-
2
-
-
0000319188
-
Optical encryption of digital data
-
L. E. M. Brackenbury and K. M. Bell, "Optical encryption of digital data," Appl. Opt. 39(29), 5374-5379 (2000).
-
(2000)
Appl. Opt.
, vol.39
, Issue.29
, pp. 5374-5379
-
-
Brackenbury, L.E.M.1
Bell, K.M.2
-
3
-
-
0029289969
-
Optical image encryption using input plane and Fourier plane random encoding
-
P. Refregier and B. Javidi, "Optical image encryption using input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995).
-
(1995)
Opt. Lett.
, vol.20
, pp. 767-769
-
-
Refregier, P.1
Javidi, B.2
-
4
-
-
0041632282
-
Optical image encryption based on XOR operations
-
J.-W. Han, C.-S. Park, D.-H. Rye, and E.-S. Kim, "Optical image encryption based on XOR operations," Opt. Eng. 38(1), 47-54 (1999).
-
(1999)
Opt. Eng.
, vol.38
, Issue.1
, pp. 47-54
-
-
Han, J.-W.1
Park, C.-S.2
Rye, D.-H.3
Kim, E.-S.4
-
5
-
-
0001756356
-
Fault tolerance properties of a double-phase encoding encryption technique
-
B. Jadivi, A. Sergent, G. Zhang, and L. Guilbert, "Fault tolerance properties of a double-phase encoding encryption technique," Opt. Eng. 36(4), 992-998 (1997).
-
(1997)
Opt. Eng.
, vol.36
, Issue.4
, pp. 992-998
-
-
Jadivi, B.1
Sergent, A.2
Zhang, G.3
Guilbert, L.4
-
7
-
-
0030384775
-
Techniques for data hiding
-
W. Bender, D. Gruhl, N. Morimot, and A. Lu, "Techniques for data hiding," IBM Syst. J. 35(3-4), 313-336 (1996).
-
(1996)
IBM Syst. J.
, vol.35
, Issue.3-4
, pp. 313-336
-
-
Bender, W.1
Gruhl, D.2
Morimot, N.3
Lu, A.4
-
8
-
-
0032785523
-
Hidden digital watermarks in images
-
C. T. Hsu and J. L. Wu, "Hidden digital watermarks in images," IEEE Trans. Image Process. 8(1), 58-68 (1999).
-
(1999)
IEEE Trans. Image Process.
, vol.8
, Issue.1
, pp. 58-68
-
-
Hsu, C.T.1
Wu, J.L.2
-
9
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Process. 6(12), 1673-1687 (1997).
-
(1997)
IEEE Trans. Image Process.
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, F.T.3
Shamoon, T.4
-
10
-
-
0033698176
-
Robust image watermarking on the DCT domain
-
(May)
-
W.-N. Lie, G.-S. Lin, and C.-L. Wu, "Robust image watermarking on the DCT domain," in Proc. ISCAS, pp. 1228-1231 (May 2000).
-
(2000)
Proc. ISCAS
, pp. 1228-1231
-
-
Lie, W.-N.1
Lin, G.-S.2
Wu, C.-L.3
-
11
-
-
0141489940
-
Data embedding into pictorial with less distortion using discrete cosine transform
-
T. Ogihara, D. Nakamura, and N. Yokoya, "Data embedding into pictorial with less distortion using discrete cosine transform," Proc. ICPR '96, pp. 675-679 (1996).
-
(1996)
Proc. ICPR '96
, pp. 675-679
-
-
Ogihara, T.1
Nakamura, D.2
Yokoya, N.3
-
13
-
-
0001228166
-
Influence of a perturbation in a double phase-encoding system
-
F. Goudail, F. Bollaro, B. Javidi, and P. Refregier, "Influence of a perturbation in a double phase-encoding system," J. Opt. Soc. Am. A 15(10), 2629-2638 (1998).
-
(1998)
J. Opt. Soc. Am. A
, vol.15
, Issue.10
, pp. 2629-2638
-
-
Goudail, F.1
Bollaro, F.2
Javidi, B.3
Refregier, P.4
-
14
-
-
0002004846
-
Optical key bit stream generator
-
J.-W. Han, S.-H. Lee, and E.-S. Kim, "Optical key bit stream generator," Opt. Eng. 38(1), 33-38 (1999).
-
(1999)
Opt. Eng.
, vol.38
, Issue.1
, pp. 33-38
-
-
Han, J.-W.1
Lee, S.-H.2
Kim, E.-S.3
-
15
-
-
0000342510
-
Performance of double phase encoding encryption technique using binarized encrypted images
-
B. Javidi, A. Sergent, and E. Abouzi, "Performance of double phase encoding encryption technique using binarized encrypted images," Opt. Eng. 37(2), 565-569 (1998).
-
(1998)
Opt. Eng.
, vol.37
, Issue.2
, pp. 565-569
-
-
Javidi, B.1
Sergent, A.2
Abouzi, E.3
|