2018
DOI: 10.1364/osac.1.001370
|View full text |Cite
|
Sign up to set email alerts
|

Multiple-image encryption by space multiplexing based on vector quantization and interference

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 44 publications
0
4
0
Order By: Relevance
“…As it is recognized by more and more researchers, using additional mechanism of information hiding in the encryption and authentication processes can further enhance the security level. Sui et al [ 51 ] carried original images into their corresponding quick response codes, and then converted them into index images by the means of vector quantization. After these images are integrated into an interim distribution, the ciphertext image is generated using interference.…”
Section: Related Workmentioning
confidence: 99%
“…As it is recognized by more and more researchers, using additional mechanism of information hiding in the encryption and authentication processes can further enhance the security level. Sui et al [ 51 ] carried original images into their corresponding quick response codes, and then converted them into index images by the means of vector quantization. After these images are integrated into an interim distribution, the ciphertext image is generated using interference.…”
Section: Related Workmentioning
confidence: 99%
“…Higher compression rates can be achieved with vector quantization, a block-based efficiency picture compression coding technique. If the simple picture does not closely match, the rebuilt image has visible blocking artifacts [15,16]. e codebook y � y j 􏽮 􏽯 m j�1 in vector, and quantization can be generated by equation ( 3):…”
Section: 2mentioning
confidence: 99%
“…Therefore, in practical applications, we often choose the appropriate number of measurements according to the encryption time and the required quality of the decrypted image. In addition, data containers [30] and deep learning techniques [27] are also effective methods commonly used to enhance the quality of decrypted images in CGI encryption systems.…”
Section: Practical Application Analysismentioning
confidence: 99%