Combined use of BP neural network and computational integral imaging reconstruction for optical multiple-image security
暂无分享,去创建一个
[1] Sikun Li,et al. Three-dimensional information security combined fringe projection with double random phase encoding , 2013 .
[2] Un-Sook Choi,et al. Computing Phase Shifts of Maximum-Length 90/150 Cellular Automata Sequences , 2004, ACRI.
[3] Eun-Soo Kim,et al. Robust image encryption by combined use of integral imaging and pixel scrambling techniques , 2009 .
[4] B Javidi,et al. Encrypted optical storage with angular multiplexing. , 1999, Applied optics.
[5] Bahram Javidi,et al. Optical encryption using multiple intensity samplings in the axial domain. , 2013, Journal of the Optical Society of America. A, Optics, image science, and vision.
[6] Myungjin Cho,et al. Three-dimensional photon counting double-random-phase encryption. , 2013, Optics letters.
[7] B Javidi,et al. Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.
[8] S. Wolfram. Random sequence generation by cellular automata , 1986 .
[9] Wen Chen,et al. Object authentication in computational ghost imaging with the realizations less than 5% of Nyquist limit. , 2013, Optics letters.
[10] Dong Hwan Kim,et al. 3D Image Encryption Using Integral Imaging Scheme and MLCA Technology , 2013 .
[11] Jingjuan Zhang,et al. Multiple-image encryption by wavelength multiplexing. , 2005, Optics letters.
[12] Xudong Chen,et al. Optical multiple-image encryption based on multiplane phase retrieval and interference , 2011 .
[13] Sui Liansheng,et al. Multiple-image encryption based on phase mask multiplexing in fractional Fourier transform domain. , 2013, Optics letters.
[14] Tarek Hegazy,et al. Developing Practical Neural Network Applications Using Back‐Propagation , 1994 .
[15] Bahram Javidi,et al. Resistance of the double random phase encryption against various attacks. , 2007, Optics express.
[16] Benjamin Schrauwen,et al. Backpropagation for Population-Temporal Coded Spiking Neural Networks , 2006, The 2006 IEEE International Joint Conference on Neural Network Proceedings.
[17] D. Nistér,et al. Stereo Matching with Color-Weighted Correlation, Hierarchical Belief Propagation, and Occlusion Handling , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[18] Dong-Hak Shin,et al. Occlusion removal method of partially occluded 3D object using sub-image block matching in computational integral imaging. , 2008, Optics express.
[19] Eun-Soo Kim,et al. Occlusion-removed scheme using depth-reversed method in computational integral imaging , 2010 .
[20] Weimin Jin,et al. Color image encryption based on joint fractional Fourier transform correlator , 2011 .
[21] Daomu Zhao,et al. Multiple-image encryption using phase retrieve algorithm and intermodulation in Fourier domain , 2012 .
[22] Andries Petrus Engelbrecht,et al. A Cooperative approach to particle swarm optimization , 2004, IEEE Transactions on Evolutionary Computation.
[23] S Nakajima,et al. Three-dimensional medical imaging display with computer-generated integral photography. , 2001, Computerized medical imaging and graphics : the official journal of the Computerized Medical Imaging Society.
[24] Li Fu,et al. Increasing the data hiding capacity and improving the security of a double-random phase-encoding technique based information hiding scheme , 2009 .
[25] Bahram Javidi,et al. Digital three-dimensional image correlation by use of computer-reconstructed integral imaging. , 2002, Applied optics.
[26] Bahram Javidi,et al. Three-dimensional volumetric object reconstruction using computational integral imaging. , 2004, Optics express.
[27] Mingguang Shan,et al. Double image encryption using double pixel scrambling and random phase encoding , 2012 .
[28] Dong Hwan Kim,et al. Novel 3-D Image Encryption Using Computational Integral Imaging and Linear-Complemented MLCA , 2013 .
[29] Eun-Soo Kim,et al. Depth extraction of three-dimensional objects in space by the computational integral imaging reconstruction technique. , 2008, Applied optics.
[30] Xudong Chen,et al. Optical cryptography network topology based on 2D-to-3D conversion and phase-mask extraction , 2013 .