Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2015 (2015), Article ID 732609, 12 pages
http://dx.doi.org/10.1155/2015/732609
Research Article

Key Distribution and Changing Key Cryptosystem Based on Phase Retrieval Algorithm and RSA Public-Key Algorithm

1State Key Laboratory of Tunable Laser Technology Research, Institute of Optic-Electronics, Harbin Institute of Technology, Harbin 150001, China
2College of Mathematics, Physics and Information Engineering, Zhejiang Normal University, Jinhua 321004, China
3School of Psychology, Northeast Normal University, Changchun 130024, China

Received 24 May 2015; Revised 15 June 2015; Accepted 18 June 2015

Academic Editor: Payman Jalali

Copyright © 2015 Tieyu Zhao et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Optics Letters, vol. 20, no. 7, pp. 767–769, 1995. View at Publisher · View at Google Scholar · View at Scopus
  2. G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Optics Letters, vol. 25, no. 12, pp. 887–889, 2000. View at Publisher · View at Google Scholar · View at Scopus
  3. G. H. Situ and J. J. Zhang, “Double random-phase encoding in the Fresnel domain,” Optics Letters, vol. 29, no. 14, pp. 1584–1586, 2004. View at Publisher · View at Google Scholar · View at Scopus
  4. R. Tao, Y. Xin, and Y. Wang, “Double image encryption based on random phase encoding in the fractional Fourier domain,” Optics Express, vol. 15, no. 24, pp. 16067–16079, 2007. View at Publisher · View at Google Scholar · View at Scopus
  5. Y. Sheng, Z. Xin, M. S. Alam, L. Xi, and L. Xiao-feng, “Information hiding based on double random-phase encoding and public-key cryptography,” Optics Express, vol. 17, no. 5, pp. 3270–3284, 2009. View at Publisher · View at Google Scholar · View at Scopus
  6. E. Pérez-Cabré, M. J. Cho, and B. Javidi, “Information authentication using photon-counting double-random-phase encrypted images,” Optics Letters, vol. 36, no. 1, pp. 22–24, 2011. View at Publisher · View at Google Scholar · View at Scopus
  7. M. Cho and B. Javidi, “Three-dimensional photon counting double-random-phase encryption,” Optics Letters, vol. 38, no. 17, pp. 3198–3201, 2013. View at Publisher · View at Google Scholar · View at Scopus
  8. W. Qin and X. Peng, “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Optics Letters, vol. 35, no. 2, pp. 118–120, 2010. View at Publisher · View at Google Scholar · View at Scopus
  9. A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys,” Optics Letters, vol. 30, no. 13, pp. 1644–1646, 2005. View at Publisher · View at Google Scholar · View at Scopus
  10. U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, “A known-plaintext heuristic attack on the Fourier plane encryption algorithm,” Optics Express, vol. 14, no. 8, pp. 3181–3186, 2006. View at Publisher · View at Google Scholar · View at Scopus
  11. G. Situ, U. Gopinathan, D. S. Monaghan, and J. T. Sheridan, “Cryptanalysis of optical security systems with significant output images,” Applied Optics, vol. 46, no. 22, pp. 5257–5262, 2007. View at Publisher · View at Google Scholar · View at Scopus
  12. X. Wang and D. Zhao, “Multiple-image encryption based on nonlinear amplitude-truncation and phase-truncation in Fourier domain,” Optics Communications, vol. 284, no. 1, pp. 148–152, 2011. View at Publisher · View at Google Scholar · View at Scopus
  13. X. G. Wang and D. M. Zhao, “Double-image self-encoding and hiding based on phase-truncated Fourier transforms and phase retrieval,” Optics Communications, vol. 284, no. 19, pp. 4441–4445, 2011. View at Publisher · View at Google Scholar · View at Scopus
  14. W. Chen and X. Chen, “Optical color image encryption based on an asymmetric cryptosystem in the Fresnel domain,” Optics Communications, vol. 284, no. 16-17, pp. 3913–3917, 2011. View at Publisher · View at Google Scholar · View at Scopus
  15. W. Chen and X. D. Chen, “Optical asymmetric cryptography using a three-dimensional space-based model,” Journal of Optics, vol. 13, no. 7, Article ID 079601, 2011. View at Publisher · View at Google Scholar
  16. S. K. Rajput and N. K. Nishchal, “Image encryption using polarized light encoding and amplitude and phase truncation in the Fresnel domain,” Applied Optics, vol. 52, no. 18, pp. 4343–4352, 2013. View at Publisher · View at Google Scholar · View at Scopus
  17. S. K. Rajput and N. K. Nishchal, “Image encryption based on interference that uses fractional Fourier domain asymmetric keys,” Applied Optics, vol. 51, no. 10, pp. 1446–1452, 2012. View at Publisher · View at Google Scholar · View at Scopus
  18. I. Mehra, S. K. Rajput, and N. K. Nishchal, “Collision in Fresnel domain asymmetric cryptosystem using phase truncation and authentication verification,” Optical Engineering, vol. 52, Article ID 028202, 6 pages, 2013. View at Google Scholar
  19. I. Mehra and N. K. Nishchal, “Image fusion using wavelet transform and its application to asymmetric cryptosystem and hiding,” Optics Express, vol. 22, no. 5, pp. 5474–5482, 2014. View at Publisher · View at Google Scholar · View at Scopus
  20. X. G. Wang, D. M. Zhao, and Y. X. Chen, “Double-image encryption without information disclosure using phase-truncation Fourier transforms and a random amplitude mask,” Applied Optics, no. 23, pp. 5100–5108, 2014. View at Publisher · View at Google Scholar · View at Scopus
  21. W. Liu, Z. Liu, J. Wu, and S. Liu, “Asymmetric cryptosystem by using modular arithmetic operation based on double random phase encoding,” Optics Communications, vol. 301-302, pp. 56–60, 2013. View at Publisher · View at Google Scholar · View at Scopus
  22. W. Liu, Z. J. Liu, and S. T. Liu, “Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang-Gu algorithm,” Optics Letters, vol. 38, no. 10, pp. 1651–1653, 2013. View at Publisher · View at Google Scholar · View at Scopus
  23. S. K. Rajput and N. K. Nishchal, “Fresnel domain nonlinear optical image encryption scheme based on Gerchberg-Saxton phase-retrieval algorithm,” Applied Optics, vol. 53, no. 3, pp. 418–425, 2014. View at Publisher · View at Google Scholar · View at Scopus
  24. T. Zhao, Q. Ran, L. Yuan, Y. Chi, and J. Ma, “Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography,” Optics and Lasers in Engineering, vol. 72, pp. 12–17, 2015. View at Publisher · View at Google Scholar
  25. W. Q. He, X. F. Meng, and X. Peng, “Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang-Gu algorithm: comment,” Optics Letters, vol. 38, no. 20, p. 4044, 2013. View at Publisher · View at Google Scholar · View at Scopus
  26. C. Zhang, W. He, J. Wu, and X. Peng, “Optical cryptosystem based on phase-truncated Fresnel diffraction and transport of intensity equation,” Optics Express, vol. 23, no. 7, pp. 8845–8854, 2015. View at Publisher · View at Google Scholar
  27. X. G. Wang, W. Chen, and X. D. Chen, “Optical information authentication using compressed double-random-phase-encoded images and quick-response codes,” Optics Express, vol. 23, no. 5, pp. 6239–6253, 2015. View at Publisher · View at Google Scholar
  28. J. J. Cai, X. J. Shen, M. Lei, C. Lin, and S. F. Dou, “Asymmetric optical cryptosystem based on coherent superposition and equal modulus decomposition,” Optics Letters, vol. 40, no. 4, pp. 475–478, 2015. View at Publisher · View at Google Scholar
  29. R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, vol. 21, no. 2, pp. 120–126, 1978. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  30. T. Zhao, Q. Ran, and Y. Chi, “Image encryption based on nonlinear encryption system and public-key cryptography,” Optics Communications, vol. 338, pp. 64–72, 2015. View at Publisher · View at Google Scholar · View at Scopus