Advances in optical visual information security: a comprehensive review

Sachin, R Kumar, Sakshi, R Yadav, SG Reddy… - Photonics, 2024 - mdpi.com
In the modern era, the secure transmission and storage of information are among the utmost
priorities. Optical security protocols have demonstrated significant advantages over digital …

Multi-user nonlinear optical cryptosystem based on polar decomposition and fractional vortex speckle patterns

VC Mandapati, H Vardhan, S Prabhakar, Sakshi… - Photonics, 2023 - mdpi.com
In this paper, we propose a new multiuser nonlinear optical cryptosystem using fractional-
order vortex speckle (FOVS) patterns as security keys. In conventional optical cryptosystems …

Multiuser medical image encryption algorithm using phase-only CGH in the gyrator domain

R Yadav, Sachin, P Singh - Journal of the Optical Society of America …, 2024 - opg.optica.org
In this paper, a multiuser medical image encryption algorithm is proposed. The proposed
algorithm utilizes polar decomposition, which enables multiuser features in the proposed …

Optical image encryption based on linear canonical transform with sparse representation

IM Qasim, EA Mohammed - Optics Communications, 2023 - Elsevier
We propose optical image encryption and authentication in the linear canonical transform
(LCT) method by using a sparse representation technique. The linearity in the LCT based …

Asymmetric image authentication algorithm using double random modulus decomposition and CGI

R Yadav, P Singh - Computational and Applied Mathematics, 2023 - Springer
In this paper, we have proposed asymmetric image encryption cum authentication
cryptosystem based on double random modulus decomposition using computational ghost …

Optical multiple-image authentication based on computational ghost imaging and hybrid non-convex second-order total variation

Y Zhou, Y Sun, M Yang, B Zhou, J Hou, T Zeng… - Optics …, 2023 - opg.optica.org
An optical security method for multiple-image authentication is proposed based on
computational ghost imaging and hybrid non-convex second-order total variation. Firstly …

An optical multiple-image authentication based on computational ghost imaging and total-variation minimization

Y Zhou, Y Sun, M Yang, J Hou, Z Xiao, A Anand, L Sui - Heliyon, 2023 - cell.com
An optical multiple-image authentication is suggested using computational ghost imaging
and total-variation minimization. Differing from encrypting multiple images into a noise-like …

An asymmetric hybrid cryptosystem based on triple random phase encoding using polar decomposition, QZ modulation, and gyrator domain

KS Gaur, H Singh, S Thakran, K Singh - Optik, 2024 - Elsevier
This paper introduces an asymmetric cryptosystem utilizing Triple Random Phase Encoding
(TRPE), incorporating polar decomposition (PD) and QZ modulation. The utilization of keys …

An asymmetric phase image encryption technique using Arnold transform, singular value decomposition, Hessenberg decomposition, and fractional Hartley transform

H Singh, KS Gaur, S Thakran, K Singh - Applied Physics B, 2024 - Springer
In this paper, we perform a cryptanalysis of a previously published symmetric cryptosystem
that utilizes the Arnold transform (AT), singular value decomposition (SVD), and the …

A novel image encryption scheme based on Logistic cosine cascade maps

W Ma, T Yu, Z Wang, X Li - Physica Scripta, 2023 - iopscience.iop.org
A two-dimensional Logistic cosine cascade map (2D-LCCM) and a three-dimensional
Logistic cosine cascade map (3D-LCCM) are proposed based on a logistic map and infinite …