2015
DOI: 10.1016/j.optlaseng.2014.08.016
|View full text |Cite
|
Sign up to set email alerts
|

Modified computational integral imaging-based double image encryption using fractional Fourier transform

Abstract: a b s t r a c tIn this paper, we propose an image encryption technique to simultaneously encrypt double or multiple images into one encrypted image using computational integral imaging (CII) and fractional Fourier transform (FrFT). In the encryption, each of the input plane images are located at different positions along a pickup plane, and simultaneously recorded in the form of an elemental image array (EIA) through a lenslet array. The recorded EIA to be encrypted is multiplied by FrFT with two different fra… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
16
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
9
1

Relationship

1
9

Authors

Journals

citations
Cited by 49 publications
(16 citation statements)
references
References 22 publications
0
16
0
Order By: Relevance
“…However, the method is only applied to encrypt a 2D image. 3D image encryption techniques based on computational integral imaging were proposed [31]. In the method, computational integral imaging is applied to pick up double images to generate EIA; then the EIA is encrypted by a cryptographic technology.…”
Section: Introductionmentioning
confidence: 99%
“…However, the method is only applied to encrypt a 2D image. 3D image encryption techniques based on computational integral imaging were proposed [31]. In the method, computational integral imaging is applied to pick up double images to generate EIA; then the EIA is encrypted by a cryptographic technology.…”
Section: Introductionmentioning
confidence: 99%
“…During the past two decades, a large number of image encryption systems have been proposed after Refregier and Javide encrypted a primary image into stationary white noise using the double random phase encoding (DRPE) in the Fourier domain [1]. Due to the capability of the DRPE to ensure the security of the data transmission and communication, this algorithm has been developed based on different transforms, such as the general fractional Fourier transform [2][3][4][5], the vector power multiple-parameter fractional Fourier transform [6], the Fresnel transform [7], and the Gyrator transform [8][9][10][11]. However, most cryptosystems are linear, which makes them vulnerable to potential attacks such as the chosen plaintext attack.…”
Section: Introductionmentioning
confidence: 99%
“…Generally, Chen et al [24] provided a detailed description on the current and future development. Recently, researchers developed novel schemes based on other optics techniques such as coherent diffractive imaging [25], polarized light encoding [26], interference [27][28][29], holography [30] and integral imaging [31].…”
Section: Introductionmentioning
confidence: 99%