International audienceThis paper describes a novel algorithm to encrypt double color images into a single undistinguishable image in quaternion gyrator domain. By using an iterative phase retrieval algorithm, the phase masks used for encryption are obtained. Subsequently, the encrypted image is generated via cascaded quaternion gyrator transforms with different rotation angles. The parameters in quaternion gyrator transforms and phases serve as encryption keys. By knowing these keys, the original color images can be fully restituted. Numerical simulations have demonstrated the validity of the proposed encryption system as well as its robustness against loss of data and additive Gaussian noise
This paper analyzes the security of amplitude encoding for double random phase encryption. We descri...
International audienceIn this paper, we propose a blind color image watermarking scheme based on qua...
With the rapid growth of communication technology, cryptography plays a significant role in securing...
International audienceThis paper describes a novel algorithm to encrypt double color images into a s...
International audienceThe gyrator transform has been proposed in optics a few years ago. By using th...
A color image compression-encryption algorithm by combining quaternion discrete multi-fractional ran...
In this paper, we apply the quaternion framework for color images to a fragile watermarking algorith...
A novel nonlinear encryption–decryption system based on a joint transform correlator (JTC) and the G...
In this paper, we propose a new asymmetric method for double image encryption using the two-dimensio...
© 2016 Elsevier Ltd. A novel nonlinear image encryption scheme based on a fully phase nonzero-order ...
A double color image encryption method based on DNA (deoxyribonucleic acid) computation and chaos is...
Several attacks are proposed against the double random phase encryption scheme. These attacks are de...
In this paper a new idea of digital images fi ngerprinting is proposed. The method is based on quate...
The security of the encryption and verification techniques with significant output images is examine...
We introduce a way to encrypt-decrypt a color dynamical phenomenon using a pure optical alternative....
This paper analyzes the security of amplitude encoding for double random phase encryption. We descri...
International audienceIn this paper, we propose a blind color image watermarking scheme based on qua...
With the rapid growth of communication technology, cryptography plays a significant role in securing...
International audienceThis paper describes a novel algorithm to encrypt double color images into a s...
International audienceThe gyrator transform has been proposed in optics a few years ago. By using th...
A color image compression-encryption algorithm by combining quaternion discrete multi-fractional ran...
In this paper, we apply the quaternion framework for color images to a fragile watermarking algorith...
A novel nonlinear encryption–decryption system based on a joint transform correlator (JTC) and the G...
In this paper, we propose a new asymmetric method for double image encryption using the two-dimensio...
© 2016 Elsevier Ltd. A novel nonlinear image encryption scheme based on a fully phase nonzero-order ...
A double color image encryption method based on DNA (deoxyribonucleic acid) computation and chaos is...
Several attacks are proposed against the double random phase encryption scheme. These attacks are de...
In this paper a new idea of digital images fi ngerprinting is proposed. The method is based on quate...
The security of the encryption and verification techniques with significant output images is examine...
We introduce a way to encrypt-decrypt a color dynamical phenomenon using a pure optical alternative....
This paper analyzes the security of amplitude encoding for double random phase encryption. We descri...
International audienceIn this paper, we propose a blind color image watermarking scheme based on qua...
With the rapid growth of communication technology, cryptography plays a significant role in securing...