2019
DOI: 10.1088/2040-8986/ab1e32
|View full text |Cite
|
Sign up to set email alerts
|

Optical voice information hiding using enhanced iterative algorithm and computational ghost imaging

Abstract: Recently, optical techniques have been studied extensively for securing grayscale and colour images. However, at the present time, a lot of sensitive information has also been transmitted in the form of audio/voice signals, thus, the development of secure optical transmission systems for voice signals is also very important. In this paper, we present a new optical cryptosystem for the secure transmission of voice/audio signals. The voice information is distributed among two phase masks and a security image usi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
9
1

Relationship

2
8

Authors

Journals

citations
Cited by 18 publications
(5 citation statements)
references
References 49 publications
(109 reference statements)
0
4
0
Order By: Relevance
“…Then, they also extended this encryption scheme from FT domain to FrT domain, FrFT domain and GT domain [24][25][26]. In addition, Kumar et al [27] proposed an optical voice encryption scheme based on enhanced iterative algorithm and computational ghost imaging.…”
Section: Introductionmentioning
confidence: 99%
“…Then, they also extended this encryption scheme from FT domain to FrT domain, FrFT domain and GT domain [24][25][26]. In addition, Kumar et al [27] proposed an optical voice encryption scheme based on enhanced iterative algorithm and computational ghost imaging.…”
Section: Introductionmentioning
confidence: 99%
“…Researchers also proposed a multi-image encryption and authentication algorithm based on the optical interference induced by binary random masks (BRMs) [23,29,34,37]. Various authentication and encryption algorithms have been developed using the PTFT, polarization lights, ghost imaging, compressive sensing, joint transform correlation, ptychography, and sparse representation [23,25,32,[38][39][40][41][42][43]. Despite their respective advantages, the aforementioned schemes still have some shortcomings in terms of complicated encryption procedures, difficulty in key distribution, and practical implementations.…”
Section: Introductionmentioning
confidence: 99%
“…A large amount of data brings with it a security problem. Optical cryptography techniques are highly noticeable in the encryption field since optical processing has several remarkable characteristics such as fast information processing and sending, the ability to operate in the phase of the signal or image, physically applicable, and multi-dimensional image processing features [1]. Refregier and Javidi's double-random phase encoding (DRPE) is the first study in this field [2] and it has inspired a number of optical encryption techniques using some optical basis such as phase truncated Fourier transform (PTFT) [3], interference [4], phase retrieval [5] and diffractive imaging [6].…”
Section: Introductionmentioning
confidence: 99%