W
Wenqi He
Researcher at Shenzhen University
Publications - 108
Citations - 1759
Wenqi He is an academic researcher from Shenzhen University. The author has contributed to research in topics: Encryption & Authentication. The author has an hindex of 20, co-authored 100 publications receiving 1280 citations. Previous affiliations of Wenqi He include Shandong University.
Papers
More filters
Journal ArticleDOI
Roadmap on optical security
Bahram Javidi,Artur Carnicer,Masahiro Yamaguchi,Takanori Nomura,Elisabet Pérez-Cabré,María S. Millán,Naveen K. Nishchal,Roberto Torroba,John Fredy Barrera,Wenqi He,Xiang Peng,Adrian Stern,Yair Rivenson,Ayman Alfalou,Christian Brosseau,Changliang Guo,John T. Sheridan,Guohai Situ,Makoto Naruse,Tsutomu Matsumoto,Ignasi Juvells,Enrique Tajahuerce,Jesús Lancis,Wen Chen,Xudong Chen,Pepijn W. H. Pinkse,Allard Mosk,Adam Markman +27 more
TL;DR: An overview of the potential, recent advances, and challenges of optical security and encryption using free space optics is presented, highlighting the need for more specialized hardware and image processing algorithms.
Journal ArticleDOI
Vulnerability to ciphertext-only attack of optical encryption scheme based on double random phase encoding.
TL;DR: It is demonstrated in this paper that the traditional double random phase encoding (DRPE) technique is vulnerable to ciphertext-only attack (COA), and the proposed scheme mainly relies on a hybrid iterative phase retrieval (HIPR) algorithm, which combines various phase retrieval algorithms.
Journal ArticleDOI
Multiple-image encryption via lifting wavelet transform and XOR operation based on compressive ghost imaging scheme
Xianye Li,Xiangfeng Meng,Xiulun Yang,Yurong Wang,Yongkai Yin,Xiang Peng,Wenqi He,Guoyan Dong,Hongyi Chen +8 more
TL;DR: Theoretical analysis and numerical simulations validate the feasibility of the proposed multiple-image encryption method via lifting wavelet transform (LWT) and XOR operation, based on a row scanning compressive ghost imaging scheme.
Journal ArticleDOI
Cryptanalysis of random-phase-encoding-based optical cryptosystem via deep learning
TL;DR: It is demonstrated that the RPE-based optical cryptosystems are vulnerable to the chosen-plaintext attack (CPA) with deep learning strategy, and the results indicate the possibility of reconstructing images (plaintexts) outside the original data set.
Journal ArticleDOI
Ciphertext-only attack on a joint transform correlator encryption system
TL;DR: The hybrid input-output (HIO) algorithm is employed to handle the issue to be solved in the COA scheme of a ciphertext-only attack on a joint transform correlator (JTC) encryption system with an inartificial signal domain support and a given frequency domain constraint.