Known plaintext attack on double random phase encoding using fingerprint as key and a method for avoiding the attack

We have shown that the application of double random phase encoding (DRPE) to biometrics enables the use of biometrics as cipher keys for binary data encryption. However, DRPE is reported to be vulnerable to known-plaintext attacks (KPAs) using a phase recovery algorithm. In this study, we investigat...

Full description

Saved in:
Bibliographic Details
Published inOptics express Vol. 18; no. 13; pp. 13772 - 13781
Main Authors Tashima, Hideaki, Takeda, Masafumi, Suzuki, Hiroyuki, Obi, Takashi, Yamaguchi, Masahiro, Ohyama, Nagaaki
Format Journal Article
LanguageEnglish
Published United States 21.06.2010
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:We have shown that the application of double random phase encoding (DRPE) to biometrics enables the use of biometrics as cipher keys for binary data encryption. However, DRPE is reported to be vulnerable to known-plaintext attacks (KPAs) using a phase recovery algorithm. In this study, we investigated the vulnerability of DRPE using fingerprints as cipher keys to the KPAs. By means of computational experiments, we estimated the encryption key and restored the fingerprint image using the estimated key. Further, we propose a method for avoiding the KPA on the DRPE that employs the phase retrieval algorithm. The proposed method makes the amplitude component of the encrypted image constant in order to prevent the amplitude component of the encrypted image from being used as a clue for phase retrieval. Computational experiments showed that the proposed method not only avoids revealing the cipher key and the fingerprint but also serves as a sufficiently accurate verification system.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
ISSN:1094-4087
1094-4087
DOI:10.1364/oe.18.013772