-
1
-
-
0029289969
-
Optical image encryption based on input plane and Fourier plane random encoding
-
P. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995).
-
(1995)
Opt. Lett
, vol.20
, pp. 767-769
-
-
Refregier, P.1
Javidi, B.2
-
2
-
-
0001182141
-
Optical encryption by double-random phase encoding in the fractional Fourier domain
-
G. Unnikrishnan, J. Joseph, and K. Singh, "Optical encryption by double-random phase encoding in the fractional Fourier domain," Opt. Lett. 25, 887-889 (2000).
-
(2000)
Opt. Lett
, vol.25
, pp. 887-889
-
-
Unnikrishnan, G.1
Joseph, J.2
Singh, K.3
-
3
-
-
3142707161
-
Double random-phase encoding in the Fresnel domain
-
G. Situ and J. Zhang, "Double random-phase encoding in the Fresnel domain," Opt. Lett. 29, 1584-1586 (2004).
-
(2004)
Opt. Lett
, vol.29
, pp. 1584-1586
-
-
Situ, G.1
Zhang, J.2
-
4
-
-
33847084395
-
Affine cryptosystem of double-random-phase encryption based on the fractional Fourier transform
-
X. Zhou, S. Yuan, S. W. Wang, and J. Xie, "Affine cryptosystem of double-random-phase encryption based on the fractional Fourier transform," Appl. Opt. 45, 8434-8439 (2006).
-
(2006)
Appl. Opt
, vol.45
, pp. 8434-8439
-
-
Zhou, X.1
Yuan, S.2
Wang, S.W.3
Xie, J.4
-
5
-
-
61549122399
-
Information hiding based on double random-phase encoding and public- key cryptography
-
S. Yuan, X. Zhou, M. S. Alam, X. Lu, and X. F. Li, "Information hiding based on double random-phase encoding and public- key cryptography," Opt. Express 17, 3270-3284 (2009).
-
(2009)
Opt. Express
, vol.17
, pp. 3270-3284
-
-
Yuan, S.1
Zhou, X.2
Alam, M.S.3
Lu, X.4
Li, X.F.5
-
6
-
-
34147095877
-
Spread-space spread-spectrum technique for secure multiplexing
-
B. M. Hennelly, T. J. Naughton, J. McDonald, J. T. Sheridan, G. Unnikrishnan, D. P. Kelly, and B. Javidi, "Spread-space spread-spectrum technique for secure multiplexing," Opt. Lett. 32, 1060-1062 (2007).
-
(2007)
Opt. Lett
, vol.32
, pp. 1060-1062
-
-
Hennelly, B.M.1
Naughton, T.J.2
McDonald, J.3
Sheridan, J.T.4
Unnikrishnan, G.5
Kelly, D.P.6
Javidi, B.7
-
7
-
-
60049100680
-
Introducing secure modes of operation for optical encryption
-
T. J. Naughton, B. M. Hennelly, and T. Dowling, "Introducing secure modes of operation for optical encryption," J. Opt. Soc. Am. A 25, 2608-2617 (2008).
-
(2008)
J. Opt. Soc. Am. A
, vol.25
, pp. 2608-2617
-
-
Naughton, T.J.1
Hennelly, B.M.2
Dowling, T.3
-
8
-
-
0344152913
-
Optical scanning cryptography for secure wireless transmission
-
T. -C. Poon, T. Kim, and K. Doh, "Optical scanning cryptography for secure wireless transmission," Appl. Opt. 42, 6496-6503 (2003).
-
(2003)
Appl. Opt
, vol.42
, pp. 6496-6503
-
-
Poon, T.-C.1
Kim, T.2
Doh, K.3
-
9
-
-
60849136942
-
Optical image coding with a circular Dammann grating
-
K. B. Doh, K. Dobson, T.-C Poon, and P. S. Chung, "Optical image coding with a circular Dammann grating," Appl. Opt. 48, 134-139 (2009).
-
(2009)
Appl. Opt
, vol.48
, pp. 134-139
-
-
Doh, K.B.1
Dobson, K.2
Poon, T.-C.3
Chung, P.S.4
-
10
-
-
0001496619
-
Security and encryption optical systems based on a correlator with significant output images
-
Y. Li, K. Kreske, and J. Rosen, "Security and encryption optical systems based on a correlator with significant output images," Appl. Opt. 39, 5295-5301 (2000).
-
(2000)
Appl. Opt
, vol.39
, pp. 5295-5301
-
-
Li, Y.1
Kreske, K.2
Rosen, J.3
-
11
-
-
0037055723
-
Multiple-phase retrieval for optical security systems by use of random-phase encoding
-
H. T. Chang, W. C. Lu, and C. J. Kuo, "Multiple-phase retrieval for optical security systems by use of random-phase encoding," Appl. Opt. 41, 4825-4834 (2002).
-
(2002)
Appl. Opt
, vol.41
, pp. 4825-4834
-
-
Chang, H.T.1
Lu, W.C.2
Kuo, C.J.3
-
12
-
-
33745771294
-
Information security system by iterative multiple-phase retrieval and pixel random permutation
-
X. Meng, L. Cai, X. Yang, X. Shen, and G. Dong, "Information security system by iterative multiple-phase retrieval and pixel random permutation," Appl. Opt. 45, 3289-3297 (2006).
-
(2006)
Appl. Opt
, vol.45
, pp. 3289-3297
-
-
Meng, X.1
Cai, L.2
Yang, X.3
Shen, X.4
Dong, G.5
-
13
-
-
35649020308
-
Hierarchical optical image encryption based on cascaded phase retrieval algorithm in the Fresnel domain
-
X. Meng, L. Cai, and Y. Wang, "Hierarchical optical image encryption based on cascaded phase retrieval algorithm in the Fresnel domain," J. Opt. A: Pure Appl. Opt. 9, 1070-1075 (2007).
-
(2007)
J. Opt. A: Pure Appl. Opt
, vol.9
, pp. 1070-1075
-
-
Meng, X.1
Cai, L.2
Wang, Y.3
-
14
-
-
35448980714
-
Cryptanalysis of optical security systems with significant output images
-
G. Situ, U. Gopinathan, D. S. Monaghan, and J. T. Sheridan, "Cryptanalysis of optical security systems with significant output images," Appl. Opt. 46, 5257-5262 (2007).
-
(2007)
Appl. Opt
, vol.46
, pp. 5257-5262
-
-
Situ, G.1
Gopinathan, U.2
Monaghan, D.S.3
Sheridan, J.T.4
-
15
-
-
20444461085
-
Multiple-image encryption by wavelength multiplexing
-
G. Situ and J. Zhang, "Multiple-image encryption by wavelength multiplexing," Opt. Lett. 30, 1306-1308 (2005).
-
(2005)
Opt. Lett
, vol.30
, pp. 1306-1308
-
-
Situ, G.1
Zhang, J.2
-
16
-
-
41549140080
-
Multiple-image hiding by information prechoosing
-
Y. Shi, G. Situ, and J. Zhang, "Multiple-image hiding by information prechoosing," Opt. Lett. 33, 542-544 (2008).
-
(2008)
Opt. Lett
, vol.33
, pp. 542-544
-
-
Shi, Y.1
Situ, G.2
Zhang, J.3
-
17
-
-
39749189539
-
Multiple-image hiding in the Fresnel domain
-
Y. Shi, G. Situ, and J. Zhang, "Multiple-image hiding in the Fresnel domain," Opt. Lett. 32, 1914-1916 (2007).
-
(2007)
Opt. Lett
, vol.32
, pp. 1914-1916
-
-
Shi, Y.1
Situ, G.2
Zhang, J.3
-
18
-
-
33751247040
-
A new approach for optical colored image compression using the JPEG standards
-
A. Alkholidi, A. Alfalou, and H. Haman, "A new approach for optical colored image compression using the JPEG standards," Signal Process. 87, 569-583 (2007).
-
(2007)
Signal Process
, vol.87
, pp. 569-583
-
-
Alkholidi, A.1
Alfalou, A.2
Haman, H.3
-
19
-
-
57349192800
-
Real-time optical 2D wavelet transform based on the JPEG2000 standards
-
A. Alkholidi, A. Cottour, A. Aflalou, H. Hamam, and G. Keryer, "Real-time optical 2D wavelet transform based on the JPEG2000 standards," Eur. Phys. J. Appl. Phys. 44, 261-272 (2008).
-
(2008)
Eur. Phys. J. Appl. Phys
, vol.44
, pp. 261-272
-
-
Alkholidi, A.1
Cottour, A.2
Aflalou, A.3
Hamam, H.4
Keryer, G.5
-
20
-
-
33847700190
-
Optical image compression based on segmentation of the Fourier plane new approaches and critical analysis
-
S. Soualmi, A. Alfalou, and H. Hamam, "Optical image compression based on segmentation of the Fourier plane new approaches and critical analysis," J. Opt. A: Pure and Appl. Opt. 9,73-80 (2007).
-
(2007)
J. Opt. A: Pure and Appl. Opt
, vol.9
, pp. 73-80
-
-
Soualmi, S.1
Alfalou, A.2
Hamam, H.3
-
21
-
-
60049100680
-
Introducing secure modes of operation for optical encryption
-
T. J. Naughton, B. M. Hennelly, and T. Dowling, "Introducing secure modes of operation for optical encryption," J. Opt. Soc. Am. A 25, 2608-2617 (2008).
-
(2008)
J. Opt. Soc. Am. A
, vol.25
, pp. 2608-2617
-
-
Naughton, T.J.1
Hennelly, B.M.2
Dowling, T.3
-
22
-
-
0027622504
-
Learning in correlators based on projections onto constraint sets
-
J. Rosen, "Learning in correlators based on projections onto constraint sets," Opt. Lett. 18, 1183-1185 (1993).
-
(1993)
Opt. Lett
, vol.18
, pp. 1183-1185
-
-
Rosen, J.1
-
23
-
-
0020173780
-
Phase retrieval algorithms: A comparison
-
J. R. Fienup, "Phase retrieval algorithms: a comparison," Appl. Opt. 21, 2758-2769 (1982).
-
(1982)
Appl. Opt
, vol.21
, pp. 2758-2769
-
-
Fienup, J.R.1
-
24
-
-
33744788334
-
Known-plaintext attack on optical encryption based on double random phase keys
-
X. Peng, P. Zhang, H. Wei, and B. Yu, "Known-plaintext attack on optical encryption based on double random phase keys," Opt. Lett. 31, 1044-1046 (2006).
-
(2006)
Opt. Lett
, vol.31
, pp. 1044-1046
-
-
Peng, X.1
Zhang, P.2
Wei, H.3
Yu, B.4
|