참고문헌
- B. Schneier, Applied Cryptography, 2nd ed. (John Wiley, New York, USA, 1994).
- C. Li, S. Li, M. Asim, J. Nunez, G. Alvarez, and G. Chen, "On the security defects of an image encryption scheme," Ima. and Vis. Comp. 27, 1371-1381 (2009). https://doi.org/10.1016/j.imavis.2008.12.008
- B. Javidi and J. L. Horner, "Optical pattern recognition for validation and security verification," Opt. Eng. 33, 1752-1756 (1994). https://doi.org/10.1117/12.170736
- J. F. Heanue, M. C. Bashaw, and L. Hesselink, "Encrypted holographic data storage based on orthogonal-phase-code multiplexing," Appl. Opt. 34, 6012-6015 (1995). https://doi.org/10.1364/AO.34.006012
- P. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995). https://doi.org/10.1364/OL.20.000767
- B. Javidi, A. Sergent, and E. Ahouzi, "Performance of double phase encoding encryption technique using binarized encrypted images," Opt. Eng. 37, 565-569 (1998). https://doi.org/10.1117/1.601645
- D. Weber and J. Trolinger, "Novel implementation of nonlinear joint transform correlators in optical security and validation," Opt. Eng. 38, 62-68 (1999). https://doi.org/10.1117/1.602062
- T. Nomura and B. Javidi, "Optical encryption using a joint transform correlator architecture," Opt. Eng. 39, 2031-2035 (1999).
- E. Cuche, F. Bevilacqua, and C. Depeursinge, "Digital holography for quantitative phase-contrast imaging," Opt. Lett. 24, 291-293 (1999). https://doi.org/10.1364/OL.24.000291
- G. Unnikrishnan and K. Singh, "Double random fractional Fourier domain encoding for optical security," Opt. Eng. 39, 2853-2859 (2000). https://doi.org/10.1117/1.1313498
- X. Meng, L. Z. Cai, X. L. Yang, X. X. Shen, and G. Y. Dong, and Y. R. Wang, "Two-step phase-shifting interferometry and its application in image encryption," Opt. Lett. 31, 1414-1416 (2006). https://doi.org/10.1364/OL.31.001414
- S. H. Jeon, Y. G. Hwang, and S. K. Gil, "Optical encryption of gray-level image using on-axis and 2-f digital holography with two-step phase-shifting method," Opt. Rev. 15, 181-186 (2008). https://doi.org/10.1007/s10043-008-0029-5
- S. H. Jeon and S. K. Gil, "Dual optical encryption for binary data and secret key using phase-shifting digital holography," J. Opt. Soc. Korea 16, 263-269 (2012). https://doi.org/10.3807/JOSK.2012.16.3.263
- G.-S. Lin, H. T. Chang, W.-N. Lie, and C.-H. Chuang, "Public-key-based optical image cryptosystem based on data embedding techniques," Opt. Eng. 42, 2331-2339 (2003). https://doi.org/10.1117/1.1588660
- T. Nomura, A. Okazaki, M. Kameda, and Y. Morimoto, "Image reconstruction from compressed encrypted digital hologram," Opt. Eng. 44, 2313-2320 (2005).
- J.-W. Han, C.-S. Park, D.-H. Ryu, and E.-S. Kim, "Optical image encryption based on XOR operations," Opt. Eng. 38, 47-54 (1999). https://doi.org/10.1117/1.602060
- G. Unnikrishnan, M. Pohit, and K. Singh, "A polarization encoded encryption system using ferroelectric spatial light modulator," Opt. Commun. 185, 25-31 (2000). https://doi.org/10.1016/S0030-4018(00)00977-9
- J. Y. Kim, S. J. Park, C. S. Kim, J.-G. Bae, and S.-J. Kim, "Optical image encryption using interferometry-based phase mask," Electron. Lett. 36, 874-875 (2000). https://doi.org/10.1049/el:20000674
- C.-M. Shin and S.-J. Kim, "Image encryption using modified exclusive-OR rules and phase-wrapping technique," Opt. Commun. 254, 67-75 (2005). https://doi.org/10.1016/j.optcom.2005.05.026
- S. Bahrami and M. Naderi, "Image encryption using a lightweight stream encryption algorithm," Adv. in Mult. 2012, 1-8 (2012).
- T. Naughton, B. Hennelly, and T. Dowling, "Introducing secure modes of operation for optical encryption," J. Opt. Soc. Am. A 26, 2608-2617 (2008).
피인용 문헌
- Optical Implementation of Asymmetric Cryptosystem Combined with D-H Secret Key Sharing and Triple DES vol.19, pp.6, 2015, https://doi.org/10.3807/JOSK.2015.19.6.592
- A Study of Definition of Security Requirements on Encryption and Audit Logging vol.19, pp.9, 2014, https://doi.org/10.9708/jksci.2014.19.9.085
- Application to 2-D Page-oriented Data Optical Cryptography Based on CFB Mode vol.19, pp.3, 2015, https://doi.org/10.7471/ikeee.2015.19.3.424
- Optical System Implementation of OFB Block Encryption Algorithm vol.18, pp.3, 2014, https://doi.org/10.7471/ikeee.2014.18.3.328