-
1
-
-
84888298824
-
A review of optical image encryption techniques
-
S. Liu, C. Guo, and J.T. Sheridan A review of optical image encryption techniques Opt. Laser Technol. 57 2014 327 342
-
(2014)
Opt. Laser Technol.
, vol.57
, pp. 327-342
-
-
Liu, S.1
Guo, C.2
Sheridan, J.T.3
-
2
-
-
66249147554
-
Optical techniques for information security
-
B.O. Matoba, T. Nomura, E. Pe, and B. Javidi Optical techniques for information security Proc. IEEE 97 2009 1128 1148
-
(2009)
Proc. IEEE
, vol.97
, pp. 1128-1148
-
-
Matoba, B.O.1
Nomura, T.2
Pe, E.3
Javidi, B.4
-
3
-
-
0029289969
-
Optical image encryption based on input plane
-
P. Refregier, and B. Javidi Optical image encryption based on input plane Opt. Lett. 20 1995 767 769
-
(1995)
Opt. Lett.
, vol.20
, pp. 767-769
-
-
Refregier, P.1
Javidi, B.2
-
4
-
-
0001182141
-
Optical encryption by double random phase encoding in the fractional Fourier domain
-
G. Unnikrishnan, J. Joseph, and K. Singh Optical encryption by double random phase encoding in the fractional Fourier domain Opt. Lett. 25 2000 887 889
-
(2000)
Opt. Lett.
, vol.25
, pp. 887-889
-
-
Unnikrishnan, G.1
Joseph, J.2
Singh, K.3
-
5
-
-
0035154787
-
Optical image encryption by cascaded fractional Fourier transforms with random phase filtering
-
S. Liu, L. Yu, and B. Zhu Optical image encryption by cascaded fractional Fourier transforms with random phase filtering Opt. Commun. 187 2001 57 63
-
(2001)
Opt. Commun.
, vol.187
, pp. 57-63
-
-
Liu, S.1
Yu, L.2
Zhu, B.3
-
6
-
-
3142707161
-
Double random phase encoding in the Fresnel domain
-
G. Situ, and J. Zhang Double random phase encoding in the Fresnel domain Opt. Lett. 29 2004 1584 1586
-
(2004)
Opt. Lett.
, vol.29
, pp. 1584-1586
-
-
Situ, G.1
Zhang, J.2
-
7
-
-
34548242301
-
Applications of gyrator transform for image processing
-
J.A. Rodrigo, T. Alieva, and M.L. Calvo Applications of gyrator transform for image processing Opt. Commun. 278 2007 279 284
-
(2007)
Opt. Commun.
, vol.278
, pp. 279-284
-
-
Rodrigo, J.A.1
Alieva, T.2
Calvo, M.L.3
-
8
-
-
77955996132
-
Image encryption using the reciprocal-orthogonal parametric transform
-
S. Bouguezel, M.O. Ahmad, M.N.S. Swamy, Image encryption using the reciprocal-orthogonal parametric transform, in: Proceedings of the IEEE International Symposium on Circuits and Systems, 2010, pp. 2542-2545.
-
(2010)
Proceedings of the IEEE International Symposium on Circuits and Systems
, pp. 2542-2545
-
-
Bouguezel, S.1
Ahmad, M.O.2
Swamy, M.N.S.3
-
9
-
-
84867451617
-
A reciprocal-orthogonal parametric transform and its fast algorithm
-
S. Bouguezel A reciprocal-orthogonal parametric transform and its fast algorithm IEEE Signal Process. Lett. 19 2012 769 772
-
(2012)
IEEE Signal Process. Lett.
, vol.19
, pp. 769-772
-
-
Bouguezel, S.1
-
10
-
-
84883422773
-
A new involutory parametric transform and its application to image encryption
-
S. Bouguezel, M.O. Ahmad, M.N.S. Swamy, A new involutory parametric transform and its application to image encryption, in: Proceedings of the IEEE International Symposium on Circuits and Systems, 2013, pp. 2605-2608.
-
(2013)
Proceedings of the IEEE International Symposium on Circuits and Systems
, pp. 2605-2608
-
-
Bouguezel, S.1
Ahmad, M.O.2
Swamy, M.N.S.3
-
11
-
-
33646881267
-
The multiple-parameter discrete fractional Fourier transform
-
S. Pei, and W. Hsue The multiple-parameter discrete fractional Fourier transform IEEE Signal Process. Lett. 13 2006 329 332
-
(2006)
IEEE Signal Process. Lett.
, vol.13
, pp. 329-332
-
-
Pei, S.1
Hsue, W.2
-
12
-
-
33744788334
-
Known-plaintext attack on optical encryption based on double random phase keys
-
X. Peng, P. Zhang, H. Wei, and B. Yu Known-plaintext attack on optical encryption based on double random phase keys Opt. Lett. 31 2006 1044 1046
-
(2006)
Opt. Lett.
, vol.31
, pp. 1044-1046
-
-
Peng, X.1
Zhang, P.2
Wei, H.3
Yu, B.4
-
13
-
-
70449435070
-
Vulnerability to known-plaintext attack of optical encryption schemes based on two fractional Fourier transform order keys and double random phase keys
-
W. Qin, and X. Peng Vulnerability to known-plaintext attack of optical encryption schemes based on two fractional Fourier transform order keys and double random phase keys J. Opt. A Pure Appl. Opt. 11 2009 075402
-
(2009)
J. Opt. a Pure Appl. Opt.
, vol.11
, pp. 075402
-
-
Qin, W.1
Peng, X.2
-
14
-
-
0042922555
-
Securing information by use of digital holography
-
B. Javidi, and T. Nomura Securing information by use of digital holography Opt. Lett. 25 2000 28 30
-
(2000)
Opt. Lett.
, vol.25
, pp. 28-30
-
-
Javidi, B.1
Nomura, T.2
-
15
-
-
84870543769
-
Opto-digital image encryption by using Baker mapping and 1-D fractional Fourier transform
-
Z. Liu, S. Li, W. Liu, and S. Liu Opto-digital image encryption by using Baker mapping and 1-D fractional Fourier transform Opt. Lasers Eng. 51 2013 224 229
-
(2013)
Opt. Lasers Eng.
, vol.51
, pp. 224-229
-
-
Liu, Z.1
Li, S.2
Liu, W.3
Liu, S.4
-
16
-
-
84908335713
-
Opto-digital spectrum encryption by using Baker mapping and gyrator transform
-
H. Chen, J. Zhao, Z. Liu, and X. Du Opto-digital spectrum encryption by using Baker mapping and gyrator transform Opt. Lasers Eng. 66 2015 285 293
-
(2015)
Opt. Lasers Eng.
, vol.66
, pp. 285-293
-
-
Chen, H.1
Zhao, J.2
Liu, Z.3
Du, X.4
-
17
-
-
36048937251
-
Optical image encryption using fractional Fourier transform and chaos
-
N. Singh, and A. Sinha Optical image encryption using fractional Fourier transform and chaos Opt. Lasers Eng. 46 2008 117 123
-
(2008)
Opt. Lasers Eng.
, vol.46
, pp. 117-123
-
-
Singh, N.1
Sinha, A.2
-
18
-
-
0037443119
-
Optical image encryption by random shifting in fractional Fourier domains
-
B. Hennelly, and J.T. Sheridan Optical image encryption by random shifting in fractional Fourier domains Opt. Lett. 28 2003 269 271
-
(2003)
Opt. Lett.
, vol.28
, pp. 269-271
-
-
Hennelly, B.1
Sheridan, J.T.2
-
19
-
-
84869089530
-
Optical encryption by combining image scrambling techniques in fractional Fourier domains
-
S. Liu, and J.T. Sheridan Optical encryption by combining image scrambling techniques in fractional Fourier domains Opt. Commun. 287 2013 73 80
-
(2013)
Opt. Commun.
, vol.287
, pp. 73-80
-
-
Liu, S.1
Sheridan, J.T.2
-
20
-
-
77749251956
-
Image encryption based on the multiple parameter discrete fractional Fourier transform and chaos function
-
J. Lang, R. Tao, and Y. Wang Image encryption based on the multiple parameter discrete fractional Fourier transform and chaos function Opt. Commun. 283 2010 2092 2096
-
(2010)
Opt. Commun.
, vol.283
, pp. 2092-2096
-
-
Lang, J.1
Tao, R.2
Wang, Y.3
-
21
-
-
33750542126
-
Some basic cryptographic requirements for chaos based cryptosystems
-
A. Gonzalo, and S. Li Some basic cryptographic requirements for chaos based cryptosystems Int. J. Bifurc. Chaos 16 2006 2129 2151
-
(2006)
Int. J. Bifurc. Chaos
, vol.16
, pp. 2129-2151
-
-
Gonzalo, A.1
Li, S.2
-
22
-
-
42049108003
-
A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
-
S. Li, C. Li, G. Chen, N.G. Bourbakis, and K.T. Lo A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks Signal Process. Image Commun. 23 2008 212 223
-
(2008)
Signal Process. Image Commun.
, vol.23
, pp. 212-223
-
-
Li, S.1
Li, C.2
Chen, G.3
Bourbakis, N.G.4
Lo, K.T.5
-
23
-
-
78650867097
-
Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
-
C. Li, and K.-T. Lo Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks Signal Process. 91 2011 949 954
-
(2011)
Signal Process.
, vol.91
, pp. 949-954
-
-
Li, C.1
Lo, K.-T.2
-
24
-
-
84887070740
-
Vulnerability to chosen plaintext attack of a general optical encryption model with the architecture of scrambling then double random phase encoding
-
Y. Zhang, D. Xiao, W. Wen, and H. Liu Vulnerability to chosen plaintext attack of a general optical encryption model with the architecture of scrambling then double random phase encoding Opt. Lett. 38 2013 4506 4509
-
(2013)
Opt. Lett.
, vol.38
, pp. 4506-4509
-
-
Zhang, Y.1
Xiao, D.2
Wen, W.3
Liu, H.4
-
25
-
-
84892526019
-
Statistical properties of digital piecewise linear chaotic maps and their roles in cryptography and pseudo-random coding
-
S. Li, Q. Li, W. Li, X. Mou, and Y. Cai Statistical properties of digital piecewise linear chaotic maps and their roles in cryptography and pseudo-random coding Lect. Notes Comput. Sci. 2260 2001 205 221
-
(2001)
Lect. Notes Comput. Sci.
, vol.2260
, pp. 205-221
-
-
Li, S.1
Li, Q.2
Li, W.3
Mou, X.4
Cai, Y.5
-
26
-
-
0031098928
-
Problems with the chaotic inverse system encryption approach
-
H. Zhou, and X. Ling Problems with the chaotic inverse system encryption approach IEEE Trans. Circuits Syst. 44 1997 268 271
-
(1997)
IEEE Trans. Circuits Syst.
, vol.44
, pp. 268-271
-
-
Zhou, H.1
Ling, X.2
-
27
-
-
0030635241
-
Generating chaotic secure sequences with desired statistical properties and high security
-
H. Zhou, and X. Ling Generating chaotic secure sequences with desired statistical properties and high security Int. J. Bifurc. Chaos 7 1997 205 213
-
(1997)
Int. J. Bifurc. Chaos
, vol.7
, pp. 205-213
-
-
Zhou, H.1
Ling, X.2
-
28
-
-
2942527220
-
Polarization encoding for optical encryption using twisted nematic liquid crystal spatial light modulators
-
C. Cheng, and M. Chen Polarization encoding for optical encryption using twisted nematic liquid crystal spatial light modulators Opt. Commun. 237 2004 45 52
-
(2004)
Opt. Commun.
, vol.237
, pp. 45-52
-
-
Cheng, C.1
Chen, M.2
|