1 |
J. Y. Kim, S. J. Park, C. S. Kim, J. K. Bae, and S. J. Kim, 'Optical image encryption using interferometry-based phase masks,' Electron. Lett., vol. 36, no. 10, pp. 874-875, 2000
DOI
ScienceOn
|
2 |
C. S. Weaver and J. W. Goodman, 'Technique for optically convolving two functions,' Appl. Opt., vol. 5, pp. 1248-1249, 1966
DOI
|
3 |
T. Nomura, B. Javidi, 'Optical encryption using a joint transform correlator architecture,' Opt. Eng., Vol. 39, No. 8, pp. 2031-2035, 2000
DOI
ScienceOn
|
4 |
P. Refregier and B. Javidi, 'Optical image encryption based on input plane and Fourier plane random encoding,' Opt. Letters, vol. 20, No. 7, pp. 767-769, 1995
DOI
ScienceOn
|
5 |
이응대, 박세준, 이하운, 김수중, '세기검출기를 이용한 광 영상 암호화', 전자공학회논문지, 제39권 SD편, 제3호, 34-40쪽, 2002년 3월
과학기술학회마을
|
6 |
C. J. Kuo, 'Joint transform correlation improved by means of the frequency selective technique,' Opt. Eng., vol. 33, no. 2, pp. 522-527, 1994
DOI
ScienceOn
|
7 |
B. Javidi and J. L. Horner, 'Optical pattern recognition for validation and security verification,' Opt. Eng., vol. 33, No. 6, pp. 1752-1756, 1994
DOI
ScienceOn
|
8 |
B. Javidi and E. Ahouzi, 'Optical security system with Fourier plane encoding,' Appl. Opt., Vol. 37, No. 26, pp. 6247-6255, 1998
DOI
|