2021
DOI: 10.1016/j.optcom.2020.126609
|View full text |Cite
|
Sign up to set email alerts
|

Research on optical encryption system based on unequal modulus decomposition and polarized vortex optical holography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(5 citation statements)
references
References 34 publications
0
5
0
Order By: Relevance
“…In equation (11), dist i represents the Euclidean distance between the target position and the ith reference point in the fingerprint database. K reference points with the smallest x, y ð Þ=…”
Section: Fingerprint Location Technology Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…In equation (11), dist i represents the Euclidean distance between the target position and the ith reference point in the fingerprint database. K reference points with the smallest x, y ð Þ=…”
Section: Fingerprint Location Technology Algorithmmentioning
confidence: 99%
“…Let the set fO, G, 2G, 3G, ðn − 1ÞGg be a cyclic subgroup generated by G on d ∈ ½1, n − 1. If d is selected as the private key and P = d G as the public key, the problem of finding d from P is the discrete logarithm problem on the elliptic curve group, which is the mathematical basis of the elliptic curve encryption algorithm [11].…”
Section: Characteristics Of Blockchain Technology and Introduction Of Related Technologiesmentioning
confidence: 99%
“…The study provides a method to obtain various charming shapes of the focusing intensity which may determine the trapping effects. At the same time, it may be widely used in optical microscopy [16][17][18][19], imaging [20][21][22], material processing [23,24] and other fields [25][26][27][28][29][30].…”
Section: Introductionmentioning
confidence: 99%
“…[6] Since the DRPE-based optical encryption has high flexibility and expansion capability, consequently, many other optical encryption methods have also been developed, which proves to be feasible and effective. [7][8][9][10][11][12][13][14][15][16][17][18][19][20][21][22][23][24][25] In recent years, the vulnerability analysis of optical encryption systems has attracted wide interest from researchers. The DRPE-based optical encryption schemes have been verified to be vulnerable to different kinds of attacks [26][27][28][29] due to its inherent properties of linearity and symmetry.…”
Section: Introductionmentioning
confidence: 99%