2018
DOI: 10.1109/access.2018.2884013
|View full text |Cite
|
Sign up to set email alerts
|

A Double-Image Encryption Scheme Based on Amplitude-Phase Encoding and Discrete Complex Random Transformation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
8
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 30 publications
(8 citation statements)
references
References 44 publications
0
8
0
Order By: Relevance
“…In detail, the asymmetric method of encryption is essential to complete the process by using a public key [3] and in pertaining to the SKE (Symmetric Key Encryption) the common key will be exchanged among the transceiver nodes. When compared between both the kind of encryption techniques, SKE criteria is found to be effective, simple, and faster for the macro image size, but the key management is crucial for SKE, as the key among the sender and receiver need to be safely communicated in the communication system defending with the untrusted intruder [7,8,9]. Whereas on the other side of the PKE (Public Key Encryption) will ensure the various issues by addressing a pair of keys such as private and public keys that are securely used for decryption and encryption activities respectively.…”
Section: Introductionmentioning
confidence: 99%
“…In detail, the asymmetric method of encryption is essential to complete the process by using a public key [3] and in pertaining to the SKE (Symmetric Key Encryption) the common key will be exchanged among the transceiver nodes. When compared between both the kind of encryption techniques, SKE criteria is found to be effective, simple, and faster for the macro image size, but the key management is crucial for SKE, as the key among the sender and receiver need to be safely communicated in the communication system defending with the untrusted intruder [7,8,9]. Whereas on the other side of the PKE (Public Key Encryption) will ensure the various issues by addressing a pair of keys such as private and public keys that are securely used for decryption and encryption activities respectively.…”
Section: Introductionmentioning
confidence: 99%
“…A number of image encryption schemes have been developed using different approaches [ 4 , 5 , 6 , 7 , 8 , 9 , 10 , 11 , 12 , 13 , 14 ]. Hua et al [ 12 ] developed a highly secure image encryption algorithm, where pixels are shuffled via the principle of the Josephus problem and diffusion is obtained by a filtering technology.…”
Section: Introductionmentioning
confidence: 99%
“…Subsequently, the gyrator transform is introduced to enhance the DIE technique cooperated with iterative random binary encoding [19], pixel scrambling [20,21], and iterative phase retrieval algorithm [22]. Meanwhile, discrete fractional random transform (DFrRT) is also proved to be an effective approach to DIE [23,24]. Besides, the asymmetric strategy with phase truncation (PT) has been employed in DIE [25,26,27].…”
Section: Introductionmentioning
confidence: 99%