Advances in optical visual information security: a comprehensive review

Sachin, R Kumar, Sakshi, R Yadav, SG Reddy… - Photonics, 2024 - mdpi.com
In the modern era, the secure transmission and storage of information are among the utmost
priorities. Optical security protocols have demonstrated significant advantages over digital …

Nonlinear image authentication algorithm based on double fractional Mellin domain

Sachin, P Singh, K Singh - Nonlinear Dynamics, 2023 - Springer
In this paper, we propose a novel dual-user image authentication algorithm based on the
double fractional Mellin transform. We perform a security analysis of the nonlinear …

Multiuser optical image authentication platform based on sparse constraint and polar decomposition in Fresnel domain

R Kumar, P Singh - Physica Scripta, 2022 - iopscience.iop.org
In this paper, a new multiuser optical image encryption and authentication technique is
proposed. Sparse multiplexing and polar decomposition are used in the Fresnel domain to …

Multi-user nonlinear optical cryptosystem based on polar decomposition and fractional vortex speckle patterns

VC Mandapati, H Vardhan, S Prabhakar, Sakshi… - Photonics, 2023 - mdpi.com
In this paper, we propose a new multiuser nonlinear optical cryptosystem using fractional-
order vortex speckle (FOVS) patterns as security keys. In conventional optical cryptosystems …

Asymmetric multi-user optical cryptosystem based on polar decomposition and Shearlet transform

R Kumar, C Quan - Optics and Lasers in Engineering, 2019 - Elsevier
In this paper, we have proposed an asymmetric optical cryptosystem using polar
decomposition and Shearlet transform (ST). Polar decomposition is employed to generate …

A new block cipher for image encryption based on multi chaotic systems

DF Chalob, AA Maryoosh, ZM Esa… - TELKOMNIKA …, 2020 - telkomnika.uad.ac.id
In this paper, a new algorithm for image encryption is proposed based on three chaotic
systems which are Chen system, logistic map and two-dimensional (2D) Arnold cat map …

A lossless probabilistic image encryption algorithm based on QSD decomposition and matrix transformations

O Harkati, L Noui, A Beloucif - International Journal of Computers …, 2024 - Taylor & Francis
With the development of Internet technology, images have become widely used in people's
daily life. However, some images carry significant importance and sensitivity, making the …

Study on the detection and recovery algorithm of important financial information tampering

W Wang, X Liu, Y Zhang, J Liu… - International Journal of …, 2022 - inderscienceonline.com
A self-recovery watermarking algorithm for important financial information content
authentication is proposed in this paper. The algorithm firstly pre-processes the source …

A secret sharing scheme based on integer decomposition and hexagonal structure

Z Rouia, N Lemnouar, AM Rida - International Journal of …, 2024 - inderscienceonline.com
Security is a major challenge in storage and transmission of digital data. Secret sharing
scheme is a fundamental primitive used in multiparty computations, access control and key …

Multiuser optical information authentication using photon counting in spiral phase transform domain

R Kumar, C Quan - Quantum Optics and Photon Counting …, 2019 - spiedigitallibrary.org
In the present time, the substantial advances in communication technology have prompted
many challenges including secure transmission of sensitive information. Optical techniques …