Events2Join

An optical encryption and authentication scheme using asymmetric ...


An optical encryption and authentication scheme using asymmetric ...

In this paper, we propose an information encryption and authentication scheme that uses asymmetric keys that requires storage of only one encrypted image that ...

An optical encryption and authentication scheme using asymmetric ...

We propose a novel optical information encryption and authentication scheme that uses asymmetric keys generated by the phase-truncation ...

An optical encryption and authentication scheme using asymmetric ...

In this paper, we propose an information encryption and authentication scheme that uses asymmetric keys that requires storage of only one encrypted image that ...

An optical encryption and authentication scheme using asymmetric ...

(DOI: 10.1364/JOSAA.31.001233) We propose a novel optical information encryption and authentication scheme that uses asymmetric keys generated by the ...

An optical encryption and authentication scheme using asymmetric ...

An optical encryption and authentication scheme using asymmetric keys. https://doi.org/10.1364/josaa.31.001233 ·. Journal: Journal of the Optical Society of ...

Asymmetric optical image encryption based on an improved ...

We propose a new asymmetric optical image encryption scheme based on an improved amplitude–phase retrieval algorithm. Using two random phase masks that ...

An optical asymmetric encryption scheme with biometric keys

In order to improve the security features and authentication of the encryption techniques, many new optical schemes have been recently reported [11], [12], [13] ...

Optical asymmetric double-image encryption and a…

We report an optical asymmetric scheme for double-image encryption and authentication based on interference using sparse representation.

(PDF) Asymmetric Image Encryption and Authentication Based on ...

A novel asymmetric image encryption and authentication scheme based on equal modulus decomposition (EMD) in the Fresnel transform (FrT) domain is proposed.

Asymmetric Image Encryption and Authentication Based on Equal ...

Javidi, “Encrypted optical memory system using three-dimensional keys in the Fresnel domain,” Opt. Lett., vol. 24, no. 11, pp. 762–764, 1999. [9] ...

Multiuser optical image authentication platform based on sparse ...

In this paper, a new multiuser optical image encryption and authentication technique is proposed. Sparse multiplexing and polar decomposition are used in the ...

Optical asymmetric double-image encryption and authentication in ...

We report an optical asymmetric scheme for double-image encryption and authentication based on interference using sparse representation.

Security Analysis on an Optical Encryption and Authentication ...

... algorithm based optical image encryption scheme in ... Nishchal, “An optical encryption and authentication scheme using asymmetric keys,” J.

An Asymmetric Encryption-Based Key Distribution Method for ... - MDPI

The two-way authentication mechanism in the proposed scheme not only prevents illegal nodes from accessing the network, but also prevents fake ...

Optical phase-truncation-based double-image encryption using ...

This work reports an optical double-image crosstalk free encryption scheme that employs equal modulus decomposition and random masks.

A Multi-User Encryption and Authentication System Based on Joint ...

An optical image encryption method based on joint transform correlation (JTC) is simple and easy to implement and combine with other encryption ...

Flexible optical encryption with multiple users and multiple security ...

An optical encryption and authentication scheme using asymmetric keys. · Computer Science, Physics. Journal of the Optical Society of America. A…

Optical image encryption and authentication scheme with ... - OUCI

List of references · Kumar, Quick response code and interference-based optical asymmetric cryptosystem, J. · Su, Security-enhanced multiple-image encryption based ...

Symmetric and Asymmetric Encryption | ACM Computing Surveys

Secure Integration of Asymmetric and Symmetric Encryption Schemes · Authenticated encryption in the symmetric and asymmetric settings · Shorter identity-based ...

Asymmetric cryptosystem based on optical scanning cryptography ...

... optical scanning cryptography (OSC) and elliptic curve cryptography (ECC) algorithm. In the encryption stage of OSC, an object is encrypted ...