2012
DOI: 10.1016/j.optcom.2011.11.025
|View full text |Cite
|
Sign up to set email alerts
|

Double image encryption using double pixel scrambling and random phase encoding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
12
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 58 publications
(12 citation statements)
references
References 22 publications
0
12
0
Order By: Relevance
“…A digital counterpart of the conventional DRPE system is vulnerable to some organized attacks [9][10][11][12] . Thereafter, many studies for instance, pixel scrambling [13][14][15][16] , random permutation technique 17 and photon-counting approaches [18][19][20] that associated with the classical encryption system, regarded as enhancing the information security. It however is widely accepted that the security of any encryption system depends on the keys used and therefore the larger the key-space the more the security will be 5 .…”
Section: Introductionmentioning
confidence: 99%
“…A digital counterpart of the conventional DRPE system is vulnerable to some organized attacks [9][10][11][12] . Thereafter, many studies for instance, pixel scrambling [13][14][15][16] , random permutation technique 17 and photon-counting approaches [18][19][20] that associated with the classical encryption system, regarded as enhancing the information security. It however is widely accepted that the security of any encryption system depends on the keys used and therefore the larger the key-space the more the security will be 5 .…”
Section: Introductionmentioning
confidence: 99%
“…But, with encryption, data though unreadable still remains as data which is somewhat vulnerable to easy decryption. This problem came to be solved by 'STEGANOGRAPHY' [1].…”
Section: Introductionmentioning
confidence: 99%
“…Wang et al [39] used linear blend operation to combine pixel values of two original images, and then Contents lists available at ScienceDirect journal homepage: www.elsevier.com/locate/optcom constituted a complex image which is encrypted into the ciphertext based on DRPE. Zhong et al [40] constituted a complex function with two scrambled images that are confused by using double pixel scrambling technique, and then encoded the complex function into stationary white noise based on DRPE in the fractional Fourier domain. To enhance the robustness against the specific attack proposed in [41], Zhao and Wang [42] proposed an asymmetric algorithm based on phase truncation, where original images are encrypted into an amplitude cyphertext and two phase-only masks are considered as the decryption keys.…”
Section: Introductionmentioning
confidence: 99%