Research Article
A Secure Asymmetric Optical Image Encryption Based on Phase Truncation and Singular Value Decomposition in Linear Canonical Transform Domain
Figure 7
(a, b) Retrieved images of tree, baboon for wrong two LCT orders; (c, d) decrypted images using another two-wrong parameter; (e, f) wrong values of DPM and RPM.
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |