2003
DOI: 10.1117/1.1588660
|View full text |Cite
|
Sign up to set email alerts
|

Public-key-based optical image cryptosystem based on data embedding techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
27
0
1

Year Published

2008
2008
2017
2017

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 54 publications
(28 citation statements)
references
References 12 publications
0
27
0
1
Order By: Relevance
“…In contrast the optical cryptosystem has advantages of fast processing and vast data encryption. In recent years, there have been a number of optical encryption methods for cryptographic systems [4][5][6][7][8][9][10][11][12][13][14][15][16] and several optical asymmetric key cryptosystems have been presented [17][18][19][20][21]. Also, we have presented several papers on the optical encryption technique by using Boolean logic-based operations [22][23], and we have recently reported on the optical modified Diffie-Hellman key exchange protocol [24].…”
Section: Introductionmentioning
confidence: 99%
“…In contrast the optical cryptosystem has advantages of fast processing and vast data encryption. In recent years, there have been a number of optical encryption methods for cryptographic systems [4][5][6][7][8][9][10][11][12][13][14][15][16] and several optical asymmetric key cryptosystems have been presented [17][18][19][20][21]. Also, we have presented several papers on the optical encryption technique by using Boolean logic-based operations [22][23], and we have recently reported on the optical modified Diffie-Hellman key exchange protocol [24].…”
Section: Introductionmentioning
confidence: 99%
“…Another advantage of an optical cryptosystem is the potential for a large key length, rendering brute force attacks almost impossible. For these reasons, there has been a growing interest in optical cryptographic systems and several optical encryption techniques have been proposed in recent years [4][5][6][7][8][9][10][11][12][13]. Also, an optical XOR logic-based encryption has been introduced as one of these effective encryption algorithms [14][15][16].…”
Section: Introductionmentioning
confidence: 99%
“…[2] Recently, various kinds of optical encryption techniques have been proposed for security systems because optical systems have merits of parallel processing and fast operation. [3][4][5][6][7][8][9][10][11] Among them the optical information is composed of complex function which is in phase and amplitude forms, and in order to get the complex encrypted data, a holographic recording technique may be required. This requirement makes it difficult to store and transmit the encrypted information over a digital network.…”
Section: Introductionmentioning
confidence: 99%