Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Advances in optical visual information security: a comprehensive review
In the modern era, the secure transmission and storage of information are among the utmost
priorities. Optical security protocols have demonstrated significant advantages over digital …
priorities. Optical security protocols have demonstrated significant advantages over digital …
Optical image encryption based on linear canonical transform with sparse representation
IM Qasim, EA Mohammed - Optics Communications, 2023 - Elsevier
We propose optical image encryption and authentication in the linear canonical transform
(LCT) method by using a sparse representation technique. The linearity in the LCT based …
(LCT) method by using a sparse representation technique. The linearity in the LCT based …
Multi-user nonlinear optical cryptosystem based on polar decomposition and fractional vortex speckle patterns
In this paper, we propose a new multiuser nonlinear optical cryptosystem using fractional-
order vortex speckle (FOVS) patterns as security keys. In conventional optical cryptosystems …
order vortex speckle (FOVS) patterns as security keys. In conventional optical cryptosystems …
Multiuser medical image encryption algorithm using phase-only CGH in the gyrator domain
In this paper, a multiuser medical image encryption algorithm is proposed. The proposed
algorithm utilizes polar decomposition, which enables multiuser features in the proposed …
algorithm utilizes polar decomposition, which enables multiuser features in the proposed …
An asymmetric phase image encryption technique using Arnold transform, singular value decomposition, Hessenberg decomposition, and fractional Hartley transform
In this paper, we perform a cryptanalysis of a previously published symmetric cryptosystem
that utilizes the Arnold transform (AT), singular value decomposition (SVD), and the …
that utilizes the Arnold transform (AT), singular value decomposition (SVD), and the …
An asymmetric hybrid cryptosystem based on triple random phase encoding using polar decomposition, QZ modulation, and gyrator domain
This paper introduces an asymmetric cryptosystem utilizing Triple Random Phase Encoding
(TRPE), incorporating polar decomposition (PD) and QZ modulation. The utilization of keys …
(TRPE), incorporating polar decomposition (PD) and QZ modulation. The utilization of keys …
A novel image encryption scheme based on Logistic cosine cascade maps
W Ma, T Yu, Z Wang, X Li - Physica Scripta, 2023 - iopscience.iop.org
A two-dimensional Logistic cosine cascade map (2D-LCCM) and a three-dimensional
Logistic cosine cascade map (3D-LCCM) are proposed based on a logistic map and infinite …
Logistic cosine cascade map (3D-LCCM) are proposed based on a logistic map and infinite …
Asymmetric image authentication algorithm using double random modulus decomposition and CGI
In this paper, we have proposed asymmetric image encryption cum authentication
cryptosystem based on double random modulus decomposition using computational ghost …
cryptosystem based on double random modulus decomposition using computational ghost …
Optical double-image cryptosystem based on a joint transform correlator in a linear canonical domain
EA Mohammed, IM Qasim - Applied Optics, 2024 - opg.optica.org
In this work, we present a new optical double-image encryption method based on a joint
transform correlator (JTC) and the linear canonical domain for the simultaneous …
transform correlator (JTC) and the linear canonical domain for the simultaneous …
Optical multiple-image authentication based on computational ghost imaging and hybrid non-convex second-order total variation
Y Zhou, Y Sun, M Yang, B Zhou, J Hou, T Zeng… - Optics …, 2023 - opg.optica.org
An optical security method for multiple-image authentication is proposed based on
computational ghost imaging and hybrid non-convex second-order total variation. Firstly …
computational ghost imaging and hybrid non-convex second-order total variation. Firstly …