Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Forgery attack on optical encryption based on computational ghost imaging

Not Accessible

Your library or personal account may give you access

Abstract

Attack techniques on a cryptosystem include not only cryptanalysis, but also forgery and modification of messages, deception and confusion on both sender and receiver sides, and so on. In this Letter, we show that an optical encryption system based on computational ghost imaging (CGI) has security vulnerability owing to its high tolerance for error deviation of ciphertext. It leaves a chance for a forgery attack in which attackers can forge a set of fake keys according to the intercepted ciphertext. If the forged key can be transmitted to the receiver by some disguised means, he/she may be cheated or confused by the retrieved fake images. The discovery of this vulnerability may also help upgrade the CGI-based encryption system.

© 2020 Optical Society of America

Full Article  |  PDF Article
More Like This
Generalized forgery attack to optical encryption systems

Jun Feng, Wei Huang, Shuming Jiao, and Xiaopeng Wang
Opt. Express 29(26) 43580-43597 (2021)

Preventing forgery attacks in computational ghost imaging or disabling ghost imaging in a “spatiotemporal” scattering medium with weighted multiplicative signals

Zhiyuan Ye, Tianyu Huang, Jingyu Pan, Tiantian Zhang, Yi Cui, Hai-Bo Wang, and Jun Xiong
Appl. Opt. 60(5) 1092-1098 (2021)

Optical encryption based on computational ghost imaging

Pere Clemente, Vicente Durán, Víctor Torres-Company, Enrique Tajahuerce, and Jesús Lancis
Opt. Lett. 35(14) 2391-2393 (2010)

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Figures (6)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Equations (8)

You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.