2021
DOI: 10.1088/1555-6611/abee86
|View full text |Cite
|
Sign up to set email alerts
|

Research on multiple-image encryption scheme based on joint power spectral division multiplexing and ghost imaging

Abstract: Since there are problems of easy cross-talk, large ciphertext transmission and low security in the process of multiple-image encryption, in order to solve these problems, a multiple-image encryption algorithm based on joint power spectral division multiplexing and ghost imaging (GI) is proposed. The joint transform correlator is combined with GI to realize ‘one encryption to one key’, which improves the security of the encryption system. Joint power spectrum (JPS) is compressed by the iterative restoration alg… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 22 publications
0
2
0
Order By: Relevance
“…The remote sensing images are encrypted by the classical diffusion method of cyclic left-side modetaking and mode-adding. Currently, there is a growing number of the general image encryption schemes; However, there is a deficiency of encryption solutions that combine different kinds of algorithms to achieve enhanced the resistance to cracking [23][24][25]. To solve the above problems, the encryption scheme based on the HACLML system is designed.…”
Section: Introductionmentioning
confidence: 99%
“…The remote sensing images are encrypted by the classical diffusion method of cyclic left-side modetaking and mode-adding. Currently, there is a growing number of the general image encryption schemes; However, there is a deficiency of encryption solutions that combine different kinds of algorithms to achieve enhanced the resistance to cracking [23][24][25]. To solve the above problems, the encryption scheme based on the HACLML system is designed.…”
Section: Introductionmentioning
confidence: 99%
“…It also includes the application of fractal ordering theory proposed by Xian et al in image encryption [15][16][17], image encryption schemes based on DNA coding theory [18][19][20], and encryption schemes based on matrix half-tensor products and Boolean networks [21]. Common image and multi-image encryption schemes are growing, but joint encryption schemes for multi-type images are currently absent [22][23][24].…”
Section: Introductionmentioning
confidence: 99%