2023
DOI: 10.1016/j.optlaseng.2022.107443
|View full text |Cite
|
Sign up to set email alerts
|

Fourier coded aperture transform hyperspectral imaging system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 21 publications
0
2
0
Order By: Relevance
“…Chaos is widely used and highly respected in the field of image encryption due to its unpredictability, pseudorandomness, and high sensitivity to initial values. At present, a variety of encryption methods have been proposed, including quantum cipher [13][14][15], bit-level encryption [16][17][18], discrete wavelet transform [19][20][21], thumbnail-preserving encryption [22][23][24], biological coding [25][26][27], discrete cosine transform [28][29][30], Fourier transform [31][32][33], chaos theory [34][35][36][37][38][39][40] and so on [41][42][43][44][45].…”
Section: Introductionmentioning
confidence: 99%
“…Chaos is widely used and highly respected in the field of image encryption due to its unpredictability, pseudorandomness, and high sensitivity to initial values. At present, a variety of encryption methods have been proposed, including quantum cipher [13][14][15], bit-level encryption [16][17][18], discrete wavelet transform [19][20][21], thumbnail-preserving encryption [22][23][24], biological coding [25][26][27], discrete cosine transform [28][29][30], Fourier transform [31][32][33], chaos theory [34][35][36][37][38][39][40] and so on [41][42][43][44][45].…”
Section: Introductionmentioning
confidence: 99%
“…Snapshot hyperspectral imaging requires longer measurement times to obtain detailed spectral information. This limits its suitability for high-speed, dynamic 3D imaging applications [9].…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, the utilization of image encryption techniques can effectively prevent important data from being leaked during transmission. Many encryption methods have been proposed, such as quantum cipher [1][2][3], thumbnail-preserving encryption [4][5][6][7], biological coding [8][9][10], discrete wavelet transform [11][12][13], discrete cosine transform [14][15][16], bit-level encryption [17][18][19], Fourier transform [20][21][22], chaos theory [23][24][25], and so on [26][27][28]. Moreover, the unpredictability, pseudo-randomness, and high sensitivity to initial values of chaos make it the most effective and widely used approach for image encryption algorithms.…”
Section: Introductionmentioning
confidence: 99%