2005
DOI: 10.1117/1.1906240
|View full text |Cite
|
Sign up to set email alerts
|

Image encryption by using fractional Fourier transform and jigsaw transform in image bit planes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
34
1

Year Published

2009
2009
2022
2022

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 50 publications
(35 citation statements)
references
References 16 publications
0
34
1
Order By: Relevance
“…Nishchal et al [27] have investigated a method to encrypt and decrypt a 2D amplitude image by using jigsaw transform and a localized FrFT. Sinha and Singh [28] have investigated a technique to encrypt the image by juxtaposition of sections in image bit plane using FrFT. Image encryption based on gyrator transform and two-step phase-shifting interferometry has also been done [29].…”
Section: Article In Pressmentioning
confidence: 99%
“…Nishchal et al [27] have investigated a method to encrypt and decrypt a 2D amplitude image by using jigsaw transform and a localized FrFT. Sinha and Singh [28] have investigated a technique to encrypt the image by juxtaposition of sections in image bit plane using FrFT. Image encryption based on gyrator transform and two-step phase-shifting interferometry has also been done [29].…”
Section: Article In Pressmentioning
confidence: 99%
“…In addition, the DRPE has been investigated for use in multiple-image encryption [46][47][48] and color image encryption [49][50][51][52][53][54][55][56]. The image scrambling techniques, which can be viewed as computer based numerical preprocessing procedure, have also been applied in conjunction with theDRPE system using the Jigsaw transform (JT) [57][58][59] and the Arnold transform (ART) [60][61][62][63][64]. Recently, the computational ghost imaging technique has been proposed for encrypting and transmitting information, where the encrypted image appears to be an intensity vector instead of a complex-valued matrix in the typical DRPE system [65,66].…”
Section: Introductionmentioning
confidence: 99%
“…Moreover some optical processes or transforms [9][10][11][12][13][14][15][16][17][18][19][20][21][22][23] have been considered for changing the pixel value of image. The scrambling operations, such as Arnold transform and jigsaw transform, are used to make the change of sequence of image pixels [24][25][26][27][28][29][30][31][32][33]. A secret image can be randomized by an encryption scheme composed of random reversible process.…”
Section: Introductionmentioning
confidence: 99%