Advances and vulnerabilities in modern cryptographic techniques: A comprehensive survey on cybersecurity in the domain of machine/deep learning and quantum …

A Mehmood, A Shafique, M Alawida, AN Khan - IEEE access, 2024 - ieeexplore.ieee.org
In the contemporary landscape, where a huge amount of data plays a vital role, the
importance of strong and robust cybersecurity measures has become increasingly …

Roadmap on optical security

B Javidi, A Carnicer, M Yamaguchi, T Nomura… - Journal of …, 2016 - iopscience.iop.org
Abstract Information security and authentication are important challenges facing society.
Recent attacks by hackers on the databases of large commercial and financial companies …

Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform

N Zhou, H Li, D Wang, S Pan, Z Zhou - Optics Communications, 2015 - Elsevier
Most of the existing image encryption techniques bear security risks for taking linear
transform or suffer encryption data expansion for adopting nonlinear transformation directly …

Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform

X Wang, Y Chen, C Dai, D Zhao - Applied optics, 2014 - opg.optica.org
A discussion and a cryptanalysis of the optical phase-truncated Fourier-transform-based
cryptosystem are presented in this paper. The concept of an optical asymmetric …

Image compression-encryption algorithms by combining hyper-chaotic system with discrete fractional random transform

L Gong, C Deng, S Pan, N Zhou - Optics & Laser Technology, 2018 - Elsevier
Based on hyper-chaotic system and discrete fractional random transform, an image
compression-encryption algorithm is designed. The original image is first transformed into a …

Asymmetric optical cryptosystem based on coherent superposition and equal modulus decomposition

J Cai, X Shen, M Lei, C Lin, S Dou - Optics Letters, 2015 - opg.optica.org
A novel asymmetric cryptosystem based on coherent superposition, which is free from
silhouette problem, is proposed. Being different from the phase-truncated Fourier transform …

Fingerprint image encryption using phase retrieval algorithm in gyrator wavelet transform domain using QR decomposition

I Mehra, NK Nishchal - Optics Communications, 2023 - Elsevier
In this paper, we propose a novel optical asymmetric fingerprint image encryption technique
that uses QR decomposition in gyrator wavelet transform domain. A fingerprint image is …

Fresnel domain nonlinear optical image encryption scheme based on Gerchberg–Saxton phase-retrieval algorithm

SK Rajput, NK Nishchal - Applied optics, 2014 - opg.optica.org
We propose a novel nonlinear image-encryption scheme based on a Gerchberg–Saxton
(GS) phase-retrieval algorithm in the Fresnel transform domain. The decryption process can …

Multiuser optical image authentication platform based on sparse constraint and polar decomposition in Fresnel domain

R Kumar, P Singh - Physica Scripta, 2022 - iopscience.iop.org
In this paper, a new multiuser optical image encryption and authentication technique is
proposed. Sparse multiplexing and polar decomposition are used in the Fresnel domain to …

Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform

SK Rajput, NK Nishchal - Applied Optics, 2013 - opg.optica.org
In this paper, we propose a scheme for information security under the basic double random
phase<? A3B2 show [pmg: line-break justify=" yes"/]?> encoding framework but with …