참고문헌
- B. Javidi, J.L. Horner, 'Optical pattern recognition for validation and security verification,' Optical Engineering, Vol. 33, Nol. 6, pp. 1752-1756, 1994 https://doi.org/10.1117/12.170736
- R.K. Wang, I.A. Watson, C. Chatwin, 'Random phase encoding for optical security,' Optical Engineering, Vol. 35, No. 9, pp. 2464-2469 https://doi.org/10.1117/1.600849
- J.W. Han, C.S. Park, D.H. Ryu, E.S. Kim, 'Optical image encrypion based on XOR operations,' Optical Engineering, Vol. 38, No. 1, pp. 47-54, 1999 https://doi.org/10.1117/1.602060
- L. G. Neto, 'Implementation of image encryption using the phase-contrast technique,' Proceedings of SPIE, Vol. 3386, pp. 284-290, 1998 https://doi.org/10.1117/12.304774
- P. Stepien, R. Gajda, T. Szoplik, 'Distributed kinoforms in optical security applications,' Optical Engineering, Vol. 35, No. 9, pp. 2453-2458, 1996 https://doi.org/10.1117/1.600847
- P. Refregier and B. Javidi, 'Optical image encryption based on input plane and Fourier plane random encoding,' Optics Letter, Vol. 20, No. 7, pp.767-769, 1995 https://doi.org/10.1364/OL.20.000767
- B. Javidi, G. Zhang, Jian Li, 'Experimental demonstration of the random phase encoding technique for image encryption and security verification,' Optical Engineering, Vol. 35, No. 9, pp. 2506-2512, 1996 https://doi.org/10.1117/1.600854
- B. Javidi, E. Ahouzi, 'Optical security system with Fourier plane encodingm,' Applied Optics, Vol. 37, No. 26, pp. 6247-6255, 1998 https://doi.org/10.1364/AO.37.006247
- G. Unnikrishnan, J. Joseph, K. Singh, 'Optical encryption system that uses phase conjugation in a photorefractive crystal,' Applied Optics, Vol. 37, No. 35, pp. 8181-8186, 1998 https://doi.org/10.1364/AO.37.008181
- T. Nomura, B. Javidi, 'Optical encryption using a joint transform correlator architecture,' Optical Engineering, Vol. 39, No. 8, pp. 2031-2035, 2000 https://doi.org/10.1117/1.1304844
- M. Yamaszki and J. Ohtsubo, 'Optimization of encrypted holograms in optical security systems,' Optical Engineering, Vol. 40, No. 1, pp. 132-137 https://doi.org/10.1117/1.1334947
- T. Sasaki, H. Togo, J. Tnida and Y. Ichioka, 'Stream cipher based on pseudorandom number generation with optical affine transformation,' Applied Optics, Vol. 39, No. 14, pp. 2340-2346, 2000 https://doi.org/10.1364/AO.39.002340
- P. C. Mogensen, J. Gluckstad, 'Phase-only optical encryption,' Optics Letter, Vol. 25, No. 8, pp. 566-568, 2000 https://doi.org/10.1364/OL.25.000566
- Optical Engineering v.40 no.1 Optimization of encrypted holograms in optical security systems M.Yamaszki;J.Ohtsubo https://doi.org/10.1117/1.1334947
- Applied Optics v.39 no.14 Stream cipher based on pseudorandom number generation with optical affine transformation T.Sasaki;H.Togo;J.Tnida;Y.Ichioka https://doi.org/10.1364/AO.39.002340
- Optics Letter v.25 no.8 Phase-only optical encryption P.C.Mogensen;J.Gluckstad https://doi.org/10.1364/OL.25.000566