2016
DOI: 10.1088/1612-2011/13/3/036201
|View full text |Cite
|
Sign up to set email alerts
|

Hierarchical multiple binary image encryption based on a chaos and phase retrieval algorithm in the Fresnel domain

Abstract: Based on the chaos and phase retrieval algorithm, a hierarchical multiple binary image encryption is proposed. In the encryption process, each plaintext is encrypted into a diffraction intensity pattern by two chaos-generated random phase masks (RPMs). Thereafter, the captured diffraction intensity patterns are partially selected by different binary masks and then combined together to form a single intensity pattern. The combined intensity pattern is saved as ciphertext. For decryption, an iterative phase retr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 49 publications
0
7
0
Order By: Relevance
“…• Passively Q-switched thulium-doped fiber laser with silver-nanoparticle film as the saturable absorber for operation at 2.0 µm-a compact thulium-doped fiber laser with a Q-switched output is proposed and demonstrated [75]. • Hierarchical multiple binary image encryption based on a chaos and phase retrieval algorithm in the Fresnel domain-based on the chaos and phase retrieval algorithm, a hierarchical multiple binary image encryption is proposed [76].…”
Section: Photonicsmentioning
confidence: 99%
“…• Passively Q-switched thulium-doped fiber laser with silver-nanoparticle film as the saturable absorber for operation at 2.0 µm-a compact thulium-doped fiber laser with a Q-switched output is proposed and demonstrated [75]. • Hierarchical multiple binary image encryption based on a chaos and phase retrieval algorithm in the Fresnel domain-based on the chaos and phase retrieval algorithm, a hierarchical multiple binary image encryption is proposed [76].…”
Section: Photonicsmentioning
confidence: 99%
“…In image authentication schemes [40,[45][46][47][48][49][50][51], including ciphertexts, all keys and the decryption algorithms are known, and no original information can be observed by an illegal intruder. Some CPE-based authentication schemes [40,46,48] have been proposed in which the ciphertexts are retrieved first and then sparsely sampled.…”
Section: Introductionmentioning
confidence: 99%
“…There is a lot of interest in the area of information security at present time. Popular approach is an optical encryption [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18]. In comparison with more widespread digital encryption, it has a number of advantages: higher speed, a possibility to encrypt data directly in the course of its registration, and also the lack of the accompanying emission in radio frequency range.…”
Section: Introductionmentioning
confidence: 99%