2015
DOI: 10.1016/j.ijleo.2015.07.148
|View full text |Cite
|
Sign up to set email alerts
|

Optical multiple-image encryption based on fully phase encoding and interference

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
6
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 32 publications
0
6
0
Order By: Relevance
“…These methods include fully phase encoding [21,22], sparse representation [23][24][25], phase truncation [10,26,27], and photon counting [28,29]. One of the simplest approaches is to encode the original plaintext image into a full-phase map, which makes the cryptosystem a nonlinear scheme that is more secure and robust to multiplicative and additive noise [30,31]. Moreover, the use of phase image instead of intensity image is preferred method in the optical encryption systems.…”
Section: Introductionmentioning
confidence: 99%
“…These methods include fully phase encoding [21,22], sparse representation [23][24][25], phase truncation [10,26,27], and photon counting [28,29]. One of the simplest approaches is to encode the original plaintext image into a full-phase map, which makes the cryptosystem a nonlinear scheme that is more secure and robust to multiplicative and additive noise [30,31]. Moreover, the use of phase image instead of intensity image is preferred method in the optical encryption systems.…”
Section: Introductionmentioning
confidence: 99%
“…This research paper focuses only on the Image Encryption Algorithm. There are several algorithms [3,4,5] designed to implement the Image Encryption algorithm and each algorithm describes the security system that protects sensitive information from the attacker. The different encryption algorithms use different theoretical and statistical tools for implementing the security system.…”
Section: Introductionmentioning
confidence: 99%
“…Over the past decades, different schemes had been implemented to encrypt images in. [1][2][3][4][5] Some of them are based on DES, 6 AES, 6 and RSA 7 cryptosystem. On the other hand, images have fundamental characteristics like, large volume of data and huge redundant data as well as real time requirement.…”
Section: Introductionmentioning
confidence: 99%
“…Over the past decades, different schemes had been implemented to encrypt images in . Some of them are based on DES, AES, and RSA cryptosystem.…”
Section: Introductionmentioning
confidence: 99%