2018
DOI: 10.1007/978-981-10-8237-5_4
|View full text |Cite
|
Sign up to set email alerts
|

Asymmetric Cryptosystem Using Affine Transform in Fourier Domain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(1 citation statement)
references
References 13 publications
0
1
0
Order By: Relevance
“…Since then, optical encryption plans dependent on DRPE have been investigated by various specialists and improved upon using various methodologies, for example, a Fresnel domain, a partial Fourier domain [2], applying fractional Fourier change in digital holography [3], utilizing diffractive imaging [4], utilizing stage recovery calculation and intermodulation in a Fourier domain [5] and utilizing adequacy balance [6]. To further upgrade the security of optical encryption plans, distinctive cutting-edge innovations have been solidified in an unexpected way, with model-image-encoding dependent on multi-stage and multi-channel partial Fourier change [7]; arbitrary parallel stage regulation with combination recovery kind of Yang-Gu calculation; gyrator and Arnold transform [8]; advanced holography and joint correlators [9,10]; fractional Mellin change; Hartley change; Arnold change and solitary worth deterioration in fragmentary Hartley space; wavelet domain [11]; gyrator wavelet change; stage-moving interferometry, phase recovery calculation [12]; photon-counting and polarimetric picture encryption [13,14]; pressure-based picture encryption; compression-imaging-based encryption with its weakness to ptychographic stage recovery [15]; and other methods [16].…”
Section: Introductionmentioning
confidence: 99%
“…Since then, optical encryption plans dependent on DRPE have been investigated by various specialists and improved upon using various methodologies, for example, a Fresnel domain, a partial Fourier domain [2], applying fractional Fourier change in digital holography [3], utilizing diffractive imaging [4], utilizing stage recovery calculation and intermodulation in a Fourier domain [5] and utilizing adequacy balance [6]. To further upgrade the security of optical encryption plans, distinctive cutting-edge innovations have been solidified in an unexpected way, with model-image-encoding dependent on multi-stage and multi-channel partial Fourier change [7]; arbitrary parallel stage regulation with combination recovery kind of Yang-Gu calculation; gyrator and Arnold transform [8]; advanced holography and joint correlators [9,10]; fractional Mellin change; Hartley change; Arnold change and solitary worth deterioration in fragmentary Hartley space; wavelet domain [11]; gyrator wavelet change; stage-moving interferometry, phase recovery calculation [12]; photon-counting and polarimetric picture encryption [13,14]; pressure-based picture encryption; compression-imaging-based encryption with its weakness to ptychographic stage recovery [15]; and other methods [16].…”
Section: Introductionmentioning
confidence: 99%