Page 184 - 2024-Vol20-Issue2
P. 184

180 |                                                             Muttashar & Fyath

                     REFERENCES                                   [13] O. S. Faragallah and et al, “Secure color image cryp-
                                                                        tosystem based on chaotic logistic in the frft domain,”
 [1] M. Z. J. Wei and X. Tong, “Multi-image compres-                    Multimedia Tools and Applications, vol. 79, no. 3-4,
      sion–encryption algorithm based on compressed sensing             p. 2495–2519, 2020.
      and optical encryption,” Entropy, vol. 24, no. 784, pp. 1–
      22, 2022.                                                   [14] A. B. J. D. Kumar and V. N. Mishra, “Optical and
                                                                        digital double color-image encryption algorithm using
 [2] C. Z. H. Wen and et al, “Secure optical image com-                 3d chaotic map and 2d-multiple parameter fractional
      munication using double random transformation and                 discrete cosine transform,” Results in Optics, vol. 1,
      memristive chaos,” IEEE Photonics Journal, vol. 15,               no. 100031, p. 1–16, 2020.
      no. 1, pp. 1–11, 2023.
                                                                  [15] Z. Man and et al, “Double image encryption algorithm
 [3] G. S. Yadav, “A genetic algorithm based image steganog-            based on neural network and chaos,” Chaos, Solitons
      raphy scheme with high embedding capacity and low                 and Fractals, vol. 152, no. 111318, pp. 1–16, 2021.
      distortion,” Imaging Science Journal, vol. 69, no. 4,
      pp. 143–152, 2023.                                          [16] P. Tian and R. Su, “A novel virtual optical image en-
                                                                        cryption scheme created by combining chaotic s-box
 [4] Z. A. Abduljabbar and et al, “Provably secure and fast             with double random phase encoding,” Sensors, vol. 22,
      color image encryption algorithm based on s-boxes and             no. 5325, p. 1–24, 2022.
      hyperchaotic map,” IEEE Access, vol. 10, pp. 26257–
      26270, 2022.                                                [17] M. R. Abuturab and A. Alfalou, “Multiple color im-
                                                                        age fusion, compression, and encryption using compres-
 [5] O. S. Faragallah and et al, “Efficient and secure opto-            sive sensing, chaotic-biometric keys, and optical frac-
      cryptosystem for color images using 2d logistic-based             tional fourier transform,” Optics and Laser Technology,
      fractional fourier transform,” Optics and Lasers in Engi-         vol. 151, no. 108071, pp. 1–13, 2022.
      neering, vol. 137, no. 106333, pp. 1–15, 2021.
                                                                  [18] K. Ahmadi and A. Carnicer, “Optical visual encryption
 [6] I. Khalid and et al, “An integrated image encryption               using focused beams and convolutional neural networks,”
      scheme based on elliptic curve,” IEEE Access, vol. 11,            Optics and Lasers in Engineering, vol. 161, no. 107321,
      p. 5483–5501, 2022.                                               2023.

 [7] S. S. Yu and et al, “Optical image encryption algorithm      [19] K. C. A. K. Singh and A. Singh, “An image security
      based on phase-truncated short-time fractional fourier            model based on chaos and dna cryptography for iiot
      transform and hyper-chaotic system,” Optics and Lasers            images,” IEEE Transactions on Industrial Informatics,
      in Engineering, vol. 124, no. 105816, pp. 1–11, 2020.             vol. 19, no. 2, p. 1957–1964, 2022.

 [8] A. Hazer and R. Yildirim, “A review of single and mul-       [20] D. Huo and et al, “Multiple-image encryption scheme
      tiple optical image encryption techniques,” Journal of            via compressive sensing and orthogonal encoding based
      Optics (United Kingdom), vol. 23, no. 113501, pp. 1–93,           on double random phase encoding,” Journal of Modern
      2021.                                                             Optics, vol. 65, no. 18, p. 2093–2102, 2018.

 [9] M. Rezai and J. A. Salehi, “Fundamentals of quantum          [21] X. W. L. J. Chen and Q. H. Wang, “Deep learning for
      fourier optics,” IEEE Transactions on Quantum Engi-               improving the robustness of image encryption,” IEEE
      neering, vol. 4, pp. 1–22, 2022.                                  Access, vol. 7, p. 181083–181091, 2019.

[10] Q. Zhou and et al, “Optical image encryption based on        [22] M. Liao and et al, “Deep-learning-based ciphertext-
      two-channel detection and deep learning,” Optics and              only attack on optical double random phase encryption,”
      Lasers in Engineering, vol. 162, no. 107415, 2022.                Opto-Electronic Advances, vol. 4, no. 5, p. 1–12, 2021.

[11] Y. Zhao and et al, “High-precision calibration of phase-     [23] J. W. R. Ni, F. Wang and Y. Hu, “Multi-image encryption
      only spatial light modulators,” IEEE Photonics Journal,           based on compressed sensing and deep learning in opti-
      vol. 14, no. 7402508, pp. 1–8, 2022.                              cal gyrator domain,” IEEE Photonics Journal, vol. 13,
                                                                        no. 3076480, p. 1–16, 2021.
[12] M. W. W. Zhou, X. Wang and D. Li, “A new combina-
      tion chaotic system and its application in a new bit-level
      image encryption scheme,” Optics and Lasers in Engi-
      neering, vol. 149, no. 106782, 2022.
   179   180   181   182   183   184   185   186   187   188   189