• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4623447)   Today's Articles (1087)   Subscriber (49408)
For: Rajput SK, Nishchal NK. Image encryption based on interference that uses fractional Fourier domain asymmetric keys. Appl Opt 2012;51:1446-1452. [PMID: 22505061 DOI: 10.1364/ao.51.001446] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/28/2011] [Accepted: 01/14/2012] [Indexed: 05/31/2023]
Number Cited by Other Article(s)
1
Luan G, Quan C. Optical phase-truncation-based double-image encryption using equal modulus decomposition and random masks. Sci Rep 2024;14:7155. [PMID: 38531920 DOI: 10.1038/s41598-024-57790-9] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/23/2024] [Accepted: 03/21/2024] [Indexed: 03/28/2024]  Open
2
Zhang L, Tang C, Shen Y, Han R. Optical double-image cryptosystem based on generalized singular value decomposition and five-dimensional hyperchaotic maps. APPLIED OPTICS 2023;62:665-674. [PMID: 36821270 DOI: 10.1364/ao.476236] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/21/2022] [Accepted: 12/06/2022] [Indexed: 06/18/2023]
3
Shan M, Guo J, Zhong Z, Liu B, Yu L, Liu L. Improved multiple-image authentication based on optical interference by wavelength multiplexing. APPLIED OPTICS 2022;61:6931-6938. [PMID: 36255775 DOI: 10.1364/ao.456222] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 02/17/2022] [Accepted: 07/17/2022] [Indexed: 06/16/2023]
4
Faragallah OS, Naeem EA, El-sayed HS, Abd El-Samie FE. Efficient compression processing of optically DCT-based DRPE encrypted images. OPTICAL AND QUANTUM ELECTRONICS 2022;54:273. [DOI: 10.1007/s11082-022-03668-x] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Received: 02/18/2021] [Accepted: 03/09/2022] [Indexed: 09/02/2023]
5
Kumar R, Singh P. Modified plaintext attacks in a session for an optical cryptosystem based on DRPE with PFS. APPLIED OPTICS 2022;61:623-628. [PMID: 35200905 DOI: 10.1364/ao.446070] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/14/2021] [Accepted: 12/14/2021] [Indexed: 06/14/2023]
6
Lensless Optical Encryption of Multilevel Digital Data Containers Using Spatially Incoherent Illumination. APPLIED SCIENCES-BASEL 2021. [DOI: 10.3390/app12010406] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
7
Cheremkhin PA, Evtikhiev NN, Krasnov VV, Rodin VG, Ryabcev IP, Shifrina AV, Starikov RS. Lensless optical encryption with speckle-noise suppression and QR codes. APPLIED OPTICS 2021;60:7336-7345. [PMID: 34613021 DOI: 10.1364/ao.430968] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/07/2021] [Accepted: 07/20/2021] [Indexed: 06/13/2023]
8
Ye G, Wu H, Jiao K, Mei D. Asymmetric image encryption scheme based on the Quantum logistic map and cyclic modulo diffusion. MATHEMATICAL BIOSCIENCES AND ENGINEERING : MBE 2021;18:5427-5448. [PMID: 34517495 DOI: 10.3934/mbe.2021275] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/13/2023]
9
Mosso E, Suárez O, Bolognini N. Asymmetric multiple-image encryption system based on a chirp z-transform. APPLIED OPTICS 2019;58:5674-5680. [PMID: 31503869 DOI: 10.1364/ao.58.005674] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/01/2019] [Accepted: 06/17/2019] [Indexed: 06/10/2023]
10
Kumar A, Nishchal NK. Quick response code and interference-based optical asymmetric cryptosystem. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2019. [DOI: 10.1016/j.jisa.2019.01.004] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/27/2022]
11
Piao ML, Liu ZX, Piao YL, Wu HY, Yu Z, Kim N. Multi-depth three-dimensional image encryption based on the phase retrieval algorithm in the Fresnel and fractional Fourier transform domains. APPLIED OPTICS 2018;57:7609-7617. [PMID: 30461829 DOI: 10.1364/ao.57.007609] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/11/2018] [Accepted: 08/14/2018] [Indexed: 06/09/2023]
12
Yan A, Wei Y, Hu Z, Zhang J, Tsang PWM, Poon TC. Optical cryptography with biometrics for multi-depth objects. Sci Rep 2017;7:12933. [PMID: 29021574 PMCID: PMC5636816 DOI: 10.1038/s41598-017-12946-8] [Citation(s) in RCA: 27] [Impact Index Per Article: 3.9] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/21/2017] [Accepted: 09/12/2017] [Indexed: 11/09/2022]  Open
13
Nakano K, Takeda M, Suzuki H. Key-length analysis of double random phase encoding. APPLIED OPTICS 2017;56:4474-4479. [PMID: 29047878 DOI: 10.1364/ao.56.004474] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 03/02/2017] [Accepted: 04/30/2017] [Indexed: 06/07/2023]
14
Yi J, Tan G. Binary-tree encryption strategy for optical multiple-image encryption. APPLIED OPTICS 2016;55:5280-5291. [PMID: 27409301 DOI: 10.1364/ao.55.005280] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/06/2023]
15
Wang Y, Quan C, Tay CJ. New method of attack and security enhancement on an asymmetric cryptosystem based on equal modulus decomposition. APPLIED OPTICS 2016;55:679-686. [PMID: 26836068 DOI: 10.1364/ao.55.000679] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/05/2023]
16
Double Random Phase Encoding Based Optical Encryption Systems Using Some Linear Canonical Transforms: Weaknesses and Countermeasures. LINEAR CANONICAL TRANSFORMS 2016. [DOI: 10.1007/978-1-4939-3028-9_13] [Citation(s) in RCA: 21] [Impact Index Per Article: 2.6] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/13/2022]
17
Yi J, Tan G. Optical compression and encryption system combining multiple measurement matrices with fractional Fourier transform. APPLIED OPTICS 2015;54:10650-10658. [PMID: 26837032 DOI: 10.1364/ao.54.010650] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/05/2023]
18
Wang Y, Quan C, Tay CJ. Improved method of attack on an asymmetric cryptosystem based on phase-truncated Fourier transform. APPLIED OPTICS 2015;54:6874-6881. [PMID: 26368104 DOI: 10.1364/ao.54.006874] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/05/2023]
19
Cai J, Shen X, Lei M, Lin C, Dou S. Asymmetric optical cryptosystem based on coherent superposition and equal modulus decomposition. OPTICS LETTERS 2015;40:475-478. [PMID: 25680128 DOI: 10.1364/ol.40.000475] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/04/2023]
20
Wang X, Zhao D, Chen Y. Double-image encryption without information disclosure using phase-truncation Fourier transforms and a random amplitude mask. APPLIED OPTICS 2014;53:5100-5108. [PMID: 25320917 DOI: 10.1364/ao.53.005100] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/14/2014] [Accepted: 07/04/2014] [Indexed: 06/04/2023]
21
Lin C, Shen X, Wang Z. Asymmetric information hiding and noise-free recovery based on rotating analyzer ellipsometry and quick-response code. JOURNAL OF THE OPTICAL SOCIETY OF AMERICA. A, OPTICS, IMAGE SCIENCE, AND VISION 2014;31:1895-1903. [PMID: 25121548 DOI: 10.1364/josaa.31.001895] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/03/2023]
22
Lin C, Shen X, Wang Z, Zhao C. Optical asymmetric cryptography based on elliptical polarized light linear truncation and a numerical reconstruction technique. APPLIED OPTICS 2014;53:3920-3928. [PMID: 24979424 DOI: 10.1364/ao.53.003920] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 03/13/2014] [Accepted: 05/13/2014] [Indexed: 06/03/2023]
23
Rajput SK, Nishchal NK. An optical encryption and authentication scheme using asymmetric keys. JOURNAL OF THE OPTICAL SOCIETY OF AMERICA. A, OPTICS, IMAGE SCIENCE, AND VISION 2014;31:1233-1238. [PMID: 24977361 DOI: 10.1364/josaa.31.001233] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/03/2023]
24
Mehra I, Nishchal NK. Image fusion using wavelet transform and its application to asymmetric cryptosystem and hiding. OPTICS EXPRESS 2014;22:5474-5482. [PMID: 24663888 DOI: 10.1364/oe.22.005474] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/03/2023]
25
Rajput SK, Nishchal NK. Fresnel domain nonlinear optical image encryption scheme based on Gerchberg-Saxton phase-retrieval algorithm. APPLIED OPTICS 2014;53:418-425. [PMID: 24514127 DOI: 10.1364/ao.53.000418] [Citation(s) in RCA: 6] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/04/2013] [Accepted: 12/15/2013] [Indexed: 06/03/2023]
26
Wang X, Chen Y, Dai C, Zhao D. Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform. APPLIED OPTICS 2014;53:208-213. [PMID: 24514051 DOI: 10.1364/ao.53.000208] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/21/2013] [Accepted: 12/09/2013] [Indexed: 06/03/2023]
27
Wang Q, Guo Q, Zhou J. Multiple-image encryption using polarized light encoding and the optical interference principle in the Fresnel-transform domain. APPLIED OPTICS 2013;52:8854-8863. [PMID: 24513953 DOI: 10.1364/ao.52.008854] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/07/2013] [Accepted: 11/19/2013] [Indexed: 06/03/2023]
28
Wang X, Zhao D. Simultaneous nonlinear encryption of grayscale and color images based on phase-truncated fractional Fourier transform and optical superposition principle. APPLIED OPTICS 2013;52:6170-6178. [PMID: 24085074 DOI: 10.1364/ao.52.006170] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/28/2013] [Accepted: 07/30/2013] [Indexed: 06/02/2023]
29
Rajput SK, Nishchal NK. Image encryption using polarized light encoding and amplitude and phase truncation in the Fresnel domain. APPLIED OPTICS 2013;52:4343-4352. [PMID: 23842178 DOI: 10.1364/ao.52.004343] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 03/04/2013] [Accepted: 04/30/2013] [Indexed: 06/02/2023]
30
Rajput SK, Nishchal NK. Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform. APPLIED OPTICS 2013;52:871-878. [PMID: 23385931 DOI: 10.1364/ao.52.000871] [Citation(s) in RCA: 5] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/22/2012] [Accepted: 01/03/2013] [Indexed: 06/01/2023]
31
Rajput SK, Nishchal NK. Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask. APPLIED OPTICS 2012;51:5377-5386. [PMID: 22859025 DOI: 10.1364/ao.51.005377] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/16/2012] [Accepted: 06/22/2012] [Indexed: 06/01/2023]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA