References
- B. Javidi and J. L. Horner, "Optical pattern recognition for validation and security verification," Opt. Eng. 33, 1752-1756 (1994). https://doi.org/10.1117/12.170736
- J. F. Heanue, M. C. Bashaw, and L. Hesselink, "Encrypted holographic data storage based on orthogonal-phase-code multiplexing," Appl. Opt. 34, 6012-6015 (1995). https://doi.org/10.1364/AO.34.006012
- P. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995). https://doi.org/10.1364/OL.20.000767
- B. Javidi, A. Sergent, and E. Ahouzi, "Performance of double phase encoding encryption technique using binarized encrypted images," Opt. Eng. 37, 565-569 (1998). https://doi.org/10.1117/1.601645
- D. Weber and J. Trolinger, "Novel implementation of nonlinear joint transform correlators in optical security and validation," Opt. Eng. 38, 62-68 (1999). https://doi.org/10.1117/1.602062
- E. Cuche, F. Bevilacqua, and C. Depeursinge, "Digital holography for quantitative phase-contrast imaging," Opt. Lett. 24, 291-293 (1999). https://doi.org/10.1364/OL.24.000291
- B. Javidi and T. Nomura, "Securing information by means of digital holography," Opt. Lett. 25, 28-30 (2000). https://doi.org/10.1364/OL.25.000028
- G. Unnikrishnan and K. Singh, "Double random fractional Fourier domain encoding for optical security," Opt. Eng. 39, 2853-2859 (2000). https://doi.org/10.1117/1.1313498
- G.-S. Lin, H. T. Chang, W.-N. Lie, and C.-H. Chuang, "Public-key-based optical image cryptosystem based on data embedding techniques," Opt. Eng. 42, 2331-2339 (2003). https://doi.org/10.1117/1.1588660
- R. Arizaga and R. Torroba, "Validation through a binary key code and a polarization sensitive digital technique," Opt. Commun. 215, 31-36 (2003). https://doi.org/10.1016/S0030-4018(02)02189-2
- T. Nomura, A. Okazaki, M. Kameda, and Y. Morimoto, "Image reconstruction from compressed encrypted digital hologram," Opt. Eng. 44, 2313-2320 (2005).
- H. J. Lee and S. K. Gil, "Error analysis for optical security by means of 4-step phase-shfting digital hologaphy," J. Opt. Soc. Korea 10, 118-123 (2006). https://doi.org/10.3807/JOSK.2006.10.3.118
- S. K. Gil, S. H. Jeon, N. Kim, and J. R. Jeong, "Successive encryption and transmission with phase-shifting digital holography," Proc. SPIE 6136, 339-346 (2006).
- S. H. Jeon and S. K. Gil, "QPSK modulation based optical image cryptosystem using phase-shifting digital holography," J. Opt. Soc. Korea 14, 97-103 (2010). https://doi.org/10.3807/JOSK.2010.14.2.097
- P. Hariharan, "Digital phase-shifting interferometry: a simple error compensating phase calculation algorithm," Appl. Opt. 26, 2504-2506 (1987). https://doi.org/10.1364/AO.26.002504
- I. Yamaguchi and T. Zhang, "Phase-shifting digital holography," Opt. Lett. 22, 610-612 (1998)
- M.-O. Jeong, N. Kim, and J.-H. Park, "Elemental image synthesis for integral imaging using phase-shifting digital holography," J. Opt. Soc. Korea 12, 275-280 (2008). https://doi.org/10.3807/JOSK.2008.12.4.275
- J.-P. Liu, T.-C. Poon, G.-S. Jhou, and P.-J. Chen, "Comparison of two-, three, and four-exposure guadrature phaseshifting holography," Appl. Opt. 50, 2443-2450 (2011). https://doi.org/10.1364/AO.50.002443
- X. Meng, L. Z. Cai, X. L. Yang, X. X. Shen, and G. Y. Dong, and Y. R. Wang, "Two-step phase-shifting interferometry and its application in image encryption," Opt. Lett. 31, 1414-1416 (2006). https://doi.org/10.1364/OL.31.001414
- S. K. Gil, H. J. Byun, H. J. Lee, S. H. Jeon, and J. R. Jeong, "Optical encryption of binary data information with 2-step phase-shifting digital holography," Proc. SPIE 6488, 648812 (2007).
- S. H. Jeon, Y. G. Hwang, and S. K. Gil, "Optical encryption of gray-level image using on-axis and 2-f digital holography with two-step phase-shifting method," Opt. Rev. 15, 181-186 (2008). https://doi.org/10.1007/s10043-008-0029-5
- Y. Awatsuji, T. Tahara, A. Kaneko, T. Koyama, K. Nishio, S. Ura, T. Kubota, and O. Matoba, "Parallel two-step phaseshifting digital holography," Appl. Opt. 47, D183-D189 (2008). https://doi.org/10.1364/AO.47.00D183
- H.-C. Lee, S.-H. Kim, and D.-S. Kim, "Two-step on-axis digital holography using dual-channel Mach-Zehnder interferometer and matched filter algorithm," J. Opt. Soc. Korea 14, 363-367 (2010). https://doi.org/10.3807/JOSK.2010.14.4.363
- S. H. Jeon and S. K. Gil, "2-step phase-shifting digital holographic optical encryption and error analysis," J. Opt. Soc. Korea 15, 244-251 (2011). https://doi.org/10.3807/JOSK.2011.15.3.244
Cited by
- Accumulation Encoding Technique Based on Double Random Phase Encryption for Transmission of Multiple Images vol.18, pp.4, 2014, https://doi.org/10.3807/JOSK.2014.18.4.401
- One-time Pattern Mutual Authentication Method by using Digital Holography vol.20, pp.3, 2016, https://doi.org/10.7471/ikeee.2016.20.3.291
- Proposal for Optical One-time Password Authentication Using Digital Holography vol.20, pp.6, 2016, https://doi.org/10.3807/JOSK.2016.20.6.722
- Error-immune Algorithm for Absolute Testing of Rotationally Asymmetric Surface Deviation vol.18, pp.4, 2014, https://doi.org/10.3807/JOSK.2014.18.4.335
- Asymmetric Public Key Cryptography by Using Logic-based Optical Processing vol.20, pp.1, 2016, https://doi.org/10.3807/JOSK.2016.20.1.055
- Optical implementation of cipher block chaining mode algorithm using phase-shifting digital holography vol.55, pp.12, 2016, https://doi.org/10.1117/1.OE.55.12.123112