메뉴 건너뛰기




Volumn 33, Issue 10, 2006, Pages 1360-1364

Optical hierarchical image encryption by use of iterative Fourier transform algorithm

Author keywords

Fourier optics; Image encryption; Iterative Fourier transform algorithm; Security verification

Indexed keywords

ALGORITHMS; COMPUTER SIMULATION; FOURIER OPTICS; FOURIER TRANSFORMS;

EID: 33845362017     PISSN: 02587025     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (9)

References (15)
  • 1
    • 0029289969 scopus 로고
    • Optical image encryption based on input plane and Fourier plane random encoding
    • P. Refregier, B. Javidi. Optical image encryption based on input plane and Fourier plane random encoding[J]. Opt. Lett., 1995, 20(7): 767-769.
    • (1995) Opt. Lett. , vol.20 , Issue.7 , pp. 767-769
    • Refregier, P.1    Javidi, B.2
  • 2
    • 0000342510 scopus 로고    scopus 로고
    • Performance of double phase encoding encryption technique using binarized encrypted images
    • B. Javidi, E. Ahouzi. Performance of double phase encoding encryption technique using binarized encrypted images[J]. Opt. Eng., 1998, 37(2): 565-569.
    • (1998) Opt. Eng. , vol.37 , Issue.2 , pp. 565-569
    • Javidi, B.1    Ahouzi, E.2
  • 3
    • 0001691995 scopus 로고    scopus 로고
    • Random phase encoding for optical security
    • R. K. Wang, C. Chatwin. Random phase encoding for optical security[J]. Opt. Eng., 1996, 35(9): 2464-2469.
    • (1996) Opt. Eng. , vol.35 , Issue.9 , pp. 2464-2469
    • Wang, R.K.1    Chatwin, C.2
  • 4
    • 0001496619 scopus 로고    scopus 로고
    • Security and encryption optical systems based on a correlator with significant output images
    • Youzhi Li, K. Kreske, J. Rosen. Security and encryption optical systems based on a correlator with significant output images[J]. Appl. Opt., 2000, 39(29): 5295-5301.
    • (2000) Appl. Opt. , vol.39 , Issue.29 , pp. 5295-5301
    • Li, Y.1    Kreske, K.2    Rosen, J.3
  • 5
    • 3042674973 scopus 로고    scopus 로고
    • A cascaded-phases retrieval algorithm for optical image encryption
    • Situ Guohai, Zhang Jingjuan, Zhang Yan et al.. A cascaded-phases retrieval algorithm for optical image encryption[J]. J. Optoelectronics·Laser, 2004, 15(3): 341-343.
    • (2004) J. Optoelectronics·Laser , vol.15 , Issue.3 , pp. 341-343
    • Situ, G.1    Zhang, J.2    Zhang, Y.3
  • 6
    • 0037057818 scopus 로고    scopus 로고
    • Design of cascaded phase keys for a hierarchical security system
    • Chia H. Yeh, Hsuan T. Chang. Hung C. Chien et al.. Design of cascaded phase keys for a hierarchical security system[J]. Appl. Opt., 2002, 41(29): 6128-6134.
    • (2002) Appl. Opt. , vol.41 , Issue.29 , pp. 6128-6134
    • Yeh, C.H.1    Chang, H.T.2    Chien, H.C.3
  • 7
    • 0034156256 scopus 로고    scopus 로고
    • Study on the rotative invariance in the phase encrypted image and the phase-ring decryption
    • Zhang Peikun, Li Yulin, Liu Jiaying et al.. Study on the rotative invariance in the phase encrypted image and the phase-ring decryption[J]. Chinese J. Lasers, 2000, A27(3): 224-228.
    • (2000) Chinese J. Lasers , vol.A27 , Issue.3 , pp. 224-228
    • Zhang, P.1    Li, Y.2    Liu, J.3
  • 8
    • 24144453114 scopus 로고    scopus 로고
    • Iterative double random phase encryption based on pixel scrambling technology
    • Lu Hongqiang, Zhao Jianlin, Fan Qi et al.. Iterative double random phase encryption based on pixel scrambling technology[J]. Acta Photonica Sinica, 2005, 34(7): 1069-1073.
    • (2005) Acta Photonica Sinica , vol.34 , Issue.7 , pp. 1069-1073
    • Lu, H.1    Zhao, J.2    Fan, Q.3
  • 9
    • 0036838955 scopus 로고    scopus 로고
    • Information encryption with virtual-optics imaging system
    • Xiang Peng, Zhiyong Cui, Tieniu Tan. Information encryption with virtual-optics imaging system[J]. Opt. Commun., 2002, 212(4-6): 235-245.
    • (2002) Opt. Commun. , vol.212 , Issue.4-6 , pp. 235-245
    • Peng, X.1    Cui, Z.2    Tan, T.3
  • 10
    • 3142742201 scopus 로고    scopus 로고
    • Information hiding theory based on virtual optics and its implementation with parallel hardware
    • Peng Xiang, Zhang Peng, Niu Hanben. Information hiding theory based on virtual optics and its implementation with parallel hardware[J]. Acta Optica Sinica, 2004, 24(5): 623-627.
    • (2004) Acta Optica Sinica , vol.24 , Issue.5 , pp. 623-627
    • Peng, X.1    Zhang, P.2    Niu, H.3
  • 11
    • 23444442920 scopus 로고    scopus 로고
    • Optical image encryption based on cascaded phase retrieval algorithm
    • Yu Bin, Peng Xiang. Optical image encryption based on cascaded phase retrieval algorithm[J]. Acta Optica Sinica, 2005, 25(7): 881-884.
    • (2005) Acta Optica Sinica , vol.25 , Issue.7 , pp. 881-884
    • Yu, B.1    Peng, X.2
  • 12
    • 0020173780 scopus 로고
    • Phase retrieval algorithms: A comparison
    • J. R. Fienup. Phase retrieval algorithms: a comparison[J]. Appl. Opt., 1982, 21(15): 2758-2769.
    • (1982) Appl. Opt. , vol.21 , Issue.15 , pp. 2758-2769
    • Fienup, J.R.1
  • 13
    • 0017985106 scopus 로고
    • Reconstruction of an object from the modulus of its Fourier transform
    • J. R. Fienup. Reconstruction of an object from the modulus of its Fourier transform[J]. Opt. Lett, 1978, 3(1): 27-29.
    • (1978) Opt. Lett , vol.3 , Issue.1 , pp. 27-29
    • Fienup, J.R.1
  • 14
    • 0015672894 scopus 로고
    • Method for computing kinoforms that reduces image reconstruction error
    • N. C. Gallagher, B. Liu. Method for computing kinoforms that reduces image reconstruction error[J]. Appl. Opt., 1973, 12(10): 2328-2335.
    • (1973) Appl. Opt. , vol.12 , Issue.10 , pp. 2328-2335
    • Gallagher, N.C.1    Liu, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.