References
- A. Menezes, T. Okamoto, and S. Vanstone, "Reducing elliptic curve logarithms to logarithms in a finite field," IEEE Trans. Inf. Theory 39, 1639-1646 (1993). https://doi.org/10.1109/18.259647
- C. Rackoff and D. Simon, "Noninteractive zero-knowledge proof of knowledge and chosen ciphertext attack," in Proc. Crypto' 91, 433-444 (1991).
- S. Tsuji and T. Itoh, "An ID-based cryptosystem based on the discrete logarithm problem," IEEE Journal on Selected Areas in Communication 7, 467-473 (1989). https://doi.org/10.1109/49.17709
- H. Tanaka, "A realization scheme for the identity-based cryptosystem," in Proc. Crypto' 87, 341-349 (1987).
- P. Refregier and B. Javidi, "Optical-image encryption based on input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995). https://doi.org/10.1364/OL.20.000767
- O. Matoba and B. Javidi, "Encrypted optical storage with angular multiplexing," Appl. Opt. 38, 7288-7293 (1999). https://doi.org/10.1364/AO.38.007288
- T. Nomura and B. Javidi, "Optical encryption system with a binary key code," Appl. Opt. 39, 4783-4787 (2000). https://doi.org/10.1364/AO.39.004783
- M. Singh, A. Kumar, and K. Singh, "Secure optical system that uses fully phase-based encryption and lithium niobate crystal as phase contrast filter for decryption," Opt. Laser Technol. 40, 619-624 (2008). https://doi.org/10.1016/j.optlastec.2007.09.007
- Z. Liu, S. Li, M. Yang, W. Liu, and S. Liu, "Image encryption based on the random rotation operation in the fractional Fourier transform domains," Opt. Lasers Eng. 50, 1352-1358 (2012). https://doi.org/10.1016/j.optlaseng.2012.05.021
- M. Joshi, C. Shakher, and K. Singh, "Fractional Fourier transform based image multiplexing and encryption technique for four-color images using input images as keys," Opt. Commun. 283, 2496-2505 (2010). https://doi.org/10.1016/j.optcom.2010.02.024
- Z. Liu, S. L. Xu, C. Lin, J. Dai, and S. Liu, "Image encryption scheme by using iterative random phase encoding in gyrator transform domains," Opt. Lasers Eng. 49, 542-546 (2011). https://doi.org/10.1016/j.optlaseng.2010.12.005
- D. S. Monaghan, U. Gopinathan, T. J. Naughton, and J. T. Sheridan, "Key-space analysis of double random phase encryption technique," Appl. Opt. 46, 6641-6647 (2007). https://doi.org/10.1364/AO.46.006641
- E. Perez-Cabre, M. Cho, and B. Javidi, "Information authentication using photon-counting double-random-phase encrypted images," Opt. Lett. 36, 22-24 (2011). https://doi.org/10.1364/OL.36.000022
- T. Sarkadi and P. Koppa, "Quantitative security evaluation of optical encryption using hybrid phase- and amplitudemodulated keys," Appl. Opt. 51, 745-750 (2012). https://doi.org/10.1364/AO.51.000745
- T. Ujvari, P. Koppa, M. Lovasz, P. Varhegyi, S. Sajti, E. Lorincz, and P. Richter, "A secure data storage system based on phase-encoded thin polarization holograms," J. Opt. A: Pure Appl. Opt. 6, 401-411 (2004). https://doi.org/10.1088/1464-4258/6/4/017
- P. Koppa, "Phase-to-amplitude data page conversion for holographic storage and optical encryption," Appl. Opt. 46, 3561-3571 (2007). https://doi.org/10.1364/AO.46.003561
- Z. Liu, M. Yang, W. Liu, S. Li, M. Gong, W. Liu, and S. Liu, "Image encryption algorithm based on the random local phase encoding in gyrator transform domains," Opt. Commun. 285, 3921-3925 (2012). https://doi.org/10.1016/j.optcom.2012.05.061
- M. Cho and B. Javidi, "Three-dimensional photon counting double-random-phase encryption," Opt. Lett. 38, 3198-3201 (2013). https://doi.org/10.1364/OL.38.003198
- M. Joshi, Chandrashakher, and K. Singh, "Color image encryption and decryption using fractional Fourier transform," Opt. Commun. 279, 35-42 (2007). https://doi.org/10.1016/j.optcom.2007.07.012
- L. F. Chen and D. M. Zhao, "Optical color image encryption by wavelength multiplexing and lensless Fresnel transform holograms," Opt. Express 14, 8552-8560 (2006). https://doi.org/10.1364/OE.14.008552
- J. J. Sylvester, "Thoughts on orthogonal matrices, simultaneous sign successions, and tessellated pavements in two or more colors, with applications to Newton's rule, ornamental tilework, and the theory of numbers," Phil. Mag. 34, 461-475 (1867).
Cited by
- Image Authentication Using Only Partial Phase Information from a Double-Random-Phase-Encrypted Image in the Fresnel Domain vol.19, pp.3, 2015, https://doi.org/10.3807/JOSK.2015.19.3.241
- Accumulation Encoding Technique Based on Double Random Phase Encryption for Transmission of Multiple Images vol.18, pp.4, 2014, https://doi.org/10.3807/JOSK.2014.18.4.401
- Double Random Phase Encryption using Orthogonal Encoding for Multiple-Image Transmission vol.18, pp.3, 2014, https://doi.org/10.3807/JOSK.2014.18.3.201
- Asymmetric Multiple-Image Encryption Based on Octonion Fresnel Transform and Sine Logistic Modulation Map vol.20, pp.3, 2016, https://doi.org/10.3807/JOSK.2016.20.3.341
- Information Authentication of Three-Dimensional Photon Counting Double Random Phase Encryption Using Nonlinear Maximum Average Correlation Height Filter vol.20, pp.2, 2016, https://doi.org/10.3807/JOSK.2016.20.2.228
- Optical Encryption Scheme with Multiple Users Based on Computational Ghost Imaging and Orthogonal Modulation vol.20, pp.4, 2016, https://doi.org/10.3807/JOSK.2016.20.4.476
- Multiple-parameter fractional quaternion Fourier transform and its application in colour image encryption pp.1751-9667, 2018, https://doi.org/10.1049/iet-ipr.2018.5440
- A cryptosystem based on deterministic phase masks and fractional Fourier transform deploying singular value decomposition vol.50, pp.5, 2018, https://doi.org/10.1007/s11082-018-1472-6