2020
DOI: 10.1007/s11276-019-02223-z
|View full text |Cite
|
Sign up to set email alerts
|

Computer generated hologram-based image cryptosystem with multiple chaotic systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 41 publications
0
1
0
Order By: Relevance
“…Ghost imaging, on the other hand, involves capturing information through correlated intensity measurements of entangled photon pairs, providing a novel means of encryption that leverages quantum properties [104][105][106][107][108][109][110][111][112][113]. Holography-based encryption relies on the creation and reconstruction of holograms to encode and decode information [114][115][116][117][118][119][120][121][122][123]. These holographic encryption methods offer unique advantages, such as resistance to certain types of attacks and the ability to secure information in various modalities, contributing to the growing landscape of advanced cryptographic techniques in an era where data security is paramount [124][125][126][127][128][129][130][131].…”
Section: Other Optical Encryption Algorithmsmentioning
confidence: 99%
“…Ghost imaging, on the other hand, involves capturing information through correlated intensity measurements of entangled photon pairs, providing a novel means of encryption that leverages quantum properties [104][105][106][107][108][109][110][111][112][113]. Holography-based encryption relies on the creation and reconstruction of holograms to encode and decode information [114][115][116][117][118][119][120][121][122][123]. These holographic encryption methods offer unique advantages, such as resistance to certain types of attacks and the ability to secure information in various modalities, contributing to the growing landscape of advanced cryptographic techniques in an era where data security is paramount [124][125][126][127][128][129][130][131].…”
Section: Other Optical Encryption Algorithmsmentioning
confidence: 99%