2011
DOI: 10.1016/j.ijleo.2010.06.010
|View full text |Cite
|
Sign up to set email alerts
|

Fast algorithm of discrete gyrator transform based on convolution operation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 67 publications
(30 citation statements)
references
References 18 publications
0
30
0
Order By: Relevance
“…2 (Part II) is based on two successive GTs and a phase retrieval function. These operations in the decryption scheme can be carried out by either optoelectronics [27] or digital [37] implementations. Figure 3 shows an example to illustrate the simulation results obtained when using the encryption and decryption schemes presented in subsections 3.1 and 3.2.…”
Section: Decryption Schemementioning
confidence: 99%
See 1 more Smart Citation
“…2 (Part II) is based on two successive GTs and a phase retrieval function. These operations in the decryption scheme can be carried out by either optoelectronics [27] or digital [37] implementations. Figure 3 shows an example to illustrate the simulation results obtained when using the encryption and decryption schemes presented in subsections 3.1 and 3.2.…”
Section: Decryption Schemementioning
confidence: 99%
“…The encrypted image e α (u, v) for the rotation angle α = 0.885π in the GT is depicted in Fig. 3(c); the digital GT was implemented using the fast algorithm of discrete GT based on convolution operation [37]. The final distributions in phase for the output plane of the decryption scheme with the correct values keys, the rotation angle α of GT, and the RPMs r(x, y) and h(x, y), are shown in Fig.…”
Section: Decryption Schemementioning
confidence: 99%
“…[22]. The digital GT will be computed using the fast algorithm of discrete GT based on convolution operation [24] for the nonlinear image encryption-decryption system that it will be described in section 5.…”
Section: The Gyrator Transformmentioning
confidence: 99%
“…When the PhCT is applied to the complex-valued image d(x), a photon-limited amplitude information |d(x)|, is generated from the normalized amplitude image g(x) = |d(x)|/ M j=1 |d(x j )| using the equation (4). The pixels that receive at least one photon count are considered in the photon-limited encrypted function d ph (x).…”
Section: Photon Counting Technique (Phct)mentioning
confidence: 99%
“…Figure 1(e) shows the amplitude of the photon-limited encrypted image |e ph (x, y)|, corresponding to figure 1(c) figure 1(f). The digital GT was implemented using the fast algorithm of the discrete GT based on convolution operation [4].…”
Section: Integration Of the Phct With The Drpe In The Gd For Secure Imentioning
confidence: 99%