Security Analysis on an Optical Encryption and Authentication Scheme Based on Phase-Truncation and Phase-Retrieval Algorithm
In this paper, the security of the cryptosystem based on phase-truncation Fourier transform (PTFT) and Gerchberg-Saxton (G-S) algorithm is analyzed. In this cryptosystem, the phase key generated using phase-truncated (PT) operation is bonded with the phase key generated in G-S algorithm to form the...
Ausführliche Beschreibung
Autor*in: |
Yi Xiong [verfasserIn] Ravi Kumar [verfasserIn] Chenggen Quan [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2019 |
---|
Schlagwörter: |
---|
Übergeordnetes Werk: |
In: IEEE Photonics Journal - IEEE, 2015, 11(2019), 5, Seite 14 |
---|---|
Übergeordnetes Werk: |
volume:11 ; year:2019 ; number:5 ; pages:14 |
Links: |
---|
DOI / URN: |
10.1109/JPHOT.2019.2936236 |
---|
Katalog-ID: |
DOAJ056416202 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | DOAJ056416202 | ||
003 | DE-627 | ||
005 | 20230308201356.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230227s2019 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1109/JPHOT.2019.2936236 |2 doi | |
035 | |a (DE-627)DOAJ056416202 | ||
035 | |a (DE-599)DOAJ16a8a6dd809f4b4daa932a2ed4ac6644 | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
050 | 0 | |a TA1501-1820 | |
050 | 0 | |a QC350-467 | |
100 | 0 | |a Yi Xiong |e verfasserin |4 aut | |
245 | 1 | 0 | |a Security Analysis on an Optical Encryption and Authentication Scheme Based on Phase-Truncation and Phase-Retrieval Algorithm |
264 | 1 | |c 2019 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a In this paper, the security of the cryptosystem based on phase-truncation Fourier transform (PTFT) and Gerchberg-Saxton (G-S) algorithm is analyzed. In this cryptosystem, the phase key generated using phase-truncated (PT) operation is bonded with the phase key generated in G-S algorithm to form the first private key, which improves the complexity of the first private key. In addition, since the second private key is generated using the G-S algorithm, the number of known constraints decreases compared to the traditional PTFT-based cryptosystem, which will lead the non-convergence of special attacks. However, it has been found that two private keys generated in the cryptosystem based on PTFT and G-S algorithm are related to one phase key generated in the G-S algorithm, which provides an additional constraint to retrieve the other private key when one private key is disclosed. Based on this analysis, two iterative processes with different constraints are proposed to crack the cryptosystem based on PTFT and G-S algorithm. This is the first time to report the silhouette problem existing in the cryptosystem based on PTFT and G-S algorithm. Numerical simulations are carried out to validate the feasibility and effectiveness of our analysis and proposed iterative processes. | ||
650 | 4 | |a Optical image encryption and authentication | |
650 | 4 | |a security analysis | |
650 | 4 | |a silhouette problem | |
653 | 0 | |a Applied optics. Photonics | |
653 | 0 | |a Optics. Light | |
700 | 0 | |a Ravi Kumar |e verfasserin |4 aut | |
700 | 0 | |a Chenggen Quan |e verfasserin |4 aut | |
773 | 0 | 8 | |i In |t IEEE Photonics Journal |d IEEE, 2015 |g 11(2019), 5, Seite 14 |w (DE-627)600310272 |w (DE-600)2495610-7 |x 19430655 |7 nnns |
773 | 1 | 8 | |g volume:11 |g year:2019 |g number:5 |g pages:14 |
856 | 4 | 0 | |u https://doi.org/10.1109/JPHOT.2019.2936236 |z kostenfrei |
856 | 4 | 0 | |u https://doaj.org/article/16a8a6dd809f4b4daa932a2ed4ac6644 |z kostenfrei |
856 | 4 | 0 | |u https://ieeexplore.ieee.org/document/8807146/ |z kostenfrei |
856 | 4 | 2 | |u https://doaj.org/toc/1943-0655 |y Journal toc |z kostenfrei |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_DOAJ | ||
912 | |a GBV_ILN_20 | ||
912 | |a GBV_ILN_22 | ||
912 | |a GBV_ILN_23 | ||
912 | |a GBV_ILN_24 | ||
912 | |a GBV_ILN_39 | ||
912 | |a GBV_ILN_40 | ||
912 | |a GBV_ILN_60 | ||
912 | |a GBV_ILN_62 | ||
912 | |a GBV_ILN_63 | ||
912 | |a GBV_ILN_65 | ||
912 | |a GBV_ILN_69 | ||
912 | |a GBV_ILN_70 | ||
912 | |a GBV_ILN_73 | ||
912 | |a GBV_ILN_95 | ||
912 | |a GBV_ILN_105 | ||
912 | |a GBV_ILN_110 | ||
912 | |a GBV_ILN_151 | ||
912 | |a GBV_ILN_161 | ||
912 | |a GBV_ILN_170 | ||
912 | |a GBV_ILN_213 | ||
912 | |a GBV_ILN_230 | ||
912 | |a GBV_ILN_285 | ||
912 | |a GBV_ILN_293 | ||
912 | |a GBV_ILN_370 | ||
912 | |a GBV_ILN_602 | ||
912 | |a GBV_ILN_2003 | ||
912 | |a GBV_ILN_2014 | ||
912 | |a GBV_ILN_4012 | ||
912 | |a GBV_ILN_4037 | ||
912 | |a GBV_ILN_4112 | ||
912 | |a GBV_ILN_4125 | ||
912 | |a GBV_ILN_4126 | ||
912 | |a GBV_ILN_4249 | ||
912 | |a GBV_ILN_4305 | ||
912 | |a GBV_ILN_4306 | ||
912 | |a GBV_ILN_4307 | ||
912 | |a GBV_ILN_4313 | ||
912 | |a GBV_ILN_4322 | ||
912 | |a GBV_ILN_4323 | ||
912 | |a GBV_ILN_4324 | ||
912 | |a GBV_ILN_4325 | ||
912 | |a GBV_ILN_4335 | ||
912 | |a GBV_ILN_4338 | ||
912 | |a GBV_ILN_4367 | ||
912 | |a GBV_ILN_4700 | ||
951 | |a AR | ||
952 | |d 11 |j 2019 |e 5 |h 14 |
author_variant |
y x yx r k rk c q cq |
---|---|
matchkey_str |
article:19430655:2019----::euiynlssnnpiaecytoaduhniainceeaeopaernai |
hierarchy_sort_str |
2019 |
callnumber-subject-code |
TA |
publishDate |
2019 |
allfields |
10.1109/JPHOT.2019.2936236 doi (DE-627)DOAJ056416202 (DE-599)DOAJ16a8a6dd809f4b4daa932a2ed4ac6644 DE-627 ger DE-627 rakwb eng TA1501-1820 QC350-467 Yi Xiong verfasserin aut Security Analysis on an Optical Encryption and Authentication Scheme Based on Phase-Truncation and Phase-Retrieval Algorithm 2019 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier In this paper, the security of the cryptosystem based on phase-truncation Fourier transform (PTFT) and Gerchberg-Saxton (G-S) algorithm is analyzed. In this cryptosystem, the phase key generated using phase-truncated (PT) operation is bonded with the phase key generated in G-S algorithm to form the first private key, which improves the complexity of the first private key. In addition, since the second private key is generated using the G-S algorithm, the number of known constraints decreases compared to the traditional PTFT-based cryptosystem, which will lead the non-convergence of special attacks. However, it has been found that two private keys generated in the cryptosystem based on PTFT and G-S algorithm are related to one phase key generated in the G-S algorithm, which provides an additional constraint to retrieve the other private key when one private key is disclosed. Based on this analysis, two iterative processes with different constraints are proposed to crack the cryptosystem based on PTFT and G-S algorithm. This is the first time to report the silhouette problem existing in the cryptosystem based on PTFT and G-S algorithm. Numerical simulations are carried out to validate the feasibility and effectiveness of our analysis and proposed iterative processes. Optical image encryption and authentication security analysis silhouette problem Applied optics. Photonics Optics. Light Ravi Kumar verfasserin aut Chenggen Quan verfasserin aut In IEEE Photonics Journal IEEE, 2015 11(2019), 5, Seite 14 (DE-627)600310272 (DE-600)2495610-7 19430655 nnns volume:11 year:2019 number:5 pages:14 https://doi.org/10.1109/JPHOT.2019.2936236 kostenfrei https://doaj.org/article/16a8a6dd809f4b4daa932a2ed4ac6644 kostenfrei https://ieeexplore.ieee.org/document/8807146/ kostenfrei https://doaj.org/toc/1943-0655 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2003 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 11 2019 5 14 |
spelling |
10.1109/JPHOT.2019.2936236 doi (DE-627)DOAJ056416202 (DE-599)DOAJ16a8a6dd809f4b4daa932a2ed4ac6644 DE-627 ger DE-627 rakwb eng TA1501-1820 QC350-467 Yi Xiong verfasserin aut Security Analysis on an Optical Encryption and Authentication Scheme Based on Phase-Truncation and Phase-Retrieval Algorithm 2019 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier In this paper, the security of the cryptosystem based on phase-truncation Fourier transform (PTFT) and Gerchberg-Saxton (G-S) algorithm is analyzed. In this cryptosystem, the phase key generated using phase-truncated (PT) operation is bonded with the phase key generated in G-S algorithm to form the first private key, which improves the complexity of the first private key. In addition, since the second private key is generated using the G-S algorithm, the number of known constraints decreases compared to the traditional PTFT-based cryptosystem, which will lead the non-convergence of special attacks. However, it has been found that two private keys generated in the cryptosystem based on PTFT and G-S algorithm are related to one phase key generated in the G-S algorithm, which provides an additional constraint to retrieve the other private key when one private key is disclosed. Based on this analysis, two iterative processes with different constraints are proposed to crack the cryptosystem based on PTFT and G-S algorithm. This is the first time to report the silhouette problem existing in the cryptosystem based on PTFT and G-S algorithm. Numerical simulations are carried out to validate the feasibility and effectiveness of our analysis and proposed iterative processes. Optical image encryption and authentication security analysis silhouette problem Applied optics. Photonics Optics. Light Ravi Kumar verfasserin aut Chenggen Quan verfasserin aut In IEEE Photonics Journal IEEE, 2015 11(2019), 5, Seite 14 (DE-627)600310272 (DE-600)2495610-7 19430655 nnns volume:11 year:2019 number:5 pages:14 https://doi.org/10.1109/JPHOT.2019.2936236 kostenfrei https://doaj.org/article/16a8a6dd809f4b4daa932a2ed4ac6644 kostenfrei https://ieeexplore.ieee.org/document/8807146/ kostenfrei https://doaj.org/toc/1943-0655 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2003 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 11 2019 5 14 |
allfields_unstemmed |
10.1109/JPHOT.2019.2936236 doi (DE-627)DOAJ056416202 (DE-599)DOAJ16a8a6dd809f4b4daa932a2ed4ac6644 DE-627 ger DE-627 rakwb eng TA1501-1820 QC350-467 Yi Xiong verfasserin aut Security Analysis on an Optical Encryption and Authentication Scheme Based on Phase-Truncation and Phase-Retrieval Algorithm 2019 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier In this paper, the security of the cryptosystem based on phase-truncation Fourier transform (PTFT) and Gerchberg-Saxton (G-S) algorithm is analyzed. In this cryptosystem, the phase key generated using phase-truncated (PT) operation is bonded with the phase key generated in G-S algorithm to form the first private key, which improves the complexity of the first private key. In addition, since the second private key is generated using the G-S algorithm, the number of known constraints decreases compared to the traditional PTFT-based cryptosystem, which will lead the non-convergence of special attacks. However, it has been found that two private keys generated in the cryptosystem based on PTFT and G-S algorithm are related to one phase key generated in the G-S algorithm, which provides an additional constraint to retrieve the other private key when one private key is disclosed. Based on this analysis, two iterative processes with different constraints are proposed to crack the cryptosystem based on PTFT and G-S algorithm. This is the first time to report the silhouette problem existing in the cryptosystem based on PTFT and G-S algorithm. Numerical simulations are carried out to validate the feasibility and effectiveness of our analysis and proposed iterative processes. Optical image encryption and authentication security analysis silhouette problem Applied optics. Photonics Optics. Light Ravi Kumar verfasserin aut Chenggen Quan verfasserin aut In IEEE Photonics Journal IEEE, 2015 11(2019), 5, Seite 14 (DE-627)600310272 (DE-600)2495610-7 19430655 nnns volume:11 year:2019 number:5 pages:14 https://doi.org/10.1109/JPHOT.2019.2936236 kostenfrei https://doaj.org/article/16a8a6dd809f4b4daa932a2ed4ac6644 kostenfrei https://ieeexplore.ieee.org/document/8807146/ kostenfrei https://doaj.org/toc/1943-0655 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2003 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 11 2019 5 14 |
allfieldsGer |
10.1109/JPHOT.2019.2936236 doi (DE-627)DOAJ056416202 (DE-599)DOAJ16a8a6dd809f4b4daa932a2ed4ac6644 DE-627 ger DE-627 rakwb eng TA1501-1820 QC350-467 Yi Xiong verfasserin aut Security Analysis on an Optical Encryption and Authentication Scheme Based on Phase-Truncation and Phase-Retrieval Algorithm 2019 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier In this paper, the security of the cryptosystem based on phase-truncation Fourier transform (PTFT) and Gerchberg-Saxton (G-S) algorithm is analyzed. In this cryptosystem, the phase key generated using phase-truncated (PT) operation is bonded with the phase key generated in G-S algorithm to form the first private key, which improves the complexity of the first private key. In addition, since the second private key is generated using the G-S algorithm, the number of known constraints decreases compared to the traditional PTFT-based cryptosystem, which will lead the non-convergence of special attacks. However, it has been found that two private keys generated in the cryptosystem based on PTFT and G-S algorithm are related to one phase key generated in the G-S algorithm, which provides an additional constraint to retrieve the other private key when one private key is disclosed. Based on this analysis, two iterative processes with different constraints are proposed to crack the cryptosystem based on PTFT and G-S algorithm. This is the first time to report the silhouette problem existing in the cryptosystem based on PTFT and G-S algorithm. Numerical simulations are carried out to validate the feasibility and effectiveness of our analysis and proposed iterative processes. Optical image encryption and authentication security analysis silhouette problem Applied optics. Photonics Optics. Light Ravi Kumar verfasserin aut Chenggen Quan verfasserin aut In IEEE Photonics Journal IEEE, 2015 11(2019), 5, Seite 14 (DE-627)600310272 (DE-600)2495610-7 19430655 nnns volume:11 year:2019 number:5 pages:14 https://doi.org/10.1109/JPHOT.2019.2936236 kostenfrei https://doaj.org/article/16a8a6dd809f4b4daa932a2ed4ac6644 kostenfrei https://ieeexplore.ieee.org/document/8807146/ kostenfrei https://doaj.org/toc/1943-0655 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2003 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 11 2019 5 14 |
allfieldsSound |
10.1109/JPHOT.2019.2936236 doi (DE-627)DOAJ056416202 (DE-599)DOAJ16a8a6dd809f4b4daa932a2ed4ac6644 DE-627 ger DE-627 rakwb eng TA1501-1820 QC350-467 Yi Xiong verfasserin aut Security Analysis on an Optical Encryption and Authentication Scheme Based on Phase-Truncation and Phase-Retrieval Algorithm 2019 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier In this paper, the security of the cryptosystem based on phase-truncation Fourier transform (PTFT) and Gerchberg-Saxton (G-S) algorithm is analyzed. In this cryptosystem, the phase key generated using phase-truncated (PT) operation is bonded with the phase key generated in G-S algorithm to form the first private key, which improves the complexity of the first private key. In addition, since the second private key is generated using the G-S algorithm, the number of known constraints decreases compared to the traditional PTFT-based cryptosystem, which will lead the non-convergence of special attacks. However, it has been found that two private keys generated in the cryptosystem based on PTFT and G-S algorithm are related to one phase key generated in the G-S algorithm, which provides an additional constraint to retrieve the other private key when one private key is disclosed. Based on this analysis, two iterative processes with different constraints are proposed to crack the cryptosystem based on PTFT and G-S algorithm. This is the first time to report the silhouette problem existing in the cryptosystem based on PTFT and G-S algorithm. Numerical simulations are carried out to validate the feasibility and effectiveness of our analysis and proposed iterative processes. Optical image encryption and authentication security analysis silhouette problem Applied optics. Photonics Optics. Light Ravi Kumar verfasserin aut Chenggen Quan verfasserin aut In IEEE Photonics Journal IEEE, 2015 11(2019), 5, Seite 14 (DE-627)600310272 (DE-600)2495610-7 19430655 nnns volume:11 year:2019 number:5 pages:14 https://doi.org/10.1109/JPHOT.2019.2936236 kostenfrei https://doaj.org/article/16a8a6dd809f4b4daa932a2ed4ac6644 kostenfrei https://ieeexplore.ieee.org/document/8807146/ kostenfrei https://doaj.org/toc/1943-0655 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2003 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 11 2019 5 14 |
language |
English |
source |
In IEEE Photonics Journal 11(2019), 5, Seite 14 volume:11 year:2019 number:5 pages:14 |
sourceStr |
In IEEE Photonics Journal 11(2019), 5, Seite 14 volume:11 year:2019 number:5 pages:14 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
Optical image encryption and authentication security analysis silhouette problem Applied optics. Photonics Optics. Light |
isfreeaccess_bool |
true |
container_title |
IEEE Photonics Journal |
authorswithroles_txt_mv |
Yi Xiong @@aut@@ Ravi Kumar @@aut@@ Chenggen Quan @@aut@@ |
publishDateDaySort_date |
2019-01-01T00:00:00Z |
hierarchy_top_id |
600310272 |
id |
DOAJ056416202 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">DOAJ056416202</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230308201356.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230227s2019 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1109/JPHOT.2019.2936236</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)DOAJ056416202</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DOAJ16a8a6dd809f4b4daa932a2ed4ac6644</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TA1501-1820</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QC350-467</subfield></datafield><datafield tag="100" ind1="0" ind2=" "><subfield code="a">Yi Xiong</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security Analysis on an Optical Encryption and Authentication Scheme Based on Phase-Truncation and Phase-Retrieval Algorithm</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2019</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">In this paper, the security of the cryptosystem based on phase-truncation Fourier transform (PTFT) and Gerchberg-Saxton (G-S) algorithm is analyzed. In this cryptosystem, the phase key generated using phase-truncated (PT) operation is bonded with the phase key generated in G-S algorithm to form the first private key, which improves the complexity of the first private key. In addition, since the second private key is generated using the G-S algorithm, the number of known constraints decreases compared to the traditional PTFT-based cryptosystem, which will lead the non-convergence of special attacks. However, it has been found that two private keys generated in the cryptosystem based on PTFT and G-S algorithm are related to one phase key generated in the G-S algorithm, which provides an additional constraint to retrieve the other private key when one private key is disclosed. Based on this analysis, two iterative processes with different constraints are proposed to crack the cryptosystem based on PTFT and G-S algorithm. This is the first time to report the silhouette problem existing in the cryptosystem based on PTFT and G-S algorithm. Numerical simulations are carried out to validate the feasibility and effectiveness of our analysis and proposed iterative processes.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Optical image encryption and authentication</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">security analysis</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">silhouette problem</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Applied optics. Photonics</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Optics. Light</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Ravi Kumar</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Chenggen Quan</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">In</subfield><subfield code="t">IEEE Photonics Journal</subfield><subfield code="d">IEEE, 2015</subfield><subfield code="g">11(2019), 5, Seite 14</subfield><subfield code="w">(DE-627)600310272</subfield><subfield code="w">(DE-600)2495610-7</subfield><subfield code="x">19430655</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:11</subfield><subfield code="g">year:2019</subfield><subfield code="g">number:5</subfield><subfield code="g">pages:14</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1109/JPHOT.2019.2936236</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doaj.org/article/16a8a6dd809f4b4daa932a2ed4ac6644</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ieeexplore.ieee.org/document/8807146/</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">https://doaj.org/toc/1943-0655</subfield><subfield code="y">Journal toc</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_DOAJ</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_39</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_105</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_161</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_170</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_213</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_230</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_285</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_293</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_602</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2003</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4012</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4126</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4249</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4306</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4323</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4325</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4335</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4338</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4367</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">11</subfield><subfield code="j">2019</subfield><subfield code="e">5</subfield><subfield code="h">14</subfield></datafield></record></collection>
|
callnumber-first |
T - Technology |
author |
Yi Xiong |
spellingShingle |
Yi Xiong misc TA1501-1820 misc QC350-467 misc Optical image encryption and authentication misc security analysis misc silhouette problem misc Applied optics. Photonics misc Optics. Light Security Analysis on an Optical Encryption and Authentication Scheme Based on Phase-Truncation and Phase-Retrieval Algorithm |
authorStr |
Yi Xiong |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)600310272 |
format |
electronic Article |
delete_txt_mv |
keep |
author_role |
aut aut aut |
collection |
DOAJ |
remote_str |
true |
callnumber-label |
TA1501-1820 |
illustrated |
Not Illustrated |
issn |
19430655 |
topic_title |
TA1501-1820 QC350-467 Security Analysis on an Optical Encryption and Authentication Scheme Based on Phase-Truncation and Phase-Retrieval Algorithm Optical image encryption and authentication security analysis silhouette problem |
topic |
misc TA1501-1820 misc QC350-467 misc Optical image encryption and authentication misc security analysis misc silhouette problem misc Applied optics. Photonics misc Optics. Light |
topic_unstemmed |
misc TA1501-1820 misc QC350-467 misc Optical image encryption and authentication misc security analysis misc silhouette problem misc Applied optics. Photonics misc Optics. Light |
topic_browse |
misc TA1501-1820 misc QC350-467 misc Optical image encryption and authentication misc security analysis misc silhouette problem misc Applied optics. Photonics misc Optics. Light |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
cr |
hierarchy_parent_title |
IEEE Photonics Journal |
hierarchy_parent_id |
600310272 |
hierarchy_top_title |
IEEE Photonics Journal |
isfreeaccess_txt |
true |
familylinks_str_mv |
(DE-627)600310272 (DE-600)2495610-7 |
title |
Security Analysis on an Optical Encryption and Authentication Scheme Based on Phase-Truncation and Phase-Retrieval Algorithm |
ctrlnum |
(DE-627)DOAJ056416202 (DE-599)DOAJ16a8a6dd809f4b4daa932a2ed4ac6644 |
title_full |
Security Analysis on an Optical Encryption and Authentication Scheme Based on Phase-Truncation and Phase-Retrieval Algorithm |
author_sort |
Yi Xiong |
journal |
IEEE Photonics Journal |
journalStr |
IEEE Photonics Journal |
callnumber-first-code |
T |
lang_code |
eng |
isOA_bool |
true |
recordtype |
marc |
publishDateSort |
2019 |
contenttype_str_mv |
txt |
container_start_page |
14 |
author_browse |
Yi Xiong Ravi Kumar Chenggen Quan |
container_volume |
11 |
class |
TA1501-1820 QC350-467 |
format_se |
Elektronische Aufsätze |
author-letter |
Yi Xiong |
doi_str_mv |
10.1109/JPHOT.2019.2936236 |
author2-role |
verfasserin |
title_sort |
security analysis on an optical encryption and authentication scheme based on phase-truncation and phase-retrieval algorithm |
callnumber |
TA1501-1820 |
title_auth |
Security Analysis on an Optical Encryption and Authentication Scheme Based on Phase-Truncation and Phase-Retrieval Algorithm |
abstract |
In this paper, the security of the cryptosystem based on phase-truncation Fourier transform (PTFT) and Gerchberg-Saxton (G-S) algorithm is analyzed. In this cryptosystem, the phase key generated using phase-truncated (PT) operation is bonded with the phase key generated in G-S algorithm to form the first private key, which improves the complexity of the first private key. In addition, since the second private key is generated using the G-S algorithm, the number of known constraints decreases compared to the traditional PTFT-based cryptosystem, which will lead the non-convergence of special attacks. However, it has been found that two private keys generated in the cryptosystem based on PTFT and G-S algorithm are related to one phase key generated in the G-S algorithm, which provides an additional constraint to retrieve the other private key when one private key is disclosed. Based on this analysis, two iterative processes with different constraints are proposed to crack the cryptosystem based on PTFT and G-S algorithm. This is the first time to report the silhouette problem existing in the cryptosystem based on PTFT and G-S algorithm. Numerical simulations are carried out to validate the feasibility and effectiveness of our analysis and proposed iterative processes. |
abstractGer |
In this paper, the security of the cryptosystem based on phase-truncation Fourier transform (PTFT) and Gerchberg-Saxton (G-S) algorithm is analyzed. In this cryptosystem, the phase key generated using phase-truncated (PT) operation is bonded with the phase key generated in G-S algorithm to form the first private key, which improves the complexity of the first private key. In addition, since the second private key is generated using the G-S algorithm, the number of known constraints decreases compared to the traditional PTFT-based cryptosystem, which will lead the non-convergence of special attacks. However, it has been found that two private keys generated in the cryptosystem based on PTFT and G-S algorithm are related to one phase key generated in the G-S algorithm, which provides an additional constraint to retrieve the other private key when one private key is disclosed. Based on this analysis, two iterative processes with different constraints are proposed to crack the cryptosystem based on PTFT and G-S algorithm. This is the first time to report the silhouette problem existing in the cryptosystem based on PTFT and G-S algorithm. Numerical simulations are carried out to validate the feasibility and effectiveness of our analysis and proposed iterative processes. |
abstract_unstemmed |
In this paper, the security of the cryptosystem based on phase-truncation Fourier transform (PTFT) and Gerchberg-Saxton (G-S) algorithm is analyzed. In this cryptosystem, the phase key generated using phase-truncated (PT) operation is bonded with the phase key generated in G-S algorithm to form the first private key, which improves the complexity of the first private key. In addition, since the second private key is generated using the G-S algorithm, the number of known constraints decreases compared to the traditional PTFT-based cryptosystem, which will lead the non-convergence of special attacks. However, it has been found that two private keys generated in the cryptosystem based on PTFT and G-S algorithm are related to one phase key generated in the G-S algorithm, which provides an additional constraint to retrieve the other private key when one private key is disclosed. Based on this analysis, two iterative processes with different constraints are proposed to crack the cryptosystem based on PTFT and G-S algorithm. This is the first time to report the silhouette problem existing in the cryptosystem based on PTFT and G-S algorithm. Numerical simulations are carried out to validate the feasibility and effectiveness of our analysis and proposed iterative processes. |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2003 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 |
container_issue |
5 |
title_short |
Security Analysis on an Optical Encryption and Authentication Scheme Based on Phase-Truncation and Phase-Retrieval Algorithm |
url |
https://doi.org/10.1109/JPHOT.2019.2936236 https://doaj.org/article/16a8a6dd809f4b4daa932a2ed4ac6644 https://ieeexplore.ieee.org/document/8807146/ https://doaj.org/toc/1943-0655 |
remote_bool |
true |
author2 |
Ravi Kumar Chenggen Quan |
author2Str |
Ravi Kumar Chenggen Quan |
ppnlink |
600310272 |
callnumber-subject |
TA - General and Civil Engineering |
mediatype_str_mv |
c |
isOA_txt |
true |
hochschulschrift_bool |
false |
doi_str |
10.1109/JPHOT.2019.2936236 |
callnumber-a |
TA1501-1820 |
up_date |
2024-07-03T20:43:04.660Z |
_version_ |
1803592017812389888 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">DOAJ056416202</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230308201356.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230227s2019 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1109/JPHOT.2019.2936236</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)DOAJ056416202</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DOAJ16a8a6dd809f4b4daa932a2ed4ac6644</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TA1501-1820</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QC350-467</subfield></datafield><datafield tag="100" ind1="0" ind2=" "><subfield code="a">Yi Xiong</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security Analysis on an Optical Encryption and Authentication Scheme Based on Phase-Truncation and Phase-Retrieval Algorithm</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2019</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">In this paper, the security of the cryptosystem based on phase-truncation Fourier transform (PTFT) and Gerchberg-Saxton (G-S) algorithm is analyzed. In this cryptosystem, the phase key generated using phase-truncated (PT) operation is bonded with the phase key generated in G-S algorithm to form the first private key, which improves the complexity of the first private key. In addition, since the second private key is generated using the G-S algorithm, the number of known constraints decreases compared to the traditional PTFT-based cryptosystem, which will lead the non-convergence of special attacks. However, it has been found that two private keys generated in the cryptosystem based on PTFT and G-S algorithm are related to one phase key generated in the G-S algorithm, which provides an additional constraint to retrieve the other private key when one private key is disclosed. Based on this analysis, two iterative processes with different constraints are proposed to crack the cryptosystem based on PTFT and G-S algorithm. This is the first time to report the silhouette problem existing in the cryptosystem based on PTFT and G-S algorithm. Numerical simulations are carried out to validate the feasibility and effectiveness of our analysis and proposed iterative processes.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Optical image encryption and authentication</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">security analysis</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">silhouette problem</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Applied optics. Photonics</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Optics. Light</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Ravi Kumar</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Chenggen Quan</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">In</subfield><subfield code="t">IEEE Photonics Journal</subfield><subfield code="d">IEEE, 2015</subfield><subfield code="g">11(2019), 5, Seite 14</subfield><subfield code="w">(DE-627)600310272</subfield><subfield code="w">(DE-600)2495610-7</subfield><subfield code="x">19430655</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:11</subfield><subfield code="g">year:2019</subfield><subfield code="g">number:5</subfield><subfield code="g">pages:14</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1109/JPHOT.2019.2936236</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doaj.org/article/16a8a6dd809f4b4daa932a2ed4ac6644</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ieeexplore.ieee.org/document/8807146/</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">https://doaj.org/toc/1943-0655</subfield><subfield code="y">Journal toc</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_DOAJ</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_39</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_105</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_161</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_170</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_213</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_230</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_285</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_293</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_602</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2003</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4012</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4126</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4249</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4306</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4323</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4325</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4335</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4338</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4367</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">11</subfield><subfield code="j">2019</subfield><subfield code="e">5</subfield><subfield code="h">14</subfield></datafield></record></collection>
|
score |
7.400154 |