• Acta Photonica Sinica
  • Vol. 41, Issue 11, 1365 (2012)
L Shan-xiang1、*, WANG Zhao-shan1, SHENG Yan2, and FENG Jiu-chao1
Author Affiliations
  • 1[in Chinese]
  • 2[in Chinese]
  • show less
    DOI: 10.3788/gzxb20124111.1365 Cite this Article
    L Shan-xiang, WANG Zhao-shan, SHENG Yan, FENG Jiu-chao. An Algorithm of Keeping Non-negative Integer Value in Image Encryption[J]. Acta Photonica Sinica, 2012, 41(11): 1365 Copy Citation Text show less
    References

    [1] SYED F. Children of DES: a look at the advanced encryption standard[J]. Network Security, 2000, 2000(9): 11-12.

    [2] PHAN R C W. Reducing the exhaustive key search of the data encryption standard (DES)[J]. Computer Standards & Interfaces, 2007, 29(5): 528-530.

    [3] GONG Jin, LIU Wen-yi, ZHANG Hui-xin. Multiple lookup table-based AES encryption algorithm implementation[J]. Physics Procedia, 2012, 25(0): 842-847.

    [4] WANG Yuan-mei, LI Tao. Study on image encryption algorithm based on arnold transformation and chaotic system[C]. Proceedings of the 2010 International Conference on Intelligent System Design and Engineering Application. Orlando, Florida, USA: IEEE, 2010: 499-451.

    [5] KUMAR G M B S S, CHANDRASEKARAN V. A novel image encryption scheme using Lorenz attractor[C]. Proceedings of the 4th IEEE Conference on Industrial Electronics and Applications. Orlando, Florida, USA: IEEE, 2009: 3662-3666.

    [6] ZHU Ai-hong, LI Lian. Improving for chaotic image encryption algorithm based on logistic map[C]. Proceedings of the 2nd International Conference on Environmental Science and Information Application Technology. Orlando, Florida, USA: IEEE, 2010: 211-214.

    [7] XIAO Yu, ZHANG Hai-ying ,RAN Qi-wen, et al. Image encryption and two dimensional discrete M-parameter Fractional Fourier transform[C]. Proceedings of the 2nd International Congress on Image and Signal Processing. Orlando, Florida, USA: IEEE, 2009: 1-4.

    [8] YOSHIMURA H, IWAI R. New encryption method of 2D image by use of the fractional Fourier transform[C]. Proceedings of the 9th International Conference on Signal Processing. Orlando, Florida, USA: IEEE, 2008: 2182-2184.

    [9] WANG Ya-qing, ZHOU Shang-bo. A novel image encryption algorithm based on fractional Fourier transform[C]. Proceedings of the 2011 International Conference on Computer Science and Service System. Orlando, Florida, USA: IEEE, 2011: 72-75.

    [10] SITU G, ZHANG Jing-juan. Double random-phase encoding in the Fresnel domain[J]. Optics Letters, 2004, 29(14): 1584-1586.

    [11] REFREGIER P, JAVIDI B. Optical image encryption based on input plane and Fourier plane random encoding[J]. Optics Letters, 1995, 20(7): 767-769.

    [12] JAVIDI B, AHOUZI E. Optical security system with Fourier plane encoding[J]. Applied Optics, 1998, 37(26): 6247-6255.

    [13] YU Li, ZHU Bang-he, LIU Shu-tian. Optical image encryption based on double phase encoding with Fractional Fourier transform[J]. Acta Photonica Sinica, 2001, 30(7): 904-907.

    [14] LU Hong-qiang, ZHAO Jian-lin, FAN Qi, et al. Iterative double random phase encryption based on pixel scrambling technology[J]. Acta Photonica Sinica, 2005, 34(7): 1069-1073.

    [15] LI Rong, LI Ping. Research on the image security in double random phase real-value encryption[J]. Acta Photonica Sinica, 2005, 34(6): 952-955.

    [16] LI Ping, LI Rong. Real-value encryption for optical security system based on holography[J]. Acta Photonica Sinica, 2008, 37(5): 957-959.

    [17] LI Xue-mei, RAN Tao, DAI Liu-ling, et al. Reality-preserving image encryption associated with the generalized Hilbert transform[C]. Proceedings of the 2009 IEEE International Symposium on Industrial Electronics. Orlando, Florida, USA: IEEE, 2009: 1909-1913.

    [18] VENTURINI I, DUHAMEL P. Reality preserving fractional transforms[C]. Proceedings of the 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing. Orlando, Florida, USA: IEEE, 2004: 205-208.

    [19] ZHU Zhi-liang, ZHANG Wei, WONG K W, et al. A chaos-based symmetric image encryption scheme using a bit-level permutation[J]. Information Sciences, 2011, 181(6): 1171-1186.

    [20] WANG Yong, WONG K W, LIAO Xiao-feng, et al. A new chaos-based fast image encryption algorithm[J]. Applied Soft Computing, 2011, 11(1): 514-522.

    CLP Journals

    [1] XIE Xiao-ping, DUAN Jie, DUAN Tao, WEN Yu. An All-optical Encryption System Scheme for 8 Wave Signals Based on LiNbO3 Waveguide[J]. Acta Photonica Sinica, 2013, 42(10): 1169

    L Shan-xiang, WANG Zhao-shan, SHENG Yan, FENG Jiu-chao. An Algorithm of Keeping Non-negative Integer Value in Image Encryption[J]. Acta Photonica Sinica, 2012, 41(11): 1365
    Download Citation