2016
DOI: 10.1007/978-1-4939-3028-9_13
|View full text |Cite
|
Sign up to set email alerts
|

Double Random Phase Encoding Based Optical Encryption Systems Using Some Linear Canonical Transforms: Weaknesses and Countermeasures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(4 citation statements)
references
References 135 publications
0
4
0
Order By: Relevance
“…The DPRE process applies to a phase image a random phase mask followed by a Fourier transform twice in series. While the DPRE scheme maximizes the entropy of the encrypted image, the linearity of the scheme creates vulnerabilities [66], [67]. Thus, [62] proposed an encryption scheme that applies a chaotic pixel mapping based on the famous 3D Lorenz System after the first Fourier transform.…”
Section: Encryption Using Dst Algorithmsmentioning
confidence: 99%
“…The DPRE process applies to a phase image a random phase mask followed by a Fourier transform twice in series. While the DPRE scheme maximizes the entropy of the encrypted image, the linearity of the scheme creates vulnerabilities [66], [67]. Thus, [62] proposed an encryption scheme that applies a chaotic pixel mapping based on the famous 3D Lorenz System after the first Fourier transform.…”
Section: Encryption Using Dst Algorithmsmentioning
confidence: 99%
“…4) The algorithms include a set of weak keys (a sequence of consecutive 1's or 0's) that further weakens the algorithm [15]. 5) The same process of encryption is repeated for a predetermined number of rounds irrespective of the significance of data.…”
Section: Issues In Conventional Symmetric Algorithmsmentioning
confidence: 99%
“…In the meantime, Refregier and Javidi [2] proposed DRPE and it has practised countless enhancements and enlargements by hosting few parameters such as wavelength, propagation distance, and polarization. Various transforms such as discrete cosine transforms (DCT) [3][4][5][6], Fresnel transforms (FrT) [7][8][9][10][11][12], Gyrator transforms (GT) [13][14][15], Hartley transforms (HT) [16][17][18], Fractional Fourier Transforms (FrFT) [19][20][21][22][23][24][25][26][27][28] and LCT [29][30][31][32][33][34][35][36][37][38] are pooled with DRPE system. These transforms are prepared with symmetric cryptosystem.…”
Section: Introductionmentioning
confidence: 99%