• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4619806)   Today's Articles (2877)   Subscriber (49403)
For: Situ G, Pedrini G, Osten W. Strategy for cryptanalysis of optical encryption in the Fresnel domain. Appl Opt 2010;49:457-462. [PMID: 20090811 DOI: 10.1364/ao.49.000457] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/28/2023]
Number Cited by Other Article(s)
1
Wu J, Shen Y, Xu G. Integrating Fresnel diffraction, multi-phase retrieval, and hyperchaos mapping for color image encryption. APPLIED OPTICS 2023;62:844-860. [PMID: 36821148 DOI: 10.1364/ao.478668] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/20/2022] [Accepted: 12/15/2022] [Indexed: 06/18/2023]
2
Zhang L, Wang Y, Li DH, Li Q, Zhao W, Li X. Cryptanalysis for a light-field 3D cryptosystem based on M-cGAN. OPTICS LETTERS 2021;46:4916-4919. [PMID: 34598233 DOI: 10.1364/ol.436049] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/06/2021] [Accepted: 08/27/2021] [Indexed: 06/13/2023]
3
Wang L, Wu Q, Situ G. Chosen-plaintext attack on the double random polarization encryption. OPTICS EXPRESS 2019;27:32158-32167. [PMID: 31684433 DOI: 10.1364/oe.27.032158] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 08/29/2019] [Accepted: 10/12/2019] [Indexed: 06/10/2023]
4
Double Random Phase Encoding Based Optical Encryption Systems Using Some Linear Canonical Transforms: Weaknesses and Countermeasures. LINEAR CANONICAL TRANSFORMS 2016. [DOI: 10.1007/978-1-4939-3028-9_13] [Citation(s) in RCA: 21] [Impact Index Per Article: 2.6] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/13/2022]
5
Li T, Shi Y. Security risk of diffractive-imaging-based optical cryptosystem. OPTICS EXPRESS 2015;23:21384-21391. [PMID: 26367986 DOI: 10.1364/oe.23.021384] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/05/2023]
6
Wang Y, Quan C, Tay CJ. Improved method of attack on an asymmetric cryptosystem based on phase-truncated Fourier transform. APPLIED OPTICS 2015;54:6874-6881. [PMID: 26368104 DOI: 10.1364/ao.54.006874] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/05/2023]
7
Vilardy JM, Millán MS, Pérez-Cabré E. Nonlinear optical security system based on a joint transform correlator in the Fresnel domain. APPLIED OPTICS 2014;53:1674-1682. [PMID: 24663426 DOI: 10.1364/ao.53.001674] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/14/2013] [Accepted: 01/31/2014] [Indexed: 06/03/2023]
8
Liu Z, Xu L, Lin C, Liu S. Image encryption by encoding with a nonuniform optical beam in gyrator transform domains. APPLIED OPTICS 2010;49:5632-5637. [PMID: 20935710 DOI: 10.1364/ao.49.005632] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/30/2023]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA