22
Views
11
CrossRef citations to date
0
Altmetric
Articles

Computational cryptography based on trigonometric algorithms and intensity superposition

Pages 61-80 | Published online: 18 Jul 2013

REFERENCES

  • Chang, H. T., Lu, W. C. and Kuo, C. J. Multiple-phase retrieval for optical security systems by use of randomphase encoding. Appl. Opt., 2002, 41, 4825–4834.
  • Kishk, S. and Javidi, B. Information hiding technique with double phase encoding. Appl. Opt., 2002, 41, 5462–5470.
  • Motoba, O. and Javidi, B. Optical retrieval of encrypted digital holograms for secure real-time display. Opt. Lett., 2002, 27, 321–323.
  • Guo, Y., Huang, Q., Du, J. and Zhang, Y. Decomposition storage of information based on computer-generated hologram interference and its application in optical image encryption. Appl. Opt., 2002, 40, 2860–2063.
  • Hennelly, B. and Sheridan, J. T. Optical image encryption by random shifting in fractional Fourier domains. Opt. Lett., 2003, 28, 269–271.
  • Zhao, J., Lu, H., Song, X., Li, J. and Ma, Y. Optical image encryption based on multistage fractional Fourier transforms and pixel scrambling technique. Opt. Commun., 2005, 249, 493–499.
  • Han, S. W., Park, C. S., Ryu, D. H. and Kim, E. S. Optical image encryption base XOR operations. Opt. Eng., 1999, 38, 47–54.
  • Javidi, B., Bernard, L. and Towgi, N. Noise performance of double-phase encryption compared to XOR encryption. Opt. Eng., 1999, 38, 9–19.
  • Cai, L. Z., He, M. Z., Liu, Q. and Yang, X. L. Digital image encryption and watermarking by phase-shifting interferometry. Appl. Opt., 2004, 43, 3078–3084.
  • He, M. Z., Cai, L. Z., Liu, Q. and Yang, X. L. Phase- only encryption and watermarking based on phase- shifting interferometry. Appl. Opt., 2005, 44, 2600–2606.
  • Unnikrishnan, G., Pohit, M. and Singh, K. A polarization encoded optical encryption system using ferroelectric spatial light modulator. Opt. Commun., 2000, 185, 25–31.
  • Cheng, C. and Chen, M. Polarization encoding for optical encryption using twisted nematic liquid crystal spatial light modulator. Opt. Commun., 2004, 237, 45–52.
  • Yu, L., Peng, X. and Cai, L. Parameterized multidimensional data encryption by digital optics. Opt. Commun. , 2002, 203, 67–77.
  • Peng, X., Yu, L. and Cai, L. Double-lock for image encryption with virtual optical wavelength. Opt. Express, 2002, 10, 41–45.
  • Kim, H., Kim, D. H. and Lee, Y. H. Encryption of digital hologram of 3-D object by virtual optics. Opt. Express, 2004, 20, 12–21.
  • Naor, M. and Shamir, A. Visual cryptography. Lect. Notes Comput. Sci., 1995, 950, (7), 1–12.
  • Yamamoto, H., Hayasaki, Y. and Nishida, N. Securing information display by use of visual cryptography. Opt. Lett., 2003, 28, 1564–1566.
  • Jahne, B. and Haubecker, H. Computer Vision and Applications, 2000 (Academic Press, San Diego, CA).
  • Robinson, D. W. and Reid, G. T. Interferogram Analysis: Digital Fringe Pattern Measurement Techniques, 1993 (IOP Publishing, Bristol).
  • Winston, P. H. Artificial Intelligence, 1992 (Addison Wesley, Reading, MA).
  • Gonzalez, R. C. and Wints, P. Digital Image Processing, 1987 (Addison Wesley, Reading, MA).
  • Younes, M. A. B. and Janatan, A. Image encryption using Block based transformation algorithm. Int. J. Comput. Sci., 2008, 35, 1–5.
  • Alsultanni, Y. A. Image encryption by cipher feedback. Int. J. Innov. Comput. Inform. Control, 2007, 3, 589–596.
  • Giesl, J. and Vlcek, K. Image encryption based on strange atractor. ICGST-GVIP J., 2009, 9, 19–26.
  • Yuan, S., Zhou, X., Li, D. H. and Zhou, D.-F. Simultaneous transmission for an encrypted image and a double random-phase encryption key. Appl. Opt., 2007, 46, 3447–3553.
  • Saxena, V., Khemka, P., Harsulkar, A. and Gupta, J. P. Performance analysis of color channel for DCT based image watermarking scheme. Int. J. Secur. Appl., 2007, 1, 41–46.
  • Cheng, X. C., Cai, L. Z., Wang, Y. R., Meng, X. F., Zhang, H., Xu, X. F., Shen, X. X. and Dong, G. Y. Security enhancement of double-random phase encryption by amplitude modulation. Opt. Lett., 2008, 33, 1575–1577
  • Shin, C. M. and Kim, S. J. Image encryption using modified exclusive-OR rules and phase-wrapping technique. Opt. Commun., 2005, 254, 67–75.
  • Singh, M., Kumar, A. and Singh, K. Multiplexing in optical encryption by using an aperture system and a rotating sandwich random phase diffuser in the Fourier plane. Opt. Lasers Eng., 2008, 46, 243–251.
  • Lin, C. H., Su, T.-S. and Hsieh, W. S. Semi-fragile watermarking scheme for authentication of JPEG images. Tamkang J. Sci. Eng., 2007, 10, 57–66.
  • Parameswaran, L. and Anbumani, A. A semi-fragile image watermarking using wavelet inter coefficient relations. Int. J. Inform. Secur. Priv., 2007, 1, 61–775.
  • Liu, S., Yu, L. and Zhu, B. Optical image encryption by cascaded fractional Fourier transform with random phase filtering. Opt. Commun., 2001, 18, 57–63.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.