2022
DOI: 10.1088/1402-4896/ac925d
|View full text |Cite
|
Sign up to set email alerts
|

Multiuser optical image authentication platform based on sparse constraint and polar decomposition in Fresnel domain

Abstract: In this paper, a new multiuser optical image encryption and authentication technique is proposed. Sparse multiplexing and polar decomposition are used in the Fresnel domain to obtain the ciphertext of an input image. To enable the multiuser platform, multiple private keys are obtained through polar decomposition during the encryption process. It will allow multiple authorized users to access the secure information simultaneously without having the key distribution problem among them. The proposed method has a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 22 publications
(7 citation statements)
references
References 53 publications
0
7
0
Order By: Relevance
“…We modulate the w, R, Q with f, d, q, whose output are cascaded to make it more complicated. We defined a three-dimension logistic collapses cascade map (3D-LCCM) as equation (4).…”
Section: Definition Of Three-dimensional Cascade Mapmentioning
confidence: 99%
See 1 more Smart Citation
“…We modulate the w, R, Q with f, d, q, whose output are cascaded to make it more complicated. We defined a three-dimension logistic collapses cascade map (3D-LCCM) as equation (4).…”
Section: Definition Of Three-dimensional Cascade Mapmentioning
confidence: 99%
“…The security of image information is particularly important and has received extensive attention in recent years [3]. Image encryption is mainly divided into two categories: Spatio-temporal domain-based image encryption and transform domain-based image encryption, such as Chirp-Z transform domain and Fresnel domain-based image encryption [4,5]. The common types of based on space-time domain image encryption algorithms include multimedia scrambling, data stream encryption, reversible cellular automata, wave perturbation and chaos-based image encryption [6][7][8][9][10][11][12][13].…”
Section: Introductionmentioning
confidence: 99%
“…Subsequently, optical encryption algorithms were introduced that offer attributes such as parallel processing, reduced computational complexity and enhanced speed and efficiency. Researchers have proposed optical encryption algorithms using various canonical transforms such as Fresnel transform [3,4], Gyrator transform [5][6][7], and Hartley transform [8]. Subsequently, optical encryption algorithms based on fractional Fourier transform (FrFT) [5,[9][10][11], fractional Mellin transform [12,13] and fractional Hartley transform [14] have been proposed.…”
Section: Introductionmentioning
confidence: 99%
“…Due to the high speed of multidimensional data processing and high freedom of multiply parameters, the optical image encryption attracts more and more attention from researchers. The pioneering work of optical image encryption, which is known as double random phase encoding (DRPE) [1,2], converts a plaintext into one complex-valued ciphertext by two random phase masks. From then on, many other advanced optical transform algorithms [3][4][5][6] are intergraded into DRPE to enlarge the key space foe higher security.…”
Section: Introductionmentioning
confidence: 99%