2012
DOI: 10.1016/j.optlaseng.2011.08.006
|View full text |Cite
|
Sign up to set email alerts
|

Double image encryption by using Arnold transform and discrete fractional angular transform

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
27
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 85 publications
(27 citation statements)
references
References 45 publications
0
27
0
Order By: Relevance
“…Supposing the size of the component is M Â N pixels, two sequences with the length of M Â N þ K can be generated by using Eqs. (17) and (18) with different initial values x 0 and y 0 , control parameters α ¼ 1andβ ¼ 3. Denoting two sequences as…”
Section: Logistic Map and Two-dimensional Sine Logistic Modulation Mapmentioning
confidence: 99%
See 1 more Smart Citation
“…Supposing the size of the component is M Â N pixels, two sequences with the length of M Â N þ K can be generated by using Eqs. (17) and (18) with different initial values x 0 and y 0 , control parameters α ¼ 1andβ ¼ 3. Denoting two sequences as…”
Section: Logistic Map and Two-dimensional Sine Logistic Modulation Mapmentioning
confidence: 99%
“…In the past decades, various optical or digital encryption schemes have been investigated for image security, since the well-known double random phase encoding (DRPE) scheme [1] is proposed, in which the image is encrypted into stationary white noise data by multiplying a random phase mask (RPM) in spatial plane and another in the frequency plane. These algorithms make use of Fresnel transform (FrT) [2][3][4], fractional Fourier transform (FrFT) [5][6][7][8][9][10], gyrator transform (GT) [11][12][13], discrete cosine transform (DCT) [14][15][16], fractional angular transform domain [17,18] and others [19][20][21][22]. Alfalou and Brosseau [23] pointed out that these optical techniques can be used for compression operations simultaneously.…”
Section: Introductionmentioning
confidence: 99%
“…Optical techniques have the distinct strength of processing complex two-dimensional (2D) or threedimensional (3D) data in parallel and performing otherwise slow operations at great speeds. Many encryption algorithms have been reported based on different types of optical systems [1][2][3][4][5]. Among these, the most common are double random phase encoding in the Fourier domain, and more recently, in the fractional Fourier domain.…”
Section: Introductionmentioning
confidence: 99%
“…Two RPMs with noise-like distribution are deserved by using statistically independent functions, and the plaintext is encrypted to the ciphertext with stationary white noise distribution. Based on DRPE architecture, a large number of optical encryption methods which make use of Fresnel transform (FrT) [2][3][4][5], fractional Fourier transform (FrFT) [6][7][8][9][10][11][12], gyrator transform (GT) [13][14][15][16], discrete cosine transform (DCT) [16][17][18], fractional angular transform domain [19,20] and other transforms [21][22][23] have focused on encoding information. Besides, some other optical techniques such as coherent diffractive imaging [24], polarized light encoding [25], interference [26][27][28] and holography [29] have been employed for image encoding.…”
Section: Introductionmentioning
confidence: 99%