2015
DOI: 10.1016/j.optcom.2015.02.040
|View full text |Cite
|
Sign up to set email alerts
|

Optical interference-based image encryption using circular harmonic expansion and spherical illumination in gyrator transform domain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 37 publications
0
3
0
Order By: Relevance
“…Using a Circular Harmonic Key in DRPE e schematic representation of the optical encryption arrangement of DRPE using the circular harmonic key in the Fresnel domain is shown in Figure 1(a). In this method, the RPM is expressed in terms of polar coordinates using a circular harmonic key [57,58] to enhance the security of the optical system. To obtain the circular harmonic key, the Cartesian coordinates (x, y) are converted to the polar coordinates (ρ, φ) using x � ρ cos φ and y � ρ sin φ. us, the RPM key can be expressed in the Fresnel domain as…”
Section: Proposed Encryption and Decryption Schemementioning
confidence: 99%
See 2 more Smart Citations
“…Using a Circular Harmonic Key in DRPE e schematic representation of the optical encryption arrangement of DRPE using the circular harmonic key in the Fresnel domain is shown in Figure 1(a). In this method, the RPM is expressed in terms of polar coordinates using a circular harmonic key [57,58] to enhance the security of the optical system. To obtain the circular harmonic key, the Cartesian coordinates (x, y) are converted to the polar coordinates (ρ, φ) using x � ρ cos φ and y � ρ sin φ. us, the RPM key can be expressed in the Fresnel domain as…”
Section: Proposed Encryption and Decryption Schemementioning
confidence: 99%
“…e inclusion of circular harmonic function [57,58] in the random phase masks imparts additional degrees of freedom of encoding such as order of harmonics (m), radius (ρ 1 , ρ 2 ), and rotation angle (φ 1 , φ 2 ) to strengthen the security level of the encryption system. erefore, the proposed encryption scheme with keys in polar coordinates is a solution to the problem of variance in the decryption process.…”
Section: Proposed Encryption and Decryption Schemementioning
confidence: 99%
See 1 more Smart Citation