2014
DOI: 10.1016/j.optlastec.2013.10.015
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic visual cryptography for optical assessment of chaotic oscillations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 15 publications
0
7
0
Order By: Relevance
“…In this scheme, more secrets can be revealed by overlapping folded shares. Other researchers also proposed DVC scheme for assessing chaotic oscillations [75]. In addition to being able to protect multiple secrets, another advantage of DVC is that its recovered images have high contrast but it suffers from high memory complexity which reduces its effectiveness for real-time applications [71].…”
Section: Number Of Secretsmentioning
confidence: 99%
See 1 more Smart Citation
“…In this scheme, more secrets can be revealed by overlapping folded shares. Other researchers also proposed DVC scheme for assessing chaotic oscillations [75]. In addition to being able to protect multiple secrets, another advantage of DVC is that its recovered images have high contrast but it suffers from high memory complexity which reduces its effectiveness for real-time applications [71].…”
Section: Number Of Secretsmentioning
confidence: 99%
“…Although there are schemes that are able to encrypt multiple secrets, they are either inefficient or are difficult to use [31,55,61,71,74,75,102]. For example, schemes that involve rotating shares may lead to decryption errors when the rotation angles are inaccurate [41].…”
Section: Open Problems and Directionsmentioning
confidence: 99%
“…Visual cryptography is one of the cryptographic techniques that encrypt the visual information in such a manner that the method of decryption is performed without the aid of computers. Dynamic cryptography using chaos oscillations introduced in [5] provided a completely visual decoding process. Scale Invariant Feature Transform (SIFT) [6] was introduced to improve the retrieval or decoding performance using local key point descriptors.…”
Section: Introductionmentioning
confidence: 99%
“…The moiré effect, as a specific optical phenomenon and a tool for image processing and precision measurement, has been widely used in scientific research and engineering practice [29][30][31][32]. In recent years, some researchers have studied the issues of various information security systems [33][34][35] and the authentication of documents [36,37], which are based on the theory of the moiré effect. However, to the best of our knowledge, most of these approaches have been limited to using linear gratings.…”
Section: Introductionmentioning
confidence: 99%
“…In this paper, we proposed a simple optical authentication scheme based on the moiré effect of nonlinear gratings in phase space. Admittedly, there are some techniques based on the moiré effect using two linear gratings [33][34][35][36][37]. However, as we know, the moiré effect is in no way restricted to linear gratings and the relationship of phase functions is also suitable for nonlinear gratings, which could increase the quantity of application possibilities.…”
Section: Introductionmentioning
confidence: 99%