References
- A. J. Menezes, T. Okamoto, and S. A. Vanstone, "Reducing elliptic curve logarithms to logarithms in a finite field," IEEE Transactions on Information Theory, vol. 39, no. 5, pp. 1639-1646, 1993. https://doi.org/10.1109/18.259647
- C. Rackoff and D. Simon, "Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack," in Advances in Cryptology: CRYPTO '91 (Lecture Notes in Computer Science Vol. 576), J. Feigenbaum, Ed. Heidelberg, Germany: Springer Berlin, 1992, pp. 433-444.
- S. Tsujii and T. Itoh, "An ID-based cryptosystem based on the discrete logarithm problem," IEEE Journal on Selected Areas in Communication, vol. 7, no. 4, pp. 467-473, 1989. https://doi.org/10.1109/49.17709
- H. Tanaka, "A realization scheme for the identity-based cryptosystem," in Advances in Cryptology: CRYPTO '87 (Lecture Notes in Computer Science Vol. 293), C. Pomerance, Ed. Heidelberg, Germany: Springer Berlin, 1988, pp. 340-349.
- P. Refregier and B. Javidi, "Optical-image encryption based on input plane and Fourier plane random encoding," Optics Letters, vol. 20, no. 7, pp. 767-769, 1995. https://doi.org/10.1364/OL.20.000767
- O. Matoba and B. Javidi, "Encrypted optical storage with angular multiplexing," Applied Optics, vol. 38, no. 35, pp. 7288-7293, 1999. https://doi.org/10.1364/AO.38.007288
- T. Nomura and B. Javidi, "Optical encryption system with a binary key code," Applied Optics, vol. 39, no. 26, pp. 4783-4787, 2000. https://doi.org/10.1364/AO.39.004783
- M. Singh, A. Kumar, and K. Singh, "Secure optical system that uses fully phase-based encryption and lithium niobate crystal as phase contrast filter for decryption," Optics & Laser Technology, vol. 40, no. 4, pp. 619-624, 2008. https://doi.org/10.1016/j.optlastec.2007.09.007
- Z. Liu, S. Li, M. Yang, W. Liu, and S. Liu, "Image encryption based on the random rotation operation in the fractional Fourier transform domains," Optics and Lasers in Engineering, vol. 50, no. 10, pp. 1352-1358, 2012. https://doi.org/10.1016/j.optlaseng.2012.05.021
- M. Joshi, C. Shakher, and K. Singh, "Fractional Fourier transform based image multiplexing and encryption technique for four-color images using input images as keys," Optics Communications, vol. 283, no. 12, pp. 2496-2505, 2010. https://doi.org/10.1016/j.optcom.2010.02.024
- Z. Liu, S. L. Xu, C. Lin, J. Dai, and S. Liu, "Image encryption scheme by using iterative random phase encoding in gyrator transform domains," Optics and Lasers in Engineering, vol. 49, no. 4, pp. 542-546, 2011. https://doi.org/10.1016/j.optlaseng.2010.12.005
- D. S. Monaghan, U. Gopinathan, T. J. Naughton, and J. T. Sheridan, "Key-space analysis of double random phase encryption technique," Applied Optics, vol. 46, no. 26, pp. 6641-6647, 2007. https://doi.org/10.1364/AO.46.006641
- E. Perez-Cabre, M. Cho, and B. Javidi, "Information authentication using photon-counting double-random-phase encrypted images," Optics Letters, vol. 36, no. 1, pp. 22-24, 2011. https://doi.org/10.1364/OL.36.000022
- T. Sarkadi and P. Koppa, "Quantitative security evaluation of optical encryption using hybrid phaseand amplitude-modulated keys," Applied Optics, vol. 51, no. 6, pp. 745-750, 2012. https://doi.org/10.1364/AO.51.000745
- T. Ujvari, P. Koppa, M. Lovasz, P. Varhegyi, S. Sajti, E. Lorincz, and P. Richter, "A secure data storage system based on phase-encoded thin polarization holograms," Journal of Optics A: Pure and Applied Optics, vol. 6, no. 4, pp. 401-411, 2004. https://doi.org/10.1088/1464-4258/6/4/017
- P. Koppa, "Phase-to-amplitude data page conversion for holographic storage and optical encryption," Applied Optics, vol. 46, no. 17, pp. 3561-3571, 2007. https://doi.org/10.1364/AO.46.003561
- Z. Liu, M. Yang, W. Liu, S. Li, M. Gong, W. Liu, and S. Liu, "Image encryption algorithm based on the random local phase encoding in gyrator transform domains," Optics Communications, vol. 285, no. 19, pp. 3921-3925, 2012. https://doi.org/10.1016/j.optcom.2012.05.061
- B. Javidi and T. Nomura, "Securing information by use of digital holography," Optics Letters, vol. 25, no. 1, pp. 28-30, 2000. https://doi.org/10.1364/OL.25.000028
- X. Tan, O. Matoba, Y. Okada-Shudo, M. Ide, T. Shimura, and K. Kuroda, "Secure optical memory system with polarization encryption," Applied Optics, vol. 40, no. 14, pp. 2310-2315, 2001. https://doi.org/10.1364/AO.40.002310
- J. W. Goodman, Statistical Optics, New York, NY: Wiley, 1985.
- G. M. Morris, "Scene matching using photon-limited images," Journal of the Optical Society of America A, vol. 1, no. 5, pp. 482-488, 1984. https://doi.org/10.1364/JOSAA.1.000482
- E. A. Watson and G. M. Morris, "Imaging thermal objects with photon-counting detector," Applied Optics, vol. 31, no. 23, pp. 4751-4757, 1992. https://doi.org/10.1364/AO.31.004751
- F. Xiong, Digital Modulation Techniques. Boston, MA: Artech House, 2000.
- M. Patzold, Mobile Fading Channels. New York, NY: John Wiley & Sons, 2002.
- J. G. Proakis and M. Salehi, Digital Communications, 5th ed. Boston, MA: McGraw-Hill, 2008.
- B. Javidi, "Nonlinear matched filter based optical correlation," Applied Optics, vol. 28, no. 21, pp. 4518-4520, 1989. https://doi.org/10.1364/AO.28.004518
Cited by
- Protection Method for Data Communication between ADS-B Sensor and Next-Generation Air Traffic Control Systems vol.5, pp.4, 2014, https://doi.org/10.3390/info5040622
- Watermarking technique based on three-coefficient comparison in DCT domain vol.72, pp.7, 2016, https://doi.org/10.1007/s11227-015-1531-8
- Ubi-RKE: A Rhythm Key Based Encryption Scheme for Ubiquitous Devices vol.2014, 2014, https://doi.org/10.1155/2014/683982