-
1
-
-
0037786776
-
-
Special Issue on Optical Security, Opt. Eng. 35, 2451-2541 (1996).
-
(1996)
Opt. Eng
, vol.35
, pp. 2451-2541
-
-
-
2
-
-
0038801470
-
-
Special Issue on Optical Security, Opt. Eng. 38, 1-119 (1999).
-
(1999)
Opt. Eng
, vol.38
, pp. 1-119
-
-
-
3
-
-
85010143094
-
Optical pattern recognition for validation and security verification
-
B. Javidi and J. L. Horner, “Optical pattern recognition for validation and security verification,” Opt. Eng. 33, 1752-1756 (1994).
-
(1994)
Opt. Eng.
, vol.33
, pp. 1752-1756
-
-
Javidi, B.1
Horner, J.L.2
-
4
-
-
0029289969
-
Optical image encryption using input and Fourier plane random phase encoding
-
P. Réfrégier and B. Javidi, “Optical image encryption using input and Fourier plane random phase encoding,” Opt. Lett. 20, 767-769 (1995).
-
(1995)
Opt. Lett.
, vol.20
, pp. 767-769
-
-
Réfrégier, P.1
Javidi, B.2
-
5
-
-
0025789456
-
Wave guide holography and its applications
-
Q. Huang and J. Caulfield, “Wave guide holography and its applications,” in Practical Holography V, S. A. Benton, ed., Proc. SPIE 1461, 303-312 (1991).
-
(1991)
Practical Holography V, S. A. Benton, Ed., Proc. SPIE 1461, 303-312
-
-
Huang, Q.1
Caulfield, J.2
-
6
-
-
0001550816
-
Experimental demonstration of the random phase encoding technique for image encryption and security verification
-
B. Javidi, G. Zhang, and J. Li, “Experimental demonstration of the random phase encoding technique for image encryption and security verification,” Opt. Eng. 35, 2506-2512 (1996).
-
(1996)
Opt. Eng.
, vol.35
, pp. 2506-2512
-
-
Javidi, B.1
Zhang, G.2
Li, J.3
-
7
-
-
0000601634
-
Optical fingerprint identification by binary joint transform correlation
-
K. H. Fielding, J. L. Horner, and C. K. Makekau, “Optical fingerprint identification by binary joint transform correlation,” Opt. Eng. 30, 1958-1961 (1991).
-
(1991)
Opt. Eng.
, vol.30
, pp. 1958-1961
-
-
Fielding, K.H.1
Horner, J.L.2
Makekau, C.K.3
-
8
-
-
0027652595
-
Optical network for real-time face recognition
-
H.-Y. Li, Y. Qiao, and D. Psaltis, “Optical network for real-time face recognition,” Appl. Opt. 32, 5026-5035 (1993).
-
(1993)
Appl. Opt.
, vol.32
, pp. 5026-5035
-
-
Li, H.-Y.1
Qiao, Y.2
Psaltis, D.3
-
9
-
-
0029344472
-
Optical implementation of neural networks for face recognition by the use of nonlinear joint transform correlators
-
B. Javidi, J. Li, and Q. Tang, “Optical implementation of neural networks for face recognition by the use of nonlinear joint transform correlators,” Appl. Opt. 34, 1752-1756 (1995).
-
(1995)
Appl. Opt.
, vol.34
, pp. 1752-1756
-
-
Javidi, B.1
Li, J.2
Tang, Q.3
-
10
-
-
0029282597
-
Performance of a photorefractive joint transform correlator for fingerprint identification
-
J. Rodolfo, H. Rajbenbach, and J.-P. Huignard, “Performance of a photorefractive joint transform correlator for fingerprint identification,” Opt. Eng. 34, 1166-1171 (1995).
-
(1995)
Opt. Eng.
, vol.34
, pp. 1166-1171
-
-
Rodolfo, J.1
Rajbenbach, H.2
Huignard, J.-P.3
-
11
-
-
0031383984
-
Combined optical and neural network fingerprint matching
-
D. Casasent and T. H. Chao, eds., Proc. SPIE 3073
-
C. L. Wilson, C. I. Watson, and E. G. Paek, “Combined optical and neural network fingerprint matching,” in Optical Pattern Recognition VIII, D. Casasent and T. H. Chao, eds., Proc. SPIE 3073, 373-382 (1997).
-
(1997)
Optical Pattern Recognition VIII
, pp. 373-382
-
-
Wilson, C.L.1
Watson, C.I.2
Paek, E.G.3
-
12
-
-
0038124513
-
Photonics security system using spatial codes and remote coded coherent optical communications
-
N. Riza and M. Howlader, “Photonics security system using spatial codes and remote coded coherent optical communications,” Opt. Eng. 35, 2487-2498 (1996).
-
(1996)
Opt. Eng.
, vol.35
, pp. 2487-2498
-
-
Riza, N.1
Howlader, M.2
-
13
-
-
0000811448
-
Wave guide hologram fingerprint entry device
-
M. Drake, M. Lid, and M. A. Fiddy, “Wave guide hologram fingerprint entry device,” Opt. Eng. 35, 2499-2505 (1996).
-
(1996)
Opt. Eng.
, vol.35
, pp. 2499-2505
-
-
Drake, M.1
Lid, M.2
Fiddy, M.A.3
-
14
-
-
0001228166
-
Influence of a perturbation in a double phase-encoding system
-
F. Goudail, F. Bollaro, B. Javidi, and P. Refregier, “Influence of a perturbation in a double phase-encoding system,” J. Opt. Soc. Am. A 15, 2629-2638 (1998).
-
(1998)
J. Opt. Soc. Am. A
, vol.15
, pp. 2629-2638
-
-
Goudail, F.1
Bollaro, F.2
Javidi, B.3
Refregier, P.4
-
15
-
-
0037786812
-
Smart photonic networks and computer security for image data
-
B. Derryberry, C. R. Holliday, L. S. Lome, V. Mar-kandey, B. Vasudev, M. V. Bove, and A. G. Tescher, eds., Proc. SPIE 3228
-
J. Campello, J. T. Gill III, M. Morf, and M. J. Flynn, “Smart photonic networks and computer security for image data,” in Multimedia Networks: Security, Displays, Terminals, and Gateways, B. Derryberry, C. R. Holliday, L. S. Lome, V. Mar-kandey, B. Vasudev, M. V. Bove, and A. G. Tescher, eds., Proc. SPIE 3228, 272-279 (1998).
-
(1998)
Multimedia Networks: Security, Displays, Terminals, and Gateways
, pp. 272-279
-
-
Campello, J.1
Gill, J.T.2
Morf, M.3
Flynn, M.J.4
-
16
-
-
0029376205
-
Encrypted holographic data storage based on orthogonal-phase-code multiplexing
-
H. F. Heanue, M. C. Bashaw, and L. Hesselink, “Encrypted holographic data storage based on orthogonal-phase-code multiplexing,” Appl. Opt. 34, 6012-6015 (1995).
-
(1995)
Appl. Opt.
, vol.34
, pp. 6012-6015
-
-
Heanue, H.F.1
Bashaw, M.C.2
Hesselink, L.3
-
17
-
-
0032607911
-
Encrypted optical memory system using three-dimensional keys in the Fresnel domain
-
O. Matoba and B. Javidi, “Encrypted optical memory system using three-dimensional keys in the Fresnel domain,” Opt. Lett. 24, 762-764 (1999).
-
(1999)
Opt. Lett.
, vol.24
, pp. 762-764
-
-
Matoba, O.1
Javidi, B.2
-
18
-
-
0002628261
-
Noise performance of double-phase encryption compared to xor encryption
-
B. Javidi, L. Bernard, and N. Towghi, “Noise performance of double-phase encryption compared to xor encryption,” Opt. Eng. 38, 9-19 (1999).
-
(1999)
Opt. Eng.
, vol.38
, pp. 9-19
-
-
Javidi, B.1
Bernard, L.2
Towghi, N.3
-
19
-
-
0032180265
-
Secure identification documents via pattern recognition and public-key cryptography
-
L. O’Gorman and I. Rabinovich, “Secure identification documents via pattern recognition and public-key cryptography,” IEEE Trans. Pattern Anal. Mach. Intell. 20,1097-1102 (1998).
-
(1998)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.20
, pp. 1097-1102
-
-
O’Gorman, L.1
Rabinovich, I.2
-
20
-
-
0032607907
-
Fully phase encrypted optical processor
-
N. Towghi, B. Javidi, and Z. Luo, “Fully phase encrypted optical processor,” J. Opt. Soc. Am. A 16, 1915-1927 (1999).
-
(1999)
J. Opt. Soc. Am. A
, vol.16
, pp. 1915-1927
-
-
Towghi, N.1
Javidi, B.2
Luo, Z.3
-
22
-
-
0001756356
-
Fault tolerance properties of a double phase encoding technique
-
B. Javidi, A. Sergent, G. Zhang, and L. Guibert, “Fault tolerance properties of a double phase encoding technique,” Opt. Eng. 36, 992-998 (1997).
-
(1997)
Opt. Eng.
, vol.36
, pp. 992-998
-
-
Javidi, B.1
Sergent, A.2
Zhang, G.3
Guibert, L.4
|