2015
DOI: 10.1016/j.optcom.2014.09.041
|View full text |Cite
|
Sign up to set email alerts
|

Image communication scheme based on dynamic visual cryptography and computer generated holography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 23 publications
0
8
0
Order By: Relevance
“…Other researchers also proposed DVC scheme for assessing chaotic oscillations [75]. In addition to being able to protect multiple secrets, another advantage of DVC is that its recovered images have high contrast but it suffers from high memory complexity which reduces its effectiveness for real-time applications [71].…”
Section: Number Of Secretsmentioning
confidence: 99%
See 1 more Smart Citation
“…Other researchers also proposed DVC scheme for assessing chaotic oscillations [75]. In addition to being able to protect multiple secrets, another advantage of DVC is that its recovered images have high contrast but it suffers from high memory complexity which reduces its effectiveness for real-time applications [71].…”
Section: Number Of Secretsmentioning
confidence: 99%
“…Although there are schemes that are able to encrypt multiple secrets, they are either inefficient or are difficult to use [31,55,61,71,74,75,102]. For example, schemes that involve rotating shares may lead to decryption errors when the rotation angles are inaccurate [41].…”
Section: Open Problems and Directionsmentioning
confidence: 99%
“…al. [4] "Image communication scheme based on dynamic visual cryptography and computer generated holography" This paper proposes the mixture of dynamic visual cryptography (an optical technique supported the interaction of visual cryptography and time-averaging geometric moiré) with Gerchberg-Saxton algorithmic rule. A stochastic moiré grating is employed to plant the secret into one cover image.…”
Section: Literature Surveymentioning
confidence: 99%
“…SS has many application scenarios, such as access control, transmitting passwords, cloud computing security, block chain security, distributed storage system, etc. [3][4][5][6].…”
Section: Introductionmentioning
confidence: 99%