메뉴 건너뛰기




Volumn 39, Issue 23, 2000, Pages 4117-4130

Error-reduction techniques and error analysis for fully phase- and amplitude-based encryption

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SIMULATION; DATA PROCESSING; ERROR ANALYSIS; PERTURBATION TECHNIQUES;

EID: 0001034520     PISSN: 1559128X     EISSN: 21553165     Source Type: Journal    
DOI: 10.1364/AO.39.004117     Document Type: Article
Times cited : (73)

References (23)
  • 1
    • 0037786776 scopus 로고    scopus 로고
    • Special Issue on Optical Security, Opt. Eng. 35, 2451-2541 (1996).
    • (1996) Opt. Eng , vol.35 , pp. 2451-2541
  • 2
    • 0038801470 scopus 로고    scopus 로고
    • Special Issue on Optical Security, Opt. Eng. 38, 1-119 (1999).
    • (1999) Opt. Eng , vol.38 , pp. 1-119
  • 3
    • 85010143094 scopus 로고
    • Optical pattern recognition for validation and security verification
    • B. Javidi and J. L. Horner, “Optical pattern recognition for validation and security verification,” Opt. Eng. 33, 1752-1756 (1994).
    • (1994) Opt. Eng. , vol.33 , pp. 1752-1756
    • Javidi, B.1    Horner, J.L.2
  • 4
    • 0029289969 scopus 로고
    • Optical image encryption using input and Fourier plane random phase encoding
    • P. Réfrégier and B. Javidi, “Optical image encryption using input and Fourier plane random phase encoding,” Opt. Lett. 20, 767-769 (1995).
    • (1995) Opt. Lett. , vol.20 , pp. 767-769
    • Réfrégier, P.1    Javidi, B.2
  • 6
    • 0001550816 scopus 로고    scopus 로고
    • Experimental demonstration of the random phase encoding technique for image encryption and security verification
    • B. Javidi, G. Zhang, and J. Li, “Experimental demonstration of the random phase encoding technique for image encryption and security verification,” Opt. Eng. 35, 2506-2512 (1996).
    • (1996) Opt. Eng. , vol.35 , pp. 2506-2512
    • Javidi, B.1    Zhang, G.2    Li, J.3
  • 7
    • 0000601634 scopus 로고
    • Optical fingerprint identification by binary joint transform correlation
    • K. H. Fielding, J. L. Horner, and C. K. Makekau, “Optical fingerprint identification by binary joint transform correlation,” Opt. Eng. 30, 1958-1961 (1991).
    • (1991) Opt. Eng. , vol.30 , pp. 1958-1961
    • Fielding, K.H.1    Horner, J.L.2    Makekau, C.K.3
  • 8
    • 0027652595 scopus 로고
    • Optical network for real-time face recognition
    • H.-Y. Li, Y. Qiao, and D. Psaltis, “Optical network for real-time face recognition,” Appl. Opt. 32, 5026-5035 (1993).
    • (1993) Appl. Opt. , vol.32 , pp. 5026-5035
    • Li, H.-Y.1    Qiao, Y.2    Psaltis, D.3
  • 9
    • 0029344472 scopus 로고
    • Optical implementation of neural networks for face recognition by the use of nonlinear joint transform correlators
    • B. Javidi, J. Li, and Q. Tang, “Optical implementation of neural networks for face recognition by the use of nonlinear joint transform correlators,” Appl. Opt. 34, 1752-1756 (1995).
    • (1995) Appl. Opt. , vol.34 , pp. 1752-1756
    • Javidi, B.1    Li, J.2    Tang, Q.3
  • 10
    • 0029282597 scopus 로고
    • Performance of a photorefractive joint transform correlator for fingerprint identification
    • J. Rodolfo, H. Rajbenbach, and J.-P. Huignard, “Performance of a photorefractive joint transform correlator for fingerprint identification,” Opt. Eng. 34, 1166-1171 (1995).
    • (1995) Opt. Eng. , vol.34 , pp. 1166-1171
    • Rodolfo, J.1    Rajbenbach, H.2    Huignard, J.-P.3
  • 11
    • 0031383984 scopus 로고    scopus 로고
    • Combined optical and neural network fingerprint matching
    • D. Casasent and T. H. Chao, eds., Proc. SPIE 3073
    • C. L. Wilson, C. I. Watson, and E. G. Paek, “Combined optical and neural network fingerprint matching,” in Optical Pattern Recognition VIII, D. Casasent and T. H. Chao, eds., Proc. SPIE 3073, 373-382 (1997).
    • (1997) Optical Pattern Recognition VIII , pp. 373-382
    • Wilson, C.L.1    Watson, C.I.2    Paek, E.G.3
  • 12
    • 0038124513 scopus 로고    scopus 로고
    • Photonics security system using spatial codes and remote coded coherent optical communications
    • N. Riza and M. Howlader, “Photonics security system using spatial codes and remote coded coherent optical communications,” Opt. Eng. 35, 2487-2498 (1996).
    • (1996) Opt. Eng. , vol.35 , pp. 2487-2498
    • Riza, N.1    Howlader, M.2
  • 13
    • 0000811448 scopus 로고    scopus 로고
    • Wave guide hologram fingerprint entry device
    • M. Drake, M. Lid, and M. A. Fiddy, “Wave guide hologram fingerprint entry device,” Opt. Eng. 35, 2499-2505 (1996).
    • (1996) Opt. Eng. , vol.35 , pp. 2499-2505
    • Drake, M.1    Lid, M.2    Fiddy, M.A.3
  • 14
    • 0001228166 scopus 로고    scopus 로고
    • Influence of a perturbation in a double phase-encoding system
    • F. Goudail, F. Bollaro, B. Javidi, and P. Refregier, “Influence of a perturbation in a double phase-encoding system,” J. Opt. Soc. Am. A 15, 2629-2638 (1998).
    • (1998) J. Opt. Soc. Am. A , vol.15 , pp. 2629-2638
    • Goudail, F.1    Bollaro, F.2    Javidi, B.3    Refregier, P.4
  • 15
    • 0037786812 scopus 로고    scopus 로고
    • Smart photonic networks and computer security for image data
    • B. Derryberry, C. R. Holliday, L. S. Lome, V. Mar-kandey, B. Vasudev, M. V. Bove, and A. G. Tescher, eds., Proc. SPIE 3228
    • J. Campello, J. T. Gill III, M. Morf, and M. J. Flynn, “Smart photonic networks and computer security for image data,” in Multimedia Networks: Security, Displays, Terminals, and Gateways, B. Derryberry, C. R. Holliday, L. S. Lome, V. Mar-kandey, B. Vasudev, M. V. Bove, and A. G. Tescher, eds., Proc. SPIE 3228, 272-279 (1998).
    • (1998) Multimedia Networks: Security, Displays, Terminals, and Gateways , pp. 272-279
    • Campello, J.1    Gill, J.T.2    Morf, M.3    Flynn, M.J.4
  • 16
    • 0029376205 scopus 로고
    • Encrypted holographic data storage based on orthogonal-phase-code multiplexing
    • H. F. Heanue, M. C. Bashaw, and L. Hesselink, “Encrypted holographic data storage based on orthogonal-phase-code multiplexing,” Appl. Opt. 34, 6012-6015 (1995).
    • (1995) Appl. Opt. , vol.34 , pp. 6012-6015
    • Heanue, H.F.1    Bashaw, M.C.2    Hesselink, L.3
  • 17
    • 0032607911 scopus 로고    scopus 로고
    • Encrypted optical memory system using three-dimensional keys in the Fresnel domain
    • O. Matoba and B. Javidi, “Encrypted optical memory system using three-dimensional keys in the Fresnel domain,” Opt. Lett. 24, 762-764 (1999).
    • (1999) Opt. Lett. , vol.24 , pp. 762-764
    • Matoba, O.1    Javidi, B.2
  • 18
    • 0002628261 scopus 로고    scopus 로고
    • Noise performance of double-phase encryption compared to xor encryption
    • B. Javidi, L. Bernard, and N. Towghi, “Noise performance of double-phase encryption compared to xor encryption,” Opt. Eng. 38, 9-19 (1999).
    • (1999) Opt. Eng. , vol.38 , pp. 9-19
    • Javidi, B.1    Bernard, L.2    Towghi, N.3
  • 19
    • 0032180265 scopus 로고    scopus 로고
    • Secure identification documents via pattern recognition and public-key cryptography
    • L. O’Gorman and I. Rabinovich, “Secure identification documents via pattern recognition and public-key cryptography,” IEEE Trans. Pattern Anal. Mach. Intell. 20,1097-1102 (1998).
    • (1998) IEEE Trans. Pattern Anal. Mach. Intell. , vol.20 , pp. 1097-1102
    • O’Gorman, L.1    Rabinovich, I.2
  • 20
    • 0032607907 scopus 로고    scopus 로고
    • Fully phase encrypted optical processor
    • N. Towghi, B. Javidi, and Z. Luo, “Fully phase encrypted optical processor,” J. Opt. Soc. Am. A 16, 1915-1927 (1999).
    • (1999) J. Opt. Soc. Am. A , vol.16 , pp. 1915-1927
    • Towghi, N.1    Javidi, B.2    Luo, Z.3
  • 22
    • 0001756356 scopus 로고    scopus 로고
    • Fault tolerance properties of a double phase encoding technique
    • B. Javidi, A. Sergent, G. Zhang, and L. Guibert, “Fault tolerance properties of a double phase encoding technique,” Opt. Eng. 36, 992-998 (1997).
    • (1997) Opt. Eng. , vol.36 , pp. 992-998
    • Javidi, B.1    Sergent, A.2    Zhang, G.3    Guibert, L.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.