메뉴 건너뛰기




Volumn 45, Issue 14, 2006, Pages 3289-3297

Information security system by iterative multiple-phase retrieval and pixel random permutation

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SIMULATION; FREQUENCY DOMAIN ANALYSIS; IMAGE ANALYSIS; INFORMATION RETRIEVAL; ITERATIVE METHODS; RANDOM PROCESSES;

EID: 33745771294     PISSN: 1559128X     EISSN: 15394522     Source Type: Journal    
DOI: 10.1364/AO.45.003289     Document Type: Article
Times cited : (62)

References (35)
  • 1
    • 0029289969 scopus 로고
    • Optical image encryption based on input plane and Fourier plane random encoding
    • P. Refrégier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995).
    • (1995) Opt. Lett. , vol.20 , pp. 767-769
    • Refrégier, P.1    Javidi, B.2
  • 2
    • 0032607911 scopus 로고    scopus 로고
    • Encrypted optical memory system using three-dimensional keys in the Fresnel domain
    • O. Matoba and B. Javidi, "Encrypted optical memory system using three-dimensional keys in the Fresnel domain," Opt. Lett. 24, 762-764 (1999).
    • (1999) Opt. Lett. , vol.24 , pp. 762-764
    • Matoba, O.1    Javidi, B.2
  • 3
    • 0037056271 scopus 로고    scopus 로고
    • Information hiding technique with double phase encoding
    • S. Kishk and B. Javidi, "Information hiding technique with double phase encoding," Appl. Opt. 41, 5462-5470 (2002).
    • (2002) Appl. Opt. , vol.41 , pp. 5462-5470
    • Kishk, S.1    Javidi, B.2
  • 4
    • 0042093539 scopus 로고    scopus 로고
    • Secure optical data storage with random phase key codes by use of a configuration of a joint transform correlator
    • T. Nomura, S. Mikan, Y. Morimoto, and B. Javidi, "Secure optical data storage with random phase key codes by use of a configuration of a joint transform correlator," Appl. Opt. 42, 1508-1514 (2003).
    • (2003) Appl. Opt. , vol.42 , pp. 1508-1514
    • Nomura, T.1    Mikan, S.2    Morimoto, Y.3    Javidi, B.4
  • 6
    • 9744221221 scopus 로고    scopus 로고
    • Hybrid optical encryption of a 3-D object using a digital holographic technique
    • T. Nomura, K. Uota, and Y. Morimoto, "Hybrid optical encryption of a 3-D object using a digital holographic technique," Opt. Eng. 43, 2228-2232 (2004).
    • (2004) Opt. Eng. , vol.43 , pp. 2228-2232
    • Nomura, T.1    Uota, K.2    Morimoto, Y.3
  • 7
    • 0001417482 scopus 로고    scopus 로고
    • Encrypting three dimensional information with digital holography
    • E. Tajahuerce and B. Javidi, "Encrypting three dimensional information with digital holography," Appl. Opt. 39, 6595-6601 (2000).
    • (2000) Appl. Opt. , vol.39 , pp. 6595-6601
    • Tajahuerce, E.1    Javidi, B.2
  • 8
    • 0042922555 scopus 로고    scopus 로고
    • Securing information by use of digital holography
    • B. Javidi and T. Nomura, "Securing information by use of digital holography," Opt. Lett. 25, 28-30 (2000).
    • (2000) Opt. Lett. , vol.25 , pp. 28-30
    • Javidi, B.1    Nomura, T.2
  • 9
    • 0036303770 scopus 로고    scopus 로고
    • Digital watermarking by a holographic technique
    • N. Takai and Y. Mifune, "Digital watermarking by a holographic technique," Appl. Opt. 41, 865-873 (2002).
    • (2002) Appl. Opt. , vol.41 , pp. 865-873
    • Takai, N.1    Mifune, Y.2
  • 10
    • 0001182141 scopus 로고    scopus 로고
    • Optical encryption by double-random phase encoding in the fractional Fourier domain
    • G. Unnikrishnan, J. Joseph, and K. Singh, "Optical encryption by double-random phase encoding in the fractional Fourier domain," Opt. Lett. 25, 887-889 (2000).
    • (2000) Opt. Lett. , vol.25 , pp. 887-889
    • Unnikrishnan, G.1    Joseph, J.2    Singh, K.3
  • 11
    • 0037443119 scopus 로고    scopus 로고
    • Optical image encryption by random shifting in fractional Fourier domains
    • B. Hennelly and J. T. Sheridan, "Optical image encryption by random shifting in fractional Fourier domains," Opt. Lett. 28, 269-271 (2003).
    • (2003) Opt. Lett. , vol.28 , pp. 269-271
    • Hennelly, B.1    Sheridan, J.T.2
  • 12
    • 0036500276 scopus 로고    scopus 로고
    • Parameterized multi-dimensional data encryption by digital optics
    • L. Yu, X. Peng, and L. Cai, "Parameterized multi-dimensional data encryption by digital optics," Opt. Commun. 203, 67-77 (2002).
    • (2002) Opt. Commun. , vol.203 , pp. 67-77
    • Yu, L.1    Peng, X.2    Cai, L.3
  • 13
    • 9144238259 scopus 로고    scopus 로고
    • Encryption of digital hologram of 3-D object by virtual optics
    • H. Kim, D. H. Kim, and Y. H. Lee, "Encryption of digital hologram of 3-D object by virtual optics," Opt. Express 12, 4912-4921 (2004).
    • (2004) Opt. Express , vol.12 , pp. 4912-4921
    • Kim, H.1    Kim, D.H.2    Lee, Y.H.3
  • 14
    • 0034268782 scopus 로고    scopus 로고
    • Polarization encoding for optical security systems
    • B. Javidi and T. Nomura, "Polarization encoding for optical security systems," Opt. Eng. 39, 2439-2443 (2000).
    • (2000) Opt. Eng. , vol.39 , pp. 2439-2443
    • Javidi, B.1    Nomura, T.2
  • 16
    • 0001691995 scopus 로고    scopus 로고
    • Random phase encoding for optical security
    • R. K. Wang, I. A. Watson, and C. Chatwin, "Random phase encoding for optical security," Opt. Eng. 35, 2464-2468 (1996).
    • (1996) Opt. Eng. , vol.35 , pp. 2464-2468
    • Wang, R.K.1    Watson, I.A.2    Chatwin, C.3
  • 17
    • 0001496619 scopus 로고    scopus 로고
    • Security and encryption optical systems based on a correlator with significant output images
    • Y. Li, K. Kreske, and J. Rosen, "Security and encryption optical systems based on a correlator with significant output images," Appl. Opt. 39, 5295-5301 (2000).
    • (2000) Appl. Opt. , vol.39 , pp. 5295-5301
    • Li, Y.1    Kreske, K.2    Rosen, J.3
  • 18
    • 0035484727 scopus 로고    scopus 로고
    • Image encryption using separable amplitude-based virtual image and iteratively retrieved phase information
    • H. T. Chang, "Image encryption using separable amplitude-based virtual image and iteratively retrieved phase information," Opt. Eng. 40, 2165-2171 (2001).
    • (2001) Opt. Eng. , vol.40 , pp. 2165-2171
    • Chang, H.T.1
  • 19
    • 0027622504 scopus 로고
    • Learning in correlators based on projections onto constraint sets
    • J. Rosen, "Learning in correlators based on projections onto constraint sets," Opt. Lett. 18, 1183-1185 (1993).
    • (1993) Opt. Lett. , vol.18 , pp. 1183-1185
    • Rosen, J.1
  • 20
    • 0037055723 scopus 로고    scopus 로고
    • Multiple-phase retrieval for optical security systems by use of random-phase encoding
    • H. T. Chang, W. C. Lu, and C. J. Kuo, "Multiple-phase retrieval for optical security systems by use of random-phase encoding," Appl. Opt. 41, 4825-4834 (2002).
    • (2002) Appl. Opt. , vol.41 , pp. 4825-4834
    • Chang, H.T.1    Lu, W.C.2    Kuo, C.J.3
  • 21
    • 11444262409 scopus 로고    scopus 로고
    • Image hiding with computer-generated phase codes for optical authentication
    • G. Situ and J. Zhang, "Image hiding with computer-generated phase codes for optical authentication," Opt. Commun. 245, 55-65 (2005).
    • (2005) Opt. Commun. , vol.245 , pp. 55-65
    • Situ, G.1    Zhang, J.2
  • 22
    • 1042302268 scopus 로고    scopus 로고
    • A cascaded iterative Fourier transform algorithm for optical security applications
    • G. Situ and J. Zhang, "A cascaded iterative Fourier transform algorithm for optical security applications," Optik (Stuttgart) 114, 473-477 (2003).
    • (2003) Optik (Stuttgart) , vol.114 , pp. 473-477
    • Situ, G.1    Zhang, J.2
  • 23
    • 1042300570 scopus 로고    scopus 로고
    • A lensless optical security system based on computer-generated phase only masks
    • G. Situ and J. Zhang, "A lensless optical security system based on computer-generated phase only masks," Opt. Commun. 232, 115-122 (2004).
    • (2004) Opt. Commun. , vol.232 , pp. 115-122
    • Situ, G.1    Zhang, J.2
  • 24
    • 0001405296 scopus 로고    scopus 로고
    • Hidden images in halftone pictures
    • J. Rosen and B. Javidi, "Hidden images in halftone pictures," Appl. Opt. 40, 3346-3353 (2001).
    • (2001) Appl. Opt. , vol.40 , pp. 3346-3353
    • Rosen, J.1    Javidi, B.2
  • 25
    • 0035414760 scopus 로고    scopus 로고
    • Security optical systems based on a joint transform correlator with significant output images
    • D. Abookasis, O. Arazi, J. Rosen, and B. Javidi, "Security optical systems based on a joint transform correlator with significant output images," Opt. Eng. 40, 1584-1589 (2001).
    • (2001) Opt. Eng. , vol.40 , pp. 1584-1589
    • Abookasis, D.1    Arazi, O.2    Rosen, J.3    Javidi, B.4
  • 26
    • 4043098280 scopus 로고    scopus 로고
    • Asymmetric-image verification for security optical system based on joint transform correlator architecture
    • H. T. Chang and C. T. Chen, "Asymmetric-image verification for security optical system based on joint transform correlator architecture," Opt. Commun. 239, 43-54 (2004).
    • (2004) Opt. Commun. , vol.239 , pp. 43-54
    • Chang, H.T.1    Chen, C.T.2
  • 27
    • 0037057818 scopus 로고    scopus 로고
    • Design of cascaded phase keys for a hierarchical security system
    • C. H. Yeh, H. T. Chang, H. C. Chien, and C. J. Kuo, "Design of cascaded phase keys for a hierarchical security system," Appl. Opt. 41, 6128-6134 (2002).
    • (2002) Appl. Opt. , vol.41 , pp. 6128-6134
    • Yeh, C.H.1    Chang, H.T.2    Chien, H.C.3    Kuo, C.J.4
  • 28
    • 0020173780 scopus 로고
    • Phase retrieval algorithms: A comparison
    • J. R. Flenup, "Phase retrieval algorithms: a comparison," Appl. Opt. 21, 2758-2769 (1982).
    • (1982) Appl. Opt. , vol.21 , pp. 2758-2769
    • Flenup, J.R.1
  • 29
    • 17844362186 scopus 로고    scopus 로고
    • Optical image encryption based on multistage fractional Fourier transforms and pixel scrambling technique
    • J. Zhao, H. Lu, X. Song, J. Li, and Y. Ma, "Optical image encryption based on multistage fractional Fourier transforms and pixel scrambling technique," Opt. Commun. 249, 493-499 (2005).
    • (2005) Opt. Commun. , vol.249 , pp. 493-499
    • Zhao, J.1    Lu, H.2    Song, X.3    Li, J.4    Ma, Y.5
  • 30
    • 22844432567 scopus 로고    scopus 로고
    • Content fragile watermarking based on a computer generated hologram coding technique
    • G. S. Spagnolo, C. Simonetti, and L. Cozzella, "Content fragile watermarking based on a computer generated hologram coding technique," J. Opt. 7, 333-342 (2005).
    • (2005) J. Opt. , vol.7 , pp. 333-342
    • Spagnolo, G.S.1    Simonetti, C.2    Cozzella, L.3
  • 31
    • 77953357350 scopus 로고
    • Understanding diffractive optic design in the scalar domain
    • J. N. Mait, "Understanding diffractive optic design in the scalar domain," J. Opt. Soc. Am. A 12, 2145-2158 (1995).
    • (1995) J. Opt. Soc. Am. A , vol.12 , pp. 2145-2158
    • Mait, J.N.1
  • 32
    • 2542511716 scopus 로고    scopus 로고
    • Digital image encryption and watermarking by phase-shifting interferometry
    • L. Z. Cai, M. Z. He, Q. Liu, and X. L. Yang, "Digital image encryption and watermarking by phase-shifting interferometry," Appl. Opt. 43, 3078-3084 (2004).
    • (2004) Appl. Opt. , vol.43 , pp. 3078-3084
    • Cai, L.Z.1    He, M.Z.2    Liu, Q.3    Yang, X.L.4
  • 33
    • 27344444971 scopus 로고    scopus 로고
    • Cross-talk-free double-image encryption and watermarking with amplitude-phase separate modulations
    • X. F. Meng, L. Z. Cai, M. Z. He, G. Y. Dong, and X. X. Shen, "Cross-talk-free double-image encryption and watermarking with amplitude-phase separate modulations," J. Opt. 7, 624-631 (2005).
    • (2005) J. Opt. , vol.7 , pp. 624-631
    • Meng, X.F.1    Cai, L.Z.2    He, M.Z.3    Dong, G.Y.4    Shen, X.X.5
  • 34
    • 13944275620 scopus 로고    scopus 로고
    • Multiple image encryption and watermarking by random phase matching
    • M. Z. He, L. Z. Cai, Q. Liu, W. C. Wang, and X. F. Meng, "Multiple image encryption and watermarking by random phase matching," Opt. Commun. 247, 29-37 (2005).
    • (2005) Opt. Commun. , vol.247 , pp. 29-37
    • He, M.Z.1    Cai, L.Z.2    Liu, Q.3    Wang, W.C.4    Meng, X.F.5
  • 35
    • 19944367911 scopus 로고    scopus 로고
    • Phase-only encryption and watermarking based on phase-shifting interferometry
    • M. Z. He, L. Z. Cai, Q. Liu, and X. L. Yang, "Phase-only encryption and watermarking based on phase-shifting interferometry," Appl. Opt. 44, 2600-2606 (2005).
    • (2005) Appl. Opt. , vol.44 , pp. 2600-2606
    • He, M.Z.1    Cai, L.Z.2    Liu, Q.3    Yang, X.L.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.