Electronics, Robotics and Automotive Mechanics Conference (CERMA'06) 2006
DOI: 10.1109/cerma.2006.38
|View full text |Cite
|
Sign up to set email alerts
|

Digital Images Phase Encryption Using Fractional Fourier Transform

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0
1

Year Published

2008
2008
2014
2014

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 18 publications
(8 citation statements)
references
References 2 publications
0
7
0
1
Order By: Relevance
“…x (2) x (13) x (3) x (12) X(4) X(5) X(6) X(7) x (4) x (11) x (5) x ( x (6) x (9) x (7) x (8) X (12) X (13) X (14) X (15) x (2) x (5) x (3) x(4) …”
Section: Discussionunclassified
See 2 more Smart Citations
“…x (2) x (13) x (3) x (12) X(4) X(5) X(6) X(7) x (4) x (11) x (5) x ( x (6) x (9) x (7) x (8) X (12) X (13) X (14) X (15) x (2) x (5) x (3) x(4) …”
Section: Discussionunclassified
“…The introduction of independent parameters in discrete transforms provides an additional important propriety. For example, the independent parameters of the generalized versions of the DFT, DHT or DCT have been used in [1] as an additional secret key for watermarking and in [2] for encryption.…”
Section: Introduction and Background Materialsmentioning
confidence: 99%
See 1 more Smart Citation
“…Both the DCT and KLT have more computational complexity than the slant transform. Therefore, the need arises for slant transform improvement schemes that yield performance comparable to that of the KLT and DCT without incurring their computational complexity [10][11][12][13][14][15][16][17][18][19][20]. Therefore, various generalizations of the WHTs and DFTs have been attempted.…”
Section: Introductionmentioning
confidence: 99%
“…It has been shown that parametric transforms can have more flexibility and a wider range of applications compared to its original transform. For example, the independent parameters of the fractional discrete transform are used as an additional secret key for watermarking [5], encryption [4,17], error-correcting codes, etc. From this point of view, parametric transforms with matrices described in a unified form and based on a set of parameters become more and more important.…”
Section: Introductionmentioning
confidence: 99%