2021
DOI: 10.1007/s11082-021-02864-5
|View full text |Cite
|
Sign up to set email alerts
|

Efficient optical double image cryptosystem using chaotic mapping-based Fresnel transform

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 24 publications
(23 citation statements)
references
References 31 publications
0
17
0
Order By: Relevance
“…We also compare histograms [29] of the source, the encrypted, and the decrypted video frames. Next, we test the noise resistance of the presented opto-video LASM-based FrFT scheme using the peak signal to noise ratio (PSNR), the Structural Similarity Index (SSIM) and the Feature Similarity Index (FSIM) [30]. Finally, we test the immunity of the presented opto-video LASM-based FrFT scheme against some recognized attacks such as occlusion and edge detection.…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…We also compare histograms [29] of the source, the encrypted, and the decrypted video frames. Next, we test the noise resistance of the presented opto-video LASM-based FrFT scheme using the peak signal to noise ratio (PSNR), the Structural Similarity Index (SSIM) and the Feature Similarity Index (FSIM) [30]. Finally, we test the immunity of the presented opto-video LASM-based FrFT scheme against some recognized attacks such as occlusion and edge detection.…”
Section: Resultsmentioning
confidence: 99%
“…After that, we compare the decrypted ciphervideo frame quality. The assessment of the noise immunity is done using visual inspection, the PSNR, the SSIM and the FSIM [30].…”
Section: Noise Immunitymentioning
confidence: 99%
See 2 more Smart Citations
“…In this regard, different types of cryptosystems have been proposed since the encryption is admitted as an effective and direct method to keep confidential information secure from hackers, cyber-criminals, or unauthorized users. There are many image encryption technique in literature based on chaotic maps [1][2][3][4][5][6][7][8][9][10][11].…”
Section: Introductionmentioning
confidence: 99%