1999
DOI: 10.1364/josaa.16.001915
|View full text |Cite
|
Sign up to set email alerts
|

Fully phase encrypted image processor

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
93
0
4

Year Published

2005
2005
2014
2014

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 211 publications
(98 citation statements)
references
References 10 publications
1
93
0
4
Order By: Relevance
“…The methods have been proved to be useful by numerical simulations. Phase-coding techniques have widely been used due to the suitability for optical encoding and decoding with high degree of security (Neto & Sheng, 1996, Javidi & Ahouzi, 1998, Towghi et al, 1999, Tan et al, 2000, and Mogensen &Gluckstad, 2000. However, they have some difficulties due to the lack of efficient optical devices used in the systems.…”
Section: Methods Of Phase-codingmentioning
confidence: 99%
“…The methods have been proved to be useful by numerical simulations. Phase-coding techniques have widely been used due to the suitability for optical encoding and decoding with high degree of security (Neto & Sheng, 1996, Javidi & Ahouzi, 1998, Towghi et al, 1999, Tan et al, 2000, and Mogensen &Gluckstad, 2000. However, they have some difficulties due to the lack of efficient optical devices used in the systems.…”
Section: Methods Of Phase-codingmentioning
confidence: 99%
“…The image decryption-decompression process is processed according to the equation (26). The computation in decryption-decompression consist inversion of the matrices and multiplication with reverse order of the 2D MPDFRFT so the complexity remains same during encryption-compression and decompressiondecryption process.…”
Section: Computation Complexitymentioning
confidence: 99%
“…In recent years there have been a number of proposed attacks [92][93][94][95][96][97] on DRPE-type encryption systems, including those systems that operate exclusively with phase [98,99]. Many of these attacks have shown that by only approximating the key one can get adequate decryption of encrypted images.…”
Section: Optical Image Encryptionmentioning
confidence: 99%