249
Views
4
CrossRef citations to date
0
Altmetric
Articles

Plaintext-related multiple-image encryption based on computational ghost imaging

, , , , &
Pages 394-404 | Received 17 Aug 2019, Accepted 14 Feb 2020, Published online: 12 Mar 2020

References

  • Refregier P, Javidi B. Optical image encryption based on input plane and Fourier plane random encoding. Opt Lett. 1995 Apr 1;20(7):767–769. doi: 10.1364/OL.20.000767
  • Amaya D, Tebaldi M, Torroba R, et al. Multichanneled encryption via a joint transform correlator architecture. Appl Opt. 2008;47(31):5903–5907. doi: 10.1364/AO.47.005903
  • Tajahuerce E, Javidi B. Encrypting three-dimensional information with digital holography. Appl Opt. 2001;39(35):6595–6601. doi: 10.1364/AO.39.006595
  • Clemente P, Durán V, Torres-Company V, et al. Optical encryption based on computational ghost imaging. Opt Lett. 2010;35(14):2391–2393. doi: 10.1364/OL.35.002391
  • Zhang Y, Wang B. Optical image encryption based on interference. Opt Lett. 2008 Nov 1;33(21):2443–2445. doi: 10.1364/OL.33.002443
  • Zhu N, Wang Y, Liu J, et al. Optical image encryption based on interference of polarized light. Acta Opt Sin. 2009;17(16):13418–13424.
  • Yuan S, Liu X, Zhou X, et al. Multiple-image encryption scheme with a single-pixel detector. J Mod Opt. 2016 Aug 21;63(15):1457–1465. doi: 10.1080/09500340.2016.1154196
  • Wu J, Xie Z, Liu Z, et al. Multiple-image encryption based on computational ghost imaging. Opt Commun. 2016;359:38–43. doi: 10.1016/j.optcom.2015.09.039
  • Zhu J, Yang X, Meng X, et al. Optical image encryption scheme with multiple light paths based on compressive ghost imaging. J Mod Opt. 2017;65(3):1–8.
  • Li X, Meng X, Yang X, et al. Multiple-image encryption via lifting wavelet transform and XOR operation based on compressive ghost imaging scheme. Opt Lasers Eng. 2018;102:106–111. doi: 10.1016/j.optlaseng.2017.10.023
  • Yuan S, Yao J, Liu X, et al. Cryptanalysis and security enhancement of optical cryptography based on computational ghost imaging. Opt Commun. 2016;365:180–185. doi: 10.1016/j.optcom.2015.12.013
  • Yi K, Leihong Z, Dawei Z. Optical encryption based on ghost imaging and public key cryptography. Opt Lasers Eng. 2018;111:58–64. doi: 10.1016/j.optlaseng.2018.07.014
  • Yuan S, Yang Y, Liu X, et al. Optical image transformation and encryption by phase-retrieval-based double random-phase encoding and compressive ghost imaging. Opt Lasers Eng. 2018;100:105–110. doi: 10.1016/j.optlaseng.2017.07.015
  • Zhou NR, Hua TX, Gong LH, et al. Quantum image encryption based on generalized Arnold transform and double random-phase encoding. Quantum Inf Process. 2015;14(4):1193–1213. doi: 10.1007/s11128-015-0926-z
  • Zhao S, Wang L, Liang W, et al. High performance optical encryption based on computational ghost imaging with QR code and compressive sensing technique. Opt Commun. 2015;353:90–95. doi: 10.1016/j.optcom.2015.04.063
  • Zhang Y, Tang Y. A plaintext-related image encryption algorithm based on chaos. Multimedia Tools Appl. 2018;77(6):6647–6669. doi: 10.1007/s11042-017-4577-1
  • Zhang Y, Xia J, Cai P, et al. Plaintext related two-level secret key image encryption scheme. Telkomnika Indonesian J Electr Eng. 2012;10(6):1254–1262.
  • Zhang Y. The image encryption algorithm with plaintext-related shuffling. IETE Tech Rev. 2016;33(3):310–322. doi: 10.1080/02564602.2015.1087350
  • Zhang Y. A Chaotic system based image encryption algorithm using plaintext- related confusion. TELKOMNIKA Indonesian J Electr Eng. 2014;12(11):7952–7962.
  • Bromberg Y, Katz O, Silberberg Y. Ghost imaging with a single detector. Phys Rev A. 2009 May 19;79(5):053840. doi: 10.1103/PhysRevA.79.053840
  • Shapiro JH. Computational ghost imaging. Phys Rev A; 78(6):061802. doi: 10.1103/PhysRevA.78.061802
  • Zhu J, Yang X, Meng X, et al. Computational ghost imaging encryption based on fingerprint phase mask. Opt Commun. 2018;420:34–39. doi: 10.1016/j.optcom.2018.03.014
  • Nag A, Singh JP, Khan S, et al. Image encryption using affine transform and XOR operation. 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies (ICSCCN); IEEE, 2011.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.