Double-image encryption based on interference and logistic map under the framework of double random phase encoding

S Liansheng, D Cong, Z Xiao, T Ailing… - Optics and Lasers in …, 2019 - Elsevier
A novel double-image encryption approach has been proposed based on optical
interference and logistic map. Initially, original images are rearranged into two scrambled …

Multiple-image encryption based on cascaded gyrator transforms and high-dimensional chaotic system

X Sun, Z Shao, Y Shang, M Liang, F Yang - Multimedia Tools and …, 2021 - Springer
In order to increase encryption capacity and improve transmission efficiency, this paper
investigates an encryption scheme for multiple-image based on cascaded gyrator transforms …

An optical multiple-image authentication based on computational ghost imaging and total-variation minimization

Y Zhou, Y Sun, M Yang, J Hou, Z Xiao, A Anand, L Sui - Heliyon, 2023 - cell.com
An optical multiple-image authentication is suggested using computational ghost imaging
and total-variation minimization. Differing from encrypting multiple images into a noise-like …

Optical image hiding under framework of computational ghost imaging based on an expansion strategy

S Liansheng, W Jiahao, T Ailing, A Asundi - Optics express, 2019 - opg.optica.org
A novel optical image hiding scheme based on an expansion strategy is presented under
the framework of computational ghost imaging. The image to be hidden is concealed into an …

Multiple-image encryption base on compressed coded aperture imaging

X Yang, H Wu, Y Yin, X Meng, X Peng - Optics and Lasers in Engineering, 2020 - Elsevier
A multiple-image encryption method based on compressed coded aperture imaging and
pixel location scrambling operation is proposed. In the encryption process, each plaintext …

Compressive interference-based image encryption via sparsity constraints

L Liu, M Shan, Z Zhong, L Yu, B Liu - Optics and Lasers in Engineering, 2020 - Elsevier
We report a compressive interference-based encryption (IBE) method using sparsity
constraints. In this method, two sparse phase-only masks (POMs) are generated through a …

Securing multiple-single-channel color image using unequal spectrum decomposition and 2D-SLIM biometric keys

MR Abuturab - Optics Communications, 2021 - Elsevier
A novel multiple-single-channel color image cryptosystem based on unequal spectrum
decomposition (USD) and 2D sine improved 1ogistic iterative chaotic map with infinite …

Image multi‐encryption architecture based on hybrid keystream sequence interspersed with Haar discrete wavelet transform

EA Umoh, ON Iloanusi, UA Nnolim - IET Image Processing, 2020 - Wiley Online Library
A novel image multi‐encryption architecture based on hybrid keystream sequence
generated by a single hyperchaotic system and Haar discrete wavelet transform (HDWT) is …

A New Highly Secure Optical Image Security Technique Using Gyrator Transform for Image Security‐Related Applications

L Anusree, MA Rahiman - International Journal of Optics, 2022 - Wiley Online Library
New methods and apparatuses for information security have evolved as a result of the rapid
expansion of optical information processing. Security is one of the major issues in digital …

On the possibilities of encoding digital images using fractional Fourier transform

PA Ruchka, ML Galkin, MS Kovalev, GK Krasin… - Optical Memory and …, 2019 - Springer
Data encryption is becoming increasingly relevant with the development of digital
technologies. A particularly promising direction is the development of encryption methods …