2008
DOI: 10.1016/j.optlaseng.2007.09.001
|View full text |Cite
|
Sign up to set email alerts
|

Optical image encryption using fractional Fourier transform and chaos

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
49
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 165 publications
(49 citation statements)
references
References 22 publications
0
49
0
Order By: Relevance
“…Where ( 1,2,3,4) i xi  the states and a, b, c, d are positive constant parameters of the system and -0.7<k<0.7 [10].…”
Section: Hyper Chaos Chen Dynamicmentioning
confidence: 99%
See 1 more Smart Citation
“…Where ( 1,2,3,4) i xi  the states and a, b, c, d are positive constant parameters of the system and -0.7<k<0.7 [10].…”
Section: Hyper Chaos Chen Dynamicmentioning
confidence: 99%
“…First in 1989, was used for the encryption from chaotic systems [3]. More research has been introduced to provide encryption methods, most of which have used the properties of chaotic systems [4]. Recently, different methods based on chaos theory is used for encrypting, such as quick encryption [5], encrypting block [6] and Neural Networks [7] mention.…”
Section: Introductionmentioning
confidence: 99%
“…To address this problem, some researchers proposed to use the chaotic maps to generate the random phase mask, and use the chaos parameters to replace the whole phase mask to act as the secret key. For example, Singh et al used the Logistic map, Tent map and Yorke map to generate the phase masks in an FrFT-based DRPE scheme [5]. Sui et al used the Logistic map to generate the phase masks in a GT-based DRPE scheme [6].…”
Section: Introductionmentioning
confidence: 99%
“…Due to these advantages, chaotic systems have been widely applied to image secure communication. Singh et al [10] propose a new DRPE method using fractional Fourier transform and chaos theory for image encryption, in which random phase masks are generated using iterative chaos functions. Taheri et al [11] proposed a phase mask generation scheme using chaos theory and hash function to enhance the DRPE security.…”
Section: Introductionmentioning
confidence: 99%