optcom.2013.06.036
- U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, "A known-plaintext heuristic attack on the Fourier plane encryption algorithm," Opt. Express 14, 3181-3186 (2006). https://doi.org/10.1364/OE.14.003181
- K. Nakano, M. Takeda, H. Suzuki, and M. Yamaguchi, "Security analysis of phase-only DRPE based on knownplaintext attack using multiple known plaintext-ciphertext pairs," Appl. Opt. 53, 6435-6443 (2014). https://doi.org/10.1364/AO.53.006435
- A. Carnicer, M. Montres-Usategui, S. Arcos, and I. Juvells, "Vulnerability to chosen-ciphertext attacks of optical encryption schemes based on double random phase keys," Opt. Lett. 30, 1644-1646 (2005). https://doi.org/10.1364/OL.30.001644
- X. Peng, H. Wei, and P. Zhang, "Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain," Opt. Lett. 31, 3261-3263 (2006). https://doi.org/10.1364/OL.31.003261
- L. Wang, Q. Wu, and G. Situ, "Chosen-plaintext attack on the double random polarization encryption," Opt. Express 27, 32158-32167 (2019). https://doi.org/10.1364/OE.27.032158
- Digital Signature Standard (DSS), Federal Information processing Standards Publication 186-4, National Institute of Standards and Technology, USA, July 2013.
- S. K. Gil, "2-step quadrature phase-shifting digital holographic optical encryption using orthogonal polarization and error analysis," J. Opt. Soc. Korea 16, 354-364 (2012). https://doi.org/10.3807/JOSK.2012.16.4.354