Acknowledgement
This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government(MSIT) (NRF-2020R1F1A1068637).
References
- M. Swan, Blockchain: Blueprint for a new economy (O'Reilly, USA, 2015).
- M. Nofer, P. Gomber, O. Hinz, and D. Schiereck, "Blockchain," Bus. Inform. Syst. Eng. 59, 183-187 (2017). https://doi.org/10.1007/s12599-017-0467-3
- M. P. Mcbee and C. Wilcox, "Blockchain technology: Principles and applications in medical imaging," J. Digit. Imaging 33, 726-734 (2020). https://doi.org/10.1007/s10278-019-00310-3
- K. Koptyra and M. R. Ogiela, "Imagechain-Application of blockchain technology for images," Sensors 21, 82 (2021). https://doi.org/10.3390/s21010082
- C. Dannen, "Introducing Ethereum and Solidity," (Springer, NY, USA, 2017).
- D. Vujicic, D. Jagodic, and S. Randic, "Blockchain technology, bitcoin, and Ethereum: A brief overview," in Proc 17th International Symposium INFOTEH-JAHORINA-INFOTEH (East Sarajevo, Bosnia and Herzegovina, Mar. 21-23, 2018).
- U. W. Chohan, "Non-fungible tokens: Blockchains, scarcity, and value," Critical Blockchain Research Initiative (CBRI) working papers, Islamabad, Pakistan (2021).
- Q. Wang, R. Li, Q. Wang, and S. Chen, "Non-fungible token (nft): Overview, evaluation, opportunities and challenges," arXiv:2105.07447 (2021).
- V. Despotovic, D. Bjelica, and D. Barac, "Analysis of potential NFT applications," E-bus. Technol. Conf. Proc. 2, 103-107, (2022)
- G. A. Pierro, M. sawaf, and R. Tonelli, "Original or Fake? How to understand the digital artworks' value in the block-chain," in Proc. Software Engineering and Formal Methods-SEFM 2021 (Virtual Conference, Dec. 6-10, 2022), pp. 76-85.
- D. Das, P. Bose, N. Ruaro, C. Krugel, and G. Vigna, "Understanding security issues in the NFT ecosystem," in Proc. ACM conference on computer and communications security-CSS, (LA, USA, Nov. 7-11, 2022).
- G. Lippmann, "La photographie integrale," Comptes Rendus Acad. Sci 146, 446-451 (1908).
- J.-S. Jang and B. Javidi, "Three-dimensional synthetic aperture integral imaging," Opt. Lett. 27, 1144-1146 (2002). https://doi.org/10.1364/OL.27.001144
- S.-H. Hong, J.-S. Jang, and B. Javidi, "Three-dimensional volumetric object reconstruction using computational integral imaging," Opt. Express 12, 483-491 (2004). https://doi.org/10.1364/OPEX.12.000483
- M. Cho and D. Shin, "3D integral imaging display using axially recorded multiple images," J. Opt. Soc. Korea 17, 410-414 (2013). https://doi.org/10.3807/JOSK.2013.17.5.410
- B. Cho, P. Kopycki, M. Martinez-Corral, and M. Cho, "Computational volumetric reconstruction of integral imaging with improved depth resolution considering continuously non-uniform shifting pixels," Opt. Lasers Eng. 111, 114-121 (2018). https://doi.org/10.1016/j.optlaseng.2018.07.016
- H. Yun, A. Llavador, G. Saavedra, and M. Cho, "Three-dimensional imaging system with both improved lateral resolution and depth of field considering non-uniform system parameters," Appl. Opt. 57, 9423-9431 (2018). https://doi.org/10.1364/AO.57.009423
- B. Javidi and J. L. Horner, "Optical pattern recognition for validation and security verification," Opt. Eng. 33, 34-39 (1994).
- P. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995). https://doi.org/10.1364/OL.20.000767
- O. Matoba and B. Javidi, "Encrypted optical memory system using three-dimensional keys in the fresnel domain," Opt. Lett. 24, 762-764 (1999). https://doi.org/10.1364/OL.24.000762
- A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, "Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys," Opt. Lett. 30, 1644-1646 (2005). https://doi.org/10.1364/OL.30.001644
- Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, "Resistance of the double random phase encryption against various attacks," Opt. Express 15, 10253-10265 (2007). https://doi.org/10.1364/OE.15.010253
- J. Lee, M. Cho, and M.-C. Lee, "Three-dimensional photon counting optical encryption with enhanced visual quality and security level," IEEE Access 9, 128862-128869 (2021). https://doi.org/10.1109/ACCESS.2021.3113670
- H. Zeng, Y. Xing, S. Kim, and X. Li, " Designing real-time 3D image security with CA-based random mode decomposition," Signal Process. 197, 108554 (2022). https://doi.org/10.1016/j.sigpro.2022.108554
- Y. Li, T. wang, Y. Liao, D. Li, and X. Li, "3D medical images security via light-field imaging," Opt. Lett. 47, 3535-3538 (2022). https://doi.org/10.1364/OL.464184