1 |
P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767-769 (1995).
DOI
|
2 |
G. H. Situ and J. J. Zhang, “Double random-phase encoding in the Fresnel domain,” Opt. Lett. 29, 1584-1586 (2004).
DOI
|
3 |
N. K. Nischal, J. Joseph, and K. Singh, “Securing information using fractional Fourier transform in digital holography,” Opt. Commun. 235, 253-259 (2004).
DOI
|
4 |
N. Singh and A. Sinha, “Optical image encryption using improper Hartley transforms and chaos,” Optik 121, 918-925 (2010).
DOI
|
5 |
M. R. Abuturab, “Securing color information using Arnold transform in gyrator transform domain,” Optics and Lasers in Engineering 50, 772-779 (2012).
DOI
|
6 |
I. H. Lee and M. Cho, “Double random phase encryption based orthogonal encoding technique for color images,” J. Opt. Soc. Korea 18, 129-133 (2014).
DOI
|
7 |
J. C. Zheng and X. Q. Li, “Image authentication using only partial phase information from a double-random-phase-encrypted image in the Fresnel domain,” J. Opt. Soc. Korea 19, 241-247 (2015).
DOI
|
8 |
L. S. Sui, K. K. Duan, J. L. Liang, and X. H. Hei, “Asymmetric double-image encryption based on cascaded discrete fractional random transform and logistic maps,” Opt. Express 22, 10605-10621 (2014).
DOI
|
9 |
U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. T. Sheridan, “A known-plaintext heuristic attack on the Fourier plane encryption algorithm,” Opt. Express 14, 3181-3186 (2006).
DOI
|
10 |
X. Peng, H. Z. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Opt. Lett. 31, 3261-3263 (2006).
DOI
|
11 |
M. R. Abuturab, “An asymmetric single-channel color image encryption based on Hartley transform and gyrator transform,” Optics and Lasers in Engineering 69, 49-57 (2015).
DOI
|
12 |
W. Qin and X. Peng, “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35,118-120 (2010).
DOI
|
13 |
X. L. Ding, Q. Yuan, and L. B. Zhang, “Known-public key attack on asymmetric optical image cryptosystem,” Laser Technology 38, 561-564 (2014). (in Chinese)
|
14 |
X. Wang and D. M. Zhao, “A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Commun. 285, 1078-1081 (2012).
DOI
|
15 |
W. Chen and X. D. Chen, “Optical color image encryption based on an asymmetric cryptosystem in the Fresnel domain,” Opt. Commun. 284, 3913-3917 (2011).
DOI
|
16 |
I. Mehra and N. K. Nishchal, “Optical asymmetric image encryption using gyrator wavelet transform,” Opt. Commun. 354, 344-352 (2015).
DOI
|
17 |
G. Situ and J. J. Zhang, “Multiple-image encryption by wavelength multiplexing,” Opt. Lett. 30, 1306-1308 (2005).
DOI
|
18 |
I. H. Lee and M. J Cho, “Double random phase encryption using orthogonal encoding for multiple-image transmission,” J. Opt. Soc. Korea 18, 201-206 (2014).
DOI
|
19 |
X. Wang and D. M. Zhao, “Multiple-image encryption based on nonlinear amplitude-truncation and phase-truncation in Fourier domain,” Opt. Commun. 284,148-152 (2011).
DOI
|
20 |
L. S. Sui, K. K. Duan, J. L. Liang, Z. Q. Zhang, and H. N. Meng, “Asymmetric multiple-image encryption based on coupled logistic maps in fractional Fourier transform domain,” Optics and Lasers in Engineering 62, 139-152 (2014).
DOI
|
21 |
M. R. Abuturab, “Generalized Arnold map-based optical multiple color-image encoding in gyrator transform domain,” Opt. Commun. 343, 157-171 (2015).
DOI
|
22 |
N. Singh and A. Sinha, “Optical image encryption using Hartley transform and logistic map,” Opt. Commun. 282, 1104-1109 (2009).
DOI
|
23 |
X. L. Wang, H. C Zhai, Z. L. Li, and Q. Ge, “Double random-phase encryption based on discrete quaternion fourier-transforms,” Optik 122, 1856-1859 (2011).
DOI
|
24 |
B. C. Chanyal, “Classical geometrodynamics with zorn vector-matrix algebra for Gravito-Dyons,” Reports on Mathematical Physics 76, 1-20 (2015).
DOI
|
25 |
H. Y. Gao and K. M. Lam, “From quaternion to octonion: feature-based image saliency detection,” in Proc. ICASSP (Florence, Italy, May 2014), pp. 2808-2812.
|
26 |
Y. Wang, C. Quan, and C. J. Tay, “Optical color image encryption without information disclosure using phase-truncated Fresnel transform and a random amplitude mask,” Opt. Commun. 344, 147-155 (2015).
DOI
|
27 |
R. Tudela, E. M. Badosa, I. Labastida, S. Vallmitjana, I. Juvells, and A. Carnicer, “Full complex Fresnel holograms displayed on liquid crystal devices,” J. Opt. A: Pure Appl. Opt. 5, S189-S194 (2003).
DOI
|
28 |
Z. Y. Hua, Y. C. Zhou, C. M. Pun, and C. L. Philip Chen, “2D sine logistic modulation map for image encryption,” Information Sciences 297, 80-94 (2015).
DOI
|
29 |
G. H. Huang and X. M. Li, “Color palmprint feature extraction and recognition algorithm based on octonion,” Computer Engineering 38, 28-33 (2012). (in Chinese)
|
30 |
C. Flaut and V. Shpakivskyi, “De Moivre’s formula and Euler’s formula for octonions,” arXiv preprint arXiv:1405.5655 (2014).
|
31 |
J. Liu, H. Jin, L. Ma, Y. Li, and W. Jin, “Optical color image encryption based on computer generated hologram and chaotic theory,” Opt. Commun. 307, 76-79 (2013).
DOI
|
32 |
M. Z. He, Q. F. Tan, L. C. Cao, Q. S. He, and G. F. Jin, “Security enhanced optical encryption system by random phase key and permutation key,” Opt. Express 17, 22462-22473 (2009).
DOI
|
33 |
C. B. Li, Data Structure (Tsinghua University Press, Beijing, PRC, 2013), Chapter 9. (in Chinese)
|
34 |
K. Xu, F. Wang, and H. Y. Wang, “Lightweight and informative traffic Metrics for data center monitoring,” Journal of Network and Systems Management 20, 226-243 (2012).
DOI
|
35 |
JENOPTIK, "Liquid crystal spatial light modulators SLM-S640(d) USB & SLM-S320(d) USB," https://www.jenoptik.com/-/media/websitedocuments/os/modulatoren/slm_usb_en.pdf
|
36 |
Y. Zhang and D. Xiao, “Double optical image encryption using discrete Chirikov standard map and chaos-based fractional random transform,” Opt. Lasers Eng. 51, 472-480 (2013).
DOI
|
37 |
R. C. Gonzalez and R. E. Woods, Digital Image Processing, 3rd ed. (Prentice Hall, New Jersey, USA, 2007), Chapter 5.
|
38 |
Y. Zhang and D. Xiao, “Double optical image encryption using discrete Chirikov standard map and chaos-based fractional random transform,” Opt. Lasers Eng. 51, 472-480 (2013).
DOI
|
39 |
X. Su, "Virtual optical encryption system based on coupling Sawtooth spatiotemporal chaos," Nanjing University of Posts and Telecommunications, Master Thesis (2014). (in Chinese)
|