Double image encryption based on iterative fractional Fourier transform
Z Liu, S Liu - Optics Communications, 2007 - Elsevier
We present an image encryption algorithm to simultaneously encrypt two images into a
single one as the amplitudes of fractional Fourier transform with different orders. From the …
single one as the amplitudes of fractional Fourier transform with different orders. From the …
Random fractional Fourier transform
Z Liu, S Liu - Optics Letters, 2007 - opg.optica.org
We propose a novel random fractional Fourier transform by randomizing the transform
kernel function of the conventional fractional Fourier transform. The random fractional …
kernel function of the conventional fractional Fourier transform. The random fractional …
Game-theoretic distributed empirical risk minimization with strategic network design
This article considers a game-theoretic framework for distributed empirical risk minimization
(ERM) problems over networks where the information acquisition at a node is modeled as a …
(ERM) problems over networks where the information acquisition at a node is modeled as a …
A review of iterative phase retrieval for measurement and encryption
C Guo, C Wei, J Tan, K Chen, S Liu, Q Wu… - Optics and Lasers in …, 2017 - Elsevier
Phase retrieval technique is regarded as one of the most significant tools to solve optical
inverse problems. Several phase retrieval algorithms are discussed in this review. The …
inverse problems. Several phase retrieval algorithms are discussed in this review. The …
Double image encryption by using iterative random binary encoding in gyrator domains
We propose a double image encryption by using random binary encoding and gyrator
transform. Two secret images are first regarded as the real part and imaginary part of …
transform. Two secret images are first regarded as the real part and imaginary part of …
Optical image encryption with multistage and multichannel fractional Fourier-domain filtering
S Liu, Q Mi, B Zhu - Optics Letters, 2001 - opg.optica.org
We present a novel image-encryption algorithm that employs multichannel and multistage
fractional Fourier-domain filtering architecture. We perform the encryption and decryption by …
fractional Fourier-domain filtering architecture. We perform the encryption and decryption by …
An identification method for enclosed voids restriction in manufacturability design for additive manufacturing structures
Additive manufacturing (AM) technologies, such as selective laser sintering (SLS) and fused
deposition modeling (FDM), have become the powerful tools for direct manufacturing of …
deposition modeling (FDM), have become the powerful tools for direct manufacturing of …
Generation of hollow Gaussian beams by spatial filtering
We demonstrate that hollow Gaussian beams can be obtained from Fourier transform of the
differentials of a Gaussian beam, and thus they can be generated by spatial filtering in the …
differentials of a Gaussian beam, and thus they can be generated by spatial filtering in the …
Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains
A color image encryption algorithm is designed by use of Arnold transform and discrete
cosine transform (DCT). The RGB components of the color image are scrambled by Arnold …
cosine transform (DCT). The RGB components of the color image are scrambled by Arnold …
Information manipulation in partially observable markov decision processes
A common approach to solve partially observable Markov decision processes (POMDPs) is
transforming them into Makov decision processes (MDPs) defined on information states …
transforming them into Makov decision processes (MDPs) defined on information states …