These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
224 related articles for article (PubMed ID: 29400881)
21. Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang-Gu algorithm. Liu W; Liu Z; Liu S Opt Lett; 2013 May; 38(10):1651-3. PubMed ID: 23938899 [TBL] [Abstract][Full Text] [Related]
22. Optical image encryption based on biometric keys and singular value decomposition. Tao S; Tang C; Shen Y; Lei Z Appl Opt; 2020 Mar; 59(8):2422-2430. PubMed ID: 32225778 [TBL] [Abstract][Full Text] [Related]
23. Simultaneous nonlinear encryption of grayscale and color images based on phase-truncated fractional Fourier transform and optical superposition principle. Wang X; Zhao D Appl Opt; 2013 Sep; 52(25):6170-8. PubMed ID: 24085074 [TBL] [Abstract][Full Text] [Related]
24. Optical asymmetric JTC cryptosystem based on binary phase modulation and image superposition-subtraction operation. Liu Y; Shen X; Zhou B; Liu J; Cai J; Liu X; Cheng Y Appl Opt; 2022 Oct; 61(29):8711-8729. PubMed ID: 36256005 [TBL] [Abstract][Full Text] [Related]
25. Security improvement for asymmetric cryptosystem based on spherical wave illumination. Ding X; Deng X; Song K; Chen G Appl Opt; 2013 Jan; 52(3):467-73. PubMed ID: 23338195 [TBL] [Abstract][Full Text] [Related]
26. Collision in double-image encryption scheme based on spatial encoding and phase-truncation Fourier transforms. Xiong Y; Gu J; Kumar R Appl Opt; 2023 Nov; 62(31):8416-8425. PubMed ID: 38037947 [TBL] [Abstract][Full Text] [Related]
27. New method of attack and security enhancement on an asymmetric cryptosystem based on equal modulus decomposition. Wang Y; Quan C; Tay CJ Appl Opt; 2016 Feb; 55(4):679-86. PubMed ID: 26836068 [TBL] [Abstract][Full Text] [Related]
28. Optical multiple-image compression-encryption via single-pixel Radon transform. Wu J; Li S Appl Opt; 2020 Nov; 59(31):9744-9754. PubMed ID: 33175809 [TBL] [Abstract][Full Text] [Related]
29. Nonlinear optical security system based on a joint transform correlator in the Fresnel domain. Vilardy JM; Millán MS; Pérez-Cabré E Appl Opt; 2014 Mar; 53(8):1674-82. PubMed ID: 24663426 [TBL] [Abstract][Full Text] [Related]
30. Security Analysis and Improvement of an Image Encryption Cryptosystem Based on Bit Plane Extraction and Multi Chaos. Zhu S; Zhu C Entropy (Basel); 2021 Apr; 23(5):. PubMed ID: 33922307 [TBL] [Abstract][Full Text] [Related]
31. Double Image Encryption System Using a Nonlinear Joint Transform Correlator in the Fourier Domain. Perez RA; Pérez-Cabré E; Vilardy JM; Millán MS; Torres CO Sensors (Basel); 2023 Feb; 23(3):. PubMed ID: 36772681 [TBL] [Abstract][Full Text] [Related]
32. Double images encryption method with resistance against the specific attack based on an asymmetric algorithm. Wang X; Zhao D Opt Express; 2012 May; 20(11):11994-2003. PubMed ID: 22714185 [TBL] [Abstract][Full Text] [Related]
33. Optical single-channel cryptosystem based on the non-negative matrix factorization and face biometric in cyan-magenta-yellow-black color space. Zhang L; Tang C; Shen Y; He H; Tang H; Lei Z J Opt Soc Am A Opt Image Sci Vis; 2023 Dec; 40(12):2146-2155. PubMed ID: 38086023 [TBL] [Abstract][Full Text] [Related]
34. Security analysis on an interference-based optical image encryption scheme. Xiong Y; Gu J; Kumar R Appl Opt; 2022 Oct; 61(30):9045-9051. PubMed ID: 36607034 [TBL] [Abstract][Full Text] [Related]
35. Cryptoanalysis on the optical image encryption scheme based on full phase encoding and equal modulus decomposition. Xiong Y; Wang Y Appl Opt; 2022 Apr; 61(10):2743-2749. PubMed ID: 35471346 [TBL] [Abstract][Full Text] [Related]
36. An image encryption scheme based on public key cryptosystem and quantum logistic map. Ye G; Jiao K; Huang X; Goi BM; Yap WS Sci Rep; 2020 Dec; 10(1):21044. PubMed ID: 33273539 [TBL] [Abstract][Full Text] [Related]
37. Hybrid plaintext attack for a cryptosystem based on interference and the phase-retrieval technique. Xiong Y; Gu J; Kumar R Appl Opt; 2023 Jun; 62(16):4301-4309. PubMed ID: 37706921 [TBL] [Abstract][Full Text] [Related]
38. Ciphertext-only attack on a joint transform correlator encryption system. Zhang C; Liao M; He W; Peng X Opt Express; 2013 Nov; 21(23):28523-30. PubMed ID: 24514364 [TBL] [Abstract][Full Text] [Related]
39. Cryptoanalysis and enhancement of a binary image encryption system based on interference. Du J; Xiong Y; Quan C Appl Opt; 2021 Sep; 60(26):8038-8045. PubMed ID: 34613065 [TBL] [Abstract][Full Text] [Related]
40. Binary-tree encryption strategy for optical multiple-image encryption. Yi J; Tan G Appl Opt; 2016 Jul; 55(20):5280-91. PubMed ID: 27409301 [TBL] [Abstract][Full Text] [Related] [Previous] [Next] [New Search]