-
1
-
-
0001158974
-
Optical pattern recognition for validation and security verification
-
B. Javidi and J. L. Horner, "Optical pattern recognition for validation and security verification," Opt. Eng. 33, 1752-1756 (1994).
-
(1994)
Opt. Eng.
, vol.33
, pp. 1752-1756
-
-
Javidi, B.1
Horner, J.L.2
-
2
-
-
0029289969
-
Optical image encryption based on input plane and Fourier plane random encoding
-
P. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995).
-
(1995)
Opt. Lett.
, vol.20
, pp. 767-769
-
-
Refregier, P.1
Javidi, B.2
-
3
-
-
0026368380
-
Image encipherment based on optical parallel processing using spatial light modulators
-
S. Fukushima, T. Kurokawa, and Y. Sakai, "Image Encipherment Based on Optical Parallel Processing Using Spatial Light Modulators," IEEE Trans. Photonics Tech. Lett. 3, 1133-1135 (1991).
-
(1991)
IEEE Trans. Photonics Tech. Lett.
, vol.3
, pp. 1133-1135
-
-
Fukushima, S.1
Kurokawa, T.2
Sakai, Y.3
-
4
-
-
0029376205
-
Encrypted holographic data storage based on orthogonal-phase-code multiplexing
-
J. F. Heanue, M. C. Bashaw, and L. Hesselink, "Encrypted holographic data storage based on orthogonal-phase-code multiplexing," Appl. Opt. 34, 6012-6015 (1995).
-
(1995)
Appl. Opt.
, vol.34
, pp. 6012-6015
-
-
Heanue, J.F.1
Bashaw, M.C.2
Hesselink, L.3
-
5
-
-
0001691995
-
Random phase encoding for optical security
-
R. K. Wang, I. A. Watson, and C. Chatwin, "Random phase encoding for optical security," Opt. Eng. 35, 2464-2469 (1996).
-
(1996)
Opt. Eng.
, vol.35
, pp. 2464-2469
-
-
Wang, R.K.1
Watson, I.A.2
Chatwin, C.3
-
6
-
-
0001295834
-
Binary computer-generated holograms for security applications from a synthetic double-exposure method by electron-beam lithography
-
N. Yoshikawa, M. Itoh, and T. Yatagai, "Binary computer-generated holograms for security applications from a synthetic double-exposure method by electron-beam lithography," Opt. Lett. 23, 1483-1485 (1998).
-
(1998)
Opt. Lett.
, vol.23
, pp. 1483-1485
-
-
Yoshikawa, N.1
Itoh, M.2
Yatagai, T.3
-
7
-
-
0000497915
-
Phase-only optical encryption
-
P. C. Mogensen and J. Glückstad, "Phase-only optical encryption," Opt Lett. 25, 566-568 (2000).
-
(2000)
Opt Lett.
, vol.25
, pp. 566-568
-
-
Mogensen, P.C.1
Glückstad, J.2
-
8
-
-
0000053322
-
Stream cipher based on pseudorandom number generation with optical affine transformation
-
T. Sasaki, H. Togo, J. Tanida, and Y. Ichioka, "Stream cipher based on pseudorandom number generation with optical affine transformation," Appl. Opt. 39, 2340-2346 (2000).
-
(2000)
Appl. Opt.
, vol.39
, pp. 2340-2346
-
-
Sasaki, T.1
Togo, H.2
Tanida, J.3
Ichioka, Y.4
-
9
-
-
0033729524
-
A new optical random coding technique for security systems
-
Z. Zalevsky, D. Mendlovic, U. Levy, and G. Shabtay, "A new optical random coding technique for security systems," Opt. Commun. 180, 15-20 (2000).
-
(2000)
Opt. Commun.
, vol.180
, pp. 15-20
-
-
Zalevsky, Z.1
Mendlovic, D.2
Levy, U.3
Shabtay, G.4
-
10
-
-
0034324230
-
A polarization encoded optical encryption system using ferroelectric spatial light modulator
-
G. Unnikrishnan, M. Pohit, and K. Singh, "A polarization encoded optical encryption system using ferroelectric spatial light modulator," Opt. Commun. 185, 25-31 (2000).
-
(2000)
Opt. Commun.
, vol.185
, pp. 25-31
-
-
Unnikrishnan, G.1
Pohit, M.2
Singh, K.3
-
11
-
-
0000931074
-
Phase-only optical decryption of a fixed mask
-
P. C. Mogensen and J. Glückstad, "Phase-only optical decryption of a fixed mask," Appl. Opt. 40, 1226-1235 (2001).
-
(2001)
Appl. Opt.
, vol.40
, pp. 1226-1235
-
-
Mogensen, P.C.1
Glückstad, J.2
-
12
-
-
0001405296
-
Hidden images in halftone pictures
-
J. Rosen and B. Javidi, "Hidden images in halftone pictures," Appl. Opt. 40, 3346-3353 (2001).
-
(2001)
Appl. Opt.
, vol.40
, pp. 3346-3353
-
-
Rosen, J.1
Javidi, B.2
-
13
-
-
0037055652
-
Practical image encryption and decryption by phase-coding technique for optical security systems
-
J. Ohtsubo and A. Fujimoto, "Practical image encryption and decryption by phase-coding technique for optical security systems," Appl. Opt. 41, 4848-4855 (2002).
-
(2002)
Appl. Opt.
, vol.41
, pp. 4848-4855
-
-
Ohtsubo, J.1
Fujimoto, A.2
-
14
-
-
0042922555
-
Securing information by use of digital holography
-
B. Javidi and T. Nomura, "Securing information by use of digital holography," Opt. Lett. 25, 28-30 (2000).
-
(2000)
Opt. Lett.
, vol.25
, pp. 28-30
-
-
Javidi, B.1
Nomura, T.2
-
15
-
-
0033753035
-
Digital wavefront reconstruction and its application to image encryption
-
S. Lai and M. A. Neifeld, "Digital wavefront reconstruction and its application to image encryption," Opt. Commun. 178, 283-289 (2000).
-
(2000)
Opt. Commun.
, vol.178
, pp. 283-289
-
-
Lai, S.1
Neifeld, M.A.2
-
16
-
-
0001417482
-
Encrypting three-dimensional information with digital holography
-
E. Tajahuerce and B. Javidi, "Encrypting three-dimensional information with digital holography," Appl. Opt. 39, 6595-6601 (2000).
-
(2000)
Appl. Opt.
, vol.39
, pp. 6595-6601
-
-
Tajahuerce, E.1
Javidi, B.2
-
17
-
-
3042637922
-
Double-lock for image encryption with virtual optical wavelength
-
X. Peng, L. Yu, and L. Cai, "Double-lock for image encryption with virtual optical wavelength," Opt. Express 10, 41-45 (2002), http://www.opticsexpress.org/abstract.cfm?URI=OPEX-10-1-41.
-
(2002)
Opt. Express
, vol.10
, pp. 41-45
-
-
Peng, X.1
Yu, L.2
Cai, L.3
-
18
-
-
0036507518
-
Optical retrieval of encrypted digital holograms for secure real-time display
-
O. Matoba and B. Javidi, "Optical retrieval of encrypted digital holograms for secure real-time display," Opt Lett. 27, 321-323 (2002).
-
(2002)
Opt Lett.
, vol.27
, pp. 321-323
-
-
Matoba, O.1
Javidi, B.2
-
19
-
-
0036500276
-
Parameterized multi-dimensional data encryption by digital optics
-
L. Yu, X. Peng, and L. Cai, "Parameterized multi-dimensional data encryption by digital optics," Opt. Commun. 203, 67-77 (2002).
-
(2002)
Opt. Commun.
, vol.203
, pp. 67-77
-
-
Yu, L.1
Peng, X.2
Cai, L.3
-
20
-
-
0037057779
-
Real-time three-dimensional object reconstruction by use of a phase-encoded digital hologram
-
O. Matoba, T. J. Naughton, Y. Frauel, N. Bertaux, and B. Javidi, "Real-time three-dimensional object reconstruction by use of a phase-encoded digital hologram," Appl. Opt. 41, 6187-6192 (2002).
-
(2002)
Appl. Opt.
, vol.41
, pp. 6187-6192
-
-
Matoba, O.1
Naughton, T.J.2
Frauel, Y.3
Bertaux, N.4
Javidi, B.5
-
21
-
-
0036823599
-
Ubiquitous display controlled by mobile terminals
-
K. Aizawa and K. Kakami, "Ubiquitous display controlled by mobile terminals," IEICE Trans. Commun. E85-B, 2214-2217 (2002), http://search.ieice.org/2002/files/e000b10.htm#e85-b.10.214.
-
(2002)
IEICE Trans. Commun.
, vol.E85-B
, pp. 2214-2217
-
-
Aizawa, K.1
Kakami, K.2
-
22
-
-
0036082995
-
Optical time-domain eavesdropping risks of CRT displays
-
IEEE Computer Society, Los Alamitos, California
-
M. G. Kuhn, "Optical Time-Domain Eavesdropping Risks of CRT Displays," in 2002 IEEE Symposium on Security and Privacy (IEEE Computer Society, Los Alamitos, California, 2002), pp. 3-18, http://computer.org/ proceedings/sp/1543/1543toc.htm.
-
(2002)
2002 IEEE Symposium on Security and Privacy
, pp. 3-18
-
-
Kuhn, M.G.1
-
23
-
-
0042286862
-
Securing information display by use of visual cryptography
-
H. Yamamoto, Y. Hayasaki, and N. Nishida, "Securing information display by use of visual cryptography," Opt Lett. 28, 1564-1566 (2003).
-
(2003)
Opt Lett.
, vol.28
, pp. 1564-1566
-
-
Yamamoto, H.1
Hayasaki, Y.2
Nishida, N.3
-
24
-
-
84926193517
-
Visual cryptography
-
Advances in Cryptography - EUROCRYPT'94, Springer-Verlag, Berlin
-
M. Naor and A. Shamir, "Visual Cryptography," in Advances in Cryptography - EUROCRYPT'94, Vol. 950 of Lecture Notes in Computer Science (Springer-Verlag, Berlin, 1994), pp. 1-12.
-
(1994)
Lecture Notes in Computer Science
, vol.950
, pp. 1-12
-
-
Naor, M.1
Shamir, A.2
-
25
-
-
0020764080
-
Optical logic array processor using shadowgrams
-
J. Tanida and Y. Ichioka, "Optical logic array processor using shadowgrams," J. Opt. Soc. Am. 73, 800-809 (1983).
-
(1983)
J. Opt. Soc. Am.
, vol.73
, pp. 800-809
-
-
Tanida, J.1
Ichioka, Y.2
-
26
-
-
84955572416
-
New results on visual cryptography
-
Advances in Cryptography - EUROCRYPT'96, Springer-Verlag, Berlin
-
S. Droste, "New Results on Visual Cryptography," in Advances in Cryptography - EUROCRYPT'96, Vol. 1109 of Lecture Notes in Computer Science (Springer-Verlag, Berlin, 1996), pp. 401-415.
-
(1996)
Lecture Notes in Computer Science
, vol.1109
, pp. 401-415
-
-
Droste, S.1
-
27
-
-
0034326194
-
Visual cryptography for grey level images
-
C. Blundo, A. De Santis, and M. Naor, "Visual cryptography for grey level images", Information Processing Letters 75, 255-259 (2000).
-
(2000)
Information Processing Letters
, vol.75
, pp. 255-259
-
-
Blundo, C.1
De Santis, A.2
Naor, M.3
-
28
-
-
0035119988
-
An analytic construction of the visual secret sharing scheme for color images
-
H. Koga, M. Iwamoto, and H. Yamamoto, "An analytic construction of the visual secret sharing scheme for color images," IEICE Trans. Fundamentals. E84-A, 262-272 (2001).
-
(2001)
IEICE Trans. Fundamentals.
, vol.E84-A
, pp. 262-272
-
-
Koga, H.1
Iwamoto, M.2
Yamamoto, H.3
-
29
-
-
0035270715
-
Hiding a picture in two pictures
-
R. Hwang and C. Chang, "Hiding a picture in two pictures," Opt. Eng. 40, 342-351 (2001).
-
(2001)
Opt. Eng.
, vol.40
, pp. 342-351
-
-
Hwang, R.1
Chang, C.2
-
30
-
-
0034251536
-
Repeating image watermarking technique by the visual cryptography
-
C.-C. Wang, S.-C. Tai, and C.-S. Yu, "Repeating image watermarking technique by the visual cryptography," IEICE Trans. Fundamentals. E83-A, 1589-1598 (2000). http://search.ieice.org/2000/files/e000a08.htm#e83-a.8.1589.
-
(2000)
IEICE Trans. Fundamentals
, vol.E83-A
, pp. 1589-1598
-
-
Wang, C.-C.1
Tai, S.-C.2
Yu, C.-S.3
|