-
1
-
-
0029289969
-
Optical image encryption based on input plane and Fourier plane random encoding
-
P. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995).
-
(1995)
Opt. Lett.
, vol.20
, pp. 767-769
-
-
Refregier, P.1
Javidi, B.2
-
2
-
-
36749065046
-
Key-space analysis of double random phase encryption technique
-
DOI 10.1364/AO.46.006641
-
D. S. Monaghan, U. Gopinathan, T. J. Naughton, and J. T. Sheridan, "Key-space analysis of double random phase encryption technique," Appl. Opt. 46, 6641-6647 (2007). (Pubitemid 350206717)
-
(2007)
Applied Optics
, vol.46
, Issue.26
, pp. 6641-6647
-
-
Monaghan, D.S.1
Gopinathan, U.2
Naughton, T.J.3
Sheridan, J.T.4
-
3
-
-
0000780878
-
Encrypted optical memory using double-random phase encoding
-
B. Javidi, G. Zhang and J. Li, "Encrypted optical memory using double-random phase encoding," Opt. Eng. 36, 1054-1058 (1997). (Pubitemid 127639884)
-
(1997)
Applied Optics
, vol.36
, Issue.5
, pp. 1054-1058
-
-
Javidi, B.1
Zhang, G.2
Li, J.3
-
4
-
-
0032607911
-
Encrypted optical memory system using three-dimensional keys in the Fresnel domain
-
O. Matoba and B. Javidi, "Encrypted optical memory system using three-dimensional keys in the Fresnel domain" Opt. Lett. 24, 762-764 (1999). (Pubitemid 129306550)
-
(1999)
Optics Letters
, vol.24
, Issue.11
, pp. 762-764
-
-
Matoba, O.1
Javidi, B.2
-
5
-
-
22144431522
-
Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys
-
DOI 10.1364/OL.30.001644
-
A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, "Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys," Opt. Lett. 30, 1644-1646 (2005). (Pubitemid 40972027)
-
(2005)
Optics Letters
, vol.30
, Issue.13
, pp. 1644-1646
-
-
Carnicer, A.1
Montes-Usategui, M.2
Arcos, S.3
Juvells, I.4
-
6
-
-
33744788334
-
Known-plaintext attack on optical encryption based on double random phase keys
-
DOI 10.1364/OL.31.001044
-
X. Peng, P. Zhang, H. Wei, and B. Yu, "Known-plaintext attack on optical encryption based on double random phase keys," Opt. Lett. 31, 1044-1046 (2006). (Pubitemid 43837446)
-
(2006)
Optics Letters
, vol.31
, Issue.8
, pp. 1044-1046
-
-
Peng, X.1
Zhang, P.2
Wei, H.3
Yu, B.4
-
7
-
-
0012194479
-
Optical image encryption with multistage and multichannel fractional Fourier-domain filtering
-
S. Liu, Q. Mi, and B. Zhu, "Optical image encryption with multistage and multichannel fractional Fourier-domain filtering," Opt. Lett. 26, 1242-1244 (2001). (Pubitemid 33693191)
-
(2001)
Optics Letters
, vol.26
, Issue.16
, pp. 1242-1244
-
-
Liu, S.1
Mi, Q.2
Zhu, B.3
-
8
-
-
0037083542
-
Optical encryption based on iterative fractional Fourier transform
-
DOI 10.1016/S0030-4018(02)01113-6, PII S0030401802011136
-
Y. Zhang, CH. Zheng, N. Tanno, "Optical encryption based on iterative fractional Fourier transform," Opt. Commun. 202, 277-285 (2002). (Pubitemid 34156760)
-
(2002)
Optics Communications
, vol.202
, Issue.4-6
, pp. 277-285
-
-
Zhang, Y.1
Zheng, C.-H.2
Tanno, N.3
-
9
-
-
33750518839
-
Image encryption based on anamorphic fractional Fourier transform and three-step phase-shifting interferometry
-
X. Wang and D. Zhao, "Image encryption based on anamorphic fractional Fourier transform and three-step phase-shifting interferometry," Opt. Commun. 268, 240-244 (2006).
-
(2006)
Opt. Commun.
, vol.268
, pp. 240-244
-
-
Wang, X.1
Zhao, D.2
-
10
-
-
38549139189
-
Random fractional Fourier transform
-
DOI 10.1364/OL.32.002088
-
Z. Liu and S. Liu, "Random fractional Fourier transform," Opt. Lett. 32, 2088-2090 (2007). (Pubitemid 351299445)
-
(2007)
Optics Letters
, vol.32
, Issue.15
, pp. 2088-2090
-
-
Liu, Z.1
Liu, S.2
-
11
-
-
33845943233
-
Optical image encryption with Hartley transforms
-
DOI 10.1364/OL.31.003438
-
L. Chen and D. Zhao, "Optical image encryption with Hartley transforms," Opt. Lett. 31, 3438-3440 (2006). (Pubitemid 46034599)
-
(2006)
Optics Letters
, vol.31
, Issue.23
, pp. 3438-3440
-
-
Chen, L.1
Zhao, D.2
-
12
-
-
9144238259
-
Encryption of digital hologram of 3-d object by virtual optics
-
H. Kim, D. H. Kim, and Y. Lee, "Encryption of digital hologram of 3-d object by virtual optics," Opt. Express 12, 4912-4921 (2004).
-
(2004)
Opt. Express
, vol.12
, pp. 4912-4921
-
-
Kim, H.1
Kim, D.H.2
Lee, Y.3
-
13
-
-
33847680180
-
Randomization of the Fourier transform
-
DOI 10.1364/OL.32.000478
-
Z. Liu and S. Liu, "Randomization of the Fourier transform," Opt. Lett. 32, 478-480 (2007). (Pubitemid 46363499)
-
(2007)
Optics Letters
, vol.32
, Issue.5
, pp. 478-480
-
-
Liu, Z.1
Liu, S.2
-
14
-
-
34249314708
-
Double image encryption based on iterative fractional Fourier transform
-
DOI 10.1016/j.optcom.2007.03.039, PII S0030401807003240
-
Z. Liu and S. Liu, "Double image encryption based on iterative fractional Fourier transform," Opt. Commun. 275, 324-329 (2007). (Pubitemid 46809945)
-
(2007)
Optics Communications
, vol.275
, Issue.2
, pp. 324-329
-
-
Liu, Z.1
Liu, S.2
-
15
-
-
20444461085
-
Multiple-image encryption by wavelength multiplexing
-
G. Situ and J. Zhang, "Multiple-image encryption by wavelength multiplexing," Opt. Lett. 30, 1306-1308 (2005). (Pubitemid 40818548)
-
(2005)
Optics Letters
, vol.30
, Issue.11
, pp. 1306-1308
-
-
Situ, G.1
Zhang, J.2
-
16
-
-
54849403483
-
Double-Image encryption based on iterative gyrator transform
-
H. Li and Y. Wang,"Double-image encryption based on iterative gyrator transform," Opt. Commun. 281, 5745-5749 (2008).
-
(2008)
Opt. Commun.
, vol.281
, pp. 5745-5749
-
-
Li, H.1
Wang, Y.2
-
17
-
-
13944275620
-
Multiple image encryption and watermarking by random phase matching
-
DOI 10.1016/j.optcom.2004.11.034, PII S0030401804011629
-
M. Z. He, L. Z. Cai, Q. Liu, X. C. Wang, and X. F. Meng, "Multiple image encryption and watermarking by random phase matching," Opt. Commun. 247, 29-37 (2005). (Pubitemid 40266292)
-
(2005)
Optics Communications
, vol.247
, Issue.1-3
, pp. 29-37
-
-
He, M.Z.1
Cai, L.Z.2
Liu, Q.3
Wang, X.C.4
Meng, X.F.5
-
18
-
-
57749210594
-
Triple image encryption scheme in fractional Fourier transform domains
-
Z. Liu, J. Dai, X. Sun, and S. Liu, "Triple image encryption scheme in fractional Fourier transform domains," Opt. Commun. 282, 518-522 (2009).
-
(2009)
Opt. Commun.
, vol.282
, pp. 518-522
-
-
Liu, Z.1
Dai, J.2
Sun, X.3
Liu, S.4
-
19
-
-
60749105721
-
A new kind of double image encryption by using a cutting spectrum in the 1-D fractional Fourier transform domains
-
Z. Liu, Q. Li, J. Dai, X. Sun, S. Liu, and M. A. Ahmad, "A new kind of double image encryption by using a cutting spectrum in the 1-D fractional Fourier transform domains," Opt. Commun. 282, 1536-1540 (2009).
-
(2009)
Opt. Commun.
, vol.282
, pp. 1536-1540
-
-
Liu, Z.1
Li, Q.2
Dai, J.3
Sun, X.4
Liu, S.5
Ahmad, M.A.6
-
20
-
-
55849128496
-
Optical image encryption based on interference
-
Y. Zhang and B. Wang, "Optical image encryption based on interference," Opt. Lett. 33, 2443-2445 (2008).
-
(2008)
Opt. Lett.
, vol.33
, pp. 2443-2445
-
-
Zhang, Y.1
Wang, B.2
-
21
-
-
0009247756
-
Optical implementation of the stream cipher based on the irreversible cellular automata algorithm
-
M. Madjarova, M. Kakuta, M. Yamaguchi and N. Ohyama, "Optical implementation of the stream cipher based on the irreversible cellular automata algorithm," Opt. Lett. 22, 1624-1626 (1997). (Pubitemid 127565244)
-
(1997)
Optics Letters
, vol.22
, Issue.21
, pp. 1624-1626
-
-
Madjarova, M.1
Kakuta, M.2
Yamaguchi, M.3
Ohyama, N.4
-
22
-
-
0041632282
-
Optical image encryption based on XOR operations
-
J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kim, "Optical image encryption based on XOR operations," Opt. Eng. 38, 47-54 (1999).
-
(1999)
Opt. Eng.
, vol.38
, pp. 47-54
-
-
Han, J.W.1
Park, C.S.2
Ryu, D.H.3
Kim, E.S.4
-
23
-
-
0002004846
-
Optical key bit stream generator
-
J. W. Han, S. Lee, and E. S. Kim, "Optical key bit stream generator," Opt. Eng. 38, 33-38 (1999). (Pubitemid 129580626)
-
(1999)
Optical Engineering
, vol.38
, Issue.1
, pp. 33-38
-
-
Han, J.-W.1
Lee, S.-H.2
Kim, E.-S.3
-
24
-
-
0001810720
-
High-security optical integrated stream ciphers
-
S. Zhang and R. Karim, "High-security optical integrated stream ciphers," Opt. Eng. 38, 20-24 (1999). (Pubitemid 129580624)
-
(1999)
Optical Engineering
, vol.38
, Issue.1
, pp. 20-24
-
-
Zhang, S.1
Karim, M.A.2
-
25
-
-
0000053322
-
Stream cipher based on pseudorandom number generation with optical affine transformation
-
T. Sasaki, H. Togo, J. Tanida, Y. Ichioka, "Stream cipher based on pseudorandom number generation with optical affine transformation," Appl. Opt. 39, 2340-2346 (2000).
-
(2000)
Appl. Opt.
, vol.39
, pp. 2340-2346
-
-
Sasaki, T.1
Togo, H.2
Tanida, J.3
Ichioka, Y.4
-
26
-
-
0015327061
-
A practical algorithm for the determination of phase from image and diffraction plane pictures
-
R. W. Gerchberg and W. O. Saxton, "A practical algorithm for the determination of phase from image and diffraction plane pictures," Optik 35, 237-246 (1972).
-
(1972)
Optik
, vol.35
, pp. 237-246
-
-
Gerchberg, R.W.1
Saxton, W.O.2
-
27
-
-
0020173780
-
Phase retrieval algorithms: A comparison
-
J. R. Fienup, "Phase retrieval algorithms: A comparison," Appl. Opt. 21, 2758-2769 (1982).
-
(1982)
Appl. Opt.
, vol.21
, pp. 2758-2769
-
-
Fienup, J.R.1
|