2010
DOI: 10.1364/oe.18.012033
|View full text |Cite
|
Sign up to set email alerts
|

Double image encryption by using iterative random binary encoding in gyrator domains

Abstract: We propose a double image encryption by using random binary encoding and gyrator transform. Two secret images are first regarded as the real part and imaginary part of complex function. Chaotic map is used for obtaining random binary matrix. The real part and imaginary part of complex function are exchanged under the control of random binary data. An iterative structure composed of the random binary encoding method is designed and employed for enhancing the security of encryption algorithm. The parameters in c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

1
67
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
6
4

Relationship

1
9

Authors

Journals

citations
Cited by 264 publications
(73 citation statements)
references
References 27 publications
1
67
0
Order By: Relevance
“…Rodrigo et al have derived the main properties of the GT [26], designed a setup to optically implement this transform [27] and presented several applications of the GT to image processing [7]. The GT has been utilized in image encryption with: RPMs generated by chaos [28], Arnold transform [29] and iterative random phase encoding [30,31,32], among other works.…”
Section: Introductionmentioning
confidence: 99%
“…Rodrigo et al have derived the main properties of the GT [26], designed a setup to optically implement this transform [27] and presented several applications of the GT to image processing [7]. The GT has been utilized in image encryption with: RPMs generated by chaos [28], Arnold transform [29] and iterative random phase encoding [30,31,32], among other works.…”
Section: Introductionmentioning
confidence: 99%
“…It has been extended to allow other transforms take the place of the optical Fourier transform, such as the Fresnel transform [5] (including by means of a chirp placed in the Fourier plane [6]), fractional Fourier transform [5], [7], and the 1-dimensional linear canonical transform (1D-LCT) [8]. Phase retrieval based on intensities captured in planes related by one specific nonseparable transform, the gyrator transform, have also been reported [9], [10], [11], [12], [13], [14], [15]. The advantage of using these alternative systems is that increased flexibility for the system designer.…”
Section: Introductionmentioning
confidence: 99%
“…Recently, double image encryption schemes [14,15,[17][18][19]30] have attracted research attention. These schemes can improve robustness because they perform encryption using two original images.…”
Section: Introductionmentioning
confidence: 99%