2021
DOI: 10.7498/aps.70.20202075
|View full text |Cite
|
Sign up to set email alerts
|

Attacking asymmetric cryptosystem based on phase truncated Fourier fransform by deep learning

Abstract: Most of optical encryption systems are symmetric cryptosystems. The plaintext and the ciphertext in optical image encryption are related linearly. The security of the system needs to be strengthened. The asymmetric cryptosystem based on phase truncated Fourier transforms (PTFT) makes the security of the encryption system greatly improved by its nonlinear phase truncation. Deep learning (DL) as a method of machine learning was proposed decades ago. With the development of computer’s performance, the practicalit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…Xu et al 132 proposed a deep learning method to attack the PTFT encryption system 131 and used a dataset with pairs of plaintext images on the MNIST handwritten dataset 133 and corresponding ciphertext images constructed through the PTFT encryption system to train residual network, 9 which automatically learned the decryption characteristics of the encryption system by reducing the MSE between the decrypted images obtained by the deep learning model with the secret image as shown in Fig. 16.…”
Section: Image Cryptanalysis Methods Based On Deep Learningmentioning
confidence: 99%
“…Xu et al 132 proposed a deep learning method to attack the PTFT encryption system 131 and used a dataset with pairs of plaintext images on the MNIST handwritten dataset 133 and corresponding ciphertext images constructed through the PTFT encryption system to train residual network, 9 which automatically learned the decryption characteristics of the encryption system by reducing the MSE between the decrypted images obtained by the deep learning model with the secret image as shown in Fig. 16.…”
Section: Image Cryptanalysis Methods Based On Deep Learningmentioning
confidence: 99%
“…To estimate object poses from visual information, multi-layer convolutional neural networks were commonly used [ 20 ]. Proximal policy optimization (PPO) was often employed to train dexterous hands in a virtual environment using thousands of different parameters [ 21 ]. However, one difficulty with PPO is that it may require a large amount of training data to achieve acceptable results.…”
Section: Introductionmentioning
confidence: 99%