• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4610651)   Today's Articles (135)   Subscriber (49380)
For: Cai J, Shen X, Lei M, Lin C, Dou S. Asymmetric optical cryptosystem based on coherent superposition and equal modulus decomposition. Opt Lett 2015;40:475-478. [PMID: 25680128 DOI: 10.1364/ol.40.000475] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/04/2023]
Number Cited by Other Article(s)
1
Wang J, Wang D. Attack on optical cryptosystems by skip connection networks. OPTICS EXPRESS 2024;32:19424-19437. [PMID: 38859077 DOI: 10.1364/oe.520504] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 02/01/2024] [Accepted: 04/13/2024] [Indexed: 06/12/2024]
2
Luan G, Quan C. Optical phase-truncation-based double-image encryption using equal modulus decomposition and random masks. Sci Rep 2024;14:7155. [PMID: 38531920 DOI: 10.1038/s41598-024-57790-9] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/23/2024] [Accepted: 03/21/2024] [Indexed: 03/28/2024]  Open
3
Yadav R, Sachin, Singh P. Multiuser medical image encryption algorithm using phase-only CGH in the gyrator domain. JOURNAL OF THE OPTICAL SOCIETY OF AMERICA. A, OPTICS, IMAGE SCIENCE, AND VISION 2024;41:A63-A72. [PMID: 38437431 DOI: 10.1364/josaa.507308] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/02/2023] [Accepted: 01/16/2024] [Indexed: 03/06/2024]
4
Liu Y, Shen X, Zhou B, Liu J, Cai J, Liu X, Cheng Y. Optical asymmetric JTC cryptosystem based on binary phase modulation and image superposition-subtraction operation. APPLIED OPTICS 2022;61:8711-8729. [PMID: 36256005 DOI: 10.1364/ao.466386] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/10/2022] [Accepted: 09/16/2022] [Indexed: 06/16/2023]
5
Chen J, He W. Parallel optical hash function based on the interaction between linearly polarized light and multiple-scattering media. APPLIED OPTICS 2022;61:5457-5465. [PMID: 36256113 DOI: 10.1364/ao.458422] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 03/25/2022] [Accepted: 06/05/2022] [Indexed: 06/16/2023]
6
Xiong Y, Wang Y. Cryptoanalysis on the optical image encryption scheme based on full phase encoding and equal modulus decomposition. APPLIED OPTICS 2022;61:2743-2749. [PMID: 35471346 DOI: 10.1364/ao.455250] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 02/03/2022] [Accepted: 03/04/2022] [Indexed: 06/14/2023]
7
Zhang Y, Zhang X, Shan M, Zhong Z, Liu B, Yu L, Liu L. Asymmetric double-image encryption via wavelength multiplexing. APPLIED OPTICS 2022;61:1248-1253. [PMID: 35201177 DOI: 10.1364/ao.449580] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/25/2021] [Accepted: 01/12/2022] [Indexed: 06/14/2023]
8
Li H, Bai X, Shan M, Zhong Z, Liu L, Liu B. Asymmetric multiparameter encryption of hyperspectral images based on hybrid chaotic mapping and an equal modulus decomposition tree. APPLIED OPTICS 2021;60:6511-6519. [PMID: 34612888 DOI: 10.1364/ao.425776] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/01/2021] [Accepted: 06/20/2021] [Indexed: 06/13/2023]
9
Polarization-Encoded Fully-Phase Encryption Using Transport-of-Intensity Equation. ELECTRONICS 2021. [DOI: 10.3390/electronics10080969] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
10
Tao S, Tang C, Shen Y, Lei Z. Optical image encryption based on biometric keys and singular value decomposition. APPLIED OPTICS 2020;59:2422-2430. [PMID: 32225778 DOI: 10.1364/ao.385652] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/11/2019] [Accepted: 01/26/2020] [Indexed: 06/10/2023]
11
Xiong Y, He A, Quan C. Cryptoanalysis on optical image encryption systems based on the vector decomposition technique in the Fourier domain. APPLIED OPTICS 2019;58:3301-3309. [PMID: 31044810 DOI: 10.1364/ao.58.003301] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 02/26/2019] [Accepted: 03/27/2019] [Indexed: 06/09/2023]
12
Pan A, Wen K, Yao B. Linear space-variant optical cryptosystem via Fourier ptychography. OPTICS LETTERS 2019;44:2032-2035. [PMID: 30985803 DOI: 10.1364/ol.44.002032] [Citation(s) in RCA: 12] [Impact Index Per Article: 2.4] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 01/23/2019] [Accepted: 03/19/2019] [Indexed: 06/09/2023]
13
Kumar P, Nishchal NK. Enhanced exclusive-OR and quick response code-based image encryption through incoherent illumination. APPLIED OPTICS 2019;58:1408-1412. [PMID: 30874025 DOI: 10.1364/ao.58.001408] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/20/2018] [Accepted: 01/18/2019] [Indexed: 06/09/2023]
14
Yu H, Chang J, Liu X, Wu C, He Y, Zhang Y. Novel asymmetric cryptosystem based on distorted wavefront beam illumination and double-random phase encoding. OPTICS EXPRESS 2017;25:8860-8871. [PMID: 28437961 DOI: 10.1364/oe.25.008860] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/07/2023]
15
Wang Y, Quan C, Tay CJ. New method of attack and security enhancement on an asymmetric cryptosystem based on equal modulus decomposition. APPLIED OPTICS 2016;55:679-686. [PMID: 26836068 DOI: 10.1364/ao.55.000679] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/05/2023]
16
Wu J, Liu W, Liu Z, Liu S. Cryptanalysis of an "asymmetric optical cryptosystem based on coherent superposition and equal modulus decomposition". APPLIED OPTICS 2015;54:8921-8924. [PMID: 26560380 DOI: 10.1364/ao.54.008921] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/05/2023]
17
Abuturab MR. Group multiple-image encoding and watermarking using coupled logistic maps and gyrator wavelet transform. JOURNAL OF THE OPTICAL SOCIETY OF AMERICA. A, OPTICS, IMAGE SCIENCE, AND VISION 2015;32:1811-1820. [PMID: 26479935 DOI: 10.1364/josaa.32.001811] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/05/2023]
18
Deng X. Asymmetric optical cryptosystem based on coherent superposition and equal modulus decomposition: comment. OPTICS LETTERS 2015;40:3913. [PMID: 26274692 DOI: 10.1364/ol.40.003913] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/04/2023]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA