2020
DOI: 10.1117/1.oe.59.10.102411
|View full text |Cite
|
Sign up to set email alerts
|

Multiple-image encryption based on optical scanning holography using orthogonal compressive sensing and random phase mask

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 24 publications
0
5
0
Order By: Relevance
“…The visual analysis is the most important assessment tool utilized to appraise the security strength and efficiency of the suggested cryptosystem. The examined color medical images and their encrypted versions with the suggested optical asymmetric cryptosystem and the conventional optical symmetric DRPE and OSH cryptosystems [7,9,10,22] are displayed in Fig. 2.…”
Section: Visual Resultsmentioning
confidence: 99%
“…The visual analysis is the most important assessment tool utilized to appraise the security strength and efficiency of the suggested cryptosystem. The examined color medical images and their encrypted versions with the suggested optical asymmetric cryptosystem and the conventional optical symmetric DRPE and OSH cryptosystems [7,9,10,22] are displayed in Fig. 2.…”
Section: Visual Resultsmentioning
confidence: 99%
“…The photodetector receives all light and converts it to an electrical holography output, which can be displayed on the monitor or stored on the computer. The OSH transfers the outcome optical information into an electrical signal [23]. In this paper, speech signal spectrogram is encrypted using the OSH algorithm.…”
Section: Optical Scanning Holography Algorithmmentioning
confidence: 99%
“…The object T o ði; jÞ initially may be complex. The object intensity, jT o ði; jÞj 2 is processed by a real and non-negative quantity, |Φ b (i, j)| 2 [23].…”
Section: Optical Scanning Holography Algorithmmentioning
confidence: 99%
“…These optical color image and multiple-image encryption systems use different input illumination wavelengths and several key codes or RPMs that can be utilized as new security keys to improve the security level of the encryption system. Optical encryption methods recently included the ability to cipher multiple images [ 41 , 42 , 43 , 44 , 45 , 46 , 47 ]. In general, this approach achieves a higher level of security because two or more pieces of information are encoded in the encryption procedure, and their decryption allows for the validation of more than one signal, unlike the first systems that dealt with a unique primary image.…”
Section: Introductionmentioning
confidence: 99%
“…The multiple-image encryption system in [ 46 ] was based on the optical interference by wavelength multiplexing in the Fresnel domain in order to generate two encrypted images. A nonlinear multiple-image encryption method was described in [ 47 ] by using optical scanning holography with a random-phase mask (RPM) and orthogonal compressive sensing.…”
Section: Introductionmentioning
confidence: 99%