Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A review of optical image encryption techniques
S Liu, C Guo, JT Sheridan - Optics & Laser Technology, 2014 - Elsevier
In this paper we review a number of optical image encryption techniques proposed in the
literature inspired by the architecture of the classic optical Double Random Phase Encoding …
literature inspired by the architecture of the classic optical Double Random Phase Encoding …
Optical image compression and encryption methods
A Alfalou, C Brosseau - Advances in Optics and Photonics, 2009 - opg.optica.org
Over the years extensive studies have been carried out to apply coherent optics methods in
real-time communications and image transmission. This is especially true when a large …
real-time communications and image transmission. This is especially true when a large …
A novel and effective image encryption algorithm based on chaos and DNA encoding
X Wang, C Liu - Multimedia Tools and Applications, 2017 - Springer
In this paper, we proposed a novel and effective image encryption algorithm based on
Chaos and DNA encoding rules. Piecewise Linear Chaotic Map (PWLCM) and Logistic Map …
Chaos and DNA encoding rules. Piecewise Linear Chaotic Map (PWLCM) and Logistic Map …
Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains
A color image encryption algorithm is designed by use of Arnold transform and discrete
cosine transform (DCT). The RGB components of the color image are scrambled by Arnold …
cosine transform (DCT). The RGB components of the color image are scrambled by Arnold …
Vulnerability to ciphertext-only attack of optical encryption scheme based on double random phase encoding
We demonstrate in this paper that the traditional double random phase encoding (DRPE)
technique is vulnerable to ciphertext-only attack (COA). In this method, an unauthorized user …
technique is vulnerable to ciphertext-only attack (COA). In this method, an unauthorized user …
Logistic sine map based image encryption
MT Elkandoz, W Alexan… - 2019 Signal Processing …, 2019 - ieeexplore.ieee.org
In this paper, an image encryption algorithm is proposed in which first the image pixels are
shuffled using the Arnold map. Second, a 256-bit key is generated using a 2D logistic Sine …
shuffled using the Arnold map. Second, a 256-bit key is generated using a 2D logistic Sine …
Image encryption scheme by using iterative random phase encoding in gyrator transform domains
Z Liu, L Xu, C Lin, J Dai, S Liu - Optics and Lasers in Engineering, 2011 - Elsevier
An image encryption is discussed based on the random phase encoding method in gyrator
domains. An iterative structure of image encryption is designed for introducing more random …
domains. An iterative structure of image encryption is designed for introducing more random …
Cyphertext-only attack on the double random-phase encryption: experimental demonstration
G Li, W Yang, D Li, G Situ - Optics Express, 2017 - opg.optica.org
We demonstrate experimentally that the traditional double random phase encoding (DPRE)
technique is vulnerable to the cyphertext-only attack (COA). With the statistical ergodic …
technique is vulnerable to the cyphertext-only attack (COA). With the statistical ergodic …
Advances in optical visual information security: a comprehensive review
In the modern era, the secure transmission and storage of information are among the utmost
priorities. Optical security protocols have demonstrated significant advantages over digital …
priorities. Optical security protocols have demonstrated significant advantages over digital …
Security enhancement of double-random phase encryption by amplitude modulation
XC Cheng, LZ Cai, YR Wang, XF Meng, H Zhang… - Optics letters, 2008 - opg.optica.org
Conventional double-random phase encoding is vulnerable to a chosen or known plaintext
attack owing to the linearity of the system. We introduce a technique to break down this …
attack owing to the linearity of the system. We introduce a technique to break down this …