1 |
S.K. Gil, S.H. Jeon, N. Kim and J.R. Jeong, "Successive encryption and transmission with phase-shifting digital holography," Proceedings of SPIE, Vol. 6136, 2006.
|
2 |
J. Y. Kim, S. J. Park, C. S. Kim, J. K. Bae, and S. J. Kim, "Optical image encryption using interferometrybased phase masks," Electron. Lett., Vol. 36, No. 10, pp. 874-875, 2000.
DOI
ScienceOn
|
3 |
I. Yamaguchi and T. Zhang, "Phase-shifting digital holography," Opt. Lett., vol. 22, pp. 610-612, 1998.
|
4 |
G. Unnikrishnan, K. Singh, "Double random fractional Fourier-domain encoding for optical security," Opt. Eng. Vol. 39, pp. 2853-2859, 2000.
DOI
ScienceOn
|
5 |
P. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett., vol. 20, pp. 767-769, 1995.
DOI
ScienceOn
|
6 |
P. Stepien, R. Gajda, and T. Szoplik, "Distributed kinoforms in optical security applications," Opt. Eng., Vol. 35, No. 9, pp. 2453-2458, 1996.
DOI
ScienceOn
|
7 |
T. Sasaki, H. Togo, J. Tnida, and Y. Ichioka, "Stream cipher based on pseudorandom number generation with optical transformation," Applied Optics, Vol. 39, No. 14, pp. 2340-2346, 2000.
DOI
|
8 |
T. Nomura and B. Javidi, "Optical encryption using a joint transform correlator architecture," Opt. Eng., Vol. 39, No. 8, pp. 2031-2035, 2000.
DOI
ScienceOn
|
9 |
L. G. Neto, "Implementation of image encryption using the phase-contrast technique," Proceedings of SPIE, Vol. 3386, pp. 284-290, 1998.
|
10 |
J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kim, "Optical image encrypion based on XOR operations," Opt. Eng., Vol. 38, No. 1, pp. 47-54, 1999.
DOI
ScienceOn
|