Wang et al., 2014 - Google Patents
Fractional Fourier domain optical image hiding using phase retrieval algorithm based on iterative nonlinear double random phase encodingWang et al., 2014
View HTML- Document ID
- 484330953193214932
- Author
- Wang X
- Chen W
- Chen X
- Publication year
- Publication venue
- Optics express
External Links
Snippet
We present a novel image hiding method based on phase retrieval algorithm under the framework of nonlinear double random phase encoding in fractional Fourier domain. Two phase-only masks (POMs) are efficiently determined by using the phase retrieval algorithm …
- 230000003287 optical 0 title description 39
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wang et al. | Fractional Fourier domain optical image hiding using phase retrieval algorithm based on iterative nonlinear double random phase encoding | |
Wang et al. | Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform | |
Sui et al. | Asymmetric double-image encryption based on cascaded discrete fractional random transform and logistic maps | |
Liansheng et al. | Optical multiple-image encryption based on the chaotic structured phase masks under the illumination of a vortex beam in the gyrator domain | |
Zhu et al. | Optical image encryption based on multifractional Fourier transforms | |
Wang et al. | Optical information authentication using compressed double-random-phase-encoded images and quick-response codes | |
Rajput et al. | Fresnel domain nonlinear optical image encryption scheme based on Gerchberg–Saxton phase-retrieval algorithm | |
Liu et al. | Vulnerability to ciphertext-only attack of optical encryption scheme based on double random phase encoding | |
Wang et al. | Amplitude-phase retrieval attack free cryptosystem based on direct attack to phase-truncated Fourier-transform-based encryption using a random amplitude mask | |
Kumar et al. | Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator | |
Zhang et al. | Vulnerability to chosen-plaintext attack of a general optical encryption model with the architecture of scrambling-then-double random phase encoding | |
Rajput et al. | Image encryption using polarized light encoding and amplitude and phase truncation in the Fresnel domain | |
Wang et al. | Security enhancement of a phase-truncation based image encryption algorithm | |
Gong et al. | Multiple-image encryption and authentication with sparse representation by space multiplexing | |
Wang et al. | Improved method of attack on an asymmetric cryptosystem based on phase-truncated Fourier transform | |
Zhong et al. | Silhouette-free image encryption using interference in the multiple-parameter fractional Fourier transform domain | |
Wang et al. | Simultaneous nonlinear encryption of grayscale and color images based on phase-truncated fractional Fourier transform and optical superposition principle | |
Wang et al. | Double-image encryption without information disclosure using phase-truncation Fourier transforms and a random amplitude mask | |
Abuturab | Color information cryptosystem based on optical superposition principle and phase-truncated gyrator transform | |
Xiong et al. | Security analysis of a double-image encryption technique based on an asymmetric algorithm | |
Qin et al. | Optical multiple-image encryption in diffractive-imaging-based scheme using spectral fusion and nonlinear operation | |
Jiao et al. | Known-plaintext attack to optical encryption systems with space and polarization encoding | |
Wang et al. | Multiple-image encryption based on interference principle and phase-only mask multiplexing in Fresnel transform domain | |
Fan et al. | Optical identity authentication scheme based on elliptic curve digital signature algorithm and phase retrieval algorithm | |
Su et al. | Optical color image encryption based on chaotic fingerprint phase mask in various domains and comparative analysis |