2015
DOI: 10.1016/j.optcom.2014.12.085
|View full text |Cite
|
Sign up to set email alerts
|

Generalized Arnold map-based optical multiple color-image encoding in gyrator transform domain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(4 citation statements)
references
References 44 publications
0
4
0
Order By: Relevance
“…To improve the efficiency of image transmission and communication over a network, more and more multipleimage encryption methods have been proposed [17][18][19][20][21]. Situ and Zhang reported the wavelength multiplexing-based multiple-image encryption scheme [16].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…To improve the efficiency of image transmission and communication over a network, more and more multipleimage encryption methods have been proposed [17][18][19][20][21]. Situ and Zhang reported the wavelength multiplexing-based multiple-image encryption scheme [16].…”
Section: Introductionmentioning
confidence: 99%
“…Based on coupled logistic maps and an iterative phase-retrieval process, Sui et al introduced an asymmetric multiple-image encryption technique in the FrFT domain [20], but it has a high computational cost due to its iterative phase-retrieval process. Abuturab designed a multiple-color-image security system based on a generalized Arnold map in the GT domain [21]. However, the plaintexts in most multiple-image encryption methods are manipulated independently, resulting in complicated systems.…”
Section: Introductionmentioning
confidence: 99%
“…To resist an attack such as chosen plaintext attack, the components of the QHT-transformed images are permuted by use of the designed scrambling algorithm based on logistic maps. Since the flexible configuration of the GT based system, which means fixed distances between the generalized lenses and the manipulation of the transformation angle using lens rotation, makes the setup useful for image encryption [19], the GT-based DRPE technique is used to encrypt the images after QHT and permutation. The resulting encrypted signal from the cryptosystem is recorded as interferograms by the three-step PSI.…”
Section: Introductionmentioning
confidence: 99%
“…But, PTFT based cryptosystem has also been found a weakness against known public key attack [21]. To overcome this attack, various improved asymmetric encryptions have been proposed [22][23][24][25][26][27]. Furthermore, an asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of YangGu algorithm has been proposed [28].…”
Section: Introductionmentioning
confidence: 99%