2014
DOI: 10.7149/opa.47.1.35
|View full text |Cite
|
Sign up to set email alerts
|

Images encryption system based on a fractional joint transform correlator and nonlinear filtering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

1
14
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(15 citation statements)
references
References 15 publications
1
14
0
Order By: Relevance
“…The DRPE system implemented with a JTC is also vulnerable to CPA [12], KPA [13] and COA [14]. Other modifications of the JTC architecture in different optical processing domains to implement the DRPE system have been proposed by several authors [15][16][17][18][19][20][21][22]. These new proposals simplify the optical setup of the encryption system, increase the security of the encryption system and improve the quality of the decrypted image.…”
Section: Introductionmentioning
confidence: 99%
“…The DRPE system implemented with a JTC is also vulnerable to CPA [12], KPA [13] and COA [14]. Other modifications of the JTC architecture in different optical processing domains to implement the DRPE system have been proposed by several authors [15][16][17][18][19][20][21][22]. These new proposals simplify the optical setup of the encryption system, increase the security of the encryption system and improve the quality of the decrypted image.…”
Section: Introductionmentioning
confidence: 99%
“…(12) given by the term |h α (u, v)| 2 in the denominator, permits the retrieval of the original image in Eq. (14) [14,15,17,18]. The decryption scheme presented in Fig.…”
Section: Decryption Schemementioning
confidence: 99%
“…We eliminate the central orders (|t α (u, v)| 2 and |h α (u, v)| 2 ) of the JGPD. This modified JGPD is then divided by the nonlinear term |h α (u, v)| 2 in order to obtain the encrypted image [13,17,18] …”
Section: Encryption Schemementioning
confidence: 99%
See 1 more Smart Citation
“…One of the main drawbacks of the image encryption systems based on the initial DRPE is that the security of the system is vulnerable to attacks, this weakness is due to the linear property of the DRPE scheme [1][2][3]. The DRPE has been further extended from the Fourier domain to the Fresnel domain [4][5][6], the fractional Fourier domain [7][8][9][10][11][12], the Gyrator domain (GD) [13][14][15][16] and other domains [17][18][19][20], with the purpose of adding more keys and increasing the security of the DRPE system.The Gyrator transform (GT) is a mathematical tool for analysis and processing of twodimensional signals [21]. The GT has been used in optics [22], signal processing [13] and image encryption [13][14][15][16].…”
mentioning
confidence: 99%