[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Wang et al., 2014 - Google Patents

Fractional Fourier domain optical image hiding using phase retrieval algorithm based on iterative nonlinear double random phase encoding

Wang et al., 2014

View HTML @Full View
Document ID
484330953193214932
Author
Wang X
Chen W
Chen X
Publication year
Publication venue
Optics express

External Links

Snippet

We present a novel image hiding method based on phase retrieval algorithm under the framework of nonlinear double random phase encoding in fractional Fourier domain. Two phase-only masks (POMs) are efficiently determined by using the phase retrieval algorithm …
Continue reading at opg.optica.org (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Similar Documents

Publication Publication Date Title
Wang et al. Fractional Fourier domain optical image hiding using phase retrieval algorithm based on iterative nonlinear double random phase encoding
Wang et al. Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform
Sui et al. Asymmetric double-image encryption based on cascaded discrete fractional random transform and logistic maps
Liansheng et al. Optical multiple-image encryption based on the chaotic structured phase masks under the illumination of a vortex beam in the gyrator domain
Zhu et al. Optical image encryption based on multifractional Fourier transforms
Wang et al. Optical information authentication using compressed double-random-phase-encoded images and quick-response codes
Rajput et al. Fresnel domain nonlinear optical image encryption scheme based on Gerchberg–Saxton phase-retrieval algorithm
Liu et al. Vulnerability to ciphertext-only attack of optical encryption scheme based on double random phase encoding
Wang et al. Amplitude-phase retrieval attack free cryptosystem based on direct attack to phase-truncated Fourier-transform-based encryption using a random amplitude mask
Kumar et al. Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator
Zhang et al. Vulnerability to chosen-plaintext attack of a general optical encryption model with the architecture of scrambling-then-double random phase encoding
Rajput et al. Image encryption using polarized light encoding and amplitude and phase truncation in the Fresnel domain
Wang et al. Security enhancement of a phase-truncation based image encryption algorithm
Gong et al. Multiple-image encryption and authentication with sparse representation by space multiplexing
Wang et al. Improved method of attack on an asymmetric cryptosystem based on phase-truncated Fourier transform
Zhong et al. Silhouette-free image encryption using interference in the multiple-parameter fractional Fourier transform domain
Wang et al. Simultaneous nonlinear encryption of grayscale and color images based on phase-truncated fractional Fourier transform and optical superposition principle
Wang et al. Double-image encryption without information disclosure using phase-truncation Fourier transforms and a random amplitude mask
Abuturab Color information cryptosystem based on optical superposition principle and phase-truncated gyrator transform
Xiong et al. Security analysis of a double-image encryption technique based on an asymmetric algorithm
Qin et al. Optical multiple-image encryption in diffractive-imaging-based scheme using spectral fusion and nonlinear operation
Jiao et al. Known-plaintext attack to optical encryption systems with space and polarization encoding
Wang et al. Multiple-image encryption based on interference principle and phase-only mask multiplexing in Fresnel transform domain
Fan et al. Optical identity authentication scheme based on elliptic curve digital signature algorithm and phase retrieval algorithm
Su et al. Optical color image encryption based on chaotic fingerprint phase mask in various domains and comparative analysis