phase truncation
Recently Published Documents


TOTAL DOCUMENTS

42
(FIVE YEARS 11)

H-INDEX

12
(FIVE YEARS 4)

Electronics ◽  
2021 ◽  
Vol 10 (21) ◽  
pp. 2648
Author(s):  
Jaime Velasco ◽  
Ignacio Parellada-Serrano ◽  
Carlos Molero

This document presents the design and manufacture of a reflectarray (RA) antenna for the Ku-band that is based on a fully-metallic 3D architecture. The reflectarray unit cell is formed by a square-shaped waveguide section ending in a short circuit, which is the reflectarray back ground plane. Each cell has the ability of configuring the phase of its own reflected field by means of resonators perforated on the walls of the cell waveguide section. The resonator-based waveguide cell introduces the 3D character to the design. The geometry of the resonators and the size variation introduces the phase behavior of each cell, thus, conforming the radiation pattern of the reflectarray. This design explores the potential of phase value truncation (six states and two states) and demonstrates that proper pattern results can be obtained with this phase truncation.


Author(s):  
Jaime Velasco ◽  
Parellada-Serrano Ignacio ◽  
Molero Carlos

This document presents the design and manufacture of a reflectarray (RA) antenna for the Ku-band, based on a fully-metallic 3D architecture. The reflectarray unit cell is formed by a square-shaped waveguide section ended in a short circuit, that is the reflectarray back ground plane. Each cell has the ability of configuring the phase of its own reflected field by means of resonators perforated on the walls of the cell waveguide section. The resonator-based waveguide cell introduces the 3D character to the design. The geometry of the resonators and its size variation introduces the phase behaviour of each cell, conforming the radiation pattern of the reflectarray. This design explores the potential of phase value truncation (6 states and 2 states), and demonstrates that proper pattern results can be obtained with this phase truncation.


2021 ◽  
Vol 2021 ◽  
pp. 1-19
Author(s):  
Anshula Sangwan ◽  
Hukum Singh

A new asymmetric optical double image encryption algorithm is proposed, which combines phase truncation and singular value decomposition. The plain text is encrypted with two-stage phase keys to obtain a uniformly distributed cipher text and two new decryption keys. These keys are generated during the encryption process and are different from encryption keys. It realizes asymmetric encryption and improves the security of the system. The unscrambling keys in the encryption operation are mainly related to plain text. At the same time, the system is more resistant to selective plain text attacks; it also improves the sensitivity of decryption keys. With the application of phase truncation, the key space expanded and the security of the cryptographic system is enhanced. The efficacy of the system is calculated by evaluating the estimated error between the input and retrieved images. The proposed technique provides innumerable security keys and is robust against various potential attacks. Numerical simulations verify the effectiveness and security of the proposed technique.


2020 ◽  
Vol 13 (4) ◽  
pp. 672-685
Author(s):  
Hukum Singh ◽  
Mehak Khurana

Background: Optical Vortex (OV) has attracted attention amongst many researchers. Paper proposes a nonlinear scheme of image encryption based on Optical Vortex (OV) and Double Random Phase Encoding (DRPE) in the Gyrator Transform (GT) domain under phase truncation operations. Objective: The amplitude and phase truncation operation in the image encryption generates two decryption keys and convert the method to nonlinear. It has also been proposed opto-electronically. Original image can only be decrypted with correct values of OV, GT rotation angles and Decryption Keys (DKs). Methods: A novel asymmetric image encryption scheme, using optical vortex mask has been proposed in view of amplitude and phase truncation operation. The scheme becomes more strengthened by the parameters used in the Optical Vortex (OV) and by taking the (n)th power operation in the encryption path and (n)th root operation in the decryption path. Results: It shows that for each of the encryption parameters, binary image has greater sensitivity as compared to the grayscale image. This scheme inflates the security by making use of OV-based Structured Phase Mask (SPM) as it expands the key space. The scheme has also been investigated for its robustness and its sensitivity against various attacks such as noise and occlusion attacks under number of iterations. Conclusion: This scheme provides solution to the problem of key space with the use of GT rotational angles and OV phase mask thus enhances the security. The scheme has been verified based on various security parameters such as occlusion, noise attacks, CC, entropy etc.


2019 ◽  
Vol 449 ◽  
pp. 100-109 ◽  
Author(s):  
Ke-Ya Hu ◽  
Chao Wu ◽  
Ying Wang ◽  
Jun Wang ◽  
Qiong-Hua Wang

2019 ◽  
Vol 448 ◽  
pp. 26-32 ◽  
Author(s):  
Chao Wu ◽  
Ke-Ya Hu ◽  
Ying Wang ◽  
Jun Wang ◽  
Qiong-Hua Wang

Sign in / Sign up

Export Citation Format

Share Document