光学对称密码分析学的研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
基于光学理论与方法的数据加密已经有十多年的历史,各种光学加密方法被相继提出。从密码学的观点来看,目前国际上报道的对光学数据加密系统的研究工作主要停留在密码编码学的范畴,很少有人对光学加密系统进行严格的安全性分析。密码学包括密码编码学和密码分析学两方面的内容。因此,对光学加密系统的密码分析学研究,无论是从光学信息安全理论体系的完整性,还是从实际应用来看都是及其重要的。
     作为国家自然科学基金项目(项目号:60472107)、广东省自然科学基金项目(项目号:04300862)、深圳市科技计划项目(项目号:200426)、中国科学院微系统与信息技术研究所开放课题基金项目的重要研究内容之一,本论文系统研究了光学加密系统的密码学特点及其密码学分析方法,着重分析了双随机相位编码及其衍生技术的安全性。论文主要工作包括以下几个方面:
     1)提出一种双随机相位加密系统的“已知明文攻击的方法”。利用该攻击方法,攻击者只需一个明文-密文对,通过常规的双强度相位恢复算法即可获得加密系统空域的随机相位函数密钥,继而轻易推导出频域的随机相位函数密钥,成功破解了这一国际著名的光学加密系统,并完成了该攻击算法的并行硬件实现。
     2)提出一种双随机相位加密系统的“选择明文攻击方法”。通过选择多个冲击函数作为明文,利用冲击函数的筛选性质,成功破解了基于数字方法实现的双随机相位加密系统,并给出了空域和频域密钥的解析式,此方法最大的优点在于解密图像的无损性。
     3)提出一种基于菲涅耳域的双随机相位加密系统的“选择明文攻击方法”。菲涅耳双随机相位加密系统相对于标准的4f双随机相位加密来说,增加了密钥的维数和变换的复杂性,但由于其仍是一个线性系统,因此其安全性不是很高。利用冲击函数的筛选性质,成功获得加密系统的密钥,并且此解密结果是无损的。
     4)提出一种“已知明文攻击的方法”,对基于POCS算法和4f相关器的密码系统进行了安全性分析。在此密码系统中,其解密结果以强度的形式输出,而不是复振幅的形式,而仅由强度输出信息不能轻易获得系统密钥。但由于其解密系统是一个典型的4f线性系统,因此基于POCS算法和4f相关器的安全系统也存在很大的安全隐患。该攻击方法将寻找系统密钥的过程转化为一个双强度相位恢复的问题,仅利用一个明文-密文对就获得了加密系统的密钥。
Optical encryption technique has experienced the development more than ten years. Various kinds of optical encryption schemes have been proposed and implemented during the past decade. However, most of those approaches were focused on the coding schemes of optical cryptographic systems whereas a few involved in the cryptoanalysis. In terms of cryptology it consists of two research aspects: cryptography and cryptoanalysis. To this point, the security analysis of optical encryption systems is not only significant to the integrity of optical information security theory but also critical to the practical applications.
     This dissertation focused on the cryptoanalysis of currently developed optical encryption systems, in particular, on the cryptoanalysis to the double random phase encoding (DPRE) and its variation techniques. The research work is supported by Natural Science Foundation of China (Grant No. 60472107 ), Natural Science Foundation of Guangdong Province (Grant No. 031804), the Science & Technology Bureau of Shenzhen(Grant No. 200426), and Shanghai Institute of Microsystem and information Technology, Chinese Academy of Science. The major contributions in this dissertation are summarized as follows:
     1. A new approach for known-plaintext attack on DPRE is proposed. With this attack an opponent can obtain the phase keys in the input plane by typical phase retrieval algorithms and subsequently deduce the phase keys in the Fourier domain easily. Since the core calculations involved in the phase retrieval method is Fourier transform, it fits very well into the digital signal processor (DSP) architecture with which the processing speed will be greatly improved. The known-plaintext attack method implemented with high performance DSP is presented.
     2. A new approach for chosen-plaintext attack on optical encryption system based on DPRE is demonstrated. With this attack an opponent can access both random phase keys with the help of impulse functions. It is shown that analytical solutions of retrieved keys can be derived in a straightforward way. One of the most prominent advantages of proposed approach is that the decryption process is lossless. Numerical simulations for decryption show a good agreement with theoretical analysis.
     3. A novel method for chosen-plaintext attack on lensless double-random phase encoding (L-DPRE) in the Fresnel domain is presented. Compared with DPRE encryption system, L-DPRE encryption system has lager keyspsace while still remains a linear system, so that security strength of this kind of cryptographic system is doubtful. An opponent would be likely to access two encryption keys with help of selecting the impulse functions as chosen plaintexts. One of the significant features of the proposed attack is that the decryption process is lossless.
     4. The security strength of the cryptosystem based on Projection-Onto -Constraint-Sets(POCS)algorithm and a 4f correlator is carefully examined. The known-plaintext attack based on phase retrieval algorithm is presented. In this specific cryptosystem only intensities can be measured at the output, it would not be easy to get the encryption keys. Nevertheless, the decryption of this cryptosystem can be equivalent to a standard 4f linear system. It is shown that the decryption process can be converted into a phase retrieval problem from two measured intensity information. An attacker is able to break down this cryptosystem with only input phase data and output intensity data. Numerical simulations are also presented to demonstrate the validity of proposed method.
引文
[1] B.Schneier. Applied Cryptography: Protocols, Algorithms, and Source Code in C, John Wiley &Sons Inc., NY, 1996
    [2] W. Stallings. Cryptography and Network Security: Principles and Practice. 2nd Ed., Prentice Hall, NJ, 1999
    [3]冯登国,计算机通信网络安全,北京:清华出版社,2001. 2 ~ 4
    [4]孙圣和,陆哲明,牛夏牧等,数字水印技术及应用,北京:科学出版社, 2004.4~10
    [5]冯登国,我国信息安全技术发展趋势的分析,信息网络安全,2007,1:15~17
    [6]王衍波,薛通,应用密码学,北京:机械工业出版社,2003. 30 ~ 32
    [7]蔡乐才,应用密码学,北京:中国电力出版社,2005. 1~ 5
    [8]章照止,现代密码学基础,北京:北京邮电大学出版社,2004. 1 ~ 3
    [9]杨波,现代密码学,北京:清华大学出版社,2003. 1~ 8
    [10]孙淑玲,应用密码学,北京:清华大学出版社,2004. 9 ~ 30
    [11]胡予濮,张玉清,肖国镇,对称密码学,北京:机械工业出版社,2002. 2 ~ 15
    [12]胡向东,魏琴芳,应用密码学教程,北京:电子工业出版社,2005. 1~10
    [13]冯登国,国内外密码学研究现状及发展趋势,通信学报,2002,23(5):18~26
    [14]沈昌祥,张焕国,冯登国等,信息安全综述,中国科学E辑,2007,37(2):129~150
    [15] W. Diffie, M. Hellman. New Directions in Cryptography,IEEE Transactions on Information Theory,1976,22(6):644~654
    [16] X. Wang, D. Feng, X. Lai, et al. Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD, Cryptology ePrint Archive: Report 2004/199, 2004
    [17] X. Wang, X. Lai, D. Feng, et al. Cryptanalysis of the hash function MD4 and RIPEMD. Advance in Cryptology-Eurocrypt’05, LNCS 3494, Berlin: Springer- Verlag, 2005, 1~18
    [18] X. Wang, H. Yu. How to break MD5 and other hash functions. Advance in Cryptology– Eurocrypt’05, LNCS 3494, Berlin: Springer-Verlag, 2005, 19~35
    [19] X. Wang, H. Yu, Y. Yin. Efficient collision search attacks on SHA-0. Advance in Cryptology–Crypto’05, LNCS 3621, Berlin: Springer-Verlag 2005, 1~16
    [20] X. Wang, Y. Yin Lisa, H. Yu. Finding collisions in the full SHA-1.Advance in Cryptology–Crypto 05, LNCS 3621, Berlin: Springer-Verlag, 2005, 17~36
    [21]王丽娜,张焕国,信息隐藏技术与应用,武汉;武汉大学出版社,2003. 1~12
    [22]钮心忻,信息隐藏与数字水印,北京:北京邮电大学出版社,2004. 117~130
    [23]杨义先,钮心忻,多媒体信息伪装综论,通信学报,2002,23(5):32~38
    [24]易开祥,数字图象加密与数字水印技术研究:[博士学位论文],浙江:浙江大学,2001
    [25] F. Petitcolas, R. J. Anderson, M.G. Kuhn. Information hiding - A survey, Proc. IEEE, 1999, 87(7): 1062~1078
    [26] F. Hartung, M. Kutter. Multimedia Watermarking Techniques, Proc. IEEE, 1999, 87(7): 1079~1107
    [27] F. Hartung, F. Ramme. Digital rights management and watermarking of multimedia content for M-commerce applications, IEEE Communication Magazine, 2000, 38(11): 78~84.
    [28] G.. Langelaar, I. Setyawan, R. Lagendijk. Watermarking digital image and video data. A state-of-the-art overview, IEEE Signal Processing Magazine, 2000,17(5): 20~46
    [29] W. Bender, D. Gruhl, N. Morimoto, et al. Techniques for data hiding, IBM Systems Journal, 1996, 35(3/4): 313~337
    [30] J. Cox , J. Killian, F. Leighton, et al. IEEE Transactions on Image Processing, 1997, 6(12): 1673~1687
    [31] A. Tirkel, G. Rankin, R. Schyndel, et al. Electronic water mark, Proc. DICTA, 1993, 2(2): 666~672
    [32] W. Bender, D. Gruhl, N. Morimoto, et al. Techniques for data hiding, IBM System Journal, 1996, 35(3-4): 313~336
    [33] N. Nikolaidis, I. Pitas. Robust image watermarking in the spatial domain, Signal Processing, 1998, 66(3): 385~403
    [34] J. Brassil, S. Low, N. Maxemchuk, et al. Electronic marking and identification techniques to discourage document copying, Proc. IEEE Infocom, 1994, 3(1): 1278~1287
    [35] J. Brassil, S. Low, N. Maxemchuk, et al. Electronic marking and identification techniques to discourage document copying, IEEE Journal on Selected Areas in Communications, 1995, 13(8): 1495~1504
    [36] M. Barni, F. Bartolini, V. Cappellini, et al. A DCT-domain system for robust image watermarking, Signal Processing, 1998, 66(3): 357~372
    [37] I. Cox, J. Linnartz. Some General Methods for Tampering with Watermarks, IEEE Journal on Selected Areas in Communications, 1998, 16(4): 587~593
    [38] C. Hsu, J. Wu. Hidden digital watermarks in images, IEEE Transactions on Image Processing, 1999, 8(1): 58~68
    [39] C. Podilchuk, W. Zeng. Image-adaptive watermarking using visual models, IEEE Journal on Selected Areas in Communications, 1998, 16(4): 525~539
    [40] M. Swanson, B. Zhu, A. Tewfik. Multiresolution Scene-Based Video Watermarking Using Perceptual Models, IEEE Journal on Selected Areas in Communications, 1998, 16(4): 540~550
    [41]钮心忻,杨义先,基于小波变换的数字水印隐藏与检测算法,计算机学报,2000,23(1):21~27
    [42] J. Ruanaidh, T. Pun. Rotation, scale, and translation invariant spread spectrum digital image watermarking, Signal Processing, 1998, 66(3): 303~317
    [43] C. Lin, M. Wu, J. Bloom, et al. Rotation, scale, and translation resilient watermarking for image, IEEE Transactions on Image Processing, 2001, 10(5): 767~782
    [44] M. Swanson, M. Kobayashi, A.Tewfik. Multimedia data-embedding and watermarking technologies, Proc. IEEE, 1998, 86(6): 1064~1087
    [45] B. Chen, G.. Wornell. Quantization index modulation: A class of provably good methods for digital watermarking and information, IEEE Transactions on Information Theory, 2001, 47(4): 1423~1443
    [46]张春田,苏育停,管晓康,多媒体数字水印技术,通信学报,2000,21(9):46~52
    [47] B. Javidi. Securing information with optical technologies, Physics Today, 1997, 50(3): 27~32
    [48]张鹏,基于信息光学的多维数据加密及数字水印:[博士学位论文],天津:天津大学,2006
    [49] B. Javidi, J. Homer. Optical pattern recognition for validation and security Verification, Optical Engineering, 1994, 33 (6):1752~1756
    [50] B. Javidi, A. Sergent. Fully phase encoded key and biometrics for security verification, Optical Engineering, 1997, 36(3):935~942
    [51] B. Javidi. Optical spatial filtering for image encryption and security system. SPIE, 1997, 3386:14~23.
    [52] B. Javidi, G. Zhang, J. Li. Experimental demonstration of the random phase encoding technique for image encryption and security verification, Optical Engineering,1996, 35(9):2506~2512
    [53] B. Soon, M. Kari, M. Alam. Using the joint transform correlator as the feature extractor for the nearest neighbor classifier. Optical Engineering,1999, 38(1):39~46
    [54] D. Weber, J. Trolinger. Novel implementation of nonlinear joint transform correlators in optical security and validation, Optical Engineering, 1999, 38(1): 62~68
    [55] K. Fielding, J. Horner, C. Makekau. Optical fingerprint identification by binary joint transform correlation, Optical Engineering, 1991, 30(12): 1958~1961
    [56] A. Stoianov, C. Soutar, A. Graham. High-speed fingerprint verification using an optical correlator, Optical Engineering, 1999, 38(1): 99~107
    [57] C. Watson, D. Casasent. Recognition of live-scan fingerprints with elastic distortions using correlation filters, Optical Engineering, 2004, 43(10): 2274~2282
    [58] P. Refregier, B. Javidi. Optical image encryption based on input and Fourier plane random encoding, Optics Letters, 1995, 20(7): 767~769
    [59] B. Javidi, A. Sergent, G. Zhang, et al. Fault tolerance properties of a double phase encoding encryption technique, Optical Engineering, 1997, 36(4): 992~998
    [60] B. Javidi, G. Zhang, J. Li, Encrypted optical memory using double-random phase encoding, Applied Optics, 1997, 36(5): 1054~1058
    [61] F. Goudail, F. Bollaro, B. Javidi, et al. Influence of perturbation in a double phase-encoding system, Journal of the Optical Society of America A, 1998, 15(10): 2629~2638
    [62] B. Javidi, L. Bernard, N. Towghi. Noise performance of double-phase encryption compared to XOR encryption, Optical Engineering, 1999, 38(1): 9~19
    [63] O. Matoba, B. Javidi. Encrypted optical memory system using three dimensional keys in the Fresnel domain, Optics Letters, 1999, 24(11): 762~764
    [64] B. Javidi. Method and apparatus for encryption, U.S. patent, 5903648, 1999-05-11
    [65] B. Javidi. Method and apparatus for encryption, U.S. patent, 6002773, 1999-12-14
    [66] B. Javidi, M. Osamu. Method and apparatus for secure ultrafast communication, U.S. patent, 20020150242, 2002-10-17
    [67] B. Javidi. Method and apparatus for encryption using partial information, U.S. patent, 6519340, 2003-02-11
    [68] B. Javidi, T. Nomura. Securing information by use of digital holography, Optics Letters, 2000, 25(1): 28~30
    [69] B. Wang, C. Sun, W. Su, et al. Shift-Tolerance Property of an Optical Double-Random Phase-Encoding Encryption System, Applied Optics, 2000, 39 (26): 4788~4793
    [70] E. Tajahuerce, O. Matoba, S. Verrall, et al. Optoelectronic information encryption with phase-shifting interferometry, Applied Optics, 2000, 39(14): 2313~2320
    [71] G. Unnikrishnan, J. Joseph, K. Singh. Optical encryption by double-random phase encoding in the fractional Fourier domain, Optics Letters, 2000, 25(12): 887~889
    [72] B. Zhu, S. Liu, Q. Ran. Optical image encryption based on multifractional Fourier transforms, Optics Letters, 2000, 25(16): 1159~1161
    [73]朱邦和,基于分数傅里叶变换的光学安全和模式识别:[博士学位论文],哈尔滨:哈尔滨工业大学,2003
    [74] S. Liu, L. Yu, B. Zhu. Optical image encryption by cascaded fractional Fourier transforms with random phase filtering, Optics Communications, 2001, 187(1-3): 57~63
    [75] G . Situ, J. Zhang. Double random-phase encoding in the Fresnel domain,Optics Letters, 2004, 29(14):1584~1586
    [76] G . Unnikrishnan, K. Singh. Optical encryption using quadratic phase system, Optics Communications, 2001, 193(1-6): 51~67
    [77] Y. Li, K. Kreske, J. Rosen. Security and encryption optical systems based on a correlator with significant output images, Applied Optics, 2000, 39(29):5295~5301
    [78] J. Rosen. Learning in correlators based on projections onto constraint sets,Optics Letters, 1993,18(14): 1183~1185
    [79] R. Wang, I. Watson, C. Chatwin. Random phase encoding for optical security, Optical Engineering, 1996, 35(9):2464~2469
    [80] X. Peng, L. Yu, L. Cai. Double-lock for image encryption with virtual optical wavelength, Optics Express, 2002, 10(1): 41~45
    [81] L. Yu, X. Peng, L. Cai. Parameterized data encryption by digital optics, Optics Communications, 2002, 203(1-2): 67~77
    [82] X. Peng, Z. Cui, T. Tan. Information encryption with virtual-optics imaging system, Optics Communications, 2002, 212(4-6): 235~245
    [83] L. Yu, and L. Cai. Multidimensional data encryption with digital holography, Optics Communications, 2003, 215(4-6): 271~284
    [84]彭翔,张鹏,牛憨笨,基于虚拟类全息的信息隐藏加/解密方法及装置,中国发明专利,200410019056.8,2004-04-20
    [85] X. Peng, P. Zhang, H. Niu. Architecture design of virtual-optics data security using parallel hardware and software, Optik, 2004, 115(1): 15~22
    [86] X. Peng, P. Zhang, X. Li, et al. Implementation of virtual-optics encryption witha DSP scheme, Proc. 1st Mian International Conference on Applied Cryptography and Network Security (ACNS), ICISA Press, 2003: 227~233
    [87] P. Zhang, X. Peng, L. Cai, et al. High-security data encryption system with virtual optics and its implementation with parallel DSP, Proc. SPIE, 2005, 5642 (1): 116~123
    [88]彭翔,张鹏,牛憨笨,虚拟光学信息隐藏理论及并行硬件实现,光学学报,2004,24(5):623~627
    [89]张鹏,彭翔,牛憨笨,一种虚拟光学数据加密的系统实现,电子学报,2004,32(10):1585~1588
    [90] X. Peng, P. Zhang, L. Cai. Information security system based on virtual-optics imaging methodology and public key infrastructure,Optik,2004, 115 (9): 420~426
    [91]张鹏,彭翔,基于公钥的虚拟光学信息安全系统,系统仿真学报,2006,18(1) :176~180
    [92] X. Peng, H. Wei, P. Zhang. Asymmetric cryptography based on wavefront sensing, Optics Letters, 2006, 31(24) : 3579~3581
    [93] X. Peng, P. Zhang. Security of virtual-optics-based cryptosystem, Optik, 2006,117(11): 525~531
    [94] X. Peng, Z. Cui, L. Cai, et al. Digital audio signal encryption with a virtual optics scheme, Optik, 2003, 114(2): 69~75
    [95] O. Matoba, B. Javidi. Encrypted optical storage with angular multiplexing, Applied Optics,1999, 38(35):7288~7293
    [96] G. Situ, J. Zhang. Multiple-image encryption by wavelength multiplexing, Optics Letters, 2005, 30(11):1306~1308
    [97] B. Hennelly, T. Naughton, J. McDonald. Spread-space spread-spectrum technique for secure multiplexing, 2007, 32(9):1060~1062
    [98] S. Zhang, M. Karim. Color image encryption using double random phase encoding, Microwave and Optical Technology Letters, 1999, 21(5):318~323
    [99] L. Chen, D. Zhao. Optical color image encryption by wavelength multiplexing and lensless Fresnel transform holograms, Optics Express, 2004, 14(9): 8552~8560
    [100] M. Madjarova, M. Kakuta, M. Yamaguchi, et al. Optical implementation of the stream cipher based on the irreversible cellular automata algorithm, Optics Letters, 1997, 22(21): 1624~1626
    [101] S. Zhang, M. Karim. High-security optical integrated stream ciphers, Optical Engineering, 1999, 38(1): 20~24
    [102] J. Han, C. Park, D. Ryu, et al. Optical image encryption based on XORoperations, Optical Engineering, 1999, 38(1): 47~54
    [103] T. Sasaki, H. Togo, J. Tanida, et al. Stream cipher based on pseudorandom number generation with optical affine transformation, Applied Optics, 2000, 39 (14): 2340~2346
    [104] E. Johnson, J. rasher. Phase encryption of biometrics diffractive optical elements, Optics Letters,1996,21(16):1271~1273
    [105] P. Mogensen, J. Glückstad. Phase-only optical encryption, Optics Letters, 2000, 25(8): 566~568
    [106] J. Glückstad. Phase contrast image synthesis. Optics Communications,1996, 130: 225~230
    [107] J. Glückstad, H. Toyoda, N. Yoshida. Experimental verification of phase contrast image synthesis system, Proc. SPIE, 1996, 2969: 630~634
    [108] V. Daria, P. Rodrigo,S. Sinzinger, J.Glückstad. Phase-only optical decryption in a planar-integrated micro-optics system, Optical Engineering,2004,43(10): 2223~2227
    [109] L. Chen, D. zhao. Optical image encryption with Hartley transforms, Optics Letters, 2006, 31( 23): 3438~3440
    [110] X. Wang, D. Zhao, F. Jing,et al. Information synthesis (complex amplitude addition and subtraction) and encryption with digital holography and virtual optics, Optics Express, 2006, 14(4): 1476~1486
    [111] X. Meng, L. Cai, X. Xu et al. Two-step phase-shifting interferometry and its application in image encryption, Optics Letters, 2006, 31(10):1414~1416
    [112] T. Vu, N. Kim, C.Nam. Simple phase-only optical decryption with misalignment-free input, Optics Letters, 2007, 32(3):223~225
    [113] C. Cuadrado-Laborde. Time-variant signal encryption by lensless dual random phase encoding applied to fiber optic links, Optics Letters, 2007, 32(19): 2867~2869
    [114] R. Steenblick, M. Hurt. Optical image encryption and decryption process, U.S. patent, 5715316, 1998-02-03
    [115] G. Tomko, A. Stoinaov. Holographic method for encrypting and decrypting information using a fingerprint, U.S. patent, 5740276, 1998-04-14
    [116] D. Jackson. Optical encryption interface, U.S. patent, 5793871, 1998-08-11
    [117] J. Heanue, M. Bashaw, L. Hesselink. Encrypted holographic data storage based on orthogonal phase code multiplexing, U.S. Patent, 5940514, 1999-08-17
    [118] S. Ohtsuka, Image encrypting method and device, image decrypting method and device, and recording medium, U.S. Patent, 6456985,2002-09-24
    [119] J. Moorhouse, M. Bodin, K. Larsen. Optical security system, U.S. patent,6499660, 2002-12-31
    [120] J. Gluckstad. Optical encryption and decryption method and system, U.S. patent, 6907124, 2005-06-14
    [121] B. Javidi, A. Esmail, G. Zhang. Optical security system using fourier plane encoding, U.S. Patent, 7095540,2006-08-22
    [122]张静娟,史祎诗,司徒国海,光学信息隐藏综述,中国科学院研究生院学报,2006,23(3):289~296
    [123] J. Rosen, B. Javidi. Hidden images in halftone pictures, Applied Optics, 2001, 40(20):3346~3353
    [124] S. Kishk, B. Javidi. Information hiding technique with double phase encoding, Applied Optics, 2002, 41(26): 5462~5470
    [125] N. Takai, Y. Mifune. Digital watermarking by a holographic technique, Applied Optics, 2002, 41(5): 865~873
    [126] H. Chang, C. Tsan. Image watermarking by use of digital holography embedded in the discrete-cosine-transform domain, Applied Optics, 2005, 44(29): 6211~6219
    [127] G. Situ, J. Zhang.Image hiding with computer-generated phase codes for optical authentication,Optics Communications,2005,245(1-6):55~65
    [128] H. Chang.Image encryption using separable amplitude-based virtual image and iteratively retrieved phase information,Optical Engineering,2001,40(10):2165~2171
    [129]尉迟亮,顾济华,刘薇等,基于数字全息及离散余弦变换的图像数字水印技术,光学学报,2006,26(3) :355~361
    [130] S. Kishk, B. Javidi. Watermarking of three-dimensional objects by digital holography, Optics Letters, 2003, 28(3): 167~169
    [131] S. Kishk, B. Javidi. 3D object watermarking by a 3D hidden object, Optics Express, 2003, 11(8): 874~888
    [132] H. Kim, Y. Lee. Optimal watermarking of digital hologram of 3-D object, Optics Express, 2005, 13(8): 2881~2886
    [133]彭翔,张鹏,牛憨笨,基于虚拟光学的三维空间数字水印系统,光学学报,2004,24(11) :1507~1510
    [134]彭翔,张鹏,牛憨笨,基于虚拟光学的三维数字水印嵌入/检测方法及装置,中国发明专利, ZL 03130553.9
    [135] X. Peng, P. Zhang, H. Niu. Audio-signal watermarking in 3-D space based on virtual-optics,Optik,2003, 114 (10): 451~456
    [136] P. Zhang, X. Peng. Audio-signal watermarking in 3-D space with a virtual-optics imaging modality, Proc. SPIE, 2005, 6027 (1): 132~139
    [137]张鹏,彭翔,牛憨笨,一种结合随机模板编码的虚拟光学三维数字水印系统,光子学报,2005,34(8):1220~1223
    [138] K. Kim, J.Kim, E.Kim. Multiple information hiding technique using random sequence and Hadamard matrix,Optical Engineering,2001,40(11):2489~2494
    [139] J. Kim, J. Kim, E. Kim. Optodigital implementation of multiple information hiding and extraction system, Optical Engineering,2004,43(1) :113~125
    [140] M. He, L. Cai, Q. Liu, et al. Multiple image encryption and watermarking by random phase matching,Optics Communications, 2005,247(1-3):29~37
    [141] Y. Shi, G. Situ, J. Zhang. Multiple-image hiding in the Fresnel domain, Optics Letters, 2007, 32(13):1914~1916
    [142] X. Meng, L. Cai, X. Yang, et al. Digital color image watermarking based on phase-shifting interferometry and neighboring pixel value subtraction algorithm in the discrete-cosine-transform domain, Applied Optics, 2007, 46(21):4694~4701
    [143]黄清龙,刘建岚,基于光学菲涅耳衍射的“盲数字水印”技术,光学学报,2006,26(8):1145~1149
    [144] O. Okman, G.. Akar. Quantization index modulation-based image watermarking using digital holography, Journal of Optical Society of America A,2007,24(1):243~251
    [145] B. Chen,G. Wornell. Quantization index modulation: a class of provably good methods for digital watermarking and information embedding, IEEE Transactions on Information Theory, 2001, 47(4): 1423~1443.
    [146]彭翔,白伟东,田劲东,半色调编码计算全息图的数字水印方法,光学学报,2007,27(6):1011~1017
    [147] S. Decker, H. Brunk, J. Carr, et al. Watermark holograms, U.S. Patent, 6782115, 2004-08-24
    [148] N. Lofgren, S. Decker, H. Brunk, et al. Digitally watermarking holograms for identity documents, U.S. Patent, 6882737, 2005-04-19
    [149] A. Carnicer, M. Montes-Usategui, S. Arcos, et al. Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys, Optics Letters, 2005,30(13):1644~1646
    [150] U.Gopinathan, D. Monaghan, T. Naughton et al. A known-plaintext heuristic attack on the Fourier plane encryption algorithm, Optics Express, 2006,14(8): 3181~3186
    [151] Y. Frauel, A. Castro, T. Naughton, et al. Resistance of the double random phase encryption against various attacks, Optics Express, 2007,15(16):10253~10265
    [152]彭翔,汤红乔,田劲东,双随机相位编码光学加密系统的唯密文攻击,物理学报,2007,56(5):2629~2936
    [153] G. Situ, U. Gopinathan, D. Monaghan, et al.Cryptanalysis of optical security systems with significant output images, Applied Optics, 2007,46(22):5275~5262
    [154] J. Horner, B. Javidi, eds. Special issue on optical security, Optical Engineering, 1996,35(9): 2451~2547
    [155] J. Horner, B. Javidi, eds. Special issue on optical security, Optical Engineering, 1999,38(1): 8~119
    [156] B. Javidi, eds. Special issue on optics and photonics for homeland security, Optical Engineering, 2004,43(10): 2222~2311
    [157] B. Javidi, ed. Optical and digital techniques for information security, Berlin: Springer,2005
    [158] B. Javidi, ed. Optical Imaging Sensors and Systems for Homeland Security Applications, Berlin: Springer, 2006
    [159] M. He, L. Cai, Q. Liu, et al. Phase-only encryption and watermarking based on phase-shifting interferometry,Applied Optics,2005,44(13):2600~2606
    [160] B. Zhu, S. Liu, Q. Ran. Optical image encryption based on multifractional Fourier transforms, Optics Letters, 2000, 25(16): 1159~1161
    [161] S. Liu, L. Yu, B. Zhu. Optical image encryption by cascaded fractional Fourier transforms with random phase filtering, Optics Communications, 2001, 187(1-3): 57~63
    [162]刘福民,翟宏琛,杨晓苹,基于相息图迭代的随机相位加密,物理学报,2003,52(10):2462~2465
    [163]杨晓苹,翟宏琛,双随机相位加密中相息图的优化设计,物理学报,2005,54(4):1578~1582
    [164]郑光昭,光信息科学与技术应用,北京:电子工业出版社,2002. 25~29
    [165]王仕璠,信息光学理论与应用,北京:北京邮电大学出版社,2003
    [166] F. Yu. Optical Information Processing, NY:John Willey&Sons Inc, 1983
    [167]陈家璧,苏显渝,光学信息技术原理及应用,北京:高等教育出版社,2002.25~65
    [168]宋伟利,盛嘉茂,信息光学基础,北京:中央民族大学出版社,1997
    [169] J. Goodman. Introduction to Fourier Optics, McGraw-Hill, NY,1988
    [170]宋菲君,S. Jutamulia,近代光学信息处理,北京:北京大学出版社,2001. 5~45
    [171]杨振寰著,母国光,羊国光,庄松林译,光学信息处理,天津:南开大学出版社,1986
    [172]钟锡华,光波衍射与变换光学,北京:高等教育出版社,1984
    [173] J.Goodman, R.Lawrence. Digital image formulation from electronically detected holograms, Applied Physics Letters,1967,11(3):77~79
    [174] T. Huang. Digital Holography, Proc. IEEE, 1971,6(159):1335~1346
    [175] U. Schnars, W. Jüptner, Direct recording of holograms by a CCD target and numerical reconstruction, Applied Optics, 1994, 33(2): 179~181
    [176] T. Poon, T. Yatagai, W. Jüptner, Digital holography-coherent optics of the 21st century: introduction, Applied Optics, 2006, 45(5): 821~821
    [177] L.Yaroslavsky, Digital holography: 30 years later, Proc. of SPIE, 2002, 4659(1):1~11
    [178] I. Yamaguchi, T. Zhang. Phase-shifting digital holography, Optics Letters, 1997, 22(16): 1268~1270
    [179] I. Yamaguchi, T. Matsumura, J. Kato, Phase-shifting color digital holography, Optics Letters, 2002,27(13):1108~1110
    [180] L.Cai, Q. Liu, X.Yang. Phase-shift extraction and wave-front reconstruction in phase-shifting interferometry with arbitrary phase steps,Optics Letters, 2003, 28(19): 1808~1810
    [181] E. Tajahuerce, B. Javidi, Encrypting three-dimensional information with digital holography, Applied Optics,2000,39(35):6595~6601
    [182] B. Javidi, E. Tajahuerce. Three-dimensional object recognition by use of digital holography, Optics Letters, 2000, 25(9):610~612
    [183] G.. Unnikrishnan, K. Singh, Double random fractional Fourier-domain encoding for optical security, Optical Engineering, 2000, 39(11): 2853~2859
    [184] H. Ozaktas, D. Mendolovic, Fractional Fourier transforms and their optical implementation: I, Journal of Optical Society of America A, 1993, 10(9): 1875~1881
    [185] H. Ozaktas, D. Mendolovic, Fractional Fourier transforms and their optical implementation: II, Journal of Optical Society of America A, 1993, 10(12): 2522~2531
    [186] T. Nomura, B. Javidi. Optical encryption using a joint transform correlator architecture. Optical Engineering, 2000,39(8):2031~2035
    [187] T. Nomura, Application of Phase-Encoded Joint Transform Correlator to Optical Encryption Decoder, Proc. SPIE,1998, 3466: 246~252
    [188] E.Tajahuerce, O.Matoba, S. Verrall, et al. Optoelectronic information encryption with phase shifting interferometry. Applied Optics, 2000,39(4):2313-2320
    [189] J. Fienup. Phase retrieval algorithms: a comparison, Applied Optics, 1982, 21(15): 2758~2769
    [190] Joseph W. Goodman著,秦克诚等译,傅里叶光学导论:第三版,北京:电子工业出版社,2006.9
    [191] J. Glückstad, P. Mogensen. Optimal phase contrast in common-path interferometry, Applied Optics, 2001, 40(2): 268~282
    [192] P. Mogensen, J. Glückstad. Practical implementation of phaseonly optical encryption system, Proc. SPIE, 2000, 3927: 284~297
    [193]赫尔齐克著,周海宪等译,微光学元件、系统和应用,北京:国防工业出版社,2002.8
    [194] A. Falou, G. Keryer, J. Bougrenet. Optical implementation of segmented composite filtering,Applied Optics, 1999, 38(29): 6129~6135
    [195] R. Sawda, A. Falou, G. Keryer, et al. Image encryption and decryption by means of an optical phase mask , Proceeding of IEEE, ICTTA06 , ISBN: 0-7803-9521-2, 1: 1474~1477
    [196] D. Casasent. Unified synthetic discriminant function computational formulation, Applied Optics, 1984, 23(10): 1620~1627
    [197] B. Vijaya Kumar. Tutorial survey of composite filter designs for optical correlators, Applied Optics, 1992, 31(23): 4773~4801
    [198] G. Lin, H. Chang, W. Lie, et al. Public-key-based optical image cryptosystem based on data embedding techniques, Optical Engineering, 2003, 42(8): 2331~2339
    [199]王彩霞,密码分析中几种方法的研究及其设计与实现:[硕士论文],陕西,西北大学,2004
    [200]冯登国,密码分析学,北京:清华大学出版社,2000.1~2
    [201]冯登国,网络安全与密码学,贵阳:贵州出版社,2004
    [202]冯登国,吴文玲,分组密码的设计与分析,北京:清华大学出版社,2000. 21~62
    [203] Y. Frauel, A.Castro, T. Naughton et al. Security analysis of optical encryption , Proc. SPIE, 2005, 5986(3):25~34
    [204] X. Peng, P. Zhang, H. Wei, et al. Known-plaintext attack on optical encryption based on double random phase keys, Optics Letters ,2006,31(8):1044~1046
    [205] J. Fienup. Reconstruction of an object from the modulus of its Fourier transform, Optics Letters, 1978, 3(1): 27~29
    [206] J. Fienup. Reconstruction of a complex-valued object from the modulus of its Fourier transform using a support constraint, Journal of Optical Society of America A, 1987, 4(1): 118~123
    [207] J. Miao, D. Sayre, H. Chapman. Phase retrieval from the magnitude of the Fourier transforms of nonperiodic objects, Journal of Optical Society of America A, 1998, 15(6): 1662~1669
    [208] J. Miao, T. Ishikawa, E. Anderson. Phase retrieval of diffraction patterns fromnoncrystalline samples using the oversampling method, Physical Review B, 2003, 67(17): 174104-1~174104-9
    [209] H. Faulkner, J. Rodenburg. Movable Aperture lensless Transmission Microscopy: A Novel Phase Retrieval Algorithm, Physical Review Letters, 2004, 93(2): 023903-1~023903-4
    [210] W. Mcbride, N. O’leary, L. Allen. Retrieval of a Complex-Valued Object from its Diffraction Pattern, Physical Review Letters, 2004, 93(23): 233902-1~233902-4
    [211] R. Gerchberg, W. Saxton. A practical algorithm for the determination of phase from image and diffraction plane pictures, Optik, 1972, 35(2): 237~246
    [212]杨国桢,顾本源,光学系统中振幅和相位的恢复问题,物理学报,1981,30(3):410~413
    [213] H. Bauschke, P. Combettes, D. Luke. Hybrid projection-reflection method for phase retrieval, Journal of Optical Society of America A, 2003, 20(6): 1025~1034
    [214] D. Luke. Relaxed Averaged Alternating Reflections for Diffraction Imaging, Inverse Problems, 2005, 21(1):37~50
    [215] V. Elser. Phase retrieval by iterated projections, Journal of Optical Society of America A, 2003, 20(1): 40~55
    [216] V. Elser. Random projections and the optimization of an algorithm for phase retrieval, Journal of Physics A: Mathematical and General, 2003, 36(12): 2995~3007
    [217]于斌,彭翔,田劲东等,硬X射线同轴相衬成像的相位恢复,物理学报,2005,54(5):2034~2037
    [218] H. Bauschke, P. Combettes, D. Luke. Phase retrieval, error reduction algorithm, and Fienup variants: a view from convex optimization, Journal of Optical Society of America A, 2002, 19(7): 1334~1345
    [219]杨国桢,顾本源,用振幅-相位型全息透镜实现光学变换的一般理论,物理学报,1981,30(3):414~417
    [220] G. Yang, L. Wang, B. Dong, et al. On the amplitude phase retrieval problem in an optical system involved nonunitary transformation, Optik, 1987, 75(1): 68~74
    [221] L. Wang, B. Dong, G. Yang. Phase retrieval from two intensity measurements in an optical system involving non-unitary transform, Applied Optics, 1990, 29 (23): 3422~3427
    [222] B. Dong, B. Gu, G. Yang. Algorithm for the recovery of a real signal from its Hartley-transform modulus only, Journal of the Optical Society of America A, 1991, 8(7): 1048~1054
    [223] G. Yang, B. Dong, B. Gu, et al. Gerchberg-Saxton and Yang-Gu algorithms for phase retrieval in a nonunitary transform system: a comparison, Applied Optics, 1994, 33(2): 209~218
    [224] S. Kirkpatrick, C. Gelatt, M. Vecchi. Optimization by simulated annealing, Science, 1983, 220(4598):671~680.
    [225] M. Nieto-Vesperinas, R. Navarro, F. Fuentes. Performance of a simulated-annealing algorithm for phase retrieval, Journal of Optical Society of America A, 1988, 5(1):30~38
    [226] TMS320DM642 Video/Imaging Fixed-Point Digital Signal Processor, Literature Number:SPRS200L, Texas Instruments Inc., USA, 2002
    [227] TMS320C64x/C64x+ DSP CPU and Instruction Set Reference Guide,Literature Number:SPRU732D, Texas Instruments Inc., USA, 2007
    [228] TMS320C6000 DSP Peripherals Overview Reference Guide , Literature Number: SPRU190M, Texas Instruments Inc., USA, 2007
    [229] TMS320DM642 Technical Overview , Literature Number: SPRU615, Texas Instruments Inc., USA, 2002
    [230] TMS320C64x Technical Overview, Literature Number: SPRU395B, Texas Instruments Inc., USA, 2001
    [231] TMS320C64x DSP Two Level Internal Memory Reference Guide, Literature Number:SPRU610C, Texas Instruments Inc., USA, 2006
    [232] TMS320C6000 DSP Cache User's Guide, Literature Number:SPRU656A, Texas Instruments Inc., USA, 2003
    [233] TI. TMS320C6X Optimizing C Compiler, Literature Number: SPRU187C, Texas Instruments, Inc., Texas, USA, 1998
    [234] TI. TMS320C6X C Source Debugger, Literature Number: SPRU188D, Texas Instruments, Inc., Texas, USA, 1998
    [235] TI. TMS320C6X Assembly Language Tools, Literature Number: SPRU186C, Texas Instruments, Inc., Texas, USA, 1998
    [236] TMS320C64x DSP Library Programmer’s Reference, Literature Number: SPRU565A, Texas Instruments Inc., USA, 2002
    [237] Signal Processing Examples Using TMS320C64x Digital Signal Processing Library (DSPLIB), Literature Number:SPRA884A, Texas Instruments Inc., USA, 2003
    [238] TMS320C64x Image/Video Processing Library Programmer’s Reference, Literature Number:SPRU023B, Texas Instruments Inc., USA, 2003
    [239] Image Processing Examples Using the TMS320C64x Image/Video Processing Library (IMGLIB), Literature Number: SPRA887, Texas Instruments Inc., USA,2003
    [240]位恒政,彭翔,张鹏等,双随机相位加密系统的选择明文攻击,光学学报,2007,27(5),824~829
    [241] E. Biham, A. Shamir. Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology, 1991, 4( 1 ): 3~72
    [242] E. Biham, A. Shamir. Differential Cryptanalysis of DES-like cryptosystems. Advances in Cryptology -CRYPTO '90, Springer-Verlag, 1990, 2~21
    [243]彭翔,位恒政,张鹏,基于菲涅耳域的双随机相位编码系统的选择明文攻击,物理学报,2007,56(7):3924~3930
    [244] Xiang Peng, Hengzheng Wei, Peng Zhang. Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain, Optics Letters , 2006, 31 (22): 3261~3263

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700