-
1
-
-
0000326312
-
Picture data encryption using SCAN pattern
-
10.1016/0031-3203(92)90074-S
-
Bourbakis, N., Alexopoulos, C.: Picture data encryption using SCAN pattern. Pattern Recognit. 25(6), 567-581 (1992)
-
(1992)
Pattern Recognit.
, vol.25
, Issue.6
, pp. 567-581
-
-
Bourbakis, N.1
Alexopoulos, C.2
-
2
-
-
0029289969
-
Optical image encryption based on input plane and Fourier plane random encoding
-
1995OptL.20.767R 10.1364/OL.20.000767
-
Refregier, R., Javidi, B.: Optical image encryption based on input plane and Fourier plane random encoding. Opt. Lett. 20(7), 767-769 (1995)
-
(1995)
Opt. Lett.
, vol.20
, Issue.7
, pp. 767-769
-
-
Refregier, R.1
Javidi, B.2
-
3
-
-
77952860495
-
Double image encryption by using iterative random binary encoding in gyrator domains
-
Liu, Z., Guo, Q., Xu, L., Ahmad, M.A., Liu, S.: Double image encryption by using iterative random binary encoding in gyrator domains. Opt. Exp. 18(11), 12033-12043 (2010)
-
(2010)
Opt. Exp.
, vol.18
, Issue.11
, pp. 12033-12043
-
-
Liu, Z.1
Guo, Q.2
Xu, L.3
Ahmad, M.A.4
Liu, S.5
-
4
-
-
0035451781
-
A new encryption algorithm for image cryptosystems
-
10.1016/S0164-1212(01)00029-2
-
Chang, C.C., Hwang, M.S., Chen, T.S.: A new encryption algorithm for image cryptosystems. J. Syst. Softw. 58(7), 83-91 (2001)
-
(2001)
J. Syst. Softw.
, vol.58
, Issue.7
, pp. 83-91
-
-
Chang, C.C.1
Hwang, M.S.2
Chen, T.S.3
-
5
-
-
0031222252
-
A linear quad tree compression scheme for image encryption
-
Chang, H.K.L., Liu, J.L.: A linear quad tree compression scheme for image encryption. Signal Process. 10(4), 279-290 (1997)
-
(1997)
Signal Process.
, vol.10
, Issue.4
, pp. 279-290
-
-
Chang, H.K.L.1
Liu, J.L.2
-
6
-
-
0034249821
-
Partial encryption of compressed image and videos
-
2004379 2000ITSP.48.2439C 10.1109/78.852023
-
Cheng, H., Li, X.B.: Partial encryption of compressed image and videos. IEEE Trans. Signal Process. 48(8), 2439-2451 (2000)
-
(2000)
IEEE Trans. Signal Process.
, vol.48
, Issue.8
, pp. 2439-2451
-
-
Cheng, H.1
Li, X.B.2
-
7
-
-
79955002664
-
A novel image encryption method based on total shuffling scheme
-
2011OptCo.284.2775Z 10.1016/j.optcom.2011.02.039
-
Zhang, G., Liu, Q.: A novel image encryption method based on total shuffling scheme. Opt. Commun. 284(12), 2775-2780 (2011)
-
(2011)
Opt. Commun.
, vol.284
, Issue.12
, pp. 2775-2780
-
-
Zhang, G.1
Liu, Q.2
-
8
-
-
0000378191
-
Fast encryption of image data using chaotic Kolmogorov flow
-
Scharinger, J.: Fast encryption of image data using chaotic Kolmogorov flow. J. Electron. Eng. 7(2), 318-325 (1998)
-
(1998)
J. Electron. Eng.
, vol.7
, Issue.2
, pp. 318-325
-
-
Scharinger, J.1
-
9
-
-
0001724909
-
Shift-tolerance property of an optical double-random phase-encoding encryption system
-
2000ApOpt.39.4788W 10.1364/AO.39.004788
-
Wang, B., Sun, C.-C., Su, W.-C.: Shift-tolerance property of an optical double-random phase-encoding encryption system. Appl. Opt. 39(26), 4788-4793 (2000)
-
(2000)
Appl. Opt.
, vol.39
, Issue.26
, pp. 4788-4793
-
-
Wang, B.1
Sun, C.-C.2
Su, W.-C.3
-
10
-
-
0001756356
-
Fault tolerance properties of a double phase encoding encryption technique
-
10.1117/1.601144
-
Bahram, J., Arnaud, S., Guanshen, Z., et al.: Fault tolerance properties of a double phase encoding encryption technique. Opt. Eng. 36(4), 992-998 (1997)
-
(1997)
Opt. Eng.
, vol.36
, Issue.4
, pp. 992-998
-
-
Bahram, J.1
Arnaud, S.2
Guanshen, Z.3
-
11
-
-
34547780523
-
Resistance of the double random phase encryption against various attacks
-
2007OExpr.1510253F 10.1364/OE.15.010253
-
Frauel, Y., Castro, A., Naughton, T., et al.: Resistance of the double random phase encryption against various attacks. Opt. Exp. 15(16), 10253-10265 (2007)
-
(2007)
Opt. Exp.
, vol.15
, Issue.16
, pp. 10253-10265
-
-
Frauel, Y.1
Castro, A.2
Naughton, T.3
-
12
-
-
33744788334
-
Known-plaintext attack on optical encryption scheme based on double random phase keys
-
2006OptL.31.1044P 10.1364/OL.31.001044
-
Peng, X., Zhang, P., Wei, H., et al.: Known-plaintext attack on optical encryption scheme based on double random phase keys. Opt. Lett. 31(8), 1044-1046 (2006)
-
(2006)
Opt. Lett.
, vol.31
, Issue.8
, pp. 1044-1046
-
-
Peng, X.1
Zhang, P.2
Wei, H.3
-
13
-
-
22144431522
-
Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys
-
2005OptL.30.1644C 10.1364/OL.30.001644
-
Carnicer, A., Montes-Usategui, M., Arcos, S., et al.: Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. Opt. Lett. 30(13), 1644-1646 (2005)
-
(2005)
Opt. Lett.
, vol.30
, Issue.13
, pp. 1644-1646
-
-
Carnicer, A.1
Montes-Usategui, M.2
Arcos, S.3
-
14
-
-
33845513584
-
Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain
-
2006OptL.31.3261P 10.1364/OL.31.003261
-
Peng, X., Wei, H., Zhang, P.: Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain. Opt. Lett. 31(22), 3261-3263 (2006)
-
(2006)
Opt. Lett.
, vol.31
, Issue.22
, pp. 3261-3263
-
-
Peng, X.1
Wei, H.2
Zhang, P.3
-
17
-
-
0003259517
-
-
Bangalore, India
-
Bennett, C.H., Brassard, G.: In Proceedings of IEEE International Conference on Computers, Systems and Signal, Bangalore, India, p.175 (1984)
-
(1984)
Proceedings of IEEE International Conference on Computers, Systems and Signal
, pp. 175
-
-
Bennett, C.H.1
Brassard, G.2
-
18
-
-
0036013605
-
Quantum cryptography
-
2002RvMP.74.145G 10.1103/RevModPhys.74.145
-
Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74, 145 (2002)
-
(2002)
Rev. Mod. Phys.
, vol.74
, pp. 145
-
-
Gisin, N.1
Ribordy, G.2
Tittel, W.3
Zbinden, H.4
-
19
-
-
77649237313
-
Processing images in entangled quantum systems
-
2593882 10.1007/s11128-009-0123-z
-
Venegas-Andraca, S.E., Ball, J.L.: Processing images in entangled quantum systems. Quantum Inf. Process. 9(1), 1-11 (2010)
-
(2010)
Quantum Inf. Process.
, vol.9
, Issue.1
, pp. 1-11
-
-
Venegas-Andraca, S.E.1
Ball, J.L.2
-
22
-
-
79551528844
-
A flexible representation of quantum images for polynomial preparation, image compression, and processing operations
-
2765303 10.1007/s11128-010-0177-y
-
Le, P.Q., Dong, F., Hirota, K.: A flexible representation of quantum images for polynomial preparation, image compression, and processing operations. Quantum Inf. Process. 10(1), 63-84 (2011)
-
(2011)
Quantum Inf. Process.
, vol.10
, Issue.1
, pp. 63-84
-
-
Le, P.Q.1
Dong, F.2
Hirota, K.3
-
25
-
-
33750524499
-
Quantum circuit design of 8 × 8 discrete cosine transforms using its fast computation on graph
-
Tseng, C.C., Hwang, T.M.: Quantum circuit design of ⊗ 8 × 8 discrete cosine transforms using its fast computation on graph. In: Proceedings of ISCAS 2005, pp. 828-831 (2005)
-
(2005)
Proceedings of ISCAS 2005
, pp. 828-831
-
-
Tseng, C.C.1
Hwang, T.M.2
-
27
-
-
27544513775
-
Fast classical and quantum fractional Walsh transforms
-
Labunets, V., Labunets-Rundblad, E., Egiazarian, K., Astola, J.: Fast classical and quantum fractional Walsh transforms. In: Proceedings of the 2nd International Symposium on Image and Signal Processing and Analysis, pp. 558-563 (2001)
-
(2001)
Proceedings of the 2nd International Symposium on Image and Signal Processing and Analysis
, pp. 558-563
-
-
Labunets, V.1
Labunets-Rundblad, E.2
Egiazarian, K.3
Astola, J.4
-
28
-
-
4344634898
-
Quantum circuit design of ⊗ 8 × 8 discrete Hartley transform
-
Tseng, C.C., Hwang, T.M.: Quantum circuit design of ⊗ 8 × 8 discrete Hartley transform. ISCAS III, 397-400 (2004)
-
(2004)
ISCAS
, vol.3
, pp. 397-400
-
-
Tseng, C.C.1
Hwang, T.M.2
-
29
-
-
33750527430
-
Quantum circuit design of discrete Hartley transform using recursive decomposition formula
-
Tseng, C.C., Hwang, T.M.: Quantum circuit design of discrete Hartley transform using recursive decomposition formula. ISCAS 1-6, 824-827 (2005)
-
(2005)
ISCAS
, vol.1-6
, pp. 824-827
-
-
Tseng, C.C.1
Hwang, T.M.2
-
31
-
-
81355146344
-
Watermarking and authentication of quantum images based on restricted geometric transformations
-
2860017 10.1016/j.ins.2011.09.028
-
Iliyasu, A.M., et al.: Watermarking and authentication of quantum images based on restricted geometric transformations. Inf. Sci. 186(1), 126-149 (2012)
-
(2012)
Inf. Sci.
, vol.186
, Issue.1
, pp. 126-149
-
-
Iliyasu, A.M.1
-
32
-
-
84876486298
-
A watermark strategy for quantum images based on quantum Fourier transform
-
3028265 2013QuIP.12.793Z 10.1007/s11128-012-0423-6
-
Zhang, W.-W., Gao, F., Liu, B., Wen, Q.-Y., Chen, H.: A watermark strategy for quantum images based on quantum Fourier transform. Quantum Inf. Process. 12(2), 793-803 (2013)
-
(2013)
Quantum Inf. Process.
, vol.12
, Issue.2
, pp. 793-803
-
-
Zhang, W.-W.1
Gao, F.2
Liu, B.3
Wen, Q.-Y.4
Chen, H.5
-
33
-
-
84877121787
-
Quantum image encryption and decryption algorithms based on quantum image Geometric transformations
-
3063402 10.1007/s10773-012-1274-8
-
Zhou, R.G., Wu, Q., Zhang, M.Q., Shen, C.Y.: Quantum image encryption and decryption algorithms based on quantum image Geometric transformations. Int. J. Theor. Phys. 52(6), 1802-1817 (2012)
-
(2012)
Int. J. Theor. Phys.
, vol.52
, Issue.6
, pp. 1802-1817
-
-
Zhou, R.G.1
Wu, Q.2
Zhang, M.Q.3
Shen, C.Y.4
-
34
-
-
84879843710
-
Analysis and improvement of the watermark strategy for quantum images based on quantum Fourier transform
-
doi: 10.1007/s11128-013-0561-5
-
Yang, Y.G., Jia, X., Xu, P., Tian, J.: Analysis and improvement of the watermark strategy for quantum images based on quantum Fourier transform. Quantum Inf. Process. doi: 10.1007/s11128-013-0561-5 (2013)
-
(2013)
Quantum Inf. Process.
-
-
Yang, Y.G.1
Jia, X.2
Xu, P.3
Tian, J.4
-
36
-
-
84866841507
-
Assessing the similarity of quantum images based on probability measurements
-
Brisbane, 10-15 June (2012)
-
Yan, F., Le, P.Q., Iliyasu, A.M., Sun, B., Garcia, J.A., Dong, F., Hirota, K.: Assessing the similarity of quantum images based on probability measurements. In 2012 IEEE World Congress on Computational Intelligence, Brisbane, 10-15 June 2012, pp. 1-6 (2012)
-
(2012)
2012 IEEE World Congress on Computational Intelligence
, pp. 1-6
-
-
Yan, F.1
Le, P.Q.2
Iliyasu, A.M.3
Sun, B.4
Garcia, J.A.5
Dong, F.6
Hirota, K.7
-
37
-
-
33750542126
-
Some basic cryptographic requirements for chaos-based cryptosystems
-
2266006 10.1142/S0218127406015970
-
Alvarez, G., Li, S.: Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurcat. Chaos 16(8), 2129-2151 (2006)
-
(2006)
Int. J. Bifurcat. Chaos
, vol.16
, Issue.8
, pp. 2129-2151
-
-
Alvarez, G.1
Li, S.2
|