-
1
-
-
0018705007
-
Symmetric and asymmetric encryption
-
G. J. Simmons, "Symmetric and asymmetric encryption.," ACM Comput. Surv. 11, 305-330 (1979).
-
(1979)
ACM Comput. Surv.
, vol.11
, pp. 305-330
-
-
Simmons, G.J.1
-
3
-
-
0029289969
-
Optical image encryption based on input plane and Fourier plane random encoding
-
P. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding.," Opt. Lett. 20, 767-769 (1995).
-
(1995)
Opt. Lett.
, vol.20
, pp. 767-769
-
-
Refregier, P.1
Javidi, B.2
-
4
-
-
66249147554
-
Optical techniques for information security
-
O. Matoba, T. Nomura, E. P. Cabré, M. S. Millán, and B. Javidi, "Optical techniques for information security.," Proc. IEEE 97, 1128-1148 (2009).
-
(2009)
Proc. IEEE
, vol.97
, pp. 1128-1148
-
-
Matoba, O.1
Nomura, T.2
Cabré, E.P.3
Millán, M.S.4
Javidi, B.5
-
5
-
-
33646881267
-
The multiple-parameter discrete fractional Fourier transform
-
S. C. Pei and W. L. Hsue, "The multiple-parameter discrete fractional Fourier transform.," IEEE Signal Process. Lett. 13, 329-332 (2006).
-
(2006)
IEEE Signal Process. Lett.
, vol.13
, pp. 329-332
-
-
Pei, S.C.1
Hsue, W.L.2
-
6
-
-
70349588470
-
Random discrete fractional Fourier transform
-
S. C. Pei and W. L. Hsue, "Random discrete fractional Fourier transform.," IEEE Signal Process. Lett. 16, 1015-1018 (2009).
-
(2009)
IEEE Signal Process. Lett.
, vol.16
, pp. 1015-1018
-
-
Pei, S.C.1
Hsue, W.L.2
-
7
-
-
77954977840
-
Optical encryption based on computational ghost imaging
-
P. Clemente, V. Durán, V. T. Company, E. Tajahuerce, and J. Lancis, "Optical encryption based on computational ghost imaging.," Opt. Lett. 35, 2391-2393 (2010).
-
(2010)
Opt. Lett.
, vol.35
, pp. 2391-2393
-
-
Clemente, P.1
Durán, V.2
Company, V.T.3
Tajahuerce, E.4
Lancis, J.5
-
8
-
-
3142707161
-
Double random-phase encoding in the Fresnel domain
-
G. Situ and J. Zhang, "Double random-phase encoding in the Fresnel domain.," Opt. Lett. 29, 1584-1586 (2004).
-
(2004)
Opt. Lett.
, vol.29
, pp. 1584-1586
-
-
Situ, G.1
Zhang, J.2
-
9
-
-
0001182141
-
Optical encryption by double-random phase encoding in the fractional Fourier domain
-
G. Unnikrishnan, J. Joseph, and K. Singh, "Optical encryption by double-random phase encoding in the fractional Fourier domain.," Opt. Lett. 25, 887-889 (2000).
-
(2000)
Opt. Lett.
, vol.25
, pp. 887-889
-
-
Unnikrishnan, G.1
Joseph, J.2
Singh, K.3
-
10
-
-
9144238259
-
Encryption of digital hologram of 3D object by virtual optics
-
H. Kim, D. H. Kim, and Y. H. Lee, "Encryption of digital hologram of 3D object by virtual optics.," Opt. Express 12, 4912-4921 (2004).
-
(2004)
Opt. Express
, vol.12
, pp. 4912-4921
-
-
Kim, H.1
Kim, D.H.2
Lee, Y.H.3
-
11
-
-
33745739431
-
Two-step phase-shifting interferometry and its application in image encryption
-
X. F. Meng, L. Z. Cai, X. F. Xu, X. L. Yang, X. X. Shen, G. Y. Dong, and Y. R. Wang, "Two-step phase-shifting interferometry and its application in image encryption.," Opt. Lett. 31, 1414-1416 (2006).
-
(2006)
Opt. Lett.
, vol.31
, pp. 1414-1416
-
-
Meng, X.F.1
Cai, L.Z.2
Xu, X.F.3
Yang, X.L.4
Shen, X.X.5
Dong, G.Y.6
Wang, Y.R.7
-
12
-
-
0037055723
-
Multiple-phase retrieval for optical security systems by use of random-phase encoding
-
H. T. Chang, W. C. Lu, and C. J. Kuo, "Multiple-phase retrieval for optical security systems by use of random-phase encoding.," Appl. Opt. 41, 4825-4834 (2002).
-
(2002)
Appl. Opt.
, vol.41
, pp. 4825-4834
-
-
Chang, H.T.1
Lu, W.C.2
Kuo, C.J.3
-
13
-
-
78349251375
-
Image encryption by encoding with a nonuniform optical beam in gyrator transform domains
-
Z. Liu, L. Xu, C. Lin, and S. Liu, "Image encryption by encoding with a nonuniform optical beam in gyrator transform domains.," Appl. Opt. 49, 5632-5637 (2010).
-
(2010)
Appl. Opt.
, vol.49
, pp. 5632-5637
-
-
Liu, Z.1
Xu, L.2
Lin, C.3
Liu, S.4
-
14
-
-
72649107175
-
Multiple-image encryption and multiplexing using a modified Gerchberg-Saxton algorithm and phase modulation in Fresnel-transform domain
-
H. E. Hwang, H. T. Chang, and W. N. Lie, "Multiple-image encryption and multiplexing using a modified Gerchberg-Saxton algorithm and phase modulation in Fresnel-transform domain.," Opt. Lett. 34, 3917-3919 (2009).
-
(2009)
Opt. Lett.
, vol.34
, pp. 3917-3919
-
-
Hwang, H.E.1
Chang, H.T.2
Lie, W.N.3
-
15
-
-
72049098841
-
Security enhanced optical encryption system by random phase key and permutation key
-
M. He, Q. Tan, L. Cao, Q. He, and G. Jin, "Security enhanced optical encryption system by random phase key and permutation key.," Opt. Express 17, 22462-22473 (2009).
-
(2009)
Opt. Express
, vol.17
, pp. 22462-22473
-
-
He, M.1
Tan, Q.2
Cao, L.3
He, Q.4
Jin, G.5
-
16
-
-
60049100680
-
Introducing secure modes of operation for optical encryption
-
T. J. Naughton, B. M. Hennelly, and T. Dowling, "Introducing secure modes of operation for optical encryption.," J. Opt. Soc. Am. A 25, 2608-2617 (2008).
-
(2008)
J. Opt. Soc. Am. A
, vol.25
, pp. 2608-2617
-
-
Naughton, T.J.1
Hennelly, B.M.2
Dowling, T.3
-
17
-
-
54849403483
-
Double-image encryption based on iterative gyrator transform
-
H. Li and Y. Wang, "Double-image encryption based on iterative gyrator transform.," Opt. Commun. 281, 5745-5749 (2008).
-
(2008)
Opt. Commun.
, vol.281
, pp. 5745-5749
-
-
Li, H.1
Wang, Y.2
-
18
-
-
55849128496
-
Optical image encryption based on interference
-
Y. Zhang and B. Wang, "Optical image encryption based on interference.," Opt. Lett. 33, 2443-2445 (2008).
-
(2008)
Opt. Lett.
, vol.33
, pp. 2443-2445
-
-
Zhang, Y.1
Wang, B.2
-
19
-
-
39749189539
-
Multiple-image hiding in the Fresnel domain
-
Y. Shi, G. Situ, and J. Zhang, "Multiple-image hiding in the Fresnel domain.," Opt. Lett. 32, 1914-1916 (2007).
-
(2007)
Opt. Lett.
, vol.32
, pp. 1914-1916
-
-
Shi, Y.1
Situ, G.2
Zhang, J.3
-
20
-
-
77952860495
-
Double image encryption by using iterative random binary encoding in gyrator domains
-
Z. Liu, Q. Guo, L. Xu, M. A. Ahmad, and S. Liu, "Double image encryption by using iterative random binary encoding in gyrator domains.," Opt. Express 18, 12033-12043 (2010).
-
(2010)
Opt. Express
, vol.18
, pp. 12033-12043
-
-
Liu, Z.1
Guo, Q.2
Xu, L.3
Ahmad, M.A.4
Liu, S.5
-
21
-
-
60749105631
-
On the security of a cryptosystem based on multiple-parameters discrete fractional Fourier transform
-
A. M. Youssef, "On the security of a cryptosystem based on multiple-parameters discrete fractional Fourier transform.," IEEE Signal Process. Lett. 15, 77-78 (2008).
-
(2008)
IEEE Signal Process. Lett.
, vol.15
, pp. 77-78
-
-
Youssef, A.M.1
-
23
-
-
33744788334
-
Known-plaintext attack on optical encryption based on double random phase keys
-
X. Peng, P. Zhang, H. Wei, and B. Yu, "Known-plaintext attack on optical encryption based on double random phase keys.," Opt. Lett. 31, 1044-1046 (2006).
-
(2006)
Opt. Lett.
, vol.31
, pp. 1044-1046
-
-
Peng, X.1
Zhang, P.2
Wei, H.3
Yu, B.4
-
24
-
-
33845513584
-
Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain
-
X. Peng, H. Wei, and P. Zhang, "Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain.," Opt. Lett. 31, 3261-3263 (2006).
-
(2006)
Opt. Lett.
, vol.31
, pp. 3261-3263
-
-
Peng, X.1
Wei, H.2
Zhang, P.3
-
25
-
-
0015327061
-
A practical algorithm for the determination of phase from image and diffraction plane pictures
-
R. W. Gerchberg and W. O. Saxton, "A practical algorithm for the determination of phase from image and diffraction plane pictures.," Optik (Stuttgart) 35, 237-246 (1972).
-
(1972)
Optik (Stuttgart)
, vol.35
, pp. 237-246
-
-
Gerchberg, R.W.1
Saxton, W.O.2
-
26
-
-
0020173780
-
Phase retrieval algorithms: A comparison
-
J. R. Fienup, "Phase retrieval algorithms: a comparison.," Appl. Opt. 21, 2758-2769 (1982).
-
(1982)
Appl. Opt.
, vol.21
, pp. 2758-2769
-
-
Fienup, J.R.1
-
27
-
-
0033595278
-
Extending the methodology of X-ray crystallography to allow imaging of micrometer-sized non-crystalline specimens
-
J. Miao, P. Charalambous, J. Kirz, and D. Sayre, "Extending the methodology of X-ray crystallography to allow imaging of micrometer-sized non-crystalline specimens.," Nature (London) 400, 342-344 (1999).
-
(1999)
Nature (London)
, vol.400
, pp. 342-344
-
-
Miao, J.1
Charalambous, P.2
Kirz, J.3
Sayre, D.4
-
28
-
-
0000657882
-
Period of a discrete cat mapping
-
F. J. Dyson and H. Falk, "Period of a discrete cat mapping.," Am. Math. Mon. 99, 603-614 (1992).
-
(1992)
Am. Math. Mon.
, vol.99
, pp. 603-614
-
-
Dyson, F.J.1
Falk, H.2
-
29
-
-
78650532045
-
Space-based optical image encryption
-
W. Chen and X. Chen, "Space-based optical image encryption.," Opt. Express 18, 27095-27104 (2010).
-
(2010)
Opt. Express
, vol.18
, pp. 27095-27104
-
-
Chen, W.1
Chen, X.2
-
30
-
-
67651154670
-
Optical color image encryption based on Arnold transform and interference method
-
W. Chen, C. Quan, and C. J. Tay, "Optical color image encryption based on Arnold transform and interference method.," Opt. Commun. 282, 3680-3685 (2009).
-
(2009)
Opt. Commun.
, vol.282
, pp. 3680-3685
-
-
Chen, W.1
Quan, C.2
Tay, C.J.3
-
32
-
-
78549284601
-
Optical image encryption based on diffractive imaging
-
W. Chen, X. Chen, and C. J. R. Sheppard, "Optical image encryption based on diffractive imaging.," Opt. Lett. 35, 3817-3819 (2010).
-
(2010)
Opt. Lett.
, vol.35
, pp. 3817-3819
-
-
Chen, W.1
Chen, X.2
Sheppard, C.J.R.3
-
33
-
-
79955803968
-
Optical cryptography topology based on a three-dimensional particle-like distribution and diffractive imaging
-
W. Chen and X. Chen, "Optical cryptography topology based on a three-dimensional particle-like distribution and diffractive imaging.," Opt. Express 19, 9008-9019 (2011).
-
(2011)
Opt. Express
, vol.19
, pp. 9008-9019
-
-
Chen, W.1
Chen, X.2
-
34
-
-
70350572878
-
Color image encryption based on interference and virtual optics
-
C. J. Tay, C. Quan, W. Chen, and Y. Fu, "Color image encryption based on interference and virtual optics.," Opt. Laser Technol. 42, 409-415 (2010).
-
(2010)
Opt. Laser Technol.
, vol.42
, pp. 409-415
-
-
Tay, C.J.1
Quan, C.2
Chen, W.3
Fu, Y.4
-
35
-
-
85030571434
-
-
The plaintext (Lena)
-
The plaintext (Lena): http://sipi.usc.edu/database.
-
-
-
-
36
-
-
33745160397
-
Information hiding based on double-random phase encoding technology
-
X. Zhou and J. G. Chen, "Information hiding based on double-random phase encoding technology.," J. Mod. Opt. 53, 1777-1783 (2006).
-
(2006)
J. Mod. Opt.
, vol.53
, pp. 1777-1783
-
-
Zhou, X.1
Chen, J.G.2
-
37
-
-
34548567436
-
Digital color image watermarking based on phase-shifting interferometry and neighboring pixel value subtraction algorithm in the discrete-cosine-transform domain
-
X. F. Meng, L. Z. Cai, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and Y. R. Wang, "Digital color image watermarking based on phase-shifting interferometry and neighboring pixel value subtraction algorithm in the discrete-cosine-transform domain.," Appl. Opt. 46, 4694-4701 (2007).
-
(2007)
Appl. Opt.
, vol.46
, pp. 4694-4701
-
-
Meng, X.F.1
Cai, L.Z.2
Yang, X.L.3
Xu, X.F.4
Dong, G.Y.5
Shen, X.X.6
Zhang, H.7
Wang, Y.R.8
-
38
-
-
78149453265
-
Robust image watermarking scheme against geometric attacks using a computer-generated hologram
-
J. Li, "Robust image watermarking scheme against geometric attacks using a computer-generated hologram.," Appl. Opt. 49, 6302-6312 (2010).
-
(2010)
Appl. Opt.
, vol.49
, pp. 6302-6312
-
-
Li, J.1
-
39
-
-
79958756713
-
Color image hiding based on the phase retrieval technique and Arnold transform
-
X. Shi and D. Zhao, "Color image hiding based on the phase retrieval technique and Arnold transform.," Appl. Opt. 50, 2134-2139 (2011).
-
(2011)
Appl. Opt.
, vol.50
, pp. 2134-2139
-
-
Shi, X.1
Zhao, D.2
|