2020
DOI: 10.1109/jphot.2020.3020077
|View full text |Cite
|
Sign up to set email alerts
|

ARM-Embedded Implementation of a Novel Color Image Encryption and Transmission System Based on Optical Chaos

Abstract: Cloud servers are very suitable for sharing and storing image data and meanwhile it is confronted with many security and privacy problems. Optical chaos and hardware implementation of image encryption possess distinct superiorities in secret image sharing. Hence, combining the advantages of advanced reduced instruction set computer machine (ARM)-embedded platform Exynos4412 model, together with vertical-cavity surface emitting laser (VCSEL) subject to positive optoelectronic feedback (POEF), a novel color imag… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 34 publications
(52 reference statements)
0
4
0
Order By: Relevance
“…When analyzing digital color deviation, refer to the above process of color deviation analysis to improve the accuracy of analysis. There are a large number of numbers in the sequence, so we cannot analyze every color, but we can determine the gray balance of the image and the color deviation by using memory color [14]. Gray balance is the basis of color in digital image processing.…”
Section: Color Deviation Analysismentioning
confidence: 99%
“…When analyzing digital color deviation, refer to the above process of color deviation analysis to improve the accuracy of analysis. There are a large number of numbers in the sequence, so we cannot analyze every color, but we can determine the gray balance of the image and the color deviation by using memory color [14]. Gray balance is the basis of color in digital image processing.…”
Section: Color Deviation Analysismentioning
confidence: 99%
“…In general, the blockchain equivalent transaction protocol based on fully homomorphic encryption can verify whether the transaction amount reduced by account A is that the receiver wants A to publish the noninteractive zero knowledge proof 2 on the blockchain at one time. When publishing the transaction information, in order to increase the amount of account B, only A needs to publish the noninteractive zero knowledge proof π 1 on the blockchain at one time [ 23 ].…”
Section: Methodsmentioning
confidence: 99%
“…A recently reported experimental technique focuses on generating a Gaussian-invariant distribution [32]. Such sources hold potential for diverse applications spanning communication [33,34], random number generation [26,27], and cryptography [30,35].…”
Section: Introductionmentioning
confidence: 99%