Photon-Counting Security Tagging and Verification Using Optically Encoded QR Codes
暂无分享,去创建一个
[1] Osamu Matoba,et al. Optical Techniques for Information Security , 2009, Proceedings of the IEEE.
[2] B Javidi,et al. Optical security and encryption with totally incoherent light. , 2001, Optics letters.
[3] David A. Huffman,et al. A method for the construction of minimum-redundancy codes , 1952, Proceedings of the IRE.
[4] A. Stern,et al. Phase-Modulated Optical System With Sparse Representation for Information Encoding and Authentication , 2013, IEEE Photonics Journal.
[5] G. Unnikrishnan,et al. Optical encryption by double-random phase encoding in the fractional Fourier domain. , 2000, Optics letters.
[6] Robert J. Schalkoff,et al. Pattern recognition - statistical, structural and neural approaches , 1991 .
[7] B. Javidi,et al. Encrypted optical storage with wavelength-key and random phase codes. , 1999, Applied optics.
[8] O Matoba,et al. Secure optical memory system with polarization encryption. , 2001, Applied optics.
[9] Hiroshi Hanaizumi,et al. Barcode readers using the camera device in mobile phones , 2004, 2004 International Conference on Cyberworlds.
[10] Hiroyuki Suzuki,et al. Experimental evaluation of fingerprint verification system based on double random phase encoding. , 2006, Optics express.
[11] Arvind Kumar,et al. Impulse attack free double-random-phase encryption scheme with randomized lens-phase functions. , 2009, Optics letters.
[12] Bahram Javidi,et al. Physics of Automatic Target Recognition , 2007 .
[13] Chris Chatwin,et al. Random phase encoding for optical security , 1996 .
[14] Bahram Javidi,et al. Optical encryption using multiple intensity samplings in the axial domain. , 2013, Journal of the Optical Society of America. A, Optics, image science, and vision.
[15] Bahram Javidi,et al. Influence of a perturbation in a double phase-encoding system , 1998 .
[16] Myungjin Cho,et al. Information authentication using photon-counting double-random-phase encrypted images. , 2011, Optics letters.
[17] Arturo Carnicer,et al. Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. , 2005, Optics letters.
[18] B. Javidi. Nonlinear joint power spectrum based optical correlation. , 1989, Applied optics.
[19] Kehar Singh,et al. Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator. , 2011, Applied optics.
[20] Y Li,et al. Security and encryption optical systems based on a correlator with significant output images. , 2000, Applied optics.
[21] Shuai Yuan. Sensitivity, noise and quantitative model of Laser Speckle Contrast Imaging , 2008 .
[22] Bahram Javidi,et al. Photon-counting double-random-phase encoding for secure image verification and retrieval , 2012 .
[23] Tom Dowling,et al. Introducing secure modes of operation for optical encryption. , 2008, Journal of the Optical Society of America. A, Optics, image science, and vision.
[24] Bahram Javidi,et al. Resistance of the double random phase encryption against various attacks. , 2007, Optics express.
[25] B Javidi,et al. Encrypted optical memory system using three-dimensional keys in the Fresnel domain. , 1999, Optics letters.
[26] Isha Mehra,et al. Collision in Fresnel domain asymmetric cryptosystem using phase truncation and authentication verification , 2013 .
[27] Bahram Javidi,et al. Optical pattern recognition for validation and security verification , 1994 .
[28] Bahram Javidi,et al. Polarization encoding for optical security systems , 2000 .
[29] Roberto Torroba,et al. Optical encryption and QR codes: secure and noise-free information retrieval. , 2013, Optics express.
[30] Ayman Alfalou,et al. Optical image compression and encryption methods , 2009 .
[31] J. Walkup,et al. Statistical optics , 1986, IEEE Journal of Quantum Electronics.
[32] B Javidi,et al. Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.
[33] Bahram Javidi,et al. Fully phase encrypted image processor , 1999 .
[34] Xudong Chen,et al. Optical image encryption based on diffractive imaging. , 2010, Optics letters.
[35] O. Matoba,et al. The keys to holographic data security , 2000 .
[36] Oded Agam,et al. Statistics of speckle patterns , 2006 .
[37] Naveen K. Nishchal,et al. Flexible optical encryption with multiple users and multiple security levels , 2011 .
[38] F Dubois. Automatic spatial frequency selection algorithm for pattern recognition by correlation. , 1993, Applied optics.
[39] J. C. Dainty,et al. I The Statistics of Speckle Patterns , 1977 .
[40] Myrian Tebaldi,et al. Multiplexing encrypted data by using polarized light , 2006 .
[41] D. Huffman. A Method for the Construction of Minimum-Redundancy Codes , 1952 .