• Acta Optica Sinica
  • Vol. 33, Issue 3, 307002 (2013)
Qin Yi*, Lü Xiaodong, Gong Qiong, and Jiang Hualong
Author Affiliations
  • [in Chinese]
  • show less
    DOI: 10.3788/aos201333.0307002 Cite this Article Set citation alerts
    Qin Yi, Lü Xiaodong, Gong Qiong, Jiang Hualong. Additional Key Rotation Multiplexing Encryption Using Joint Transform Correlator Architecture[J]. Acta Optica Sinica, 2013, 33(3): 307002 Copy Citation Text show less
    References

    [1] Wan Qin, Xiang Peng. Asymmetric cryptosystem based on phase-truncated Fourier transforms [J]. Opt. Lett., 2010, 35(2): 118~120

    [2] Xi Sixing, Sun Xin, Liu Bing et al.. New image encryption technology of image based on computer generated hologram [J]. Laser & Optoelectronics Progress, 2012, 49(4): 040902

    [3] Qin Yi, Zhang Shuai, Gong Qiong et al.. Virtual optical image encryption based on interference [J]. Acta Optica Sinica, 2012, 32(10): 1007001

    [4] Nanrun Zhou, Yixian Wang, Lihua Gong et al.. Novel single-channel color image encryption algorithm based on chaos and fractional Fourier transform [J]. Opt. Commun., 2011, 284(12): 2789~2796

    [5] Chen Daqing, Zhou Hao, Tao Zhi et al.. Fourier computer-generated hologram digital watermarking with nonlinear amplitude limiting [J]. Acta Optica Sinica, 2011, 31(2): 0207002

    [6] Yang Xiujuan, Zhang Xiaoqiu, Yang Ming et al.. Properties of the fractional dual nonlinear correlator [J]. Acta Optica Sinica, 2011, 31(1): 0107002

    [7] Xiaogang Wang, Daomu Zhao. Security enhancement of a phase-truncation based image encryption algorithm [J]. Appl. Opt., 2011, 50(36): 6645~6651

    [8] Yan Zhang, Bo Wang. Optical image encryption based on interference [J]. Opt. Lett., 2008, 33(21): 2443~2445

    [9] Yujing Han, Yunhai Zhang. Optical image encryption based on two beams′ interference [J]. Opt. Commun., 2010, 283(9): 1690~1692

    [10] Philippe Refregier, Bahram Javidi. Optical image encryption based on input plane and Fourier plane random encoding [J]. Opt. Lett., 1995, 20(7): 767~769

    [11] Bor Wang, Ching-cherng Sun, Wei-chia Su et al.. Shift-tolerance property of an optical double-random phase-encoding encryption system [J]. Appl. Opt., 2000, 39(26): 4788~4793

    [12] Peng Xiang, Tang Hongqiao, Tian Jindong. Ciphertext-only attack on double random phase encoding optical encryption system [J]. Acta Physica Sinica, 2007, 56(5): 2629~2636

    [13] Takanori Nomura, Bahram Javidi. Optical encryption using a joint transform correlator architecture [J]. Opt. Eng., 2000, 39(8): 2031~2035

    [14] Wan Qin, Xiang Peng, Xiangfeng Meng. Cryptanalysis of optical encryption schemes based on joint transform correlator architecture [J]. Opt. Eng., 2011, 50(2): 028201

    [15] John Fredy Barrera, Carlos Vargas, Myrian Tebaldi et al.. Chosen-plaintext attack on a joint transform correlator encrypting system [J]. Opt. Commun., 2010, 283(20): 3917~3921

    [16] John Fredy Barrera, Carlos Vargas, Myrian Tebaldi et al.. Known-plaintext attack on a joint transform correlator encrypting system [J]. Opt. Lett., 2010, 35(21): 3553~3555

    [17] E. Rueda, M. Tebaldi, R. Torroba et al.. Three-dimensional key in a modified joint transform correlator encryption scheme [J]. Opt. Commun., 2011, 284(19): 4321~4326

    [18] Zhengjun Liu, Shutian Liu. Double image encryption based on iterative fractional Fourier transform [J]. Opt. Commun., 2007, 275(2): 324~329

    [19] Zhengjun Liu, Jingmin Dai, Xiaogang Sun et al.. Triple image encryption scheme in fractional Fourier transform domains [J]. Opt. Commun., 2009, 282(4): 518~522

    [20] Zhengjun Liu, Qing Guo, Lie Xu et al.. Double image encryption by using iterative random binary encoding in gyrator domains [J]. Opt. Express, 2010, 18(11): 12033~12043

    [21] Xiaogang Wang, Daomu Zhao. Multiple-image encryption based on nonlinear amplitude-truncation and phase-truncation in Fourier domain [J]. Opt. Commun., 2011, 284(1): 148~152

    [22] M. Z. He, L. Z. Cai, Q. Liu et al.. Multiple image encryption and watermarking by random phase matching [J]. Opt. Commun., 2005, 247(1-3): 29~37

    [23] Guohai Situ, Jingjuan Zhang. Multiple-image encryption by wavelength multiplexing [J]. Opt. Lett., 2005, 30(11): 1306~1308

    [24] Dafne Amaya, Myrian Tebaldi, Roberto Torroba et al.. Wavelength multiplexing encryption using joint transform correlator architecture [J]. Appl. Opt., 2009, 48(11): 2099~2104

    [25] Xiaoyong Liang, Xianyu Su, Sikun Li et al.. Key rotation multiplexing for multiple-image optical encryption in the Fresnel domain [J]. Opt. & Laser Technol., 2011, 43(4): 889~894

    [26] Chunhui Niu, Xiaoling Wang, Xianhui Mao. Multiple-image hiding based on interference principle [J]. Opt. & Quantum Electron., 2012, 43(6-10): 91~99

    CLP Journals

    [1] Zhu Wei, Yang Geng, Chen Lei, Chen Zhengyu. An Improved Image Encryption Algorithm Based on Double Random Phase Encoding and Chaos[J]. Acta Optica Sinica, 2014, 34(6): 607001

    [2] WANG Zhipeng, MA Maofen, QIN Yi. Multiple Binary Images Optical Encryption Technology Based on JTC and Spread Spectrum Technology[J]. Opto-Electronic Engineering, 2014, 41(1): 54

    [3] Qin Yi, Li Jing, Ma Maofen, Lü Xiaodong. System for Optical Multiple Binary Image Encryption by Random Phase Mask Multiplexing[J]. Acta Optica Sinica, 2014, 34(3): 307001

    Qin Yi, Lü Xiaodong, Gong Qiong, Jiang Hualong. Additional Key Rotation Multiplexing Encryption Using Joint Transform Correlator Architecture[J]. Acta Optica Sinica, 2013, 33(3): 307002
    Download Citation