encryption scheme
Recently Published Documents


TOTAL DOCUMENTS

2811
(FIVE YEARS 904)

H-INDEX

69
(FIVE YEARS 16)

2022 ◽  
Vol 27 (3) ◽  
pp. 642-652
Author(s):  
Xiaoyuan Yang ◽  
Shangwen Zheng ◽  
Tanping Zhou ◽  
Yao Liu ◽  
Xiaoliang Che

2022 ◽  
Vol 64 ◽  
pp. 103039
Author(s):  
Walid El-Shafai ◽  
Ahmed K. Mesrega ◽  
Hossam Eldin Ahmed ◽  
Nermin Abdelwahab ◽  
Fathi E. Abd El-Samie

Author(s):  
Najlae Falah Hameed Al Saffar ◽  
Inaam R. Al-Saiq ◽  
Rewayda Razaq Mohsin Abo Alsabeh

Asymmetric image encryption schemes have shown high resistance against modern cryptanalysis. Massey Omura scheme is one of the popular asymmetric key cryptosystems based on the hard mathematical problem which is discrete logarithm problem. This system is more secure and efficient since there is no exchange of keys during the protocols of encryption and decryption. Thus, this work tried to use this fact to propose a secure asymmetric image encryption scheme. In this scheme the sender and receiver agree on public parameters, then the scheme begin deal with image using Massey Omura scheme to encrypt it by the sender and then decrypted it by the receiver. The proposed scheme tested using peak signal to noise ratio, and unified average changing intensity to prove that it is fast and has high security.


Author(s):  
Jiang Liu ◽  
Qin Li ◽  
Junyu Quan ◽  
Can Wang ◽  
Jinjing Shi ◽  
...  

2022 ◽  
Author(s):  
Han Yu ◽  
Yong Li ◽  
Junhao Zhang ◽  
Dongyu Yang ◽  
Tianhao Ruan ◽  
...  

Abstract Non-mechanical ptychographic encoding (NPE) transforms the secret information into a series of diffractive patterns through a spatial light modulator, saving the need to fabricate the secret objects. Conventionally, the shares in extended visual cryptography (EVC) are printed on transparent sheets or fabricated with diffractive optical elements and metasurface, but these methods are expensive and disposable. To solve these problems, we proposed an optical image encryption scheme that combines EVC and NPE. In the encryption process, the secret image is decomposed into multiple shares that are digitally loaded on the spatial light modulator, and the ciphertexts are generated according to the ptychographic encoding scheme. The decryption is performed by superimposing the shares reconstructed from the ciphertexts. We present optical experiments to demonstrate the feasibility and effectiveness of the proposed method.


Sign in / Sign up

Export Citation Format

Share Document