• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4623447)   Today's Articles (1084)   Subscriber (49407)
For: Qin W, Peng X. Vulnerability to known-plaintext attack of optical encryption schemes based on two fractional Fourier transform order keys and double random phase keys. ACTA ACUST UNITED AC 2009. [DOI: 10.1088/1464-4258/11/7/075402] [Citation(s) in RCA: 57] [Impact Index Per Article: 3.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/11/2022]
Number Cited by Other Article(s)
1
Xiong Y, Gu J, Kumar R. Collision in double-image encryption scheme based on spatial encoding and phase-truncation Fourier transforms. APPLIED OPTICS 2023;62:8416-8425. [PMID: 38037947 DOI: 10.1364/ao.501672] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/26/2023] [Accepted: 10/10/2023] [Indexed: 12/02/2023]
2
Xiong Y, Gu J, Kumar R. Security analysis on an interference-based optical image encryption scheme. APPLIED OPTICS 2022;61:9045-9051. [PMID: 36607034 DOI: 10.1364/ao.470234] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/12/2022] [Accepted: 09/22/2022] [Indexed: 06/17/2023]
3
Du J, Xiong Y, Quan C. Cryptoanalysis and enhancement of a binary image encryption system based on interference. APPLIED OPTICS 2021;60:8038-8045. [PMID: 34613065 DOI: 10.1364/ao.432858] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/01/2021] [Accepted: 08/11/2021] [Indexed: 06/13/2023]
4
Abd-El-Atty B, Iliyasu AM, Alanezi A, Abd El-latif AA. Optical image encryption based on quantum walks. OPTICS AND LASERS IN ENGINEERING 2021;138:106403. [DOI: 10.1016/j.optlaseng.2020.106403] [Citation(s) in RCA: 10] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/01/2023]
5
Xiong Y, He A, Quan C. Cryptoanalysis on optical image encryption systems based on the vector decomposition technique in the Fourier domain. APPLIED OPTICS 2019;58:3301-3309. [PMID: 31044810 DOI: 10.1364/ao.58.003301] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 02/26/2019] [Accepted: 03/27/2019] [Indexed: 06/09/2023]
6
Xiong Y, He A, Quan C. Security analysis and enhancement of a cryptosystem based on phase truncation and a designed amplitude modulator. APPLIED OPTICS 2019;58:695-703. [PMID: 30694257 DOI: 10.1364/ao.58.000695] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/17/2018] [Accepted: 12/11/2018] [Indexed: 06/09/2023]
7
Xiong Y, He A, Quan C. Security analysis of a double-image encryption technique based on an asymmetric algorithm. JOURNAL OF THE OPTICAL SOCIETY OF AMERICA. A, OPTICS, IMAGE SCIENCE, AND VISION 2018;35:320-326. [PMID: 29400881 DOI: 10.1364/josaa.35.000320] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/27/2017] [Accepted: 12/26/2017] [Indexed: 06/07/2023]
8
Sahoo SK, Tang D, Dang C. Enhancing security of incoherent optical cryptosystem by a simple position-multiplexing technique and ultra-broadband illumination. Sci Rep 2017;7:17895. [PMID: 29263367 PMCID: PMC5738381 DOI: 10.1038/s41598-017-17916-8] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/15/2017] [Accepted: 12/04/2017] [Indexed: 11/10/2022]  Open
9
Kong D, Shen X, Cao L, Jin G. Phase retrieval for attacking fractional Fourier transform encryption. APPLIED OPTICS 2017;56:3449-3456. [PMID: 28430212 DOI: 10.1364/ao.56.003449] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/07/2023]
10
Double Random Phase Encoding Based Optical Encryption Systems Using Some Linear Canonical Transforms: Weaknesses and Countermeasures. LINEAR CANONICAL TRANSFORMS 2016. [DOI: 10.1007/978-1-4939-3028-9_13] [Citation(s) in RCA: 21] [Impact Index Per Article: 2.6] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/13/2022]
11
Wang Y, Quan C, Tay CJ. Improved method of attack on an asymmetric cryptosystem based on phase-truncated Fourier transform. APPLIED OPTICS 2015;54:6874-6881. [PMID: 26368104 DOI: 10.1364/ao.54.006874] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/05/2023]
12
Liu X, Wu J, He W, Liao M, Zhang C, Peng X. Vulnerability to ciphertext-only attack of optical encryption scheme based on double random phase encoding. OPTICS EXPRESS 2015;23:18955-18968. [PMID: 26367558 DOI: 10.1364/oe.23.018955] [Citation(s) in RCA: 5] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/05/2023]
13
Chen Y, Zhao H, Tan Z, Zhang C, Fu X. Bottleneck limitations for microRNA-based therapeutics from bench to the bedside. DIE PHARMAZIE 2015. [PMID: 25980175 DOI: 10.1016/j.optlastec.2015.01.016] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/16/2023]
14
Yang YG, Pan QX, Sun SJ, Xu P. Novel image encryption based on quantum walks. Sci Rep 2015;5:7784. [PMID: 25586889 PMCID: PMC4293593 DOI: 10.1038/srep07784] [Citation(s) in RCA: 52] [Impact Index Per Article: 5.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/13/2014] [Accepted: 12/15/2014] [Indexed: 11/09/2022]  Open
15
Chen W, Chen X, Sheppard CJR. Optical color-image encryption and synthesis using coherent diffractive imaging in the Fresnel domain. OPTICS EXPRESS 2012;20:3853-3865. [PMID: 22418142 DOI: 10.1364/oe.20.003853] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/31/2023]
16
Qin W, Peng X, Meng X, Gao B. Universal and special keys based on phase-truncated Fourier transform. OPTICAL ENGINEERING (REDONDO BEACH, CALIF.) 2011;50:080501. [PMID: 25339784 PMCID: PMC4203434 DOI: 10.1117/1.3607421] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/31/2023]
17
Qin W, Peng X, Meng X, Gao BZ. Vulnerability to chosen-plaintext attack of optoelectronic information encryption with phase-shifting interferometry. OPTICAL ENGINEERING (REDONDO BEACH, CALIF.) 2011;50:065601. [PMID: 23894214 PMCID: PMC3721417 DOI: 10.1117/1.3590725] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/02/2023]
18
Situ G, Pedrini G, Osten W. Strategy for cryptanalysis of optical encryption in the Fresnel domain. APPLIED OPTICS 2010;49:457-462. [PMID: 20090811 DOI: 10.1364/ao.49.000457] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/28/2023]
19
Qin W, Peng X. Asymmetric cryptosystem based on phase-truncated Fourier transforms. OPTICS LETTERS 2010;35:118-120. [PMID: 20081940 DOI: 10.1364/ol.35.000118] [Citation(s) in RCA: 14] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/28/2023]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA