These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
5. Dual encryption scheme of images using polarized light. Alfalou A; Brosseau C Opt Lett; 2010 Jul; 35(13):2185-7. PubMed ID: 20596188 [TBL] [Abstract][Full Text] [Related]
6. Image encryption based on interference that uses fractional Fourier domain asymmetric keys. Rajput SK; Nishchal NK Appl Opt; 2012 Apr; 51(10):1446-52. PubMed ID: 22505061 [TBL] [Abstract][Full Text] [Related]
7. Image fusion using wavelet transform and its application to asymmetric cryptosystem and hiding. Mehra I; Nishchal NK Opt Express; 2014 Mar; 22(5):5474-82. PubMed ID: 24663888 [TBL] [Abstract][Full Text] [Related]
8. Single-channel color image encryption using a modified Gerchberg-Saxton algorithm and mutual encoding in the Fresnel domain. Deng X; Zhao D Appl Opt; 2011 Nov; 50(31):6019-25. PubMed ID: 22086029 [TBL] [Abstract][Full Text] [Related]
9. Fresnel domain nonlinear optical image encryption scheme based on Gerchberg-Saxton phase-retrieval algorithm. Rajput SK; Nishchal NK Appl Opt; 2014 Jan; 53(3):418-25. PubMed ID: 24514127 [TBL] [Abstract][Full Text] [Related]
10. Triple-image encryption based on phase-truncated Fresnel transform and basic vector operation. Pan X; Meng X; Yang X; Wang Y; Peng X; He W; Dong G; Chen H Appl Opt; 2015 Oct; 54(28):8485-93. PubMed ID: 26479627 [TBL] [Abstract][Full Text] [Related]
11. Asymmetric double-image encryption based on chaotic random phase encoding. Su Y; Xue X; Deng R; Wang Y; Zhao Q; Li T; Li Y; Liu S; Zhao J Appl Opt; 2022 Sep; 61(26):7608-7617. PubMed ID: 36256360 [TBL] [Abstract][Full Text] [Related]
12. Security enhancement of a phase-truncation based image encryption algorithm. Wang X; Zhao D Appl Opt; 2011 Dec; 50(36):6645-51. PubMed ID: 22193194 [TBL] [Abstract][Full Text] [Related]
13. Optical asymmetric cryptography based on elliptical polarized light linear truncation and a numerical reconstruction technique. Lin C; Shen X; Wang Z; Zhao C Appl Opt; 2014 Jun; 53(18):3920-8. PubMed ID: 24979424 [TBL] [Abstract][Full Text] [Related]
14. An optical encryption and authentication scheme using asymmetric keys. Rajput SK; Nishchal NK J Opt Soc Am A Opt Image Sci Vis; 2014 Jun; 31(6):1233-8. PubMed ID: 24977361 [TBL] [Abstract][Full Text] [Related]
15. Optical asymmetric cryptosystem for multi-image in cyan-magenta-yellow-black color space. Shen Y; Tang C; Zhou L; Lei Z Appl Opt; 2020 Mar; 59(7):1854-1863. PubMed ID: 32225701 [TBL] [Abstract][Full Text] [Related]
17. Multiple-image encryption scheme based on cascaded fractional Fourier transform. Kong D; Shen X; Xu Q; Xin W; Guo H Appl Opt; 2013 Apr; 52(12):2619-25. PubMed ID: 23669669 [TBL] [Abstract][Full Text] [Related]
18. Color image security system using double random-structured phase encoding in gyrator transform domain. Abuturab MR Appl Opt; 2012 May; 51(15):3006-16. PubMed ID: 22614604 [TBL] [Abstract][Full Text] [Related]
19. Double-image encryption without information disclosure using phase-truncation Fourier transforms and a random amplitude mask. Wang X; Zhao D; Chen Y Appl Opt; 2014 Aug; 53(23):5100-8. PubMed ID: 25320917 [TBL] [Abstract][Full Text] [Related]
20. Optical image encryption based on biometric keys and singular value decomposition. Tao S; Tang C; Shen Y; Lei Z Appl Opt; 2020 Mar; 59(8):2422-2430. PubMed ID: 32225778 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]