Advances and vulnerabilities in modern cryptographic techniques: A comprehensive survey on cybersecurity in the domain of machine/deep learning and quantum …
In the contemporary landscape, where a huge amount of data plays a vital role, the
importance of strong and robust cybersecurity measures has become increasingly …
importance of strong and robust cybersecurity measures has become increasingly …
Roadmap on optical security
Abstract Information security and authentication are important challenges facing society.
Recent attacks by hackers on the databases of large commercial and financial companies …
Recent attacks by hackers on the databases of large commercial and financial companies …
Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform
N Zhou, H Li, D Wang, S Pan, Z Zhou - Optics Communications, 2015 - Elsevier
Most of the existing image encryption techniques bear security risks for taking linear
transform or suffer encryption data expansion for adopting nonlinear transformation directly …
transform or suffer encryption data expansion for adopting nonlinear transformation directly …
Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform
X Wang, Y Chen, C Dai, D Zhao - Applied optics, 2014 - opg.optica.org
A discussion and a cryptanalysis of the optical phase-truncated Fourier-transform-based
cryptosystem are presented in this paper. The concept of an optical asymmetric …
cryptosystem are presented in this paper. The concept of an optical asymmetric …
Image compression-encryption algorithms by combining hyper-chaotic system with discrete fractional random transform
Based on hyper-chaotic system and discrete fractional random transform, an image
compression-encryption algorithm is designed. The original image is first transformed into a …
compression-encryption algorithm is designed. The original image is first transformed into a …
Asymmetric optical cryptosystem based on coherent superposition and equal modulus decomposition
J Cai, X Shen, M Lei, C Lin, S Dou - Optics Letters, 2015 - opg.optica.org
A novel asymmetric cryptosystem based on coherent superposition, which is free from
silhouette problem, is proposed. Being different from the phase-truncated Fourier transform …
silhouette problem, is proposed. Being different from the phase-truncated Fourier transform …
Fingerprint image encryption using phase retrieval algorithm in gyrator wavelet transform domain using QR decomposition
In this paper, we propose a novel optical asymmetric fingerprint image encryption technique
that uses QR decomposition in gyrator wavelet transform domain. A fingerprint image is …
that uses QR decomposition in gyrator wavelet transform domain. A fingerprint image is …
Fresnel domain nonlinear optical image encryption scheme based on Gerchberg–Saxton phase-retrieval algorithm
We propose a novel nonlinear image-encryption scheme based on a Gerchberg–Saxton
(GS) phase-retrieval algorithm in the Fresnel transform domain. The decryption process can …
(GS) phase-retrieval algorithm in the Fresnel transform domain. The decryption process can …
Multiuser optical image authentication platform based on sparse constraint and polar decomposition in Fresnel domain
In this paper, a new multiuser optical image encryption and authentication technique is
proposed. Sparse multiplexing and polar decomposition are used in the Fresnel domain to …
proposed. Sparse multiplexing and polar decomposition are used in the Fresnel domain to …
Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform
In this paper, we propose a scheme for information security under the basic double random
phase<? A3B2 show [pmg: line-break justify=" yes"/]?> encoding framework but with …
phase<? A3B2 show [pmg: line-break justify=" yes"/]?> encoding framework but with …