2015
DOI: 10.1016/j.optlastec.2015.01.016
|View full text |Cite
|
Sign up to set email alerts
|

Gyrator transform based double random phase encoding with sparse representation for information authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
13
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 39 publications
(13 citation statements)
references
References 34 publications
0
13
0
Order By: Relevance
“…At the same time, CS can compress the signal in the process of acquisition, so as to reduce the data volume and achieve the purpose of reducing data storage and power consumption [12], [14]. At present, CS has been widely used for signal acquisition and processing [15]- [18]. When applied in WBSN, CS can significantly improve the monitoring efficiency of the bio-sensors and furthermore extend the monitoring durations [8], [19].…”
Section: Introductionmentioning
confidence: 99%
“…At the same time, CS can compress the signal in the process of acquisition, so as to reduce the data volume and achieve the purpose of reducing data storage and power consumption [12], [14]. At present, CS has been widely used for signal acquisition and processing [15]- [18]. When applied in WBSN, CS can significantly improve the monitoring efficiency of the bio-sensors and furthermore extend the monitoring durations [8], [19].…”
Section: Introductionmentioning
confidence: 99%
“…For instance, the extracted phase mask can be compressed [31], and only some sparse pixels in the extracted phase mask are available to the receivers. Hence, nonlinear correlation algorithm [31][32][33][34][35][36][37][38][39][40][41][42][43][44][45] can be further applied to verify the decoded images without information disclosure by connecting to a remote database. It is demonstrated [31,38] that it is possible to generate a new layer to enhance CGH-based system security.…”
Section: Introductionmentioning
confidence: 99%
“…1 Many others could be regarded as its variations, which are based on Fourier transform (FT) and its different generalizations, such as fractional Fourier transform (FrFT), 2-7 discrete fractional random transform (DFrRT), [8][9][10][11][12] gyrator transform (GT), [13][14][15][16][17] Fresnel transform, [18][19][20][21][22][23] and fractional Mellin transform. Various image cryptosystems have been designed and verified for security in the past two decades.…”
Section: Introductionmentioning
confidence: 99%