2011
DOI: 10.1016/j.ijleo.2010.11.016
|View full text |Cite
|
Sign up to set email alerts
|

Double random-phase encryption based on discrete quaternion fourier-transforms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
32
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(32 citation statements)
references
References 11 publications
0
32
0
Order By: Relevance
“…This is done by setting two random phase masks in the input and the Fourier planes. Since the publication of this method, the DRPE scheme has been applied in different domains, such as fractional Fourier transform (FRT) 9,10 , Fresnel transform (FrT) 11,12,13 , gyrator transform (GT) 14,15 , quaternion Fourier transform 16 , diffractive imaging 17 , dual fractional Fourier-wavelet 18 , fractional Mellin 19 , and Hartley transform 20 . Nevertheless, it has been demonstrated that DRPE scheme is vulnerable to some type of attacks 21,22,23 and due to its high shift sensitivity, it requires high alignment accuracy in the spatial domain systems.…”
Section: Introductionmentioning
confidence: 99%
“…This is done by setting two random phase masks in the input and the Fourier planes. Since the publication of this method, the DRPE scheme has been applied in different domains, such as fractional Fourier transform (FRT) 9,10 , Fresnel transform (FrT) 11,12,13 , gyrator transform (GT) 14,15 , quaternion Fourier transform 16 , diffractive imaging 17 , dual fractional Fourier-wavelet 18 , fractional Mellin 19 , and Hartley transform 20 . Nevertheless, it has been demonstrated that DRPE scheme is vulnerable to some type of attacks 21,22,23 and due to its high shift sensitivity, it requires high alignment accuracy in the spatial domain systems.…”
Section: Introductionmentioning
confidence: 99%
“…However, the plaintexts in most multiple-image encryption methods are manipulated independently, resulting in complicated systems. Additionally, the increase in keys, such as the whole RPMs that have to be sent to the receiver side for decryption, in the aforementioned DRPE-based encryption schemes make it difficult to save and distribute the keys expediently and safely [22][23].…”
Section: Introductionmentioning
confidence: 99%
“…Li and Zhao [16] designed a color image encryption based on the fractional HT. However, the aforementioned encryption methods for color image ignore the potential interactions between different color channels [17,18]. In these methods, a color image is separated into the three color channels, and encryption is carried out in each channel independently.…”
Section: Introductionmentioning
confidence: 99%