-
1
-
-
0029289969
-
Optical image encryption based on input plane encoding and Fourier plane random encoding
-
P. Refregier and B. Javidi, "Optical image encryption based on input plane encoding and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995).
-
(1995)
Opt. Lett.
, vol.20
, pp. 767-769
-
-
Refregier, P.1
Javidi, B.2
-
2
-
-
0032607911
-
Encrypted optical memory system using three-dimensional keys in the Fresnel domain
-
O. Matoba and B. Javidi, "Encrypted optical memory system using three-dimensional keys in the Fresnel domain," Opt. Lett. 24, 762-764 (1999). (Pubitemid 129306550)
-
(1999)
Optics Letters
, vol.24
, Issue.11
, pp. 762-764
-
-
Matoba, O.1
Javidi, B.2
-
3
-
-
20444461085
-
Multiple-image encryption by wavelength multiplexing
-
G. Situ and J. Zhang, "Multiple image encryption by wavelength multiplexing," Opt. Lett. 30, 1306-1308 (2005). (Pubitemid 40818548)
-
(2005)
Optics Letters
, vol.30
, Issue.11
, pp. 1306-1308
-
-
Situ, G.1
Zhang, J.2
-
4
-
-
31644440682
-
Multiplexing encryption-decryption via lateral shifting of a random phase mask
-
DOI 10.1016/j.optcom.2005.09.027, PII S0030401805009673
-
J. F. Barrera, R. Henao, R. Torroba, M. Tebaldi, and N. Bolognini, "Multiplexing encryption-decryption via lateral shifting of a random phase mask," Opt. Commun. 259, 532-536 (2006). (Pubitemid 43172231)
-
(2006)
Optics Communications
, vol.259
, Issue.2
, pp. 532-536
-
-
Barrera, J.F.1
Henao, R.2
Tebaldi, M.3
Torroba, R.4
Bolognini, N.5
-
5
-
-
72649107175
-
Multiple-image encryption and multiplexing using a modified Gerchberg-Saxton algorithm and phase modulation in Fresnel-transform domain
-
H.-E. Hwang, H. T. Chang, andW.-N. Lie, "Multiple-image encryption and multiplexing using a modified Gerchberg-Saxton algorithm and phase modulation in Fresnel-transform domain," Opt. Lett. 34, 3917-3919 (2009).
-
(2009)
Opt. Lett.
, vol.34
, pp. 3917-3919
-
-
Hwang, H.-E.1
Chang, H.T.2
Lie, W.-N.3
-
6
-
-
0001182141
-
Optical encryption by double-random phase encoding in the fractional Fourier domain
-
G. Unnikrishnan, J. Joseph, and K. Singh, "Optical encryption by double-random phase encoding in the fractional Fourier domain," Opt. Lett. 25, 887-889 (2000).
-
(2000)
Opt. Lett.
, vol.25
, pp. 887-889
-
-
Unnikrishnan, G.1
Joseph, J.2
Singh, K.3
-
7
-
-
0037443119
-
Optical image encryption by random shifting in fractional Fourier domains
-
B. Hennelly and J. T. Sheridan, "Optical image encryption by random shifting in fractional Fourier domains," Opt. Lett. 28, 269-271 (2003).
-
(2003)
Opt. Lett.
, vol.28
, pp. 269-271
-
-
Hennelly, B.1
Sheridan, J.T.2
-
8
-
-
36048937251
-
Optical image encryption using fractional Fourier transform and chaos
-
DOI 10.1016/j.optlaseng.2007.09.001, PII S0143816607001649
-
N. Singh and A. Sinha, "Optical image encryption using fractional Fourier transform and chaos," Opt. Lasers Eng. 46, 117-123 (2008). (Pubitemid 350087229)
-
(2008)
Optics and Lasers in Engineering
, vol.46
, Issue.2
, pp. 117-123
-
-
Singh, N.1
Sinha, A.2
-
9
-
-
77954936135
-
Optical image compression and encryption methods
-
A. Alfalou and C. Brosseau, "Optical image compression and encryption methods," Opt. Photon. 1, 589-636 (2009).
-
(2009)
Opt. Photon.
, vol.1
, pp. 589-636
-
-
Alfalou, A.1
Brosseau, C.2
-
10
-
-
0001248217
-
Optical image encryption based on multifractional Fourier transforms
-
B. Zhu, S. Liu, and Q. Ran, "Optical image encryption based on multifractional Fourier transforms," Opt. Lett. 25, 1159-1161 (2000).
-
(2000)
Opt. Lett.
, vol.25
, pp. 1159-1161
-
-
Zhu, B.1
Liu, S.2
Ran, Q.3
-
11
-
-
78650033282
-
Flexible optical encryption with multiple users and multiple security levels
-
N. K. Nishchal and T. J. Naughton, "Flexible optical encryption with multiple users and multiple security levels," Opt. Commun. 284, 735-739 (2011).
-
(2011)
Opt. Commun.
, vol.284
, pp. 735-739
-
-
Nishchal, N.K.1
Naughton, T.J.2
-
12
-
-
55849128496
-
Optical image encryption based on interference
-
Y. Zhang and B. Wang, "Optical image encryption based on interference," Opt. Lett. 33, 2443-2445 (2008).
-
(2008)
Opt. Lett.
, vol.33
, pp. 2443-2445
-
-
Zhang, Y.1
Wang, B.2
-
13
-
-
70450187173
-
Enhancement of image hiding by exchanging two phase masks
-
Y. Zhang, B. Wang, and Z. Dong, "Enhancement of image hiding by exchanging two phase masks," J. Opt. A: Pure Appl. Opt. 11, 125406 (2009).
-
(2009)
J. Opt. A: Pure Appl. Opt.
, vol.11
, pp. 125406
-
-
Zhang, Y.1
Wang, B.2
Dong, Z.3
-
14
-
-
77249163176
-
Optical image encryption based on two beams interference
-
Y. Han and Y. Zhang, "Optical image encryption based on two beams interference," Opt. Commun. 283, 1690-1692 (2010).
-
(2010)
Opt. Commun.
, vol.283
, pp. 1690-1692
-
-
Han, Y.1
Zhang, Y.2
-
15
-
-
77950901513
-
An encryption method with multiple encrypted keys based on interference principle
-
C. H. Niu, X. L. Wang, N. G. Lv, Z. H Zhou, and X. Y. Li, "An encryption method with multiple encrypted keys based on interference principle," Opt. Express 18, 7827-7834 (2010).
-
(2010)
Opt. Express
, vol.18
, pp. 7827-7834
-
-
Niu, C.H.1
Wang, X.L.2
Lv, N.G.3
Zhou, Z.H.4
Li, X.Y.5
-
16
-
-
79952312318
-
Experimental verification of optical image encryption based on interference
-
D. Weng, N. Zhu, Y. Wang, J. Xie, and J. Liu, "Experimental verification of optical image encryption based on interference," Opt. Commun. 284, 2485-2487 (2011).
-
(2011)
Opt. Commun.
, vol.284
, pp. 2485-2487
-
-
Weng, D.1
Zhu, N.2
Wang, Y.3
Xie, J.4
Liu, J.5
-
17
-
-
79958850486
-
Optical image encryption using jigsaw transform for silhouette removal in interferencebased methods and decryption with single spatial light modulator
-
P. Kumar, J. Joseph, and K. Singh, "Optical image encryption using jigsaw transform for silhouette removal in interferencebased methods and decryption with single spatial light modulator," Appl. Opt. 50, 1805-1811 (2011).
-
(2011)
Appl. Opt.
, vol.50
, pp. 1805-1811
-
-
Kumar, P.1
Joseph, J.2
Singh, K.3
-
18
-
-
79851476254
-
Optical stream-cipher-like system for image encryption based on Michelson interferometer
-
B. Yang, Z. Liu, B. Wang, Y. Zhang, and S. Liu, "Optical stream-cipher-like system for image encryption based on Michelson interferometer," Opt. Express 19, 2634-2642 (2011).
-
(2011)
Opt. Express
, vol.19
, pp. 2634-2642
-
-
Yang, B.1
Liu, Z.2
Wang, B.3
Zhang, Y.4
Liu, S.5
-
19
-
-
80052804056
-
Information hiding based on the optical interference principle
-
S. Yuan, S.-X. Yao, Y.-H. Xin, and M.-T. Liu, "Information hiding based on the optical interference principle," Opt. Commun. 284, 5078-5083 (2011).
-
(2011)
Opt. Commun.
, vol.284
, pp. 5078-5083
-
-
Yuan, S.1
Yao, S.-X.2
Xin, Y.-H.3
Liu, M.-T.4
-
21
-
-
33846148634
-
Asymmetric cryptography based on wavefront sensing
-
DOI 10.1364/OL.31.003579
-
X. Peng, H. Wie, and P. Zhang, "Asymmetric cryptography based on wavefront sensing," Opt. Lett. 31, 3579-3581 (2006). (Pubitemid 46079708)
-
(2006)
Optics Letters
, vol.31
, Issue.24
, pp. 3579-3581
-
-
Peng, X.1
Wei, H.2
Zhang, P.3
-
22
-
-
75749131585
-
Asymmetric cryptosystem based on phase-truncated Fourier transforms
-
W. Qin and X. Peng, "Asymmetric cryptosystem based on phase-truncated Fourier transforms," Opt. Lett. 35, 118-120 (2010).
-
(2010)
Opt. Lett.
, vol.35
, pp. 118-120
-
-
Qin, W.1
Peng, X.2
-
23
-
-
81355163453
-
Universal and special keys based on phase-truncated Fourier transform
-
W. Qin, X. Peng, X. Meng, and B. Gao, "Universal and special keys based on phase-truncated Fourier transform," Opt. Eng. 50, 080501 (2011).
-
(2011)
Opt. Eng.
, vol.50
, pp. 080501
-
-
Qin, W.1
Peng, X.2
Meng, X.3
Gao, B.4
-
24
-
-
78649684161
-
Multiple-image encryption based on nonlinear amplitude-truncation and phase-truncation in Fourier domain
-
X. Wang and D. Zhao, "Multiple-image encryption based on nonlinear amplitude-truncation and phase-truncation in Fourier domain," Opt. Commun. 284, 148-152 (2011).
-
(2011)
Opt. Commun.
, vol.284
, pp. 148-152
-
-
Wang, X.1
Zhao, D.2
-
25
-
-
84255184192
-
Security enhancement of a phasetruncation based image encryption algorithm
-
X. Wang and D. Zhao, "Security enhancement of a phasetruncation based image encryption algorithm," Appl. Opt. 50, 6645-6651 (2011).
-
(2011)
Appl. Opt.
, vol.50
, pp. 6645-6651
-
-
Wang, X.1
Zhao, D.2
-
26
-
-
22144431522
-
Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys
-
DOI 10.1364/OL.30.001644
-
A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, "Vulnerability to chosen-cyphertext attacks of the optical encryption schemes based on double random phase keys," Opt. Lett. 30, 1644-1646 (2005). (Pubitemid 40972027)
-
(2005)
Optics Letters
, vol.30
, Issue.13
, pp. 1644-1646
-
-
Carnicer, A.1
Montes-Usategui, M.2
Arcos, S.3
Juvells, I.4
-
27
-
-
33744788334
-
Known-plaintext attack on optical encryption based on double random phase keys
-
DOI 10.1364/OL.31.001044
-
X. Peng, P. Chang, H.Wei, and B. Yu, "Known plaintext attack on optical encryption based on double random phase keys," Opt. Lett. 31, 1044-1046 (2006). (Pubitemid 43837446)
-
(2006)
Optics Letters
, vol.31
, Issue.8
, pp. 1044-1046
-
-
Peng, X.1
Zhang, P.2
Wei, H.3
Yu, B.4
-
28
-
-
34547780523
-
Resistance of the double random phase encryption against various attacks
-
DOI 10.1364/OE.15.010253
-
Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, "Resistance of the double random phase encryption against various attacks," Opt. Express 15, 10253-10265 (2007). (Pubitemid 47230839)
-
(2007)
Optics Express
, vol.15
, Issue.16
, pp. 10253-10265
-
-
Frauel, Y.1
Castro, A.2
Naughton, T.J.3
Javidi, B.4
|