TY - JOUR
T1 - Optical-cryptographic scheme based on an image self-disordering algorithm
AU - Mosso, Edward
N1 - Publisher Copyright:
© 2023 Optica Publishing Group.
PY - 2023/4
Y1 - 2023/4
N2 - This paper demonstrates a novel optical-cryptographic system based on a new image self-disordering algorithm (ISDA). The cryptographic stage is based on an iterative procedure using an ordering sequence from the input data to produce diffusion and confusion keys. Our system uses this approach over plaintext and optical cipher from a 2f-coherent processor working with two random phase masks. Since the keys used for encryption depend on the initial input information, the system is resistant to common attacks such as the chosen-plaintext attack (CPA) and the known-plaintext attack (KPA). In addition, since the ISDA operates the optical cipher, the 2f processor linearity is destroyed, producing an enhanced ciphertext in phase and amplitude, improving optical encryption protection. This new approach offers higher security and efficiency than other reported systems. We perform security analyses and validate the feasibility of this proposal by synthesizing an experimental keystream and performing color image encryption.
AB - This paper demonstrates a novel optical-cryptographic system based on a new image self-disordering algorithm (ISDA). The cryptographic stage is based on an iterative procedure using an ordering sequence from the input data to produce diffusion and confusion keys. Our system uses this approach over plaintext and optical cipher from a 2f-coherent processor working with two random phase masks. Since the keys used for encryption depend on the initial input information, the system is resistant to common attacks such as the chosen-plaintext attack (CPA) and the known-plaintext attack (KPA). In addition, since the ISDA operates the optical cipher, the 2f processor linearity is destroyed, producing an enhanced ciphertext in phase and amplitude, improving optical encryption protection. This new approach offers higher security and efficiency than other reported systems. We perform security analyses and validate the feasibility of this proposal by synthesizing an experimental keystream and performing color image encryption.
UR - https://www.scopus.com/pages/publications/85151793579
U2 - 10.1364/JOSAA.482458
DO - 10.1364/JOSAA.482458
M3 - Article
C2 - 37132972
AN - SCOPUS:85151793579
SN - 1084-7529
VL - 40
SP - C74-C86
JO - Journal of the Optical Society of America A: Optics and Image Science, and Vision
JF - Journal of the Optical Society of America A: Optics and Image Science, and Vision
IS - 4
ER -