2009
DOI: 10.1016/j.optcom.2008.10.028
|View full text |Cite
|
Sign up to set email alerts
|

Digital hologram encryption using discrete wavelet packet transform

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
10
0
5

Year Published

2010
2010
2019
2019

Publication Types

Select...
8

Relationship

2
6

Authors

Journals

citations
Cited by 17 publications
(15 citation statements)
references
References 12 publications
0
10
0
5
Order By: Relevance
“…where H and W are width and height of the original picture, and P (x, y) and C (x, y) represent the gray scale intensity The lower PSNR values of the encrypted picture indicate the difficulty in the recovery of the original picture from the encrypted picture without having the correct decryption key [1,7,8,25]. The obtained results for different modes of A5/1 and W7 encryption algorithms as well as the different encrypted frames are available in Tables 1 and 2.…”
Section: The Peak Signal To Noise Ratio Of the Encrypted Framesmentioning
confidence: 99%
See 1 more Smart Citation
“…where H and W are width and height of the original picture, and P (x, y) and C (x, y) represent the gray scale intensity The lower PSNR values of the encrypted picture indicate the difficulty in the recovery of the original picture from the encrypted picture without having the correct decryption key [1,7,8,25]. The obtained results for different modes of A5/1 and W7 encryption algorithms as well as the different encrypted frames are available in Tables 1 and 2.…”
Section: The Peak Signal To Noise Ratio Of the Encrypted Framesmentioning
confidence: 99%
“…For this purpose, fast and lightweight encryption algorithms are used in frequency conversion. Discrete cosine transform (DCT) and wavelet transform are usually used for multimedia data including video [6][7][8]. The most necessary and important information is available only in some of the initial coefficients in DCT transform [9].…”
Section: Introductionmentioning
confidence: 99%
“…With the advancement of the computing technology, the holographic encryption process can be conducted with numerical means or a combination of numerical and optical means, which are more flexible and easier to implement than the classical optical methods. Along this direction, successful attempts have been made and published on the digital holographic processing techniques for information security [9][10][11][12][13]. Despite the success achieved to date on digital holography encryption, there are a number of problems which have become identified as areas of investigation in recent years.…”
Section: Introductionmentioning
confidence: 99%
“…여기에는 디지털 홀로그램의 획득/생 성, 홀로그램 영상 디스플레이뿐만 아니라 디지털 홀로그 램 데이터의 압축 [5] , 정보보호 [6] , 정보보안 [7] , 심지어는 디 지털 홀로그램 데이터를 서비스하기 위한 시스템 [8] 까지 포함되고 있다. 특히 [9] [10][11][12] .…”
unclassified