292 related articles for article (PubMed ID: 22193194)
1. Security enhancement of a phase-truncation based image encryption algorithm.
Wang X; Zhao D
Appl Opt; 2011 Dec; 50(36):6645-51. PubMed ID: 22193194
[TBL] [Abstract][Full Text] [Related]
2. Hybrid attack on an optical cryptosystem based on phase-truncated Fourier transforms and a random amplitude mask.
Xiong Y; He A; Quan C
Appl Opt; 2018 Jul; 57(21):6010-6016. PubMed ID: 30118027
[TBL] [Abstract][Full Text] [Related]
3. Collision in double-image encryption scheme based on spatial encoding and phase-truncation Fourier transforms.
Xiong Y; Gu J; Kumar R
Appl Opt; 2023 Nov; 62(31):8416-8425. PubMed ID: 38037947
[TBL] [Abstract][Full Text] [Related]
4. Security analysis and enhancement of a cryptosystem based on phase truncation and a designed amplitude modulator.
Xiong Y; He A; Quan C
Appl Opt; 2019 Jan; 58(3):695-703. PubMed ID: 30694257
[TBL] [Abstract][Full Text] [Related]
5. Image encryption based on interference that uses fractional Fourier domain asymmetric keys.
Rajput SK; Nishchal NK
Appl Opt; 2012 Apr; 51(10):1446-52. PubMed ID: 22505061
[TBL] [Abstract][Full Text] [Related]
6. Double-image encryption without information disclosure using phase-truncation Fourier transforms and a random amplitude mask.
Wang X; Zhao D; Chen Y
Appl Opt; 2014 Aug; 53(23):5100-8. PubMed ID: 25320917
[TBL] [Abstract][Full Text] [Related]
7. Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask.
Rajput SK; Nishchal NK
Appl Opt; 2012 Aug; 51(22):5377-86. PubMed ID: 22859025
[TBL] [Abstract][Full Text] [Related]
8. Amplitude-phase retrieval attack free cryptosystem based on direct attack to phase-truncated Fourier-transform-based encryption using a random amplitude mask.
Wang X; Zhao D
Opt Lett; 2013 Sep; 38(18):3684-6. PubMed ID: 24104846
[TBL] [Abstract][Full Text] [Related]
9. Simultaneous nonlinear encryption of grayscale and color images based on phase-truncated fractional Fourier transform and optical superposition principle.
Wang X; Zhao D
Appl Opt; 2013 Sep; 52(25):6170-8. PubMed ID: 24085074
[TBL] [Abstract][Full Text] [Related]
10. Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform.
Wang X; Chen Y; Dai C; Zhao D
Appl Opt; 2014 Jan; 53(2):208-13. PubMed ID: 24514051
[TBL] [Abstract][Full Text] [Related]
11. Double images encryption method with resistance against the specific attack based on an asymmetric algorithm.
Wang X; Zhao D
Opt Express; 2012 May; 20(11):11994-2003. PubMed ID: 22714185
[TBL] [Abstract][Full Text] [Related]
12. Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang-Gu algorithm.
Liu W; Liu Z; Liu S
Opt Lett; 2013 May; 38(10):1651-3. PubMed ID: 23938899
[TBL] [Abstract][Full Text] [Related]
13. Asymmetric cryptosystem based on phase-truncated Fourier transforms.
Qin W; Peng X
Opt Lett; 2010 Jan; 35(2):118-20. PubMed ID: 20081940
[TBL] [Abstract][Full Text] [Related]
14. Image encryption using polarized light encoding and amplitude and phase truncation in the Fresnel domain.
Rajput SK; Nishchal NK
Appl Opt; 2013 Jun; 52(18):4343-52. PubMed ID: 23842178
[TBL] [Abstract][Full Text] [Related]
15. Triple-image encryption based on phase-truncated Fresnel transform and basic vector operation.
Pan X; Meng X; Yang X; Wang Y; Peng X; He W; Dong G; Chen H
Appl Opt; 2015 Oct; 54(28):8485-93. PubMed ID: 26479627
[TBL] [Abstract][Full Text] [Related]
16. Security analysis of a double-image encryption technique based on an asymmetric algorithm.
Xiong Y; He A; Quan C
J Opt Soc Am A Opt Image Sci Vis; 2018 Feb; 35(2):320-326. PubMed ID: 29400881
[TBL] [Abstract][Full Text] [Related]
17. Discussion on comparative analysis and a new attack on optical asymmetric cryptosystem.
Fatima A; Nishchal NK
J Opt Soc Am A Opt Image Sci Vis; 2016 Oct; 33(10):2034-2040. PubMed ID: 27828107
[TBL] [Abstract][Full Text] [Related]
18. Asymmetric double-image encryption based on cascaded discrete fractional random transform and logistic maps.
Sui L; Duan K; Liang J; Hei X
Opt Express; 2014 May; 22(9):10605-21. PubMed ID: 24921762
[TBL] [Abstract][Full Text] [Related]
19. Optical asymmetric cryptosystem for multi-image in cyan-magenta-yellow-black color space.
Shen Y; Tang C; Zhou L; Lei Z
Appl Opt; 2020 Mar; 59(7):1854-1863. PubMed ID: 32225701
[TBL] [Abstract][Full Text] [Related]
20. Cryptoanalysis on optical image encryption systems based on the vector decomposition technique in the Fourier domain.
Xiong Y; He A; Quan C
Appl Opt; 2019 Apr; 58(12):3301-3309. PubMed ID: 31044810
[TBL] [Abstract][Full Text] [Related]
[Next] [New Search]