1 |
J.-S. Jang and B. Javidi, "Three-dimensional synthetic aperture integral imaging," Opt. Lett. 27, 1144-1146 (2002).
DOI
|
2 |
H. Yun, A. Llavador, G. Saavedra, and M. Cho, "Three-dimensional imaging system with both improved lateral resolution and depth of field considering non-uniform system parameters," Appl. Opt. 57, 9423-9431 (2018).
DOI
|
3 |
M. Swan, Blockchain: Blueprint for a new economy (O'Reilly, USA, 2015).
|
4 |
M. Nofer, P. Gomber, O. Hinz, and D. Schiereck, "Blockchain," Bus. Inform. Syst. Eng. 59, 183-187 (2017).
DOI
|
5 |
K. Koptyra and M. R. Ogiela, "Imagechain-Application of blockchain technology for images," Sensors 21, 82 (2021).
DOI
|
6 |
C. Dannen, "Introducing Ethereum and Solidity," (Springer, NY, USA, 2017).
|
7 |
G. Lippmann, "La photographie integrale," Comptes Rendus Acad. Sci 146, 446-451 (1908).
|
8 |
M. P. Mcbee and C. Wilcox, "Blockchain technology: Principles and applications in medical imaging," J. Digit. Imaging 33, 726-734 (2020).
DOI
|
9 |
D. Vujicic, D. Jagodic, and S. Randic, "Blockchain technology, bitcoin, and Ethereum: A brief overview," in Proc 17th International Symposium INFOTEH-JAHORINA-INFOTEH (East Sarajevo, Bosnia and Herzegovina, Mar. 21-23, 2018).
|
10 |
V. Despotovic, D. Bjelica, and D. Barac, "Analysis of potential NFT applications," E-bus. Technol. Conf. Proc. 2, 103-107, (2022)
|
11 |
M. Cho and D. Shin, "3D integral imaging display using axially recorded multiple images," J. Opt. Soc. Korea 17, 410-414 (2013).
DOI
|
12 |
D. Das, P. Bose, N. Ruaro, C. Krugel, and G. Vigna, "Understanding security issues in the NFT ecosystem," in Proc. ACM conference on computer and communications security-CSS, (LA, USA, Nov. 7-11, 2022).
|
13 |
U. W. Chohan, "Non-fungible tokens: Blockchains, scarcity, and value," Critical Blockchain Research Initiative (CBRI) working papers, Islamabad, Pakistan (2021).
|
14 |
Q. Wang, R. Li, Q. Wang, and S. Chen, "Non-fungible token (nft): Overview, evaluation, opportunities and challenges," arXiv:2105.07447 (2021).
|
15 |
G. A. Pierro, M. sawaf, and R. Tonelli, "Original or Fake? How to understand the digital artworks' value in the block-chain," in Proc. Software Engineering and Formal Methods-SEFM 2021 (Virtual Conference, Dec. 6-10, 2022), pp. 76-85.
|
16 |
S.-H. Hong, J.-S. Jang, and B. Javidi, "Three-dimensional volumetric object reconstruction using computational integral imaging," Opt. Express 12, 483-491 (2004).
DOI
|
17 |
B. Cho, P. Kopycki, M. Martinez-Corral, and M. Cho, "Computational volumetric reconstruction of integral imaging with improved depth resolution considering continuously non-uniform shifting pixels," Opt. Lasers Eng. 111, 114-121 (2018).
DOI
|
18 |
B. Javidi and J. L. Horner, "Optical pattern recognition for validation and security verification," Opt. Eng. 33, 34-39 (1994).
|
19 |
P. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995).
DOI
|
20 |
O. Matoba and B. Javidi, "Encrypted optical memory system using three-dimensional keys in the fresnel domain," Opt. Lett. 24, 762-764 (1999).
DOI
|
21 |
A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, "Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys," Opt. Lett. 30, 1644-1646 (2005).
DOI
|
22 |
Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, "Resistance of the double random phase encryption against various attacks," Opt. Express 15, 10253-10265 (2007).
DOI
|
23 |
J. Lee, M. Cho, and M.-C. Lee, "Three-dimensional photon counting optical encryption with enhanced visual quality and security level," IEEE Access 9, 128862-128869 (2021).
DOI
|
24 |
H. Zeng, Y. Xing, S. Kim, and X. Li, " Designing real-time 3D image security with CA-based random mode decomposition," Signal Process. 197, 108554 (2022).
DOI
|
25 |
Y. Li, T. wang, Y. Liao, D. Li, and X. Li, "3D medical images security via light-field imaging," Opt. Lett. 47, 3535-3538 (2022).
DOI
|