2014
DOI: 10.1016/j.optlastec.2013.05.023
|View full text |Cite
|
Sign up to set email alerts
|

A review of optical image encryption techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
148
0
2

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 332 publications
(150 citation statements)
references
References 125 publications
(207 reference statements)
0
148
0
2
Order By: Relevance
“…With the approaches described in Refs. [7] and [11], two phase masks were inserted in the object wave path for DRPE; however, with our system, they are applied to the object and reference waves. The Fresnel-type DRPE uses three cipher keys: the phase distribution on the Fresnel domain, the distance of Fresnel diffraction, and the wavelength of laser; all of which that must be provided correctly to restore the plaintext image from the encrypted image.…”
Section: Encrypted Sensing Based On Drpementioning
confidence: 99%
See 1 more Smart Citation
“…With the approaches described in Refs. [7] and [11], two phase masks were inserted in the object wave path for DRPE; however, with our system, they are applied to the object and reference waves. The Fresnel-type DRPE uses three cipher keys: the phase distribution on the Fresnel domain, the distance of Fresnel diffraction, and the wavelength of laser; all of which that must be provided correctly to restore the plaintext image from the encrypted image.…”
Section: Encrypted Sensing Based On Drpementioning
confidence: 99%
“…peak mean , PSR σ − = (11) where σ denotes the standard deviation of ( ) , n x y and peak and mean denote the peak value and spatial average of ( ) , n x y , respectively.…”
Section: Verification Accuracymentioning
confidence: 99%
“…It is known that a cellular automaton (CA) can be used to encrypt images efficiently [6][7][8][9][10][11], and using an image scrambling algorithm can make the entire encryption system safer and more reliable [12][13][14]. In computer science and mathematics, the Josephus problem is a theoretical problem related to a certain counting-out game [15].…”
Section: Introductionmentioning
confidence: 99%
“…Optical processing systems have been proposed for a number of security applications, including encryptiondecryption, authentication, and anti-counterfeiting of a number of primary images, from one in the most common case, up to four in the case of multifactor authentication [1][2][3][4][5][6]. They benefit from parallel processing, multiple degrees of freedom (such as amplitude, phase, wavelength, and polarization of light), high storage capacity and use of biometrics data such as, for instance, fingerprints, iris and retina.…”
Section: Introductionmentioning
confidence: 99%
“…Most of the optical security systems usually deal with a single primary image (for instance, an object, a plaintext, a signature, a biometric signal) as authenticator [2][3][4][5][6][7][10][11][12][13][14][18][19][20][21][22][23]. Some approaches permit to store multiple primary images, either in an optical memory [9] or in a single encrypted distribution [24][25][26][27], with the purpose of sequential and independent one-by-one decryption.…”
Section: Introductionmentioning
confidence: 99%