Buscar
Mostrando ítems 21-30 de 499
Matrix approach of an encryption system based on cellular automata and its numerical implementation
(World Scientific Publishing Company, 2012)
The space-bandwidth product in the joint transform correlator optical encryption setup
(Elsevier Science, 2011-09-01)
In this work we study the joint transform correlator (JTC) optical encryption setup through the Wigner function. We found analytical expressions for the spatial and spatial frequency extent of the encrypted signal. Since ...
Galois Ring GR (2(3),8) Dependent 24 x 24 S-Box Design: An RGB Image Encryption Application
(Springer, 2020-04-19)
An S-box is based on Boolean functions which are essentially the foundation of symmetric cryptographic systems. The Boolean functions are used for S-box designing in block ciphers and exploited as nonlinear components. ...
Perceptual security of encrypted images based on wavelet scaling analysis
(Elsevier Science BV, 2016)
All-optical encrypted movie
(2011)
Experimental analysis of a joint free space cryptosystem
(Elsevier, 2016-08)
In this paper, we analyze a joint free space cryptosystem scheme implemented in an actual laboratory environment. In this encrypting architecture, the object to be encoded and the security key are placed side by side in ...
Chaotic encryption method based on life-like cellular automata
(PERGAMON-ELSEVIER SCIENCE LTDOXFORD, 2012)
A chaotic encryption algorithm is proposed based on the "Life-like" cellular automata (CA), which acts as a pseudo-random generator (PRNG). The paper main focus is to use chaos theory to cryptography. Thus, CA was explored ...
Experimental optical encryption system based on a single-lens imaging architecture combined with a phase retrieval algorithm
(IOP Publishing, 2015-06)
We propose, and experimentally demonstrate, a single-lens imaging system as a compact encoding architecture by using a hybrid protocol for data processing. The encryption process consists of coherent light illuminating a ...
Roadmap on optical security
(Institute of Physics Publishing, 2016-08)
Information security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development ...