2017 14th IEEE India Council International Conference (INDICON) 2017
DOI: 10.1109/indicon.2017.8487849
|View full text |Cite
|
Sign up to set email alerts
|

Optical Image Encryption using Fringe Projection Profilometry, Fourier Fringe Analysis, and RSA Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 15 publications
0
6
0
Order By: Relevance
“…Some traditional encryption algorithms, such as DES, AES, and RSA, are used in image encryption [1]- [3]. However, the traditional encryption algorithm is less efficient when applied to the system that encrypts a large number of pictures or encrypts video.…”
Section: Introductionmentioning
confidence: 99%
“…Some traditional encryption algorithms, such as DES, AES, and RSA, are used in image encryption [1]- [3]. However, the traditional encryption algorithm is less efficient when applied to the system that encrypts a large number of pictures or encrypts video.…”
Section: Introductionmentioning
confidence: 99%
“…Further research works are investigated in the literature that can be developed for medical image security protocols [34][35][36][37][38][39]. In [34], an optical security protocol based on Fourier analysis, RSA, projection profilometry algorithms is introduced. In [35], the authors developed a userdefined key-based digital image cryptosystem.…”
Section: Related Workmentioning
confidence: 99%
“…For evaluating the privacy efficacy of the suggested security protocol, comprehensive comparisons are investigated for the proposed security protocol contrasted to the latest security protocols [19][20][21][22][23][24][25][26][27][28][29][30][31][32][33][34][35][36][37][38]. These comparisons are in terms of the average entropy, PSNR, correlation, NPCR, and UACI values for the ciphered color Lena image, as depicted in Tab.…”
Section: Noisementioning
confidence: 99%
“…Zhou et al [52] suggested a security technique that is capable of full protection of chosen regions/objects in medical images. Moreover, several image security systems [53][54][55][56][57][58] can be exploited in medical imaging services. In [53], the authors introduced an optical image security algorithm using fringe projection profilometry and Fourier fringe analysis.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, several image security systems [53][54][55][56][57][58] can be exploited in medical imaging services. In [53], the authors introduced an optical image security algorithm using fringe projection profilometry and Fourier fringe analysis. Das et al [54] developed an image security system in which the input image is ciphered based on a user-defined key.…”
Section: Related Workmentioning
confidence: 99%