Skip to main content
Entropy logoLink to Entropy
. 2020 Nov 30;22(12):1354. doi: 10.3390/e22121354

Modified Gerchberg–Saxton (G-S) Algorithm and Its Application

Tieyu Zhao 1,*, Yingying Chi 1
PMCID: PMC7760810  PMID: 33266143

Abstract

The Gerchberg–Saxton (G-S) algorithm is a phase retrieval algorithm that is widely used in beam shaping and optical information processing. However, the G-S algorithm has difficulty obtaining the exact solution after iterating, and an approximate solution is often obtained. In this paper, we propose a series of modified G-S algorithms based on the Fresnel transform domain, including the single-phase retrieval (SPR) algorithm, the double-phase retrieval (DPR) algorithm, and the multiple-phase retrieval (MPR) algorithm. The analysis results show that the convergence of the SPR algorithm is better than that of the G-S algorithm, but the exact solution is not obtained. The DPR and MPR algorithms have good convergence and can obtain exact solutions; that is, the information is recovered losslessly. We discuss the security advantages and verification reliability of the proposed algorithms in image encryption. A multiple-image encryption scheme is proposed, in which n plaintexts can be recovered from n ciphertexts, which greatly improves the efficiency of the system. Finally, the proposed algorithms are compared with the current phase retrieval algorithms, and future applications are discussed. We hope that our research can provide new ideas for the application of the G-S algorithm.

Keywords: G-S algorithm, single-phase retrieval algorithm, double-phase retrieval algorithm, multiple-phase retrieval algorithm, image encryption

1. Introduction

Phase retrieval was first proposed to solve the imaging problem of an electron microscope. Gerchberg and Saxton addressed the issue of the wavefront phase of the light field via numerical iteration using the intensity of the image plane and the diffraction plane [1,2]. Since the successful solution of this problem, phase retrieval has aroused significant research interest and has been extended to many engineering fields, such as X-ray imaging, astronomical imaging, adaptive optics, and binary optical design [3,4,5,6,7,8,9]. Gerchberg and Saxton first proposed a numerical algorithm in 1972, known as the G-S algorithm [2]. The G-S algorithm has groundbreaking significance in addition to a number of shortcomings. Some of these shortcomings are inherent to the solution of inverse problems. For example, the Fourier transform amplitude of a function to a function is a many-to-one mapping, and finding a function from the Fourier transform amplitude will inevitably have multiple solutions. The other issue arises from the algorithm itself. For example, after the first few iterations, the convergence speed of the G-S algorithm slows down or even stagnates. Two important improvements to the G-S algorithm were made by Misell and Fienup. In 1973, Misell proposed that iterating between two images with different levels of defocus can improve the accuracy and convergence of the algorithm [10]. Misell’s algorithm is more practical, and provides a reference for the improvement of the G-S algorithm. In 1982, Fienup noted that G-S is an error descent algorithm, and its essence is the same as the fastest descent algorithm [11]. To solve the problem of stagnation of the G-S algorithm, Fienup proposed a hybrid input-output (HIO) algorithm based on nonlinear control. The HIO algorithm effectively improves the convergence effect and is widely used.

Due to the correlation of image pixels, the G-S algorithm can obtain a clear target image, and is thus widely used in image encryption. In 1996, Johnson et al. proposed a new optical image encryption scheme, which encrypts a plaintext image into two phases [12]. In the same year, Wang et al. used the G-S algorithm to encrypt a plaintext image into the phase of the Fourier spectrum [13]. In addition, Zalevsky et al. extended the G-S algorithm to the fractional Fourier transform domain, which further promoted the application of the algorithm [14]. Image encryption schemes based on the phase retrieval algorithm are generally implemented with the help of a photoelectric hybrid system so that both the optical system and the computer can be used in the recovery process of the plaintext [15,16,17,18,19,20,21]. Some multiple-image encryption schemes have been proposed to greatly improve the efficiency of the system [22,23]. Moreover, the G-S algorithm has been expanded to three-dimensional space with greater flexibility, which can achieve image encryption and identity verification to ensure security [24,25,26]. These developments mainly involve the application of the G-S algorithm in symmetric cryptosystems; however, it is also widely used in key distribution [27] and asymmetric cryptosystems [28,29,30,31]. In an asymmetric cryptosystem, the encryption key and the decryption key are independent of each other, which is more satisfactory for practical applications. In 2015, Zhao et al. proposed an asymmetric image encryption system using human biometrics combined with the G-S algorithm. A fingerprint can be used to verify the authenticity of the ciphertext in this system [32]. In addition, the G-S algorithm can be well combined with other encryption technologies to improve security [33,34]. Image encryption technology is time effective. To ensure the security of information, recently, some generalized G-S algorithms have been applied to image encryption [35,36,37,38].

The application of the G-S algorithm in image encryption has greatly promoted its theoretical development [39]. The obtained phase is an approximate solution due to the attributes of G-S, that is, lossless plaintext cannot be recovered. In this paper, we attempt to modify the G-S algorithm and apply it to image encryption. The research results are as follows:

(a) A single-phase retrieval algorithm based on the Fresnel transform domain is proposed and compared with the G-S algorithm.

(b) We further propose a double-phase retrieval algorithm and a multiple-phase retrieval algorithm, and prove that they have a good convergence effect.

(c) A multiple-image encryption scheme is proposed to greatly improve the efficiency of the system.

The remainder of this paper is organized as follows. The preliminary knowledge is described in Section 2. Section 3 proposes the modified G-S algorithm. The convergence is discussed in Section 4. Section 5 analyzes the security and reliability of the proposed algorithm, and further presents multiple-image encryption. The proposed algorithms are compared with the current phase retrieval algorithms, and the future applications are discussed in Section 6. Finally, the conclusions are presented in Section 7.

2. Preliminaries

2.1. G-S Algorithm

In 1972, Gerchberg and Saxton first proposed an algorithm for solving the phase recovery problem in the study of electron microscope imaging [2]. Here, we briefly introduce the process of the G-S algorithm, as shown in Figure 1. First, an initial guess g0(x,y) is input, and the amplitude |G(u,v)| is obtained by the Fourier transform. Next, the amplitude |G(u,v)| is replaced by a known function |F(u,v)| to form a new function. Then, the estimated square function g(x,y) is obtained by the inverse Fourier transform, and the input value g(x,y) of a new iteration is formed with known constraints.

Figure 1.

Figure 1

Gerchberg–Saxton (G-S) algorithm. FT—Fourier transform, and IFT—inverse Fourier transform.

In the given initial phase distribution, the amplitude distributions of the input and the output are successively iterated, which can determine the phase distribution of the input. The G-S algorithm can be implemented using Equations (1)–(4).

Gk1(u,v)=FT[gk1(x,y)]=|Gk1(u,v)|eiϕk1(u,v), (1)
Gk(u,v)=|F(u,v)|eiϕk1(u,v), (2)
gk(x,y)=IFT[Gk(u,v)]=|gk(x,y)|eiϕk(x,y), (3)
gk(x,y)=|g(x,y)|eiϕk(x,y). (4)
k=1,2,,n

The iterations of the algorithm can be controlled using the mean squared error (MSE) or the correlation coefficient (CC). The main principle is to control the iterative process by calculating the difference between the amplitude of the spectrum surface and the preset amplitude. The iteration stops when the MSE or CC satisfies a certain preset condition; otherwise, the next iteration starts.

Next, we conducted a comparative analysis with a two-dimensional function graph. The function graph of the Gaussian beam is shown in Figure 2a, and Figure 2b is the function graph of the target light intensity. In the simulation experiment, the G-S algorithm performed 200 iterations in total, and the comparison results are shown in Figure 2c. The red curve is obtained again, and the green curve is the target function curve. Figure 2d is the CC curve. The closer the CC is to 1, the better the convergence effect of the algorithm. Figure 2d shows that the initial convergence speed is relatively fast. After 50 iterations, the convergence speed is very slow, and the phenomenon of stagnation occurs.

Figure 2.

Figure 2

Figure 2

Numerical simulation of the G-S algorithm: (a) Gauss function curve, (b) target function curve, (c) comparative analysis, and (d) correlation coefficient curve.

As in the above analysis, when the G-S algorithm is applied to beam shaping, the problem arises that the convergence stagnates.

2.2. Application of G-S Algorithm in Image Encryption

The G-S algorithm is widely used in image encryption. Due to the correlation between the pixels of an image, a plaintext image can be recovered well. Here, we introduce the most common and simplest encryption scheme. In the encryption process, the optical attributes involved usually include the wavelength, focal length, diffraction distance, phase, etc., which can be used as the keys.

The principle of image encryption based on the G-S algorithm is shown in Figure 3. Here, g is a known amplitude image, assuming there is phase ei·ϕ (ciphertext). Then, the light intensity detector at the receiving end can obtain the image q (plaintext).

Figure 3.

Figure 3

The G-S algorithm applied to image encryption. f: the focal length. CCD: charge coupled device.

Next, we used the G-S algorithm to obtain the phase ei·ϕ (ciphertext). In the encryption process, we used the G-S algorithm for 200 iterations, and the numerical simulation results are shown in Figure 4. Figure 4a,b are a known input amplitude image and a target amplitude image, respectively. The CC was selected as the criterion for judging the convergence of the iterations. The value of CC was 0.9984 after 200 iterations. The transformation curve of CC is shown in Figure 4c.

Figure 4.

Figure 4

G-S algorithm applied to image encryption: (a) input amplitude image, (b) target amplitude image, (c) number of iterations, (d) ciphertext, (e) the recovered plaintext image, (f) the recovered plaintext image without amplitude.

The phase ei·ϕ obtained is shown in Figure 4d, which is also ciphertext. The decryption process can be completed either by an optical system or by a computer. The phase ei·ϕ was placed in the optical system of Figure 3, and the plaintext can be obtained directly at the receiver. In the computer, the receiver can obtain the plaintext image via the operation |FT(g·eiϕ)|. The recovered plaintext image is shown in Figure 4e.

It is well-known that the G-S algorithm has difficulty obtaining an exact solution, but the recovered image is no different from the original image visually. We attempted to recover the plaintext using the operation |FT(eiϕ)| (only phase), and the result is shown in Figure 4f. The result shows that we can still recognize the plaintext image information, which indicates that the phase is dominant in image reconstruction.

2.3. The Importance of the Phase

The phase is very important in signal processing due to its ability to reconstruct a signal completely [40,41]. Similarly, the phase is also very important in image processing, as shown in Figure 5. The phase and the amplitude were extracted by applying the Fourier transform to the images. We combined the phase of one image with the amplitude of another. Then, the new image was obtained using the inverse Fourier transform, and we can recognize the image information. This shows the importance of the phase in image processing. Here, PT and PR denote the phase truncation and phase reservation operations, respectively. For any complex amplitude F=|F|ei·ϕ,

PT(F)=|F|, (5)
PR(F)=ei·ϕ. (6)

Figure 5.

Figure 5

The importance of the phase. PT denotes the phase truncation operation, PR—the phase reservation observation, FT—Fourier transform, and IFT—inverse Fourier transform.

This analysis shows that the phase is dominant in image reconstruction. Inspired by this, we attempted to use the phase for image reconstruction, and then propose the modified G-S algorithm.

3. Modified G-S Algorithm

In this section, we propose three modified G-S algorithms in a progressive relationship. They are the single-phase retrieval (SPR) algorithm, the double-phase retrieval (DPR) algorithm, and the multiple-phase retrieval (MPR) algorithm.

3.1. Single-Phase Retrieval Algorithm

Our idea is shown in Figure 6. The modified G-S algorithm is applied to the Fresnel transform domain, which is more flexible; and the diffraction distance can be used as a key to improve security. We try to recover the target image using only a single phase during the iteration.

Figure 6.

Figure 6

The optical system of single-phase modulation: z1 is the diffraction distance; CCD—charge coupled device.

Obtaining the phase ei·ϕ is the core problem of our research. Therefore, we refer to the idea of the G-S algorithm to propose an SPR algorithm based on the Fresnel transform domain.

For the initial random phase mask ei·ϕ0 with ϕ0(π,π), the complex amplitude S0=|S0|·ei·arg(S0) is obtained after the Fresnel transform. Then, the amplitude |S0| is replaced to obtain a new complex amplitude S1=f·ei·arg(S0). Next, the function F1=|F1|·ei·arg(F1) is obtained after the inverse Fresnel transform. The extracted phase ei·arg(F1) replaces the initial phase ei·ϕ0 and enters the next iteration. The iterations continue until the iterative result meets the preset requirements. The SPR algorithm is shown in Equations (7)–(10):

Sk1=FrTz1(ei·ϕk1)=|Sk1|·ei·arg(Sk1), (7)
Sk=f·ei·arg(Sk1), (8)
Fk=FrTz1(Sk)=|Fk|·ei·arg(Fk), (9)
eiϕk=ei·arg(Fk), (10)
k=1,2,,n

Here, FrTz1(·) denotes the Fresnel transform with distance z1, f denotes a known image, |·| is the modulus operation, and arg(·) is the argument function. It is known that image f is transformed into a phase encoding ei·ϕ through the above iterative process. When the phase encoding ei·ϕ passes through the optical system, the image can be directly captured by the light intensity detector, as shown in Figure 6. In addition, the image can also be obtained by the operation f=|FrTz1(eiϕ)|. The flowchart of the SPR algorithm is shown in Figure 7.

Figure 7.

Figure 7

The flowchart of the single-phase retrieval (SPR) algorithm.

We use the CC as a criterion for judging the iterative convergence. f(x,y) denotes the known image, and f^(x,y) denotes the recovered image. Then, the CC can be expressed as follows:

CC=COV[f(x,y),f^(x,y)]σf·σf^. (11)

Here, COV is the covariance, and σ is the variance. The closer the value of the correlation coefficient to 1, the better the convergence.

The simulation results are shown in Figure 8. Figure 8a is the target image. The phase obtained after the iterations is shown in Figure 8b. Figure 8c is the recovered image, and the reconstruction process can be completed using the optical system of Figure 6 or the operation |FrTz1(eiϕ)|. Similar to the G-S algorithm, the SPR algorithm converges quickly in the early stages of the iterative process, but is slow in the later stages. The CC after 200 iterations is 0.9988.

Figure 8.

Figure 8

Simulation of the single-phase retrieval algorithm: (a) target amplitude image, (b) ciphertext, (c) the recovered plaintext image, (d) the transformation curve of the correlation coefficient (CC).

3.2. Double-Phase Retrieval Algorithm

Here, we try to iterate using two phases, and our idea is shown in Figure 9. When the two phase encodings are arranged in order, the light intensity detector at the output can directly acquire the recovered image.

Figure 9.

Figure 9

The optical system of double-phase modulation.

Based on the research in Section 3.1, we present the DPR algorithm. The mathematical expression of its detailed process is as follows.

The initial random phases are ei·ϕ10 and ei·ϕ20, where ϕ10,ϕ20(π,π) are the random matrices. Then, the wavefront function of the CCD can be expressed as:

S0=FrTz2[FrTz1(ei·ϕ10)·ei·ϕ20]. (12)

Assuming that there is a phase ei·ϕ21, it satisfies Equation (13):

f·S0|S0|=FrTz2[FrTz1(ei·ϕ10)·ei·ϕ21], (13)

where f is a target image. We can further obtain:

ei·ϕ21=FrTz2[f·S0|S0|]/FrTz1(ei·ϕ10), (14)

where FrTz2 denotes the inverse Fresnel transform with the distance z2. Next, assuming that there is a phase ei·ϕ11, it satisfies Equation (15):

f·S0|S0|=FrTz2[FrTz1(ei·ϕ11)·ei·ϕ21]. (15)

Therefore, we can obtain:

ei·ϕ11=FrTz1(FrTz2(f·S0|S0|)·(ei·ϕ21)*), (16)

where * is complex conjugate. Substituting the obtained ei·ϕ21 and ei·ϕ11 into Equation (12), we obtain:

S1=FrTz2[FrTz1(ei·ϕ11)·ei·ϕ21]. (17)

Then, the above operation can be repeated to obtain ei·ϕ22,ei·ϕ12,S2. When the k-th iteration stops, we can obtain ei·ϕ1k=ei·ϕ1 and ei·ϕ2k=ei·ϕ2. Then, the target image can be obtained by Equation (18):

f=|FrTz2[FrTz1(ei·ϕ1)·ei·ϕ2]|. (18)

Through the above mathematical derivation, we give the general mathematical expression of the DPR algorithm in Equations (19)–(21):

Sk1=FrTz2[FrTz1(ei·ϕ1k1)·ei·ϕ2k1], (19)
ei·ϕ2k=FrTz2[f·Sk1|Sk1|]/FrTz1(ei·ϕ1k1), (20)
ei·ϕ1k=FrTz1(FrTz2(f·Sk1|Sk1|)·(ei·ϕ2k)*), (21)
k=1,2,,n

where ei·ϕ10 and ei·ϕ20 are the initial random matrices. The flowchart of the DPR algorithm is shown in Figure 10.

Figure 10.

Figure 10

The flowchart of the double-phase retrieval (DPR) algorithm.

The simulation results of the DPR algorithm are shown in Figure 11. Figure 11a is the target image. Figure 11b,c are the obtained phases, respectively. The recovered image is shown in Figure 11d. After 15 iterations, the value of CC is 1, as shown in Figure 11e. The results show that the DPR algorithm has good convergence, can obtain the exact solution, and can recover the image losslessly. We will further analyze the convergence in Section 4.

Figure 11.

Figure 11

Simulation of the double-phase retrieval algorithm: (a) target amplitude image; (b) ciphertext, (c) ciphertext, (d) the recovered plaintext image, (e) the transformation curve of the CC.

3.3. Multiple-Phase Retrieval Algorithm

Further, we present the MPR algorithm, and its principle is shown in Figure 12. When n phase encodings are arranged in a certain order, the output can directly obtain the recovered image using parallel light illumination. For image encryption, an image is encrypted into n phase encodings.

Figure 12.

Figure 12

The optical system of multiple-phase modulation.

With the help of the derivation in Section 3.2, we present the mathematical expressions for the MPR algorithm:

Sk1=FrTzn{FrTzn1[FrTz2(FrTz1(ei·ϕ1k1)·ei·ϕ2k1)]·ei·ϕnk1}, (22)
ei·ϕnk=FrTzn[f·Sk1|Sk1|]FrTzn1{FrTzn2[FrTz2(FrTz1(ei·ϕ1k1)·ei·ϕ2k1)]·ei·ϕn1k1}, (23)
ei·ϕn1k=FrTzn1{FrTzn[f·Sk1|Sk1|]·(ei·ϕnk)*}FrTzn2{FrTzn3[FrTz2(FrTz1(ei·ϕ1k1)·ei·ϕ2k1)]·ei·ϕn2k1}, (24)
ei·ϕ1k=arg(FrTz1{FrTz2[FrTzn1(FrTzn(f·Sk1|Sk1|)·(ei·ϕnk)*)]·(ei·ϕ2k)*}), (25)
k=1,2,,n

where ei·ϕ10,ei·ϕ20,,ei·ϕn10 and ei·ϕn0 are the initial random phase encodings. The flowchart of the MPR algorithm is shown in Figure 13.

Figure 13.

Figure 13

The flowchart of the multiple-phase retrieval (MPR) algorithm.

The SPR and DRP algorithms are special examples of the algorithm proposed in this section. The convergence of these algorithms and the comparison with the G-S algorithm is analyzed in Section 4.

4. Convergence

4.1. G-S Algorithm and Single-Phase Retrieval Algorithm

The convergence of the G-S algorithm often stagnates, and the obtained solution is an approximate solution [11]. Next, we will perform an experiment by selecting two matrices A and B (both are 16 × 16). Here, matrix A is the magic matrix, and the corresponding imaging is shown in Figure 14a. The imaging corresponding to matrix B is shown in Figure 14b. We use Figure 14a as the input image and Figure 14b as the target image. The G-S algorithm performs 1000 iterations, and the obtained phase information is shown in Figure 14c. Figure 14d is the recovered image, and its corresponding pixel matrix is C. Figure 14e is the curve of the CC, which is closer to 1 as the number of iterations increases. However, the convergence is slow or even stagnant in the later stages of the iterative process. Our analysis shows that the G-S can recover the image well, but the exact solution is not obtained.

A=(256232532526724924810112452441415241172392382021235234242523123028292272263233223222363721921840412152144445211210482085051205204545520120058591971966263193192666718918870711851847475181180787917781175174848517117088891671669293163162969715915810010115515410410515115010810914714611214411411514114011811913713612212313313212612712912813013112512413413512112013813911711614214311314511111014814910710615215310310215615799981601619594164165919016816987861721738382176801781797776182183737218618769681901916564194195616019819957562022035352206207492094746212213434221621739382202213534224225313022822927262322332322236237191824016242243131224624798250251542542551)
B=(505050505050505050505050505050505010020020020020020020020020020020020020010050502001001001001001001001001001001001001002005050100100100100100100100100100100100100100100505010010010010025510010010010025510010010010050501001001001002551001001001002551001001001005050100100100100100100100100100100100100100100505010010010010023023023023023023010010010010050501001001001001002302302302301001001001001005050100100100100100100100100100100100100100100505010010010010010010010010010010010010010010050501501001001001001001001001001001001001001505050150150150150150150150150150150150150150150505015015015015015015015015015015015015015015050501001501501501501501501501501501501501501005050505050505050505050505050505050)
C=(5650505744524550545252515246505347971951981891921881871941931861901951981045351186979810196102108989710310010098185585310191959410297103989610610096103975253100969794255961041021082519294949952531001019696236101941009224210210098995150100101949710198951019592101969999515095106929622522122122822921510195991004651100981019999226214227224102979294985052105989294101103989995999197100106535193961019496103989899102979695107544814496959597989995101101969110114853521441411471451491421421511491511441511421435552143134144142145140147140146148146143144149435389145142146147145143144148148143147140984450565148445356514851544950514961)

Figure 14.

Figure 14

Application of the G-S algorithm: (a) input amplitude image, (b) target amplitude image, (c) ciphertext, (d) the recovered plaintext image, (e) the transformation curve of the CC.

Next, we analyze the proposed SPR algorithm. Figure 15a shows that a known image is selected (matrix B). The phase information obtained by the SPR algorithm is shown in Figure 15b. Figure 15c is the recovered image, which is visually indistinguishable from the original image. In the restoration process, we perform 1000 iterations, and the final correlation coefficient is 0.9999, which indicates that there is no lossless recovered image. The pixel matrix of Figure 15c is D, which further verifies that the SPR algorithm does not obtain the exact solution.

Figure 15.

Figure 15

Application of the single-phase retrieval algorithm: (a) target amplitude image, (b) ciphertext, (c) the recovered plaintext image, (d) the transformation curve of the CC.

D=(505050505050515051505151504951505010019920019920019920020020019929920019910050502009910099100991001009999100991002005049101100100100100100101101100100100101991005050100100101100255101100991002551001009910050511011001001002551001011001002549910010010051501009910099991009910010099100100102101505210010010099229229229230229229101100100101505010010099100101229229230229100991001011005050991011001009910110110110010010010110099515110010110110010099100100999910010099100505015010010099101100100100100101100100101149505014914914915014915014915014915015015015015052501501501491501501511511511501501491501491505150100149149150150149149149150149151150149995150505050495150515150505050495151)

4.2. Double-Phase Retrieval Algorithm and Multiple-Phase Retrieval Algorithm

The DPR algorithm is used to encrypt an image into two phase encodings. Figure 16a is a known image (matrix B). The obtained phase encodings are shown in Figure 16b,c. Figure 16d is the recovered image, and its pixel matrix is E. It can be clearly seen that the image is recovered losslessly. The CC curve is shown in Figure 16e, and the value is 1 for 13 iterations, which again verifies that the algorithm can restore information losslessly.

E=(505050505050505050505050505050505010020020020020020020020020020020020020010050502001001001001001001001001001001001001002005050100100100100100100100100100100100100100100505010010010010025510010010010025510010010010050501001001001002551001001001002551001001001005050100100100100100100100100100100100100100100505010010010010023023023023023023010010010010050501001001001001002302302302301001001001001005050100100100100100100100100100100100100100100505010010010010010010010010010010010010010010050501501001001001001001001001001001001001001505050150150150150150150150150150150150150150150505015015015015015015015015015015015015015015050501001501501501501501501501501501501501501005050505050505050505050505050505050)

Figure 16.

Figure 16

Figure 16

Application of the double-phase retrieval algorithm: (a) target amplitude image; (b) ciphertext, (c) ciphertext, (d) the recovered plaintext image, (e) the transformation curve of the CC.

The CC curve of the MPR algorithm is shown in Figure 17. The MPR algorithm can also recover information losslessly (the CC is 1), and its convergence is better than that of the DPR algorithm. Moreover, as the phase increases, the convergence speed is faster.

Figure 17.

Figure 17

The CC curves for different numbers of phases.

The G-S algorithm and the SPR algorithm are error reduction algorithms. One simply transforms back and forth between the two domains, satisfying the constraints in one before returning to the other. During the iterations, nonlinear operations are used to enforce the constraints on the amplitude to obtain the phase. It is difficult to obtain the exact solution for this kind of nonlinear operation, and the Fourier transform from one function to another is a many-to-one mapping. The DPR algorithm and the MPR algorithm proposed are linear operations in the iterative process, and the exact solution can be obtained. We take the DPR algorithm as example since it is the simplest form of MPR algorithm.

In the DPR algorithm, we finally determine the phases ei·ϕ1 and ei·ϕ2. The k-th iteration stops to obtain the phases ei·ϕ1=ei·ϕ1k and ei·ϕ2=ei·ϕ2k, which satisfy Equation (18). In the iteration, the phase ei·ϕ2k is determined by Equations (14) and (15). In Equation (14), only the phase ei·ϕ2k is unknown, and all other terms are known. Thus, we can obtain the phase ei·ϕ2k in Equation (15) via a linear operation. The phase ei·ϕ1k can also be obtained via the linear operation of Equations (16) and (17). In this way, we finally obtained the exact solution by means of this linear operation. The MPR algorithm is an extension of the DPR algorithm, which can also obtain exact solutions. However, such a solution is not unique, and is related to the selection of the initial random phase encoding. When the initial phase encodings selected each time are different, the determined solutions are also different. This property can improve image encryption security.

5. Performance Analysis

5.1. Security and Reliability

It is well-known that the existing attack schemes can be divided into chosen ciphertext attacks, chosen plaintext attacks, known plaintext attacks, and ciphertext only attacks. In Section 4, we noted that the solution of the proposed algorithm is not unique, and this property can effectively improve the security of the system. That is, even for the same image, the ciphertexts obtained by each encryption are different. Figure 18 shows the simulation results of two encryptions. The ciphertexts P1, P2, and P3 are obtained by the first encryption. During the second encryption, we select a new set of initial phase encodings, and obtain ciphertexts P11, P22, and P33. Our research shows that only the combination of ciphertexts (P1, P2, P3) and (P11, P22, P33) can recover the plaintext while other combinations, such as (P1, P22, P3) and (P11, P2, P33), cannot recover the plaintext information.

Figure 18.

Figure 18

Numerical simulation of two encryptions: (a) plaintext; (b) ciphertext, (c) ciphertext, (d) ciphertext, (e) plaintext; (f) ciphertext, (g) ciphertext, (h) ciphertext.

A histogram is a function of the distribution of image pixels, and reflects the frequency of each pixel. The histogram of the ciphertext tends to be evenly distributed, which means that the frequency of each pixel in the ciphertext is very close, which can better cover the distribution law of the image pixels, and ensure that the algorithm can effectively resist statistical attacks. The histograms of Figure 18b–d are shown in Figure 19. The pixels of the ciphertext are evenly distributed, which means that they can resist statistical attacks.

Figure 19.

Figure 19

Histogram of ciphertexts: (a) histogram of P1, (b) histogram of P2, (c) histogram of P3.

Ciphertexts are often disturbed and lost during storage and transmission, thus, the reliability of the algorithm is particularly important. In Figure 20, we damage the ciphertexts, and then tried to recover the plaintext information from them. The recovery result is shown in Figure 20d. Even if the ciphertexts are damaged, the plaintext information can still be recovered by the proposed algorithm.

Figure 20.

Figure 20

Reliability verification: (a) ciphertext damaged, (b) ciphertext damaged, (c) ciphertext damaged, (d) the recovered plaintext image.

As unnecessary or redundant interference information in image data, noise seriously affects the image quality. In Figure 21, we added Gaussian noise (mean m = 0, variance var = 0.01) to the original image (Figure 21a), and the result is shown in Figure 21b. We add salt and pepper noise (noise density d = 0.05) to the original image, and the result is shown in Figure 21c. After the original image is encrypted, the ciphertexts are shown in Figure 21d–f. When the three ciphertexts are interfered by Gaussian noise, the decryption result can identify the information of the original image, as shown in Figure 21g. When the three ciphertexts are interfered by salt and pepper noise, the decryption result is shown in Figure 21h. We can still identify the original image information from the decryption result.

Figure 21.

Figure 21

Reliability verification: (a) plaintext, (b) Gaussian noise is added, (c) salt and pepper noise is added, (d) ciphertext, (e) ciphertext, (f) ciphertext, (g) the recovered plaintext image, (h) the recovered plaintext image.

5.2. Multiple-Image Encryption

With the increasing speed of information exchange, single-image encryption has gradually become unable to meet practical needs. Therefore, multiple-image encryption technology has begun to attract attention. The traditional multiple-image encryption technology generally compresses multiple plaintexts into an image or superimposes multiple plaintexts into a composite image and then encrypts them. However, these methods have difficulties achieving optical system decryption. Here, we present a novel multiple-image encryption technology using the proposed algorithm. Our idea is shown in Figure 22. When the phase ei·ϕ1 is placed separately in the system, the plaintext f1 can be recovered. When phase ei·ϕ1 and phase ei·ϕ2 are placed in the system, the plaintext f2 can be recovered. That is, as the phase increases, the recovered plaintext also increases. Finally, we can recover n plaintext images from n phase encodings.

Figure 22.

Figure 22

Multiple-image encryption/decryption.

To encrypt n images, it is necessary to perform N-stage iterations, and the detailed flow chart is shown in Figure 23. In the first stage, the initial random phase ei·ϕ10 is input and the plaintext image f1 is encrypted.

Figure 23.

Figure 23

Encryption process of multiple-image encryption.

The CC is used to control the iteration process. When the k-th iteration meets certain conditions, the iteration stops and the system outputs the phase ei·ϕ1=ei·ϕ1k(ciphertext). Then, the plaintext image f1 can be obtained by Equation (26) as:

f1=|FrTz1(ei·ϕ1)|. (26)

In the second stage, the plaintext image f2 is encrypted. The phase ei·ϕ1 and phase ei·ϕ20 (random phase encoding) are used as the initial inputs. The phase ei·ϕ1 remains unchanged in the iteration process, and the phase ei·ϕ2=ei·ϕ2k is obtained when the iteration stops. The plaintext image f2 can be obtained by Equation (27) as:

f2=|FrTz2((FrTz1(ei·ϕ1))·ei·ϕ2)|. (27)

In stage N, the plaintext image fn is encrypted. The phases ei·ϕ1,ei·ϕ2,,ei·ϕn1 obtained in the previous N-1 stages remain unchanged as the initial phase while the initial random phase ei·ϕn0 is added. When the k-th iteration stops, the phase ei·ϕn=ei·ϕnk is obtained. Thus, the plaintext image fn can be obtained by Equation (28).

fn=|FrTzn{FrTzn1[FrTz2(FrTz1(ei·ϕ1)·ei·ϕ2)]·ei·ϕn}|. (28)

The simulation verification of multiple-image encryption is shown in Figure 24. Four ciphertext images are obtained as shown in Figure 24a–d. We decrypt the ciphertext image (Figure 24a) to obtain the plaintext, as shown in Figure 24e. Figure 24f can be recovered from the ciphertexts of Figure 24a,b. Figure 24g can be recovered from the ciphertexts of Figure 24a–c. Figure 24h can be recovered from the ciphertexts of Figure 24a–d.

Figure 24.

Figure 24

Numerical simulation of multiple-image encryption/decryption: (a) ciphertext, (b) ciphertext, (c) ciphertext, (d) ciphertext, (e) the recovered plaintext image by (a,f) the recovered plaintext image by (a,b,g) the recovered plaintext image by (ac,h) the recovered plaintext image by (ad).

We have successfully recovered four plaintexts from the four ciphertexts. The numerical simulation verifies that the proposed multiple-image encryption scheme is feasible, which will allow it to provide new ideas for the application of phase retrieval algorithms.

The multiple-image encryption scheme proposed in this paper avoids the problem of crosstalk because each encryption process is carried out in succession, and each plaintext in the decryption process is obtained successively.

6. Discussion and Prospect

The G-S algorithm is also widely used in beam shaping and binary optical element design. To improve the diffraction efficiency, many improved G-S algorithms have been proposed [42,43,44]. The main principle is to change the Gaussian beam into the desired ideal beam. Our algorithm does not need input amplitude in image encryption, so it is applied to beam shaping without a wavefront function. For our algorithm, it can be understood as turning a parallel light into an ideal beam. The waveform function we want to obtain is shown in Figure 25a. After 200 iterations with the G-S algorithm, the result is shown in Figure 25b. There is still a certain gap between this result and our objective function. The SPR algorithm is applied to 200 iterations, and the result is shown in Figure 25c, which is better than that of the G-S algorithm. Compared with the modified G-S algorithms [45,46], the SPR algorithm also improves the convergence effect. Unfortunately, these algorithms are based on a nonlinear operation, so cannot obtain accurate solutions. Our DPR and MPR algorithms are linear iterative methods based on the G-S algorithm, which can obtain accurate solutions. When the DPR algorithm is applied, the result is shown in Figure 25d, which can accurately obtain the objective function. Figure 25e shows the comparison results of the G-S, SPR, and DPR algorithms.

Figure 25.

Figure 25

Beam shaping: (a) target waveform, (b) G-S algorithm, (c) SPR algorithm, (d) DPR algorithm, (e) the algorithm comparison.

The G-S algorithm is sensitive to the initial value, that is, the different initial phase selection has a significant impact on the results. When the initial phase is given a fixed value, the iterative results are shown in Figure 26a,b. Figure 26c,d shows the results obtained by selecting random initial phase iterations. Compared with the results in Figure 26, it can be clearly seen that the G-S algorithm is extremely sensitive to the initial phase, which directly affects the convergence effect. We use the same method to test the SPR algorithm, and the results are shown in Figure 27. It is found that the sensitivity of SPR algorithm to the initial phase is weaker.

Figure 26.

Figure 26

Sensitivity of initial phase based on the G-S algorithm: (a) the phase exp(πi/2), (b) the phase exp(πi), (c) the random phase, (d) the random phase.

Figure 27.

Figure 27

Sensitivity of initial phase based on the SPR algorithm: (a) the phase exp(πi/2), (b) the phase exp(πi), (c) the random phase, (d) the random phase.

The G-S algorithm is applied to optical image encryption because its attributes can provide good security [47,48]. The initial phase is not used as the key of the system, so different initial phases can be selected for each encryption process, and different ciphertexts can be obtained. That is, a plaintext can have many different ciphertexts, which creates difficulties in cipher decoding. Our algorithm also has such a security property.

The G-S algorithm has been used in optical cryptanalysis [49,50,51,52], but the result is not ideal because it cannot obtain the exact solution. The DPR and MPR algorithms proposed in this paper can obtain the exact solution, which clearly provides a powerful tool for optical cryptanalysis.

We have previously proposed a key distribution scheme for optical cryptography, which is also restricted by the convergence of the algorithm, and thus makes the result unsatisfactory [27]. The algorithm proposed in this paper provides an idea for key distribution.

At present, for secret image sharing, the resolution of the restored image is reduced due to sharing and the large size of the recovery image. This problem has been considered by researchers. However, the algorithms proposed in this paper can overcome this problem, which provides a new idea for secret image sharing. This is a topic that we will study next.

7. Conclusions

In this paper, we modify the G-S algorithm to propose the SPR, DPR, and MPR algorithms. We analyze the convergence of the proposed algorithms, and the results show that the SPR algorithm also has the same problem as the G-S algorithm. The convergence is slow in later iterations, its convergence stagnates, and only an approximate solution can be obtained. However, our analysis shows that the DPR and MPR algorithms have good convergence, can recover the plaintext without loss, and can obtain exact solutions. Furthermore, we analyzed the security and reliability of the proposed image encryption algorithm. Because different initial phase encodings can be selected for each encryption, different ciphertexts can be obtained, which improves the security of the algorithm. The reliability analysis shows that the plaintext can be recovered even if the ciphertexts are damaged. Finally, we present the multiple-image encryption scheme based on the proposed algorithm. The n plaintexts can be recovered from n ciphertexts, which greatly improves the efficiency of the system. The proposed DPR and MPR algorithms can obtain exact solutions, that is, they can recover information losslessly, which means they have an important reference value for the application of the algorithms.

Acknowledgments

On behalf of my co-authors, we would like to express our great appreciation to editor and reviewers.

Author Contributions

Methodology, T.Z.; software, T.Z.; validation, T.Z. and Y.C.; writing—original draft preparation, Y.C.; writing—review and editing, T.Z.; supervision, T.Z.; funding acquisition, T.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This study was supported by Scientific Research Projects of Hebei colleges and universities (QN2020511).

Conflicts of Interest

The authors declare no conflict of interest.

Footnotes

Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

References

  • 1.Gerchberg R.W. Phase determination for image and diffraction plane pictures in the electron microscope. Optik. 1971;34:275–284. [Google Scholar]
  • 2.Gerchberg R.W., Saxton W.O. A practical algorithm for the determination of phase from image and diffraction plane pictures. Optik. 1972;35:237–246. [Google Scholar]
  • 3.Wilkins S.W., Gureyev T.E., Gao D., Pogany A., Stevenson A.W. Phase-contrast imaging using polychromatic hard X-rays. Nature. 1996;384:335–338. doi: 10.1038/384335a0. [DOI] [Google Scholar]
  • 4.Pogany A., Gao D., Wilkins S.W. Contrast and resolution in imaging with a microfocus x-ray source. Rev. Sci. Instrum. 1997;68:2774–2782. doi: 10.1063/1.1148194. [DOI] [Google Scholar]
  • 5.Millane R.P. Phase retrieval in crystallography and optics. JOSA A. 1990;7:394–411. doi: 10.1364/JOSAA.7.000394. [DOI] [Google Scholar]
  • 6.Gonsalves R.A., Chidlaw R. Wavefront sensing by phase retrieval. Applications of Digital Image Processing III. Int. Soc. Opt. Photonics. 1979;207:32–39. [Google Scholar]
  • 7.Gonsalves R.A. Phase retrieval and diversity in adaptive optics. Opt. Eng. 1982;21:215829. doi: 10.1117/12.7972989. [DOI] [Google Scholar]
  • 8.Chang M.P., Ersoy O.K., Dong B., Yang G., Gu B. Iterative optimization of diffractive phase elements simultaneously implementing several optical functions. Appl. Opt. 1995;34:3069–3076. doi: 10.1364/AO.34.003069. [DOI] [PubMed] [Google Scholar]
  • 9.Fienup J.R. Iterative method applied to image reconstruction and to computer-generated holograms. Opt. Eng. 1980;19:193297. doi: 10.1117/12.7972513. [DOI] [Google Scholar]
  • 10.Misell D.L. A method for the solution of the phase problem in electron microscopy. J. Phys. D Appl. Phys. 1973;6:L6–L9. doi: 10.1088/0022-3727/6/1/102. [DOI] [Google Scholar]
  • 11.Fienup J.R. Phase retrieval algorithms: A comparison. Appl. Opt. 1982;21:2758–2769. doi: 10.1364/AO.21.002758. [DOI] [PubMed] [Google Scholar]
  • 12.Johnson E.G., Brasher J.D. Phase Encryption of Biometrics in Diffractive Optical Elements. Opt. Lett. 1996;21:1271–1273. doi: 10.1364/OL.21.001271. [DOI] [PubMed] [Google Scholar]
  • 13.Wang R.K., Watson I.A., Chatwin C. Random Phase Encoding for Optical Security. Opt. Eng. 1996;35:2464–2469. doi: 10.1117/1.600849. [DOI] [Google Scholar]
  • 14.Zalevsky Z., Mendlovic D., Dorsch R.G. Gerchberg–Saxton algorithm applied in the fractional Fourier or the Fresnel domain. Opt. Lett. 1996;21:842–844. doi: 10.1364/OL.21.000842. [DOI] [PubMed] [Google Scholar]
  • 15.Li Y.Z., Kreske K., Rosen J. Security and encryption optical systems based on a correlator with significant output images. Appl. Opt. 2000;39:5295–5301. doi: 10.1364/AO.39.005295. [DOI] [PubMed] [Google Scholar]
  • 16.Chang H.T., Lu W.C., Kuo C.J. Multiple-phase retrieval for optical security systems by use of random-phase encoding. Appl. Opt. 2002;41:4825–4834. doi: 10.1364/AO.41.004825. [DOI] [PubMed] [Google Scholar]
  • 17.Hennelly B., Sheridan J.T. Fractional Fourier transform-based image encryption: Phase retrieval algorithm. Opt. Commun. 2003;226:61–80. doi: 10.1016/j.optcom.2003.08.030. [DOI] [Google Scholar]
  • 18.Situ G.H., Zhang J.J. A Cascaded iterative Fourier transform algorithm for optical security applications. Optik. 2003;114:473–477. doi: 10.1078/0030-4026-00291. [DOI] [Google Scholar]
  • 19.Niu C., Zhang Y., Gu B. Optical encryption and verification technique for information coding in multiple-wavelengths in Fresnel domain. Optik. 2006;117:516–524. doi: 10.1016/j.ijleo.2005.10.014. [DOI] [Google Scholar]
  • 20.Zhang F., Pedrini G., Osten W. Phase retrieval of arbitrary complex-valued fields through aperture-plane modulation. Phys. Rev. A. 2007;75:0438054. doi: 10.1103/PhysRevA.75.043805. [DOI] [Google Scholar]
  • 21.Liu Z., Liu S. Double Image encryption based on iterative fractional Fourier transform. Opt. Commun. 2007;275:324–329. doi: 10.1016/j.optcom.2007.03.039. [DOI] [Google Scholar]
  • 22.Hwang H., Chang H.T., Lie W. Multiple image encryption and multiplexing using a modified Gerchberg-Saxton algorithm and phase modulation in Fresnel-transform Domain. Opt. Lett. 2009;34:3917–3919. doi: 10.1364/OL.34.003917. [DOI] [PubMed] [Google Scholar]
  • 23.Chang H.T., Hwang H.-E., Lee C.-L., Lee M.-T. Wavelength multiplexing multiple-image encryption using cascaded phase-only masks in the Fresnel transform domain. Appl. Opt. 2011;50:710–716. doi: 10.1364/AO.50.000710. [DOI] [PubMed] [Google Scholar]
  • 24.Chen W., Chen X., Sheppard C.J.R. Optical image encryption based on phase retrieval combined with three-dimensional particle-like distribution. J. Opt. 2012;14:75402. doi: 10.1088/2040-8978/14/7/075402. [DOI] [Google Scholar]
  • 25.Chen W., Chen X. Optical cryptography network topology based on 2D-to-3D conversion and phase-mask extraction. Opt. Lasers Eng. 2013;51:410–416. doi: 10.1016/j.optlaseng.2012.11.013. [DOI] [Google Scholar]
  • 26.Chen W., Chen X. Optical multiple-image authentication based on modified Gerchberg–Saxton algorithm with random sampling. Opt. Commun. 2014;318:128–132. doi: 10.1016/j.optcom.2013.12.059. [DOI] [Google Scholar]
  • 27.Zhao T., Ran Q., Yuan L., Chi Y., Ma J. Key distribution and changing key cryptosystem based on phase retrieval algorithm and RSA public-key algorithm. Math. Probl. Eng. 2015;2015:732609. doi: 10.1155/2015/732609. [DOI] [Google Scholar]
  • 28.Rajput S.K., Nishchal N.K. Fresnel domain nonlinear optical image encryption scheme based on Gerchberg–Saxton phase-retrieval algorithm. Appl. Opt. 2014;53:418–425. doi: 10.1364/AO.53.000418. [DOI] [PubMed] [Google Scholar]
  • 29.Wang Y., Quan C., Tay C.J. Nonlinear multiple-image encryption based on mixture retrieval algorithm in Fresnel domain. Opt. Commun. 2014;330:91–98. doi: 10.1016/j.optcom.2014.05.032. [DOI] [Google Scholar]
  • 30.Liu W., Xie Z., Liu Z., Zhang Y., Liu S. Multiple-image encryption based on optical asymmetric key cryptosystem. Opt. Commun. 2015;335:205–211. doi: 10.1016/j.optcom.2014.09.046. [DOI] [Google Scholar]
  • 31.Zhao T., Ran Q., Chi Y. Image encryption based on nonlinear encryption system and public-key cryptography. Opt. Commun. 2015;338:64–72. doi: 10.1016/j.optcom.2014.09.083. [DOI] [Google Scholar]
  • 32.Zhao T., Ran Q., Yuan L., Chi Y., Ma J. Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography. Opt. Lasers Eng. 2015;72:12–17. doi: 10.1016/j.optlaseng.2015.03.024. [DOI] [Google Scholar]
  • 33.Zhao T., Ran Q., Yuan L., Chi Y., Ma J. Optical image encryption using password key based on phase retrieval algorithm. J. Mod. Opt. 2016;63:771–776. doi: 10.1080/09500340.2015.1101171. [DOI] [Google Scholar]
  • 34.Wang X., Chen W., Chen X. Optical information authentication using compressed double-random-phase-encoded images and Quick-response Codes. Opt. Express. 2015;23:6239–6253. doi: 10.1364/OE.23.006239. [DOI] [PubMed] [Google Scholar]
  • 35.Chen W. Hierarchically optical double-image correlation using 3D phase retrieval algorithm in fractional Fourier transform domain. Opt. Commun. 2018;427:374–381. doi: 10.1016/j.optcom.2018.06.084. [DOI] [Google Scholar]
  • 36.Kumar R., Sheridan J.T., Bhaduri B. Nonlinear double image encryption using 2D non-separable linear canonical transform and phase retrieval algorithm. Opt. Laser Technol. 2018;107:353–360. doi: 10.1016/j.optlastec.2018.06.014. [DOI] [Google Scholar]
  • 37.Piao M.L., Liu Z.X., Piao Y.L., Wu H.Y., Yu Z., Kim N. Multi-depth three-dimensional image encryption based on the phase retrieval algorithm in the Fresnel and fractional Fourier transform domains. Appl. Opt. 2018;57:7609–7617. doi: 10.1364/AO.57.007609. [DOI] [PubMed] [Google Scholar]
  • 38.Abuturab M.R. Securing multiple information using wavelet transform and Yang-Gu mixture amplitude-phase retrieval algorithm. Opt. Lasers Eng. 2019;118:42–51. doi: 10.1016/j.optlaseng.2019.01.015. [DOI] [Google Scholar]
  • 39.Nishchal N.K. Optical Cryptosystems. IOP Publishing; Bristol, UK: 2019. [Google Scholar]
  • 40.Oppenheim A.V., Lim J.S. The importance of phase in signals. Proc. IEEE. 1981;69:529–541. doi: 10.1109/PROC.1981.12022. [DOI] [Google Scholar]
  • 41.Skarbnik N., Zeevi Y.Y., Sagiv C. The Importance of Phase in Image Processing. Technion—Israel Institute of Technology; Haifa, Israel: 2010. pp. 1–30. Technical Report. [Google Scholar]
  • 42.Fienup J.R. Phase retrieval algorithms: A personal tour. Appl. Opt. 2013;52:45–56. doi: 10.1364/AO.52.000045. [DOI] [PubMed] [Google Scholar]
  • 43.Chang H., Yin X., Cui X., Zhang Z., Ma J., Wu G., Zhang L., Xin X. Adaptive optics compensation of orbital angular momentum beams with a modified Gerchberg–Saxton-based phase retrieval algorithm. Opt. Commun. 2017;405:271–275. doi: 10.1016/j.optcom.2017.08.035. [DOI] [Google Scholar]
  • 44.Wang H., Yue W., Song Q., Liu J., Situ G. A hybrid Gerchberg–Saxton-like algorithm for DOE and CGH calculation. Opt. Lasers Eng. 2017;89:109–115. doi: 10.1016/j.optlaseng.2016.04.005. [DOI] [Google Scholar]
  • 45.Guo C., Liu S., Sheridan J.T. Iterative phase retrieval algorithms. I: Optimization. Appl. Opt. 2015;54:4698–4708. doi: 10.1364/AO.54.004698. [DOI] [PubMed] [Google Scholar]
  • 46.Milster T.D. Optical Holography—Materials, Theory and Applications. Elsevier; Amsterdam, The Netherlands: 2020. The Gerchberg-Saxton Phase Retrieval Algorithm and Related Variations; pp. 61–72. [Google Scholar]
  • 47.Nakano K., Suzuki H. Analysis of singular phase based on double random phase encoding using phase retrieval algorithm. Opt. Lasers Eng. 2020;134:106300. doi: 10.1016/j.optlaseng.2020.106300. [DOI] [Google Scholar]
  • 48.Situ G., Suo J., Dai Q. Generalized iterative phase retrieval algorithms and their applications; Proceedings of the 2015 IEEE 13th International Conference on Industrial Informatics (INDIN); Cambridge, UK. 22–24 July 2015; pp. 713–720. [Google Scholar]
  • 49.Peng X., Zhang P., Wei H., Yu B. Known-plaintext attack on optical encryption based on double random phase keys. Opt. Lett. 2006;31:1044–1046. doi: 10.1364/OL.31.001044. [DOI] [PubMed] [Google Scholar]
  • 50.Barrera J.F., Vargas C., Tebaldi M., Torroba R., Bolognini N. Known-plaintext attack on a joint transform correlator encrypting system. Opt. Lett. 2010;35:3553–3555. doi: 10.1364/OL.35.003553. [DOI] [PubMed] [Google Scholar]
  • 51.Rajput S.K., Nishchal N.K. Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform. Appl. Opt. 2013;52:871–878. doi: 10.1364/AO.52.000871. [DOI] [PubMed] [Google Scholar]
  • 52.Zhao T., Ran Q., Yuan L., Chi Y. Manipulative attack using the phase retrieval algorithm for double random phase encoding. Appl. Opt. 2015;54:7115–7119. doi: 10.1364/AO.54.007115. [DOI] [PubMed] [Google Scholar]

Articles from Entropy are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES