Figure 6 | Scientific Reports

Figure 6

From: Asymmetric cryptosystem based on optical scanning cryptography and elliptic curve algorithm

Figure 6

(a) Wrong private key \({{\varvec{w}}\_{\varvec{k}}}_{{\varvec{b}}}\); (b,c) are \(({{\varvec{p}}}_{1},{{\varvec{p}}}_{2})\), generated by \({{\varvec{w}}\_{\varvec{k}}}_{{\varvec{b}}}\otimes {{\varvec{K}}}_{{\varvec{A}}}\) in decryption; (d,e) are the corresponding cosine hologram \({{\varvec{w}}\_{\varvec{H}}}_{{\varvec{B}}{\varvec{c}}}\) and sine hologram \({{\varvec{w}}\_{\varvec{H}}}_{{\varvec{B}}{\varvec{s}}}\), respectively; (f) decrypted image with wrong key.

Back to article page