2015
DOI: 10.1016/j.optlaseng.2015.01.001
|View full text |Cite
|
Sign up to set email alerts
|

An asymmetric single-channel color image encryption based on Hartley transform and gyrator transform

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
14
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 57 publications
(14 citation statements)
references
References 33 publications
0
14
0
Order By: Relevance
“…2, the complex function U obtained in step (6) is fed into the SLM1 and illuminated by a monochromatic light, then recorded by CCD1. The phase-truncated part Am1 of the Fresnel spectrum may be generated by CCD1 [11]. The corresponding amplitude-truncated part Ph1 may be generated by interferometry with the reference beam RB1, which is split from the light source [19].…”
Section: The Proposed Asymmetric Multiple-image Encryption and Decmentioning
confidence: 99%
See 2 more Smart Citations
“…2, the complex function U obtained in step (6) is fed into the SLM1 and illuminated by a monochromatic light, then recorded by CCD1. The phase-truncated part Am1 of the Fresnel spectrum may be generated by CCD1 [11]. The corresponding amplitude-truncated part Ph1 may be generated by interferometry with the reference beam RB1, which is split from the light source [19].…”
Section: The Proposed Asymmetric Multiple-image Encryption and Decmentioning
confidence: 99%
“…Most of the optical encryption methods can be viewed as symmetric cryptosystems, in which the keys for encryption and decryption are identical [8]. However, earlier studies indicated that these cryptosystems are lacking in security strength, because of the inherently linear property of mathematical or optical transformation, and are vulnerable to various attacks such as chosen plaintext attack [8][9][10][11]. In addition, most schemes mainly focused on single-image encryption, which leads to deficiency in multiple-image encryption and transmission [8].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Optical encryption methods have attached much attention because they have various merits [13][14][15][16][17][18][19][20][21][22][23][24][25]. Double random-phase encoding in the Fresnel domain was proposed in 2004, and the encryption method is more flexible and compact because it is lensless and has higher security [26].…”
Section: Introductionmentioning
confidence: 99%
“…Encryption algorithms in the spatial domain [1,2] are mainly based on scrambling image pixels or blocks. Encryption algorithms in transformed domain [3][4][5][6][7][8][9] are mainly based on scrambling or encrypting the transform coefficients or blocks. Although most of the reported encryption techniques based on transformed domains can be implemented by optical setups which have high speed in encryption, but they lack in security strength because of their inherent linearity of the overall system.…”
Section: Introductionmentioning
confidence: 99%