Asymmetric cryptosystem for securing multiple images using two beam interference phenomenon
暂无分享,去创建一个
[1] Xiaogang Wang,et al. Security enhancement of a phase-truncation based image encryption algorithm. , 2011, Applied optics.
[2] Naveen K. Nishchal,et al. Flexible optical encryption with multiple users and multiple security levels , 2011 .
[3] Daomu Zhao,et al. Multiple-image encryption using phase retrieve algorithm and intermodulation in Fourier domain , 2012 .
[4] B Javidi,et al. Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.
[5] John Fredy Barrera,et al. Optical encryption method using toroidal zone plates , 2005 .
[6] Bahram Javidi,et al. Optical and Digital Techniques for Information Security , 2004 .
[7] Jingjuan Zhang,et al. Multiple-image encryption by wavelength multiplexing. , 2005, Optics letters.
[8] Isha Mehra,et al. Collision in Fresnel domain asymmetric cryptosystem using phase truncation and authentication verification , 2013 .
[9] Xiaogang Wang,et al. A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms , 2012 .
[10] Wen-Nung Lie,et al. Multiple-image encryption and multiplexing using a modified Gerchberg-Saxton algorithm and phase modulation in Fresnel-transform domain. , 2009, Optics letters.
[11] Arturo Carnicer,et al. Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. , 2005, Optics letters.
[12] Myrian Tebaldi,et al. Chosen-plaintext attack on a joint transform correlator encrypting system , 2010 .
[13] John T. Sheridan,et al. Optical image encryption by random shifting in fractional Fourier domains. , 2003, Optics letters.
[14] Ting-Chung Poon,et al. Multiple-image encryption by compressive holography. , 2012, Applied optics.
[15] Naveen K Nishchal,et al. Image encryption based on interference that uses fractional Fourier domain asymmetric keys. , 2012, Applied optics.
[16] Bo Wang,et al. Optical image encryption based on interference. , 2008, Optics letters.
[17] Xiang Peng,et al. Asymmetric cryptosystem based on phase-truncated Fourier transforms. , 2010, Optics letters.
[18] Naveen K. Nishchal,et al. Image encryption and authentication verification using fractional nonconventional joint transform correlator , 2012 .
[19] Xiaogang Wang,et al. Multiple-image encryption based on nonlinear amplitude-truncation and phase-truncation in Fourier domain , 2011 .
[20] Daomu Zhao,et al. Double images encryption method with resistance against the specific attack based on an asymmetric algorithm. , 2012, Optics express.
[21] D Mendlovic,et al. Gerchberg-Saxton algorithm applied in the fractional Fourier or the Fresnel domain. , 1996, Optics letters.
[22] Peng Zhang,et al. Known-plaintext attack on optical encryption based on double random phase keys. , 2006, Optics letters.
[23] Chenggong Zhang,et al. Ciphertext-only attack on a joint transform correlator encryption system. , 2013, Optics express.
[24] Naveen K Nishchal,et al. Image encryption using polarized light encoding and amplitude and phase truncation in the Fresnel domain. , 2013, Applied optics.
[25] G. Unnikrishnan,et al. Optical encryption by double-random phase encoding in the fractional Fourier domain. , 2000, Optics letters.
[26] Ayman Alfalou,et al. Dual encryption scheme of images using polarized light. , 2010, Optics letters.
[27] Yujing Han,et al. Optical image encryption based on two beams' interference , 2010 .
[28] Roberto Torroba,et al. Noise-free recovery of optodigital encrypted and multiplexed images. , 2010, Optics letters.
[29] Bahram Javidi,et al. Resistance of the double random phase encryption against various attacks. , 2007, Optics express.
[30] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[31] Naveen K Nishchal,et al. Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform. , 2013, Applied optics.
[32] Jingjuan Zhang,et al. Double random-phase encoding in the Fresnel domain. , 2004, Optics letters.
[33] Isha Mehra,et al. Cryptanalysis of an image encryption scheme based on joint transform correlator with amplitude- and phase- truncation approach , 2014 .
[34] Xiaogang Wang,et al. Double-image self-encoding and hiding based on phase-truncated Fourier transforms and phase retrieval , 2011 .
[35] B Javidi,et al. Securing information by use of digital holography. , 2000, Optics letters.
[36] Unnikrishnan Gopinathan,et al. A known-plaintext heuristic attack on the Fourier plane encryption algorithm. , 2006, Optics express.
[37] Naveen K Nishchal,et al. Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask. , 2012, Applied optics.
[38] Roberto Torroba,et al. Experimental protocol for packaging and encrypting multiple data , 2013 .