광기술을 이용한 차세대 정보보안 기술

  • 윤진선 (충북대학교 전기전자공학부) ;
  • 김남 (충북대학교 전기전자공학부)
  • Published : 2002.08.01

Abstract

Keywords

References

  1. J. S. Yoon and N. Kim, 'Triple encryption packaging scheme for preserving from the reproduction and protecting the information,' Jpn. J. Appl. Phys., PT. 2, vol. 41, no. 3B, pp. L305-L306, Mar. 2002 https://doi.org/10.1143/JJAP.41.L305
  2. 윤진선, 김남, 전용성, 정교일, '광기술을 이용한 정보보안', 전자공학회지, 제28권 제6호, pp. 65-72, 2001년 6월
  3. 한국전자통신연구원, '차세대 IC 카드를 위한 홀로그래픽 위상 패턴을 이용한 신분 복제방지기술에 관한 연구', 2000년 11월
  4. 김승주, 이홍섭, '암호기술 동향,' 전자공학회지, 제28권 제6호, pp. 22-29, 2001년 6월
  5. Ph. Refregier and B. Javidi, 'Optical image encryption based on input plane and Fourier plane random encoding,' Opt. Lett., vol. 20. no. 7, pp. 767-769, Apr. 1995 https://doi.org/10.1364/OL.20.000767
  6. B. Javidi, G. Zhang, and J. Li, 'Encrypted optical memory using double random phase encoding,' Appl. Opt., vol. 36, no. 5, pp. 1054-1058, Feb. 1997 https://doi.org/10.1364/AO.36.001054
  7. B. Javidi, G. Zhang, and J. Li, 'Experimental demonstration of the random phase encoding technique for image encryption and security verification,' Opt. Eng., vol. 35, no. 9, pp. 2506-2512, Sept. 1996 https://doi.org/10.1117/1.600854
  8. J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kim, 'Optical image encryption based on XOR operation,' Opt. Eng., vol. 38, no. 1, pp. 47-54, Jan. 1999 https://doi.org/10.1117/1.602060
  9. T. Nomura and B. Javidi, 'High speed optical encryption using binary encoding algorithms,' LEOS '99, vol. 1, pp. 192-193, Nov. 1999
  10. T. Nomura, B. Javidi, S. Mikan, and Y. Morimoto, 'Optical image encryption using an optically designed encryption key,' CLEO/Pacific Rim 2001, vol. 2, pp. 492-493, 2001
  11. O. Matoba and B. Javidi, 'Encrypted optical memory system using threedimensional keys in the Fresnel domain,' Opt. Lett., vol. 24, no. 11, pp. 762-764, June 1999 https://doi.org/10.1364/OL.24.000762
  12. B. Javidi and J. L. Horner, 'Optical pattern recognition for validation and security verification,' Opt. Eng., vol. 33, no. 6, pp. 1752-1756, June 1994 https://doi.org/10.1117/12.170736
  13. B. Javidi and A. Sergent, 'Fully phase encoded key and biometrics for security verification,' Opt. Eng., vol. 36, no. 3, pp, 935-942, Mar. 1997 https://doi.org/10.1117/1.601259
  14. M. Yamazaki, 'Optimization of encrypted holograms in optical secirity systems', Opt. Eng., vol. 40, no. 1, pp. 132-137, Jan. 2001 https://doi.org/10.1117/1.1334947
  15. K. H. Fielding, J. L. Horner, and C. K. Makekau, 'Optical fingerprint identification by binary joint transform correlation', Opt. Eng., vol. 30, no. 12, pp. 1958-1961, Dec. 1991 https://doi.org/10.1117/12.56030