2015
DOI: 10.1016/j.optlaseng.2014.10.002
|View full text |Cite
|
Sign up to set email alerts
|

Opto-digital spectrum encryption by using Baker mapping and gyrator transform

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
8
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 36 publications
0
8
0
Order By: Relevance
“…Hyperspectral images (HIs) provide information on tens to hundreds of spectral bands, thus enabling the observation of more abundant information. Consequently, information security issues are fast becoming one of the most important issues in applications involving HIs; however, OIE for HIs [29][30][31][32][33][34] is still a nascent area. Chen et al [29] applied Baker mapping in the GT domain to encrypt both the spatial and spectral information of HIs, where Baker mapping was employed to scramble every single band of the HI.…”
Section: Introductionmentioning
confidence: 99%
“…Hyperspectral images (HIs) provide information on tens to hundreds of spectral bands, thus enabling the observation of more abundant information. Consequently, information security issues are fast becoming one of the most important issues in applications involving HIs; however, OIE for HIs [29][30][31][32][33][34] is still a nascent area. Chen et al [29] applied Baker mapping in the GT domain to encrypt both the spatial and spectral information of HIs, where Baker mapping was employed to scramble every single band of the HI.…”
Section: Introductionmentioning
confidence: 99%
“…Image encryption technology developed rapidly after 1995 when Refregier and Javidi proposed double random phase encryption technology [9]. Because this system is efficient and it has the features of fast response and high degree of parallelism, many scholars have been attracted to research it [10]- [17]. However, these optical systems require a very accurate spatial position, and it will reduce the fault tolerance of the entire system.…”
Section: Introductionmentioning
confidence: 99%
“…AlphaEta is also cited in Lloyd’s work on quantum enigma machines [ 15 ]; Lloyd notes the open problem to construct a provably secure quantum enigma machine using linear optics and coherent states. As an alternative to AlphaEta, other optical cryptographic solutions were considered, including the use of double random phase encoding (DRPE) [ 16 , 17 , 18 ]. It deserves noting that not only has academia been focusing on quantum technologies, but several industries have started to commercialize quantum cryptographic tools [ 5 ], specifically for quantum key distribution and quantum random number generation.…”
Section: Introductionmentioning
confidence: 99%