2012
DOI: 10.1016/j.optlaseng.2011.12.006
|View full text |Cite
|
Sign up to set email alerts
|

Securing color information using Arnold transform in gyrator transform domain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
40
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 96 publications
(40 citation statements)
references
References 29 publications
0
40
0
Order By: Relevance
“…Rodrigo et al have derived the main properties of the GT [26], designed a setup to optically implement this transform [27] and presented several applications of the GT to image processing [7]. The GT has been utilized in image encryption with: RPMs generated by chaos [28], Arnold transform [29] and iterative random phase encoding [30,31,32], among other works.…”
Section: Introductionmentioning
confidence: 99%
“…Rodrigo et al have derived the main properties of the GT [26], designed a setup to optically implement this transform [27] and presented several applications of the GT to image processing [7]. The GT has been utilized in image encryption with: RPMs generated by chaos [28], Arnold transform [29] and iterative random phase encoding [30,31,32], among other works.…”
Section: Introductionmentioning
confidence: 99%
“…One is based on matrix transformation to shift coordinates and the other makes use of permutations of the pixel coordinates. Most of the scrambling approaches are based on an Arnold Transform or a combination of the Arnold Transform with other techniques [5]- [8]. However, these methods are applicable only to equilateral images.…”
Section: Introductionmentioning
confidence: 99%
“…Since development of the double random phase encryption (DRPE) technique [1], in which the image is encoded to be a white noise pattern with two statistically independent random phase masks (RPM), a number of improved DPRE-based image encryption methods have been proposed, to achieve higher security [2][3][4][5][6][7]. Most of the optical encryption methods can be viewed as symmetric cryptosystems, in which the keys for encryption and decryption are identical [8].…”
Section: Introductionmentioning
confidence: 99%