2020
DOI: 10.1007/s11042-020-08658-3
|View full text |Cite
|
Sign up to set email alerts
|

Two level phase retrieval in fractional Hartley domain for secure image encryption and authentication using digital signatures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 45 publications
0
7
0
Order By: Relevance
“…The proposed ISS scheme can decode secret images losslessly with bidirectional shadow image authentication without pixel expansion. The study in [18] proposed an asymmetric two-level phase generation image encryption scheme that uses a nonlinear decryption key generation process. The nonlinear encryption process provides a high level of resistance to the existing attacks.…”
Section: Cryptography-based Image Authenticationmentioning
confidence: 99%
“…The proposed ISS scheme can decode secret images losslessly with bidirectional shadow image authentication without pixel expansion. The study in [18] proposed an asymmetric two-level phase generation image encryption scheme that uses a nonlinear decryption key generation process. The nonlinear encryption process provides a high level of resistance to the existing attacks.…”
Section: Cryptography-based Image Authenticationmentioning
confidence: 99%
“…There was a variety of studies both on digital and digital signatures. The key disadvantage to these methods is that prior information on the image becomes essential at the point of filming with special equipment [20,21].…”
Section: Active Authenticationmentioning
confidence: 99%
“…In addition, such a locator has a large amount of radiation. Moreover, the compliance of the locator also makes it inconvenient to clean clothes and shoes [1][2][3][4][5][6][7][8][9][10]. Therefore, compared with electronic tags and identifi cation cards that rely on radio frequency identifi cation (RFID) technology, we prefer a nonradiation, confi dential identifi cation technology that does not need to rely on network storage.…”
Section: Introductionmentioning
confidence: 99%
“…
On the basis of the integer-order chaotic system, we decompose its fractional order, because the fractional-order system has more complex dynamic characteristics, and the security performance of the encryption system designed on this basis is also higher [6][7][8][9]. For instance, Dong et al designed a color image encryption algorithm based on a fractional hyperchaotic system and introduced the compression theory of
…”
mentioning
confidence: 99%