-
1
-
-
33749266061
-
Security of virtual-optics-based cryptosystem
-
Xiang P., and Peng Z. Security of virtual-optics-based cryptosystem. Optik 117 (2006) 525-531
-
(2006)
Optik
, vol.117
, pp. 525-531
-
-
Xiang, P.1
Peng, Z.2
-
2
-
-
0141973669
-
Image encryption and the fractional Fourier transform
-
Hennelly B.M., and Sheridan J.T. Image encryption and the fractional Fourier transform. Optik 114 6 (2003) 251-265
-
(2003)
Optik
, vol.114
, Issue.6
, pp. 251-265
-
-
Hennelly, B.M.1
Sheridan, J.T.2
-
3
-
-
33947603219
-
Optical image encryption based on binary Fourier transform computer-generated hologram and pixel scrambling technology
-
Wang Y.-Y., Wang Y.-R., Wang Y., Li H.-J., and Sun W.-J. Optical image encryption based on binary Fourier transform computer-generated hologram and pixel scrambling technology. Opt Lasers Eng 45 (2007) 761-765
-
(2007)
Opt Lasers Eng
, vol.45
, pp. 761-765
-
-
Wang, Y.-Y.1
Wang, Y.-R.2
Wang, Y.3
Li, H.-J.4
Sun, W.-J.5
-
4
-
-
36048937251
-
Optical image encryption using fractional Fourier transform and chaos
-
Singh N., and Sinha A. Optical image encryption using fractional Fourier transform and chaos. Opt Lasers Eng 46 2 (2008) 117-123
-
(2008)
Opt Lasers Eng
, vol.46
, Issue.2
, pp. 117-123
-
-
Singh, N.1
Sinha, A.2
-
5
-
-
34547811875
-
An image encryption method with magnitude and phase manipulation using carrier images
-
Prasanna S.R.M., Subba Rao Y.V., and Mitra A. An image encryption method with magnitude and phase manipulation using carrier images. Int J Comput Sci 1 2 (2006) 132-138
-
(2006)
Int J Comput Sci
, vol.1
, Issue.2
, pp. 132-138
-
-
Prasanna, S.R.M.1
Subba Rao, Y.V.2
Mitra, A.3
-
6
-
-
47149112918
-
Optical security system using jigsaw transforms of the second random phase mask and the encrypted image in a double random phase encoding system
-
Singh M., Kumar A., and Singh K. Optical security system using jigsaw transforms of the second random phase mask and the encrypted image in a double random phase encoding system. Opt Lasers Eng 46 10 (2008) 763-768
-
(2008)
Opt Lasers Eng
, vol.46
, Issue.10
, pp. 763-768
-
-
Singh, M.1
Kumar, A.2
Singh, K.3
-
7
-
-
43149114419
-
Image encryption and decryption using fractional Fourier transform and radial Hilbert transform
-
Joshi M., Shakher C., and Singh K. Image encryption and decryption using fractional Fourier transform and radial Hilbert transform. Opt Lasers Eng 46 7 (2008) 522-526
-
(2008)
Opt Lasers Eng
, vol.46
, Issue.7
, pp. 522-526
-
-
Joshi, M.1
Shakher, C.2
Singh, K.3
-
8
-
-
56549120127
-
-
Podesser Martina, Schmidt Hans-Peter, Uhl Andreas. Selective bitplane encryption for secure transmission of image data in mobile environments. School of Telematics & Network Engineering, Carinthia Tech Institute, Klagenfurt, Austria.
-
Podesser Martina, Schmidt Hans-Peter, Uhl Andreas. Selective bitplane encryption for secure transmission of image data in mobile environments. School of Telematics & Network Engineering, Carinthia Tech Institute, Klagenfurt, Austria.
-
-
-
-
9
-
-
56549091285
-
-
Huntress, Gary B. (Swansea, MA). Encryption using fractal key. United States Patent 6782101.
-
Huntress, Gary B. (Swansea, MA). Encryption using fractal key. United States Patent 6782101.
-
-
-
-
11
-
-
56549117951
-
Symmetry of the modified Mandelbrot set
-
Rozouvan V. Symmetry of the modified Mandelbrot set. Pi in the Sky 9 (2005) 20-21
-
(2005)
Pi in the Sky
, Issue.9
, pp. 20-21
-
-
Rozouvan, V.1
-
12
-
-
3142707161
-
Double random-phase encoding in the Fresnel domain
-
Situ G., and Zhang J. Double random-phase encoding in the Fresnel domain. Opt Lett 29 4 (2004) 1584-1586
-
(2004)
Opt Lett
, vol.29
, Issue.4
, pp. 1584-1586
-
-
Situ, G.1
Zhang, J.2
-
13
-
-
56549118446
-
-
Peak signal-to-noise ratio. (17.06.2008). In Wikipedia-The Free Encyclopedia. Retrieved 16:08, 22.08.2008, from 〈http://en.wikipedia.org/w/index.php?title=Peak_signal-to-noise_ratio&oldid=219887771〉.
-
Peak signal-to-noise ratio. (17.06.2008). In Wikipedia-The Free Encyclopedia. Retrieved 16:08, 22.08.2008, from 〈http://en.wikipedia.org/w/index.php?title=Peak_signal-to-noise_ratio&oldid=219887771〉.
-
-
-
-
14
-
-
56549113363
-
Selective combinational encryption of gray scale images using orthogonal polynomials based transformation
-
Krishnamoorthi R., and Sheba Kezia Malarchelvi P.D. Selective combinational encryption of gray scale images using orthogonal polynomials based transformation. Int J Comput Sci Network Secur 8 5 (2008)
-
(2008)
Int J Comput Sci Network Secur
, vol.8
, Issue.5
-
-
Krishnamoorthi, R.1
Sheba Kezia Malarchelvi, P.D.2
-
15
-
-
56549124154
-
-
Rivest RFC 1321. The MD5 Message-Digest Algorithm. April 1992.
-
Rivest RFC 1321. The MD5 Message-Digest Algorithm. April 1992.
-
-
-
|