References
- P. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995). https://doi.org/10.1364/OL.20.000767
- O. Matoba, T. Nomura, E. Perez-Cabre, M. S. Millan, and B. Javidi, "Optical techniques for information security," Proc. IEEE 97, 1128-1148 (2009). https://doi.org/10.1109/JPROC.2009.2018367
- A. Alfalou and C. Brosseau, "Optical image compression and encryption methods," Adv. Opt. Photonics 1, 589-636 (2009). https://doi.org/10.1364/AOP.1.000589
- W. Chen, B. Javidi, and X. Chen, "Advances in optical security systems," Adv. Opt. Photonics 6, 120-155 (2014). https://doi.org/10.1364/AOP.6.000120
- B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, "Roadmap on optical security," J. Opt. 18, 083001 (2016). https://doi.org/10.1088/2040-8978/18/8/083001
- B. Javidi and T. Nomura, "Securing information by use of digital holography," Opt. Lett. 25, 28-30 (2000). https://doi.org/10.1364/OL.25.000028
- E. Tajahuerce, O. Matoba, S. C. Verrall, and B. Javidi, "Optoelectronic information encryption with phase-shifting interferometry," Appl. Opt. 39, 2313-2320 (2000). https://doi.org/10.1364/AO.39.002313
- L.-Z Cai, M.-Z He, Q. Liu, and X.-L Yang, "Digital image encryption and watermarking by phase-shifting interferometry," Appl. Opt. 43, 3078-3084 (2004). https://doi.org/10.1364/AO.43.003078
- C. Mela and C. Iemmi, "Optical encryption using phase-shifting interferometry in a joint transform correlator," Opt. Lett. 31, 2562-2564 (2006). https://doi.org/10.1364/OL.31.002562
- X. F. Meng, L. Z. Cai, X. L. Yang, X. X. Shen, G. Y. Dong, and Y. R. Wang, "Two-step phase-shifting interferometry and its application in image encryption," Opt. Lett. 31, 1414-1416 (2006). https://doi.org/10.1364/OL.31.001414
- H. Li, "Image encryption based on gyrator transform and two-step phase-shifting interferometry," Opt. Lasers Eng. 47, 45-50 (2009). https://doi.org/10.1016/j.optlaseng.2008.08.001
- X. F. Meng, X. Peng, L. Z. Cai, A. M. Li, Z. Gao, and Y. R. Wang, "Cryptosystem based on two-step phase-shifting interferometry and the RSA public-key encryption algorithm," J. Opt. A: Pure Appl. Opt. 11, 085402 (2009). https://doi.org/10.1088/1464-4258/11/8/085402
- S.-H. Jeon and S.-K. Gil, "2-step phase-shifting digital holographic optical encryption and error analysis," J. Opt. Soc. Korea 15, 244-251 (2011). https://doi.org/10.3807/JOSK.2011.15.3.244
- D. Fan, X. Meng, Y. Wang, X. Yang, X. Peng, W. He, G. Dong, and H. Chen, "Asymmetric cryptosystem and software design based on two-step phase-shifting interferometry and elliptic curve algorithm," Opt. Commun. 309, 50-56 (2013). https://doi.org/10.1016/j.optcom.2013.06.044
- B. Javidi and T. Nomura, "Polarization encoding for optical security systems," Opt. Eng. 39, 2439-2443 (2000). https://doi.org/10.1117/1.1288369
- J. F. Barrera, R. Henao, M. Tebaldi, R. Torroba, and N. Bolognini, "Multiplexing encrypted data by using polarized light," Opt. Commun. 260, 109-112 (2006). https://doi.org/10.1016/j.optcom.2005.10.053
- U. Gopinathan, T. J. Naughton, and J. T. Sheridan, "Polarization encoding and multiplexing of two-dimensional signals: application to image encryption," Appl. Opt. 45, 5693-5700 (2006). https://doi.org/10.1364/AO.45.005693
- N. Zhu, Y. Wang, J. Liu, J. Xie, and H. Zhang, "Optical image encryption based on interference of polarized light," Opt. Express 17, 13418-13424 (2009). https://doi.org/10.1364/OE.17.013418
- A. Alfalou1 and C. Brosseau, "Dual encryption scheme of images using polarized light," Opt. Lett. 35, 2185-2187 (2010). https://doi.org/10.1364/OL.35.002185
- S. K. Gil, "2-step quadrature phase-shifting digital holographic optical encryption using orthogonal polarization and error analysis," J. Opt. Soc. Korea 16, 354-364 (2012). https://doi.org/10.3807/JOSK.2012.16.4.354
- T. J. Naughton, B. M. Hennelly, and T. Dowling, "Introducing secure modes of operation for optical encryption," J. Opt. Soc. Am. A 25, 2608-2617 (2008). https://doi.org/10.1364/JOSAA.25.002608
- S.-H. Jeon and S.-K. Gil, "Optical implementation of cipher block chaining mode algorithm using phase-shifting digital holography," Opt. Eng. 55, 123112 (2016). https://doi.org/10.1117/1.OE.55.12.123112