约束集投影算法和4f相关器的光学密码系统的已知明文攻击
[1] . Optical image encryption based on input plane and Fourier plane random encoding[J]. Opt. Lett., 1995, 20(7): 767-769.
[2] . Double-lock for image encryption with virtual optical wavelength[J]. Opt. Exp., 2001, 10(1): 41-45.
[3] Xiang Peng, Zhiyong Cui, Tieniu Tan. Information encryption with virtual-optics imaging system[J]. Opt. Commun., 2002, 212(4~6): 235~245
[9] . . Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys[J]. Opt. Lett., 2005, 30(13): 1644-1646.
[10] . . Known-plaintext attack on optical encryption based on double random phase keys[J]. Opt. Lett., 2006, 31(8): 1044-1046.
[11] . Monaghan, Thanas J. Naughton et al.. A known-plaintext heuristic attack on the Fourier plane encryption algorithm[J]. Opt. Exp., 2006, 14(8): 3181-3186.
[12] . Ciphertext-only attack on double random phase encoding optical encryption system[J]. Acta Physica Sinica, 2007, 56(5): 2639-2636.
[13] . Learning in correlators based on projections onto constraint sets[J]. Opt. Lett., 1993, 18(14): 1183-1185.
[14] . Security and encryption optical systems based on a correlator with significant output images[J]. Appl. Opt., 2000, 39(29): 5295-5301.
[15] . Hidden images in halftone pictures[J]. Appl. Opt., 2001, 40(20): 3346-3353.
[16] . . Cryptanalysis of optical security systems with significant output images[J]. Appl. Opt., 2007, 46(22): 5275-5262.
[17] Bruce Schneier. Applied Cryptography and Network Security: Principle, Algorithms, and Source Code in C[M]. New York: John Wiley & Sons Inc., 1996. 5~7
[18] . R. Fienup. Phase retrieval algorithms: a comparison[J]. Appl. Opt., 1982, 21(15): 2758-2769.
位恒政, 彭翔. 约束集投影算法和4f相关器的光学密码系统的已知明文攻击[J]. 光学学报, 2008, 28(3): 429. Wei Hengzheng, Peng Xiang. Known-Plaintext Attack on Optical Cryptosystem Based on Projection-Onto-Constraint-Sets Algorithm and a 4f Correlator[J]. Acta Optica Sinica, 2008, 28(3): 429.