1 |
R. K. Wang, I. A. Watson, and C. Chatwin, “Random phase encoding for optical security,” Opt. Eng., vol. 35, no. 9, pp. 2464-2469, 1996
DOI
ScienceOn
|
2 |
K-B. Cho, D-H. Seo, and S-J. Kim, “Practical Image Hiding Method Using a Phase Wrapping Rule and Real-Valued Decoding Key,” Opt. rev., Vol. 14, No. 3, 2007
DOI
|
3 |
M. Z. He, L. Z. Cai, Q. Liu, X. C. Wang, X. F. Meng, “Multiple image encryption and watermarking by random phase matching,” Opt. Commun. 247, pp. 29-37, 2005
DOI
ScienceOn
|
4 |
D. P, J. W, S. Y, S. W, and A. L, “CDMA based Multipleuser digital watermarking,” Proceedings of the 2006 inter national conference on intelligent information hiding and multimedia signal processing, 2006
|
5 |
C. H. Yeh, H. T. Cahng, H. C. Chien, and C. J. Kuo, “Design of cascaded phase Keys for a hierarchical security system,” Appl. Opt., vol. 41, no. 29, pp. 6128-6314, Oct. 2002
DOI
|
6 |
M. Yamazaki and J. Ohtsubo, “Optimization of encrypted holograms in optical security systems,” Opt. Eng., vol. 40, no. 1, pp. 132-137, 2001
DOI
ScienceOn
|
7 |
K-T Kim, J-H Kim, and E-S Kim, “Multiple information hiding technique using random sequence and Hadamard matrix,” Opt. Eng., vol. 40, no. 11, pp. 2489-2494, 2001
DOI
ScienceOn
|
8 |
D. Abookasis, O. Montal, O. Abramson, and J. Rosen, “Watermarks encrypted in a concealogram and deciphered by a modified joint-transform correlator,” Appl Opt., vol. 44, no. 15, pp. 3019-3023, 2005
DOI
|
9 |
G. Situ, J. Zhang, “Image hiding with computer-generated phase codes for optical authentication,” Opt. Commun. 245 pp. 55-65, 2005
DOI
ScienceOn
|
10 |
Hsuan T. Chang and Chung L. Tsan, “Image watermarking by use of digital holography embedded in the discretecosine-transform domain,” Appl. Opt., vol. 44, no. 29, pp. 6211-6219, 2005
DOI
|
11 |
S. Huang and J. K. Wu, “Optical Watermarking for Printed Document Authentication,” IEEE Trans. on Information Forensics and Security, vol. 2, no. 2, pp. 164-173, 2007
DOI
ScienceOn
|
12 |
P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett., vol. 20, no. 7, pp. 767-769, 1995
DOI
ScienceOn
|
13 |
B. Schneier, Applied cryptography-protocol, algorithms, and source code in C, 2nd ed., John Wiley & Sons, New York, 1995
|
14 |
A. Shamir, “How to share secret,” Communications of ACM, vol. 22, pp. 612-613, 1979
DOI
ScienceOn
|
15 |
B. Javidi and J. L. Horner, “Optical pattern recognition for validation and security verification,” Opt. Eng., vol. 33, no. 6, pp. 1752-1756, 1994
DOI
ScienceOn
|
16 |
B. Javidi and E. Ahouzi, “Optical security system with Fourier plane encoding,” Appl. Opt., vol. 37, no. 26, pp. 6247-6255, 1998
DOI
|
17 |
T. Nomura and B. Javidi, “Optical encryption using a joint transform correlator architecture,” Opt. Eng., vol. 39, no. 8, pp. 2031-2035, 2000
DOI
ScienceOn
|
18 |
B. Javidi, A. Sergent, G. Zhang, and L. Guibert, “Fault tolerance properties of a double phase encoding encryption technique,” Opt. Eng., vol. 36, no. 4, pp. 992-998, 1997
DOI
ScienceOn
|
19 |
B. Wang, C. C. Sun, W. C. Su, and A. E. T. Chiou, “Shifttolerance property of an optical double-random phase-encoding encryption system,” Appl. Opt., vol. 39, no. 26, pp. 4788-4793, 2000
DOI
|
20 |
N-J Kim, D-H Seo, and S-G Lee, C-M Shin, K-B Cho, and S-J Kim, “Hierarchical Image Encryption System Using Orthogonal Method,” Journal of OSK, vol. 17, no. 3, 2006
과학기술학회마을
DOI
ScienceOn
|