2015
DOI: 10.1016/j.optcom.2014.10.018
|View full text |Cite
|
Sign up to set email alerts
|

Optical image cryptosystem using chaotic phase-amplitude masks encoding and least-data-driven decryption by compressive sensing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(4 citation statements)
references
References 28 publications
0
4
0
Order By: Relevance
“…Compressive sensing (CS), also referred to sparse signal sampling, was introduced by work of Donoho, Candes [157,158]. CS is able to achieve compression and signal sampling simultaneously [118,159,160]. For a signal of bandwidth, BW = , the sampling frequency (f s ) required to represent the signal is much smaller than Nyquist frequency (f s ≪ ).…”
Section: Compressive Sensing (T )mentioning
confidence: 99%
“…Compressive sensing (CS), also referred to sparse signal sampling, was introduced by work of Donoho, Candes [157,158]. CS is able to achieve compression and signal sampling simultaneously [118,159,160]. For a signal of bandwidth, BW = , the sampling frequency (f s ) required to represent the signal is much smaller than Nyquist frequency (f s ≪ ).…”
Section: Compressive Sensing (T )mentioning
confidence: 99%
“…In [36], the measurement matrix and the random phase masks are constituted by chaotic sequences. Lang and Zhang came up with a unique perspective of transmitting only a few measurements intermittently chosen from the masks rather than the real keys and the tremendous masks codes [37], since the parameters of the chaotic maps can be inferred from the received measurements without error so that the correct random phase-amplitude masks can be obtained and used for decrypting the encoded information. The further review of image encryption based on CS is shown in the following sections.…”
Section: Application Security a Image Security 1) Image Encryptionmentioning
confidence: 99%
“…In fact, there also exist a framework of image ciphers based on CS itself, as shown in [39]- [42], which combine neither chaos nor optics. Finally, what is worth mentioning is a particular image cryptosystem using chaotic phaseamplitude masks and least-data-driven decryption by CS [37]. The highlight lies in that it transmits only a few measurements intermittently chosen from the masks rather than the real keys and the enormous mask codes.…”
Section: Image Ciphers Based On Chaos Optics and Csmentioning
confidence: 99%
“…It has been also applied for spectrometry [25], Stokes polarimetric imaging [26] and hyperspectral imag-ing [27,28], and holography [29,30,31]. Image encryption with compression is another major application of CS [32,33,34,35,36,37]. Ref.…”
Section: Introductionmentioning
confidence: 99%