Advances in optical visual information security: a comprehensive review
In the modern era, the secure transmission and storage of information are among the utmost
priorities. Optical security protocols have demonstrated significant advantages over digital …
priorities. Optical security protocols have demonstrated significant advantages over digital …
Multi-user nonlinear optical cryptosystem based on polar decomposition and fractional vortex speckle patterns
In this paper, we propose a new multiuser nonlinear optical cryptosystem using fractional-
order vortex speckle (FOVS) patterns as security keys. In conventional optical cryptosystems …
order vortex speckle (FOVS) patterns as security keys. In conventional optical cryptosystems …
Multiuser medical image encryption algorithm using phase-only CGH in the gyrator domain
In this paper, a multiuser medical image encryption algorithm is proposed. The proposed
algorithm utilizes polar decomposition, which enables multiuser features in the proposed …
algorithm utilizes polar decomposition, which enables multiuser features in the proposed …
Optical image encryption based on linear canonical transform with sparse representation
IM Qasim, EA Mohammed - Optics Communications, 2023 - Elsevier
We propose optical image encryption and authentication in the linear canonical transform
(LCT) method by using a sparse representation technique. The linearity in the LCT based …
(LCT) method by using a sparse representation technique. The linearity in the LCT based …
Asymmetric image authentication algorithm using double random modulus decomposition and CGI
In this paper, we have proposed asymmetric image encryption cum authentication
cryptosystem based on double random modulus decomposition using computational ghost …
cryptosystem based on double random modulus decomposition using computational ghost …
Optical multiple-image authentication based on computational ghost imaging and hybrid non-convex second-order total variation
Y Zhou, Y Sun, M Yang, B Zhou, J Hou, T Zeng… - Optics …, 2023 - opg.optica.org
An optical security method for multiple-image authentication is proposed based on
computational ghost imaging and hybrid non-convex second-order total variation. Firstly …
computational ghost imaging and hybrid non-convex second-order total variation. Firstly …
An optical multiple-image authentication based on computational ghost imaging and total-variation minimization
An optical multiple-image authentication is suggested using computational ghost imaging
and total-variation minimization. Differing from encrypting multiple images into a noise-like …
and total-variation minimization. Differing from encrypting multiple images into a noise-like …
An asymmetric hybrid cryptosystem based on triple random phase encoding using polar decomposition, QZ modulation, and gyrator domain
This paper introduces an asymmetric cryptosystem utilizing Triple Random Phase Encoding
(TRPE), incorporating polar decomposition (PD) and QZ modulation. The utilization of keys …
(TRPE), incorporating polar decomposition (PD) and QZ modulation. The utilization of keys …
An asymmetric phase image encryption technique using Arnold transform, singular value decomposition, Hessenberg decomposition, and fractional Hartley transform
In this paper, we perform a cryptanalysis of a previously published symmetric cryptosystem
that utilizes the Arnold transform (AT), singular value decomposition (SVD), and the …
that utilizes the Arnold transform (AT), singular value decomposition (SVD), and the …
A novel image encryption scheme based on Logistic cosine cascade maps
W Ma, T Yu, Z Wang, X Li - Physica Scripta, 2023 - iopscience.iop.org
A two-dimensional Logistic cosine cascade map (2D-LCCM) and a three-dimensional
Logistic cosine cascade map (3D-LCCM) are proposed based on a logistic map and infinite …
Logistic cosine cascade map (3D-LCCM) are proposed based on a logistic map and infinite …