-
1
-
-
0029289969
-
Optical image encryption based on input plane and Fourier plane random encoding
-
P. Refrégier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995).
-
(1995)
Opt. Lett.
, vol.20
, pp. 767-769
-
-
Refrégier, P.1
Javidi, B.2
-
2
-
-
0032607911
-
Encrypted optical memory system using three-dimensional keys in the Fresnel domain
-
O. Matoba and B. Javidi, "Encrypted optical memory system using three-dimensional keys in the Fresnel domain," Opt. Lett. 24, 762-764 (1999).
-
(1999)
Opt. Lett.
, vol.24
, pp. 762-764
-
-
Matoba, O.1
Javidi, B.2
-
3
-
-
0037056271
-
Information hiding technique with double phase encoding
-
S. Kishk and B. Javidi, "Information hiding technique with double phase encoding," Appl. Opt. 41, 5462-5470 (2002).
-
(2002)
Appl. Opt.
, vol.41
, pp. 5462-5470
-
-
Kishk, S.1
Javidi, B.2
-
4
-
-
0042093539
-
Secure optical data storage with random phase key codes by use of a configuration of a joint transform correlator
-
T. Nomura, S. Mikan, Y. Morimoto, and B. Javidi, "Secure optical data storage with random phase key codes by use of a configuration of a joint transform correlator," Appl. Opt. 42, 1508-1514 (2003).
-
(2003)
Appl. Opt.
, vol.42
, pp. 1508-1514
-
-
Nomura, T.1
Mikan, S.2
Morimoto, Y.3
Javidi, B.4
-
6
-
-
9744221221
-
Hybrid optical encryption of a 3-D object using a digital holographic technique
-
T. Nomura, K. Uota, and Y. Morimoto, "Hybrid optical encryption of a 3-D object using a digital holographic technique," Opt. Eng. 43, 2228-2232 (2004).
-
(2004)
Opt. Eng.
, vol.43
, pp. 2228-2232
-
-
Nomura, T.1
Uota, K.2
Morimoto, Y.3
-
7
-
-
0001417482
-
Encrypting three dimensional information with digital holography
-
E. Tajahuerce and B. Javidi, "Encrypting three dimensional information with digital holography," Appl. Opt. 39, 6595-6601 (2000).
-
(2000)
Appl. Opt.
, vol.39
, pp. 6595-6601
-
-
Tajahuerce, E.1
Javidi, B.2
-
8
-
-
0042922555
-
Securing information by use of digital holography
-
B. Javidi and T. Nomura, "Securing information by use of digital holography," Opt. Lett. 25, 28-30 (2000).
-
(2000)
Opt. Lett.
, vol.25
, pp. 28-30
-
-
Javidi, B.1
Nomura, T.2
-
9
-
-
0036303770
-
Digital watermarking by a holographic technique
-
N. Takai and Y. Mifune, "Digital watermarking by a holographic technique," Appl. Opt. 41, 865-873 (2002).
-
(2002)
Appl. Opt.
, vol.41
, pp. 865-873
-
-
Takai, N.1
Mifune, Y.2
-
10
-
-
0001182141
-
Optical encryption by double-random phase encoding in the fractional Fourier domain
-
G. Unnikrishnan, J. Joseph, and K. Singh, "Optical encryption by double-random phase encoding in the fractional Fourier domain," Opt. Lett. 25, 887-889 (2000).
-
(2000)
Opt. Lett.
, vol.25
, pp. 887-889
-
-
Unnikrishnan, G.1
Joseph, J.2
Singh, K.3
-
11
-
-
0037443119
-
Optical image encryption by random shifting in fractional Fourier domains
-
B. Hennelly and J. T. Sheridan, "Optical image encryption by random shifting in fractional Fourier domains," Opt. Lett. 28, 269-271 (2003).
-
(2003)
Opt. Lett.
, vol.28
, pp. 269-271
-
-
Hennelly, B.1
Sheridan, J.T.2
-
12
-
-
0036500276
-
Parameterized multi-dimensional data encryption by digital optics
-
L. Yu, X. Peng, and L. Cai, "Parameterized multi-dimensional data encryption by digital optics," Opt. Commun. 203, 67-77 (2002).
-
(2002)
Opt. Commun.
, vol.203
, pp. 67-77
-
-
Yu, L.1
Peng, X.2
Cai, L.3
-
13
-
-
9144238259
-
Encryption of digital hologram of 3-D object by virtual optics
-
H. Kim, D. H. Kim, and Y. H. Lee, "Encryption of digital hologram of 3-D object by virtual optics," Opt. Express 12, 4912-4921 (2004).
-
(2004)
Opt. Express
, vol.12
, pp. 4912-4921
-
-
Kim, H.1
Kim, D.H.2
Lee, Y.H.3
-
14
-
-
0034268782
-
Polarization encoding for optical security systems
-
B. Javidi and T. Nomura, "Polarization encoding for optical security systems," Opt. Eng. 39, 2439-2443 (2000).
-
(2000)
Opt. Eng.
, vol.39
, pp. 2439-2443
-
-
Javidi, B.1
Nomura, T.2
-
15
-
-
0000395465
-
Secure optical memory system with polarization encryption
-
X. Tan, O. Matoba, Y. Okada-Shudo, M. Ide, T. Shimura, and K. Kuroda, "Secure optical memory system with polarization encryption," Appl. Opt. 40, 2310-2315 (2001).
-
(2001)
Appl. Opt.
, vol.40
, pp. 2310-2315
-
-
Tan, X.1
Matoba, O.2
Okada-Shudo, Y.3
Ide, M.4
Shimura, T.5
Kuroda, K.6
-
16
-
-
0001691995
-
Random phase encoding for optical security
-
R. K. Wang, I. A. Watson, and C. Chatwin, "Random phase encoding for optical security," Opt. Eng. 35, 2464-2468 (1996).
-
(1996)
Opt. Eng.
, vol.35
, pp. 2464-2468
-
-
Wang, R.K.1
Watson, I.A.2
Chatwin, C.3
-
17
-
-
0001496619
-
Security and encryption optical systems based on a correlator with significant output images
-
Y. Li, K. Kreske, and J. Rosen, "Security and encryption optical systems based on a correlator with significant output images," Appl. Opt. 39, 5295-5301 (2000).
-
(2000)
Appl. Opt.
, vol.39
, pp. 5295-5301
-
-
Li, Y.1
Kreske, K.2
Rosen, J.3
-
18
-
-
0035484727
-
Image encryption using separable amplitude-based virtual image and iteratively retrieved phase information
-
H. T. Chang, "Image encryption using separable amplitude-based virtual image and iteratively retrieved phase information," Opt. Eng. 40, 2165-2171 (2001).
-
(2001)
Opt. Eng.
, vol.40
, pp. 2165-2171
-
-
Chang, H.T.1
-
19
-
-
0027622504
-
Learning in correlators based on projections onto constraint sets
-
J. Rosen, "Learning in correlators based on projections onto constraint sets," Opt. Lett. 18, 1183-1185 (1993).
-
(1993)
Opt. Lett.
, vol.18
, pp. 1183-1185
-
-
Rosen, J.1
-
20
-
-
0037055723
-
Multiple-phase retrieval for optical security systems by use of random-phase encoding
-
H. T. Chang, W. C. Lu, and C. J. Kuo, "Multiple-phase retrieval for optical security systems by use of random-phase encoding," Appl. Opt. 41, 4825-4834 (2002).
-
(2002)
Appl. Opt.
, vol.41
, pp. 4825-4834
-
-
Chang, H.T.1
Lu, W.C.2
Kuo, C.J.3
-
21
-
-
11444262409
-
Image hiding with computer-generated phase codes for optical authentication
-
G. Situ and J. Zhang, "Image hiding with computer-generated phase codes for optical authentication," Opt. Commun. 245, 55-65 (2005).
-
(2005)
Opt. Commun.
, vol.245
, pp. 55-65
-
-
Situ, G.1
Zhang, J.2
-
22
-
-
1042302268
-
A cascaded iterative Fourier transform algorithm for optical security applications
-
G. Situ and J. Zhang, "A cascaded iterative Fourier transform algorithm for optical security applications," Optik (Stuttgart) 114, 473-477 (2003).
-
(2003)
Optik (Stuttgart)
, vol.114
, pp. 473-477
-
-
Situ, G.1
Zhang, J.2
-
23
-
-
1042300570
-
A lensless optical security system based on computer-generated phase only masks
-
G. Situ and J. Zhang, "A lensless optical security system based on computer-generated phase only masks," Opt. Commun. 232, 115-122 (2004).
-
(2004)
Opt. Commun.
, vol.232
, pp. 115-122
-
-
Situ, G.1
Zhang, J.2
-
24
-
-
0001405296
-
Hidden images in halftone pictures
-
J. Rosen and B. Javidi, "Hidden images in halftone pictures," Appl. Opt. 40, 3346-3353 (2001).
-
(2001)
Appl. Opt.
, vol.40
, pp. 3346-3353
-
-
Rosen, J.1
Javidi, B.2
-
25
-
-
0035414760
-
Security optical systems based on a joint transform correlator with significant output images
-
D. Abookasis, O. Arazi, J. Rosen, and B. Javidi, "Security optical systems based on a joint transform correlator with significant output images," Opt. Eng. 40, 1584-1589 (2001).
-
(2001)
Opt. Eng.
, vol.40
, pp. 1584-1589
-
-
Abookasis, D.1
Arazi, O.2
Rosen, J.3
Javidi, B.4
-
26
-
-
4043098280
-
Asymmetric-image verification for security optical system based on joint transform correlator architecture
-
H. T. Chang and C. T. Chen, "Asymmetric-image verification for security optical system based on joint transform correlator architecture," Opt. Commun. 239, 43-54 (2004).
-
(2004)
Opt. Commun.
, vol.239
, pp. 43-54
-
-
Chang, H.T.1
Chen, C.T.2
-
27
-
-
0037057818
-
Design of cascaded phase keys for a hierarchical security system
-
C. H. Yeh, H. T. Chang, H. C. Chien, and C. J. Kuo, "Design of cascaded phase keys for a hierarchical security system," Appl. Opt. 41, 6128-6134 (2002).
-
(2002)
Appl. Opt.
, vol.41
, pp. 6128-6134
-
-
Yeh, C.H.1
Chang, H.T.2
Chien, H.C.3
Kuo, C.J.4
-
28
-
-
0020173780
-
Phase retrieval algorithms: A comparison
-
J. R. Flenup, "Phase retrieval algorithms: a comparison," Appl. Opt. 21, 2758-2769 (1982).
-
(1982)
Appl. Opt.
, vol.21
, pp. 2758-2769
-
-
Flenup, J.R.1
-
29
-
-
17844362186
-
Optical image encryption based on multistage fractional Fourier transforms and pixel scrambling technique
-
J. Zhao, H. Lu, X. Song, J. Li, and Y. Ma, "Optical image encryption based on multistage fractional Fourier transforms and pixel scrambling technique," Opt. Commun. 249, 493-499 (2005).
-
(2005)
Opt. Commun.
, vol.249
, pp. 493-499
-
-
Zhao, J.1
Lu, H.2
Song, X.3
Li, J.4
Ma, Y.5
-
30
-
-
22844432567
-
Content fragile watermarking based on a computer generated hologram coding technique
-
G. S. Spagnolo, C. Simonetti, and L. Cozzella, "Content fragile watermarking based on a computer generated hologram coding technique," J. Opt. 7, 333-342 (2005).
-
(2005)
J. Opt.
, vol.7
, pp. 333-342
-
-
Spagnolo, G.S.1
Simonetti, C.2
Cozzella, L.3
-
31
-
-
77953357350
-
Understanding diffractive optic design in the scalar domain
-
J. N. Mait, "Understanding diffractive optic design in the scalar domain," J. Opt. Soc. Am. A 12, 2145-2158 (1995).
-
(1995)
J. Opt. Soc. Am. A
, vol.12
, pp. 2145-2158
-
-
Mait, J.N.1
-
32
-
-
2542511716
-
Digital image encryption and watermarking by phase-shifting interferometry
-
L. Z. Cai, M. Z. He, Q. Liu, and X. L. Yang, "Digital image encryption and watermarking by phase-shifting interferometry," Appl. Opt. 43, 3078-3084 (2004).
-
(2004)
Appl. Opt.
, vol.43
, pp. 3078-3084
-
-
Cai, L.Z.1
He, M.Z.2
Liu, Q.3
Yang, X.L.4
-
33
-
-
27344444971
-
Cross-talk-free double-image encryption and watermarking with amplitude-phase separate modulations
-
X. F. Meng, L. Z. Cai, M. Z. He, G. Y. Dong, and X. X. Shen, "Cross-talk-free double-image encryption and watermarking with amplitude-phase separate modulations," J. Opt. 7, 624-631 (2005).
-
(2005)
J. Opt.
, vol.7
, pp. 624-631
-
-
Meng, X.F.1
Cai, L.Z.2
He, M.Z.3
Dong, G.Y.4
Shen, X.X.5
-
34
-
-
13944275620
-
Multiple image encryption and watermarking by random phase matching
-
M. Z. He, L. Z. Cai, Q. Liu, W. C. Wang, and X. F. Meng, "Multiple image encryption and watermarking by random phase matching," Opt. Commun. 247, 29-37 (2005).
-
(2005)
Opt. Commun.
, vol.247
, pp. 29-37
-
-
He, M.Z.1
Cai, L.Z.2
Liu, Q.3
Wang, W.C.4
Meng, X.F.5
-
35
-
-
19944367911
-
Phase-only encryption and watermarking based on phase-shifting interferometry
-
M. Z. He, L. Z. Cai, Q. Liu, and X. L. Yang, "Phase-only encryption and watermarking based on phase-shifting interferometry," Appl. Opt. 44, 2600-2606 (2005).
-
(2005)
Appl. Opt.
, vol.44
, pp. 2600-2606
-
-
He, M.Z.1
Cai, L.Z.2
Liu, Q.3
Yang, X.L.4
|