Optical cryptosystem based on phase-truncated ... - OSA Publishing

0 downloads 0 Views 3MB Size Report
T. Nomura and B. Javidi, “Optical encryption using a joint transform correlator ..... following paragraphs, the TIE method requires computing a finite difference ...
Optical cryptosystem based on phase-truncated Fresnel diffraction and transport of intensity equation Chenggong Zhang, Wenqi He, Jiachen Wu, and Xiang Peng* College of Optoelectronics Engineering, Key Laboratory of Optoelectronic Devices and Systems of Ministry of Education and Guangdong Province, Shenzhen University, Shenzhen 518060, China * [email protected]

Abstract: A novel optical cryptosystem based on phase-truncated Fresnel diffraction (PTFD) and transport of intensity equation (TIE) is proposed. By using the phase truncation technique, a phase-encoded plaintext could be encrypted into a real-valued noise-like intensity distribution by employing a random amplitude mask (RAM) and a random phase mask (RPM), which are regarded as two secret keys. For decryption, a generalized amplitudephase retrieval (GAPR) algorithm combined with the TIE method are proposed to recover the plaintext with the help of two keys. Different from the current phase-truncated-based optical cryptosystems which need record the truncated phase as decryption keys, our scheme do not need the truncated phase because of the introducing of the TIE method. Moreover, the proposed scheme is expected to against existing attacks. A set of numerical simulation results show the feasibility and security of the proposed method. ©2015 Optical Society of America OCIS codes: (060.4785) Optical security and encryption; (070.0070) Fourier optics and signal processing.

References and links 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15.

B. Javidi, “Securing information with optical technologies,” Phys. Today 50(3), 27–32 (1997). P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20(7), 767–769 (1995). T. Nomura and B. Javidi, “Optical encryption using a joint transform correlator architecture,” Opt. Eng. 39(8), 2031–2035 (2000). A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys,” Opt. Lett. 30(13), 1644–1646 (2005). U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, “A known-plaintext heuristic attack on the Fourier plane encryption algorithm,” Opt. Express 14(8), 3181–3186 (2006), doi:10.1364/OE.14.003181. X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett. 31(8), 1044–1046 (2006). Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Opt. Express 15(16), 10253–10265 (2007), doi:10.1364/OE.15.010253. J. F. Barrera, C. Vargas, M. Tebaldi, and R. Torroba, “Chosen-plaintext attack on a joint transform correlator encrypting system,” Opt. Commun. 283(20), 3917–3921 (2010). W. Qin, X. Peng, and X. Meng, “Cryptanalysis of optical encryption schemes based on joint transform correlator architecture,” Opt. Eng. 50(2), 028201(2011). J. F. Barrera, C. Vargas, M. Tebaldi, R. Torroba, and N. Bolognini, “Known-plaintext attack on a joint transform correlator encrypting system,” Opt. Lett. 35(21), 3553–3555 (2010). M. Liao, W. He, X. Peng, X. Liu, and X. Meng, “Cryptanalysis of optical encryption with a reference wave in a joint transform correlator architecture,” Opt. Laser Technol. 45, 763–767 (2013). C. Zhang, M. Liao, W. He, and X. Peng, “Ciphertext-only attack on a joint transform correlator encryption system,” Opt. Express 21(23), 28523–28530 (2013), doi:10.1364/OE.21.028523. W. He, X. Peng, W. Qin, and X. Meng, “The keyed optical Hash function based on cascaded phase-truncated Fourier transforms,” Opt. Commun. 283(11), 2328–2332 (2010). W. Qin and X. Peng, “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35(2), 118–120 (2010). W. Qin, X. Peng, X. Meng, and B. Gao, “Universal and special keys based on phase-truncated Fourier transform,” Opt. Eng. 50(8), 080501(2011).

#233331 - $15.00 USD (C) 2015 OSA

Received 28 Jan 2015; revised 22 Mar 2015; accepted 23 Mar 2015; published 30 Mar 2015 6 Apr 2015 | Vol. 23, No. 7 | DOI:10.1364/OE.23.008845 | OPTICS EXPRESS 8845

16. X. Wang and D. Zhao, “A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Commun. 285(6), 1078–1081 (2012). 17. X. Wang, Y. Chen, C. Dai, and D. Zhao, “Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform,” Appl. Opt. 53(2), 208–213 (2014). 18. W. Liu, Z. Liu, and S. Liu, “Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang-Gu algorithm,” Opt. Lett. 38(10), 1651–1653 (2013). 19. X. Wang and D. Zhao, “Double images encryption method with resistance against the specific attack based on an asymmetric algorithm,” Opt. Express 20(11), 11994–12003 (2012), doi:10.1364/OE.20.011994. 20. W. He, X. Meng, and X. Peng, “Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang-Gu algorithm: comment,” Opt. Lett. 38(20), 4044(2013). 21. W. Chen, B. Javidi, and X. Chen, “Advances in optical security systems,” Adv. Opt. Photon. 6(2), 120–155 (2014). 22. M. Reed Teague, “Deterministic phase retrieval: a Green’s function solution,” J. Opt. Soc. Am. 73(11), 1434– 1441 (1983). 23. L. J. Allen and M. P. Oxley, “Phase retrieval from series of images obtained by defocus variation,” Opt. Commun. 199(1–4), 65–75 (2001). 24. J. W. Goodman, Introduction to Fourier Optics (Roberts & Company, 2005), Chap. 3. 25. C. Zuo, Q. Chen, W. Qu, and A. Asundi, “High-speed transport-of-intensity phase microscopy with an electrically tunable lens,” Opt. Express 21(20), 24060–24075 (2013), doi:10.1364/OE.21.024060. 26. C. Zuo, Q. Chen, Y. Yu, and A. Asundi, “Transport-of-intensity phase imaging using Savitzky-Golay differentiation filter - theory and applications,” Opt. Express 21(5), 5346–5362 (2013), doi:10.1364/OE.21.005346. 27. J. R. Fienup, “Phase retrieval algorithms: a comparison,” Appl. Opt. 21(15), 2758–2769 (1982). 28. J. R. Fienup, “Phase retrieval algorithms: a personal tour [Invited],” Appl. Opt. 52(1), 45–56 (2013).

1. Introduction Optical information security technique has drawn a lot of attention due to its inherent property of parallelism and ultrafast processing speed [1]. Since Refregier and Javidi proposed the double random phase encoding (DRPE) method, which encrypted a plaintext into a complexvalued distribution with a 4-f optical processor in 1995 [2], various optical setups have been introduced to this research realm. In 2000, Nomura and Javidi adopt a joint transform correlator (JTC) architecture to encrypt an image into the joint power spectrum, a real-valued distribution, which is convenient to record and transmit [3]. Moreover, the JTC method does not require accurate optical alignment and an extra complex conjugate of the key as the DRPE demands. However, with development of cryptanalysis, more and more security issues were exposed by researchers. Carnicer et al schemed a chosen-ciphertext attack (CCA) on the DRPE-based systems in 2005 [4]. Soon afterwards, the same system was attacked by knownplaintext attacks (KPAs) [5–7]. Besides, it was also proved that the JTC-based systems have some security risks. Chosen-plaintext attacks (CPAs) were first implemented on these cryptosystems [8, 9] and KPAs were also proved effective [10, 11]. Before long, this system was attacked by COA method based on a hybrid input-output algorithm [12]. To resist the mentioned attacks such as CPAs, KPAs and COA, Qin and Peng proposed an asymmetric cryptosystem based on phase-truncated Fourier transform (PTFT) which use different keys in encryption and decryption process [13–15]. However, it was reported that the PTFT is suffered from known public key attack (KPKA) by a modified amplitude-phase retrieval algorithm [16, 17]. In recent years, scholars proposed modified asymmetric methods [18, 19]; whereas some researchers argued that it is rather a one-time pad than an asymmetric system, since the decryption keys are not independent of the plaintext [20, 21]. In optical encryption methods, phase information plays an important role. For example, RPMs are used as encryption keys in cryptosystems based on DRPE and JTC [2, 3], and truncated phases are used as decryption keys in PTFT-based systems [14, 19]. Therefore, it is vital to record or retrieve the phase information. To our knowledge, there are two kinds of phase retrieval techniques which are widely used in optical cryptography and cryptanalysis: phase-shifting interferometry and iterative phase retrieval algorithm (e.g. Gerchberg-Saxton algorithm, GS). In this paper, we introduce the transport of equation (TIE) method [22, 23], a third type of method to obtain the phase information in our decryption process. As discussed in above paragraph, the PTFT-based systems have a security enhancement due to the nonlinear operator of the phase-truncation. However, it requires recording the truncated phase each time using complicated interferometry in encryption process, and then the truncated #233331 - $15.00 USD (C) 2015 OSA

Received 28 Jan 2015; revised 22 Mar 2015; accepted 23 Mar 2015; published 30 Mar 2015 6 Apr 2015 | Vol. 23, No. 7 | DOI:10.1364/OE.23.008845 | OPTICS EXPRESS 8846

phase are regard as secret keys for decryption. Besides, the security risks would arise if the encryption keys are used as public keys. To avoid its deficiency, we use a phase-truncated Fresnel diffraction (PTFD) optical setup for encryption, but utilize a generalized amplitudephase retrieval (GAPR) algorithm and the TIE method in decryption process, which have no need of the truncated phase. Therefore, rather than generate two truncated phase each time as decryption keys in the PTFT-based systems [14, 19], our method only use two fixed keys which is more convenient in practice. Above all, we proposed an optical cryptosystem based on PTFD and TIE, in which the decryption process is different from the encryption. And this scheme not only enhances the security of the system but also avoids recording truncated phases as the traditional PTFT-based systems do. The rest of this paper is organized as follows. In section 2, we give a theoretical description of the proposed cryptosystem. Section 3 provides simulation results and a discussion. At last, a conclusion is made in section 4. 2. Theoretical description For encryption, a phase-encoded plaintext bonded with a random amplitude mask (RAM) Fresnel diffracts a short distance, then the phase is truncated and its amplitude is recorded by its intensity. Subsequently the resultant amplitude is attached by a random phase mask (RPM), and Fresnel diffracts another distance, then the phase is truncated again and its intensity is recorded as ciphertext. The flow chart of the encryption process is shown in Fig. 1. R1 ( x, y ) and R2 ( x, y ) are two random distributions, which form the RAM (Key 1) and the RPM (Key 2), respectively. The RAM and RPM are regarded as two secret keys.

Fig. 1. The flow chart of the encryption process. PTFD: phase-truncated Fresnel diffraction; E: ciphertext.

To formulate the encryption process, suppose that an image (plaintext) f ( x, y ) is phaseencoded as exp[i 2π f ( x, y )] , which multiply by the first key, RAM R1 ( x, y ) , to form a complex amplitude distribution: u0 ( x, y ) = R1 ( x, y ) ⋅ exp [i 2π f ( x, y )]

(1)

Then the complex amplitude Fresnel diffracts a distance dz1 , which could be formulated by the angular spectrum theory [24]: u1 ( x, y ) = IFT {FT [u0 ( x, y ) ] H1 (qx , q y )}

{

}

(2) = IFT FT [u0 ( x, y ) ] exp ikdz1 1 − (λ qx ) 2 − (λ q y ) 2    Here λ is wavelength, k = 2π / λ and H1 (qx , q y ) is the transfer function. (qx , q y ) are the variables conjugate to ( x, y ) in the Frequency domain. FT and IFT denote Fourier transform and inverse Fourier transform, respectively. CCD records its intensity as: I1 ( x, y ) = u1 ( x, y)

2

(3)

Here  represents the modulus operator. In this record process the phase is truncated after Fresnel diffraction so that we name it as phase-truncated Fresnel diffraction (PTFD). Now we get the intermediate amplitude u1 ( x, y) = I1 ( x, y ) as shown in Fig. 1. Then this

#233331 - $15.00 USD (C) 2015 OSA

Received 28 Jan 2015; revised 22 Mar 2015; accepted 23 Mar 2015; published 30 Mar 2015 6 Apr 2015 | Vol. 23, No. 7 | DOI:10.1364/OE.23.008845 | OPTICS EXPRESS 8847

amplitude is multiplied by the second key, RPM exp[i 2π R2 ( x, y )] . This process could be written as: u2 ( x, y ) = u1 ( x, y) ⋅ exp [i 2π ⋅ R2 ( x, y )]

(4)

Then this complex amplitude Fresnel diffracts another distance dz2 and is recorded by a CCD as ciphertext: E ( x, y ) = u3 ( x, y ) = IFT {FT [u2 ( x, y ) ] H 2 (qx , q y )} 2

2

(5) 2 = IFT FT [u2 ( x, y ) ] exp ikdz2 1 − (λ qx ) 2 − (λ q y ) 2    As described in the encryption process, the proposed method need not record the truncated phase as the PTFT-based cryptosystems do. We have also given a potential optical setup to realize our proposed encryption process. As shown in Fig. 2, SLM1 and SLM2 are amplitudemodulated and phase-modulated space-light modulators, respectively. The 4-f imaging system consisted by Lens1 and Lens2 enables the SLM1 and SLM2 to optically come into contact with each other. The Lens3 and Lens4 play identical role to transmit the complex amplitude on the SLM2 to the imaging plane. An intensity measurement device such as CCD is placed at a distance of dz from the imaging plane to measure the intensity of its corresponding complex amplitude. All the SLMs and CCD are controlled by a personal computer (PC). This optical setup could be used to implement the PTFD in the encryption process. As discussed in following paragraphs, the TIE method requires computing a finite difference which means that the Fresnel diffraction formulated in Eq. (2) only diffracts a very short distance. In other words, the CCD plane must be close to the image plane as shown in Fig. (2). It will be explained detailed in paragraphs following Eq. (14). Here we would like to emphasize that, the TIE method is widely used in the biomedical microscopy and X-ray imaging and its feasibility has been extensively verified by theories and experiments [23, 25, 26].

{

}

Fig. 2. Sketch of optical setup for PTFD. SLM: space-light modulator; PC: personal computer.

To decrypt the ciphertext, as shown in Fig. 3, the ciphertext E ( x, y ) and the RPM (Key 2) are taken as two constraints to retrieve the intermediate amplitude algorithm, and then the amplitude

I1 ( x, y ) using the GAPR

I1 ( x, y ) and the RAM (Key 1) are together to compute

the phase exp[i 2π f ( x, y )] using the TIE method [22, 23]. The following paragraphs will formulate the GAPR and TIE methods in detail.

#233331 - $15.00 USD (C) 2015 OSA

Received 28 Jan 2015; revised 22 Mar 2015; accepted 23 Mar 2015; published 30 Mar 2015 6 Apr 2015 | Vol. 23, No. 7 | DOI:10.1364/OE.23.008845 | OPTICS EXPRESS 8848

Fig. 3. The flow chart of the decryption process. GAPR: generalized amplitude-phase retrieval algorithm; TIE: transport of intensity equation.

The GAPR method that we used to retrieve the intermediate amplitude from two constraints is similar to the GS algorithm [27, 28]. It mainly consists of five steps: (1) generate a random distribution as the initial phase Φ 0 ( x, y ) to initialize an estimation of the complex amplitude G0 ( x, y ) = E ( x, y ) exp[iΦ 0 ( x, y )] in the output plane; (2) inverse Fresnel diffracts the estimation in the output plane; (3) replace the phase of the result in the step (2) with the RPM exp [i 2π ⋅ R2 ( x, y ) ] (Key 2), which is regarded as the phase constraint, to form an estimation of the complex amplitude in the input plane; (4) Fresnel diffracts the result of step (3) leading to another complex amplitude in the output plane; (5) replace the modulus of the result in step (4) with E ( x, y ) , which is regarded as the amplitude constraint, to form an estimation of the complex amplitude in the output plane and it is then taken as the new input of the next iterative loop. The kth iteration process is illustrated in Fig. 4 and the aforementioned steps (2)-(5) are formulated as follows: Gk ( x, y ) = E ( x, y ) exp[iΦ k ( x, y )] g k ( x, y ) = IFD [Gk ( x, y )] = I k′ ( x, y ) exp[iϕk ( x, y )] g k +1 ( x, y ) = I k′ ( x, y ) exp[i 2π ⋅ R2 ( x, y )]

(6)

Gk +1 ( x, y ) = FD [ g k +1 ( x, y ) ] = Gk +1 ( x, y ) exp[iΦ k +1 ( x, y )] In Eq. (6), FD and IFD denote Fresnel diffraction and inverse Fresnel diffraction, respectively.

Fig. 4. The flow chart of the GAPR algorithm. FD and IFD denote Fresnel diffraction and inverse Fresnel diffraction, respectively.

Once obtained the intermediate amplitude

I ′( x, y ) using the aforementioned GAPR

method, we need to retrieve the plaintext using the amplitude I ′( x, y ) and the RAM (Key 1). Generally speaking, iterative phase retrieval algorithm could not guarantee to retrieve the true solution, as the algorithm may converge to a local minimum. Therefore, as reported by J. R. Fienup, it is difficult to retrieve the true phase from two amplitude constraints using an iterative phase retrieval algorithms [26]. However, if the two amplitudes are in close proximity, its phase distribution could be recovered from the finite difference of the two amplitudes’ intensities using the TIE method [22, 23]. Here we give a brief derivation of the TIE formulation. A complex amplitude satisfies approximately the parabolic equation [22]:

#233331 - $15.00 USD (C) 2015 OSA

Received 28 Jan 2015; revised 22 Mar 2015; accepted 23 Mar 2015; published 30 Mar 2015 6 Apr 2015 | Vol. 23, No. 7 | DOI:10.1364/OE.23.008845 | OPTICS EXPRESS 8849

∂ ∇2 + + k )u0 ( x, y ) = 0 ∂z 2k ∂2 ∂2  ∂  ∂ Where k = 2π / λ , ∇ = x + y , ∇ 2 = 2 + 2 and u0 ( x, y ) is such that, ∂x ∂y ∂x ∂y (i

I 0 ( x , y ) = u0 ( x , y )

2

(7)

(8)

u0 ( x, y ) has been defined in Eq. (1) in above paragraphs. So that the complex amplitude may be expressed in terms of the intensity and the phase, u0 ( x, y ) = [ I 0 ( x, y ) ] exp [iϕ ( x, y )] = R1 ( x, y ) ⋅ exp [i 2π f ( x, y ) ] 1/ 2

(9)



Let Eq. (7) be multiplied by u0 ( x, y ) on the left-hand side and the complex conjugate of Eq. (7) be multiplied by u0 ( x, y ) on the left-hand. To subtract the two resulting equations one gets: ∂I 0 ( x, y ) = −∇ ⋅ [ I 0 ( x, y )∇ϕ ( x, y ) ] (10) ∂z Now, we need further introduce an auxiliary function ψ ( x, y ) , which defined as: k

∇ψ ( x, y ) = I 0 ( x, y )∇ϕ ( x, y ) Then Eq. (10) can be rewritten by: ∇ 2ψ ( x, y )= − k

(11)

∂I 0 ( x, y ) ∂z

(12)

According to the Fourier derivative theorem: FT ∂ (xn ) w( x, y )  = i n qxn FT [ w( x, y ) ]

(13)

Here qx is the variable conjugate to x in the Fourier domain. So we get: 

 ∂I 0 ( x, y )    ∂z   

ψ ( x, y ) = IFT ( qx2 + q y2 ) FT  k −1

(14)  The longitude intensity derivative ∂I 0 ( x, y ) ∂z in Eq. (14) along the Fresnel diffraction direction could not be directly measured. Conventionally, it has to make an approximation by a finite difference between two adjacent intensities. In the encryption process, as shown in Fig. 2, we set a very short distance between the image plane and the CCD plane, which ensures that the derivative ∂I 0 ( x, y ) ∂z could be approximated by its finite difference. In decryption process, the derivative is approximated as follows: ∂I 0 ( x, y ) I ′( x, y ) − R1 ( x, y ) ≈ ∂z dz1

2

(15)

I ′( x, y ) is obtained by using GAPR algorithm, R1 ( x, y ) is the Key 1 and dz1 is the diffraction distance that we set in the encryption process. Substitute Eq. (14) into Eq. (11), we get:

{

}

ϕ ( x, y ) = −IFT ( qx2 + q y2 ) FT {∇ ⋅ [∇ψ ( x, y ) I 0 ( x, y ) ]}

#233331 - $15.00 USD (C) 2015 OSA

−1

(16)

Received 28 Jan 2015; revised 22 Mar 2015; accepted 23 Mar 2015; published 30 Mar 2015 6 Apr 2015 | Vol. 23, No. 7 | DOI:10.1364/OE.23.008845 | OPTICS EXPRESS 8850

We noticed that the Eq. (16) has to compute ∇ψ ( x, y ) I 0 ( x, y ) , where 2

I 0 ( x, y ) = R1 ( x, y ) , so we set R1 ( x, y ) ∈ [0.3,1] in the encryption process to avoid the division by zero error. So we obtain the plaintext directly by: f ( x, y ) = ϕ ( x, y ) 2π (17) As depicted in the decryption process, the plaintext could be decrypted from the ciphertext by only using the two secret keys. The truncated phases in encryption process are needless in our cryptosystem. It is an essential difference and advantage of our method compared with the traditional PTFT-based cryptosystems.

3. Simulation results and discussion

The computer simulations are performed under the environment of MATLAB R2013b. To illustrate the performance of our algorithm and the reasonability of the diffraction distances, we calculate the correlation coefficient (CC) values vary with the diffraction distances. As shown in Fig. 5, the horizontal axis is the diffraction distance with the unit of micron ( μm ); the vertical axis is the CC values between the recovered results and the plaintext. The algorithm performance affected by diffraction distances of the TIE is shown in Fig. 5(a), which shows CC values varying with the diffraction distance dz1 from 1 μm to 300 μm . Besides, if we fix the diffraction distance dz1 = 10 μm , after encryption and decryption, the CC values between the decrypted results and the plaintext is shown in the Fig. 5(b). It is clear that there is a down trending for CC values with the increasing of the diffraction distance. The simulation results provide guidance for parameters setting. We would like to point out that in this simulation the secret key R1 ( x, y ) ∈ [0.3, 0.8] , in which the minimum has been explained in the paragraph following the Eq. (16), and the maximum is set to constraint the intensity distribution within a reasonable scope after Fresnel diffraction.

Fig. 5. (a) The CC values between the original plaintext and the recovered results using the TIE method, it declines while the diffraction distance dz1 increases, (b) fix the diffraction distance dz1 = 10μm , the CC values between the original plaintext and the decrypted results

using the MAPR and TIE methods, it also declines while the diffraction distance dz2 increases.

In encryption process, we set parameters as λ = 632.8 nm , dz1 = 0.01 mm and dz2 = 0.02 mm . The proposed method requires that the intermediate result and the ciphertext to be quantized and recorded to high-bit format (16-bit in our method). Otherwise the recovered plaintext will be unrecognizable. In all the simulation experiments, we assume that the pixel sizes of SLMs and the CCD in the proposed optical setup are both 8 μm , and the CCD works in the 16-bit imaging mode. Two images are taken as plaintexts which are shown in Fig. 6(a) (Lena, 512 × 512 pixels) and Fig. 6(d) (Treasure map, 512 × 512 pixels). Based on the PTFD strategy mentioned above, the corresponding ciphertexts obtained according to

#233331 - $15.00 USD (C) 2015 OSA

Received 28 Jan 2015; revised 22 Mar 2015; accepted 23 Mar 2015; published 30 Mar 2015 6 Apr 2015 | Vol. 23, No. 7 | DOI:10.1364/OE.23.008845 | OPTICS EXPRESS 8851

the Eqs. (1)-(5) are shown in Fig. 6(b) and Fig. 6(e) respectively, which look like noise patterns. With the help of the two keys (RAM and RPM), the ciphertexts are decrypted by using the GAPR and TIE methods, which are shown in the Fig. 6 (c) and Fig. 6(f). The CC values between the decrypted images and the original plaintexts are 0.9501 and 0.9936, respectively.

Fig. 6. The simulation results. (a) Original plaintext ‘Lena’, (b) ciphertext corresponding to (a), (c) decrypted result using the GAPR and TIE methods. The CC value between the decrypted image (c) and the plaintext (a) is 0.9501. (d) Original plaintext ‘Treasure map’, (e) ciphertext corresponding to (d), (f) decrypted result using the GAPR and TIE methods. The CC value between the decrypted image (f) and the plaintext (d) is 0.9936.

And the CC is defined as: CC =

 ( A

mn

m

− A)( Bmn − B )

n

(18)  2  2   ( Amn − A)    ( Bmn − B)   m n  m n  Where A and B denote two different two-dimensional distributions, m and n are the indexes of the rows and columns, respectively. Here we would like to emphasize that thanks to introducing of the nonlinear phasetruncated operator, the security level of the proposed cryptosystem can thus get improved compared with other linear cryptosystems. For example, a plenty of optical cryptosystems based on the DRPE with a linear nature have already been proved to be vulnerable to the CCA and CPA [4, 7]. However, the proposed cryptosystem could be immune to these attacks. Meanwhile, referring to the more powerful KPA, the attackers usually adopt the phase retrieval technique to estimate the secret keys based on some prior knowledge, say a plaintext-ciphertext pair [5, 6]. But for our encryption scheme, the attackers use a plaintextciphertext pair cannot deduce the keys because they cannot aware of the RPM which is an essential constraint for a traditional phase retrieval algorithm [25]. As shown in Fig. 7, KPKA

#233331 - $15.00 USD (C) 2015 OSA

Received 28 Jan 2015; revised 22 Mar 2015; accepted 23 Mar 2015; published 30 Mar 2015 6 Apr 2015 | Vol. 23, No. 7 | DOI:10.1364/OE.23.008845 | OPTICS EXPRESS 8852

based on phase retrieval algorithm [16, 17] is also not feasible for our proposed method due to be lack of two secret keys.

Fig. 7. The flow chart of the phase retrieval process. GAPR: generalized amplitude-phase retrieval algorithm. The red parts are not available to the attackers.

To further demonstrate the security of our cryptosystem, suppose an attacker who has intercepted the ciphertext attempts to retrieve the plaintext without the knowledge of the Keys, he might try to decode the ciphertext with arbitrarily selected random keys. Figure 8(a) shows the decrypted result with a fake RPM and a fake RAM. Moreover, our simulation shows that, even if one of the two secret keys is divulged, it is still impossible to deduce the plaintext. Figure 8(b) shows the decrypted result with the true RPM (Key 2) and a fake RAM; Fig. 8(c) shows the decrypted result with a fake RPM and the true RAM (Key 1). Only possessed the true pair of keys, the correct decrypted result could be obtained. The CC values between the plaintext and the decrypted results with fake keys shown in Fig. 8(a)-8(c) are 0.0716, 0.0699 and 0.0718, respectively.

Fig. 8. The decrypted results using fake keys. (a) Decrypted result using a fake RPM and a fake RAM; (b) decrypted result using the true RPM and a fake RAM; (c) decrypted result using a fake RPM and the true RAM.

Moreover, different from the asymmetric cryptography based on PTFT which works with a one-time pad manner (each encryption process will generate a new set of keys used for decryption) [14, 18–21], our cryptosystem based on PTFD use only two fixed keys both in the encryption and decryption processes, this is more convenient in practice. Meanwhile, the PTFT-based methods have to record the truncated phase as decryption keys [14, 19]; by contrast, our decryption process based on the GAPR and TIE methods have no need of the truncated phase and the generated ciphertext is an intensity which could be recorded conveniently by a CCD. 4. Conclusion

In summary, we have proposed a novel optical cryptosystem based on the PTFD and TIE in which the decryption process is different from the encryption. A RAM and a RPM are employed as two secret keys to encrypt the input image into a real-valued noise-like intensity distribution. With the help of two secret keys, the ciphertext could be decrypt with the GAPR and TIE methods. Other than the published PTFT-based encryption methods which have to record the truncated phase as the decryption keys (different from the encryption keys), our method only requires the presence of the two encryption keys in the decryption process, and

#233331 - $15.00 USD (C) 2015 OSA

Received 28 Jan 2015; revised 22 Mar 2015; accepted 23 Mar 2015; published 30 Mar 2015 6 Apr 2015 | Vol. 23, No. 7 | DOI:10.1364/OE.23.008845 | OPTICS EXPRESS 8853

the decrypt plaintext is nearly lossless. Moreover, the generated ciphertext is an intensity which is convenient to record and transmit. Owing to the nonlinear operation of phase truncation as well as the decryption strategy, a higher security level could be achieved. A set of computer simulations are carried out to show the feasibility and security of the proposed method. Acknowledgments

This work is supported by the National Natural Science Foundation of China (61171073 and 61307003), the Sino-German Center for Research Promotion (GZ 760) and China Postdoctoral Science Foundation (2013M540662, 2014T70823).

#233331 - $15.00 USD (C) 2015 OSA

Received 28 Jan 2015; revised 22 Mar 2015; accepted 23 Mar 2015; published 30 Mar 2015 6 Apr 2015 | Vol. 23, No. 7 | DOI:10.1364/OE.23.008845 | OPTICS EXPRESS 8854