2015
DOI: 10.4236/opj.2015.511029
|View full text |Cite
|
Sign up to set email alerts
|

A Robust Optical Encryption Method for Three-Dimensional Object Based on the Fresnel Transform

Abstract: An optical encryption of three-dimensional (3D) object with digital holography was implemented. In the process of encryption, two holograms involved recording key information and 3D object were obtained. In the process of decryption, the 3D object was reconstructed from the two holograms by extracting the object and key information, followed by multiplication of the two holograms and inverse Fresnel transform numerically. The robustness of the method was also tested for different occlusions attacks and Gaussia… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 21 publications
0
0
0
Order By: Relevance
“…As a result of the inevitability of noise and cryptographic attacks, it is a design objective to test the robustness of a proposed image encryption algorithm in the presence of noise and cryptographic attacks such as statistical, differential and brute force attacks. Adding noise to an image as a means to test the robustness and performance of an algorithm in the presence of uncertainties is an effective approach that has been used extensively in the literature [20][21][22][23]. Due to modelling constraints, not all image encryption algorithms are robust against noise attacks [24], while some have low robustness to noise [25].…”
Section: Introductionmentioning
confidence: 99%
“…As a result of the inevitability of noise and cryptographic attacks, it is a design objective to test the robustness of a proposed image encryption algorithm in the presence of noise and cryptographic attacks such as statistical, differential and brute force attacks. Adding noise to an image as a means to test the robustness and performance of an algorithm in the presence of uncertainties is an effective approach that has been used extensively in the literature [20][21][22][23]. Due to modelling constraints, not all image encryption algorithms are robust against noise attacks [24], while some have low robustness to noise [25].…”
Section: Introductionmentioning
confidence: 99%