Double random phase encryption scheme to multiplex and simultaneous encode multiple images
| Main Authors: | Alfalou, A., Mansour, Ali |
|---|---|
| Format: | Journal Article |
| Published: |
Optical Socity of America
2009
|
| Online Access: | http://hdl.handle.net/20.500.11937/41599 |
Similar Items
New Image Encryption and Compression Method Based on Independent Component Analysis
by: Alfalou, A., et al.
Published: (2008)
by: Alfalou, A., et al.
Published: (2008)
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020)
by: Omolara, Abiodun Esther
Published: (2020)
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020)
by: Omolara, Abiodun Esther
Published: (2020)
On the security defects of an image encryption scheme
by: C., Li, et al.
Published: (2009)
by: C., Li, et al.
Published: (2009)
Performance evaluation of phase encoding schemes in multi-user networks
by: Thio, T. H. G., et al.
Published: (2014)
by: Thio, T. H. G., et al.
Published: (2014)
New spectral image compression method based on an optimal phase coding and the RMS duration principle
by: Alfalou, A., et al.
Published: (2010)
by: Alfalou, A., et al.
Published: (2010)
Multi-phase dual-encoder model for anomaly detection in medical imaging
by: Nur Rusyidah Azri,, et al.
Published: (2025)
by: Nur Rusyidah Azri,, et al.
Published: (2025)
Image compression and encryption
by: Zainal Abidin, Zuhairiah
Published: (2003)
by: Zainal Abidin, Zuhairiah
Published: (2003)
Rabin-p encryption scheme analysis on MQTT
by: Che Izam, Wan Abdullah, et al.
Published: (2023)
by: Che Izam, Wan Abdullah, et al.
Published: (2023)
Identity-based encryption schemes - a review
by: Tea, Boon Chian, et al.
Published: (2019)
by: Tea, Boon Chian, et al.
Published: (2019)
Randomized text encryption: a new dimension in cryptography
by: Memon, Jamshed, et al.
Published: (2014)
by: Memon, Jamshed, et al.
Published: (2014)
Improving The Randomness of Output Sequence for The Advanced Encryption Standard Cryptographic Algorithm
by: Abdulbari Ali, Sherif
Published: (2005)
by: Abdulbari Ali, Sherif
Published: (2005)
Design And Cryptanalysis Of Encryption And Signature Schemes Without Certificates
by: Yap, Wun She
Published: (2007)
by: Yap, Wun She
Published: (2007)
On the underlying hard lattice problems of GGH encryption scheme
by: Mandangan, Arif, et al.
Published: (2018)
by: Mandangan, Arif, et al.
Published: (2018)
An overview of multiplexing schemes for MIMO channel sounding
by: Sharif, Md. Raihan, et al.
Published: (2011)
by: Sharif, Md. Raihan, et al.
Published: (2011)
Development of thermostable multiplex qPCR for simultaneous detection of pathogens associated with febrile illnesses
by: Ali, Mohammad Ridhuan Mohd
Published: (2018)
by: Ali, Mohammad Ridhuan Mohd
Published: (2018)
An improved chaotic image encryption algorithm
by: Al-Khasawneh, Mahmoud Ahmad, et al.
Published: (2018)
by: Al-Khasawneh, Mahmoud Ahmad, et al.
Published: (2018)
Message based random variable length key encryption algorithm.
by: Mirvaziri, Hamid, et al.
Published: (2009)
by: Mirvaziri, Hamid, et al.
Published: (2009)
Performance Indices of BSS for Real-World Applications
by: Mansour, Ali, et al.
Published: (2006)
by: Mansour, Ali, et al.
Published: (2006)
A review on multiplexing schemes for MIMO channel sounding
by: Ullah, Mohammad Habib, et al.
Published: (2009)
by: Ullah, Mohammad Habib, et al.
Published: (2009)
Generic DNA encoding design scheme to solve combinatorial problems
by: Rofilde, Hasudungan
Published: (2015)
by: Rofilde, Hasudungan
Published: (2015)
Partial Encryption of Compressed Images Employing FPGA
by: Reaz, M.B.I., et al.
Published: (2005)
by: Reaz, M.B.I., et al.
Published: (2005)
Partial encryption of compressed images employing FPGA
by: Reaz, Mamun Bin Ibne Ibne, et al.
Published: (2005)
by: Reaz, Mamun Bin Ibne Ibne, et al.
Published: (2005)
Image encryption algorithm based on chaotic mapping
by: Salleh, Mazleena, et al.
Published: (2003)
by: Salleh, Mazleena, et al.
Published: (2003)
Development of an image rotary encoder for motion control
by: Ismayuzri, Ishak
Published: (2013)
by: Ismayuzri, Ishak
Published: (2013)
Optical Encoding Based On Single Pixel Imaging
by: Leong, Yong En
Published: (2021)
by: Leong, Yong En
Published: (2021)
Development of multiplex pcr platform for simultaneous detection of selected foodborne pathogens / Thenmoly Utayakumaran
by: Thenmoly , Utayakumaran
Published: (2019)
by: Thenmoly , Utayakumaran
Published: (2019)
Encrypted quick response scheme for hotel check-in and access control system
by: Cheong, S., et al.
Published: (2017)
by: Cheong, S., et al.
Published: (2017)
Pairing-based public-key encryption schemes with backward-and-forward security
by: Han, Song, et al.
Published: (2008)
by: Han, Song, et al.
Published: (2008)
Analysis of Rabin-p and HIME(R) encryption scheme on IoT platform
by: Abd Nashir, Abdul Muhaimin, et al.
Published: (2020)
by: Abd Nashir, Abdul Muhaimin, et al.
Published: (2020)
Simultaneous time imaging, velocity estimation, and multiple suppression using local event slopes
by: Cooke, D., et al.
Published: (2009)
by: Cooke, D., et al.
Published: (2009)
Simultaneous time imaging, velocity estimation and multiple suppression using local event slopes
by: Cooke, D., et al.
Published: (2008)
by: Cooke, D., et al.
Published: (2008)
Fingerprint Image Watermarking Using Encrypted Identification Number
by: Mustafa, Intan Shafinaz
Published: (2006)
by: Mustafa, Intan Shafinaz
Published: (2006)
An Improved RDWT-based Image Steganography Scheme with QR Decomposition and Double Entropy
by: Ng, Ke-Huey, et al.
Published: (2020)
by: Ng, Ke-Huey, et al.
Published: (2020)
LUNASKA simultaneous neutrino searches with multiple telescopes
by: Bray, J., et al.
Published: (2011)
by: Bray, J., et al.
Published: (2011)
Run length encoding in image compression / Yusniza Yaakub
by: Yusniza, Yaakub
Published: (2004)
by: Yusniza, Yaakub
Published: (2004)
Encoding of facial images into illumination-invariant
spike trains
by: Hafiz , Fadhlan, et al.
Published: (2012)
by: Hafiz , Fadhlan, et al.
Published: (2012)
New IV-Based database encryption scheme
using TS block cipher
by: Zailani Mohamad Sidek,, et al.
Published: (2004)
by: Zailani Mohamad Sidek,, et al.
Published: (2004)
An upgrade on the key generation algorithm of the GGH-MKA lattice-based encryption scheme
by: Arif, Mandangan, et al.
Published: (2021)
by: Arif, Mandangan, et al.
Published: (2021)
A randomized, doubled-blind study comparing multiple doses of Channa striatus supplementation for knee osteoarthritis
by: Azidah, Abdul Kadir, et al.
Published: (2017)
by: Azidah, Abdul Kadir, et al.
Published: (2017)
Similar Items
-
New Image Encryption and Compression Method Based on Independent Component Analysis
by: Alfalou, A., et al.
Published: (2008) -
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020) -
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020) -
On the security defects of an image encryption scheme
by: C., Li, et al.
Published: (2009) -
Performance evaluation of phase encoding schemes in multi-user networks
by: Thio, T. H. G., et al.
Published: (2014)