References
- B. Schneier, Applied Cryptography, 2nd ed. (John Wiley, New York, USA, 1994).
- W. Diffie and M. Hellman, "New directions in cryptography," IEEE Trans. on Info. Theory 22, 644-654 (1976). https://doi.org/10.1109/TIT.1976.1055638
- B. Javidi and J. L. Horner, "Optical pattern recognition for validation and security verification," Opt. Eng. 33, 1752-1756 (1994). https://doi.org/10.1117/12.170736
- J. F. Heanue, M. C. Bashaw, and L. Hesselink, "Encrypted holographic data storage based on orthogonal-phase-code multiplexing," Appl. Opt. 34, 6012-6015 (1995). https://doi.org/10.1364/AO.34.006012
- P. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995). https://doi.org/10.1364/OL.20.000767
- B. Javidi, A. Sergent, and E. Ahouzi, "Performance of double phase encoding encryption technique using binarized encrypted images," Opt. Eng. 37, 565-569 (1998). https://doi.org/10.1117/1.601645
- D. Weber and J. Trolinger, "Novel implementation of nonlinear joint transform correlators in optical security and validation," Opt. Eng. 38, 62-68 (1999). https://doi.org/10.1117/1.602062
- E. Cuche, F. Bevilacqua, and C. Depeursinge, "Digital holography for quantitative phase-contrast imaging," Opt. Lett. 24, 291-293 (1999). https://doi.org/10.1364/OL.24.000291
- B. Javidi and T. Nomura, "Securing information by means of digital holography," Opt. Lett. 25, 28-30 (2000). https://doi.org/10.1364/OL.25.000028
- G. Unnikrishnan and K. Singh, "Double random fractional Fourier domain encoding for optical security," Opt. Eng. 39, 2853-2859 (2000). https://doi.org/10.1117/1.1313498
- G.-S. Lin, H. T. Chang, W.-N. Lie, and C.-H. Chuang, "Public-key-based optical image cryptosystem based on data embedding techniques," Opt. Eng. 42, 2331-2339 (2003). https://doi.org/10.1117/1.1588660
- B. M. Hennelly and J. T. Sheridan, "Random phase and jigsaw encryption in the Fraesnel domain," Opt. Eng. 43, 2239-2249 (2004). https://doi.org/10.1117/1.1790502
- G. Situ and J. Zhang, "A lensless optical secyrity system based on computer-generated phase only masks," Opt. Commun. 232, 115-122 (2004). https://doi.org/10.1016/j.optcom.2004.01.002
- T. Nomura, A. Okazaki, M. Kameda, and Y. Morimoto, "Image reconstruction from compressed encrypted digital hologram," Opt. Eng. 44, 2313-2320 (2005).
- S. K. Gil, S. H. Jeon, N. Kim, and J. R. Jeong, "Successive encryption and transmission with phase-shifting digital holography," Proc. SPIE 6136, 339-346 (2006).
- S. H. Jeon, Y. G. Hwang, and S. K. Gil, "Optical encryption of gray-level image using on-axis and 2-f digital holography with two-step phase-shifting method," Opt. Rev. 15, 181-186 (2008). https://doi.org/10.1007/s10043-008-0029-5
- S. H. Jeon and S. K. Gil, "QPSK modulation based optical image cryptosystem using phase-shifting digital holography," J. Opt. Soc. Korea 14, 97-103 (2010). https://doi.org/10.3807/JOSK.2010.14.2.097
- S. H. Jeon and S. K. Gil, "2-step phase-shifting digital holographic optical encryption and error analysis," J. Opt. Soc. Korea 15, 244-251 (2011). https://doi.org/10.3807/JOSK.2011.15.3.244
- S. H. Jeon and S. K. Gil, "Dual optical encryption for binary data and secret key using phase-shifting digital holography," J. Opt. Soc. Korea 16, 263-269 (2012). https://doi.org/10.3807/JOSK.2012.16.3.263
- J.-W. Han, C.-S. Park, D.-H. Ryu, and E.-S. Kim, "Optical image encryption based on XOR operations," Opt. Eng. 38, 47-54 (1999). https://doi.org/10.1117/1.602060
- C.-M. Shin and S.-J. Kim, "Image encryption using modified exclusive-OR rules and phase-wrapping technique," Opt. Commun. 254, 67-75 (2005). https://doi.org/10.1016/j.optcom.2005.05.026
- S. H. Jeon and S. K. Gil, "Optical implementation of triple DES algorithm based on dual XOR logic operations," J. Opt. Soc. Korea 17, 362-370 (2013). https://doi.org/10.3807/JOSK.2013.17.5.362
- A. Sinha, "Fractional Fourier transform based key exchange for asymmetric key cryptography," in Proc. the 6th WSEAS Int. Conf. on Electronics, Hardware and Optical Communications (Corfu Island, Greece, Feb. 2007), pp. 51-54.
Cited by
- Optical Implementation of Asymmetric Cryptosystem Combined with D-H Secret Key Sharing and Triple DES vol.19, pp.6, 2015, https://doi.org/10.3807/JOSK.2015.19.6.592
- Optical Encryption Scheme with Multiple Users Based on Computational Ghost Imaging and Orthogonal Modulation vol.20, pp.4, 2016, https://doi.org/10.3807/JOSK.2016.20.4.476