• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4602597)   Today's Articles (693)   Subscriber (49368)
For: Zhang Y, Wang B, Dong Z. Enhancement of image hiding by exchanging two phase masks. ACTA ACUST UNITED AC 2009. [DOI: 10.1088/1464-4258/11/12/125406] [Citation(s) in RCA: 60] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/11/2022]
Number Cited by Other Article(s)
1
Xiong Y, Gu J, Kumar R. Security analysis on an interference-based optical image encryption scheme. APPLIED OPTICS 2022;61:9045-9051. [PMID: 36607034 DOI: 10.1364/ao.470234] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/12/2022] [Accepted: 09/22/2022] [Indexed: 06/17/2023]
2
Shan M, Guo J, Zhong Z, Liu B, Yu L, Liu L. Improved multiple-image authentication based on optical interference by wavelength multiplexing. APPLIED OPTICS 2022;61:6931-6938. [PMID: 36255775 DOI: 10.1364/ao.456222] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 02/17/2022] [Accepted: 07/17/2022] [Indexed: 06/16/2023]
3
Du J, Xiong Y, Quan C. Cryptoanalysis and enhancement of a binary image encryption system based on interference. APPLIED OPTICS 2021;60:8038-8045. [PMID: 34613065 DOI: 10.1364/ao.432858] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/01/2021] [Accepted: 08/11/2021] [Indexed: 06/13/2023]
4
Xiong Y, He A, Quan C. Cryptoanalysis on optical image encryption systems based on the vector decomposition technique in the Fourier domain. APPLIED OPTICS 2019;58:3301-3309. [PMID: 31044810 DOI: 10.1364/ao.58.003301] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 02/26/2019] [Accepted: 03/27/2019] [Indexed: 06/09/2023]
5
Kumar A, Nishchal NK. Quick response code and interference-based optical asymmetric cryptosystem. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2019. [DOI: 10.1016/j.jisa.2019.01.004] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/27/2022]
6
Lin C, Ren J. Security validation based on orthogonal polarization multiplexing in three-dimensional space. APPLIED OPTICS 2017;56:9583-9591. [PMID: 29216076 DOI: 10.1364/ao.56.009583] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 08/30/2017] [Accepted: 11/01/2017] [Indexed: 06/07/2023]
7
Zhong Z, Qin H, Liu L, Zhang Y, Shan M. Silhouette-free image encryption using interference in the multiple-parameter fractional Fourier transform domain. OPTICS EXPRESS 2017;25:6974-6982. [PMID: 28381039 DOI: 10.1364/oe.25.006974] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/07/2023]
8
Wang Y, Quan C, Tay CJ. New method of attack and security enhancement on an asymmetric cryptosystem based on equal modulus decomposition. APPLIED OPTICS 2016;55:679-686. [PMID: 26836068 DOI: 10.1364/ao.55.000679] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/05/2023]
9
Cai J, Shen X, Lei M, Lin C, Dou S. Asymmetric optical cryptosystem based on coherent superposition and equal modulus decomposition. OPTICS LETTERS 2015;40:475-478. [PMID: 25680128 DOI: 10.1364/ol.40.000475] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/04/2023]
10
Wang X, Chen W, Chen X. Fractional Fourier domain optical image hiding using phase retrieval algorithm based on iterative nonlinear double random phase encoding. OPTICS EXPRESS 2014;22:22981-22995. [PMID: 25321769 DOI: 10.1364/oe.22.022981] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/04/2023]
11
A multispectral photon-counting double random phase encoding scheme for image authentication. SENSORS 2014;14:8877-94. [PMID: 24854208 PMCID: PMC4063078 DOI: 10.3390/s140508877] [Citation(s) in RCA: 22] [Impact Index Per Article: 2.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 02/19/2014] [Revised: 05/13/2014] [Accepted: 05/15/2014] [Indexed: 11/16/2022]
12
Wang Q, Guo Q, Zhou J. Multiple-image encryption using polarized light encoding and the optical interference principle in the Fresnel-transform domain. APPLIED OPTICS 2013;52:8854-8863. [PMID: 24513953 DOI: 10.1364/ao.52.008854] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/07/2013] [Accepted: 11/19/2013] [Indexed: 06/03/2023]
13
Zhang C, Liao M, He W, Peng X. Ciphertext-only attack on a joint transform correlator encryption system. OPTICS EXPRESS 2013;21:28523-28530. [PMID: 24514364 DOI: 10.1364/oe.21.028523] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/03/2023]
14
Wang Q, Guo Q, Lei L, Zhou J. Multiple-image encryption based on interference principle and phase-only mask multiplexing in Fresnel transform domain. APPLIED OPTICS 2013;52:6849-6857. [PMID: 24085198 DOI: 10.1364/ao.52.006849] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/16/2013] [Accepted: 08/27/2013] [Indexed: 06/02/2023]
15
Qin Y, Gong Q. Interference-based multiple-image encryption with silhouette removal by position multiplexing. APPLIED OPTICS 2013;52:3987-3992. [PMID: 23759846 DOI: 10.1364/ao.52.003987] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/02/2013] [Accepted: 05/13/2013] [Indexed: 06/02/2023]
16
Abuturab MR. Security enhancement of color image cryptosystem by optical interference principle and spiral phase encoding. APPLIED OPTICS 2013;52:1555-1563. [PMID: 23478757 DOI: 10.1364/ao.52.001555] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/12/2012] [Accepted: 01/24/2013] [Indexed: 06/01/2023]
17
Chen W, Chen X. Interference-based optical image encryption using three-dimensional phase retrieval. APPLIED OPTICS 2012;51:6076-6083. [PMID: 22945153 DOI: 10.1364/ao.51.006076] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/30/2012] [Accepted: 08/01/2012] [Indexed: 06/01/2023]
18
Jia W, Wen FJ, Chow YT, Zhou C. Binary image encryption based on interference of two phase-only masks. APPLIED OPTICS 2012;51:5253-5258. [PMID: 22858969 DOI: 10.1364/ao.51.005253] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/09/2012] [Accepted: 06/17/2012] [Indexed: 06/01/2023]
19
Rajput SK, Nishchal NK. Image encryption based on interference that uses fractional Fourier domain asymmetric keys. APPLIED OPTICS 2012;51:1446-1452. [PMID: 22505061 DOI: 10.1364/ao.51.001446] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/28/2011] [Accepted: 01/14/2012] [Indexed: 05/31/2023]
20
Wang X, Zhao D. Optical image hiding with silhouette removal based on the optical interference principle. APPLIED OPTICS 2012;51:686-691. [PMID: 22358156 DOI: 10.1364/ao.51.000686] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/05/2011] [Accepted: 11/10/2011] [Indexed: 05/31/2023]
21
Kumar P, Joseph J, Singh K. Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator. APPLIED OPTICS 2011;50:1805-1811. [PMID: 21532655 DOI: 10.1364/ao.50.001805] [Citation(s) in RCA: 7] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/30/2023]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA