Image Encryption Based on Interleaved Computer-Generated Holograms
暂无分享,去创建一个
Liangcai Cao | Guofan Jin | Hao Zhang | Dezhao Kong | Xueju Shen | H. Zhang | Guofan Jin | Liangcai Cao | Dezhao Kong | Xueju Shen
[1] Y Guo,et al. Decomposition storage of information based on computer-generated hologram interference and its application in optical image encryption. , 2001, Applied optics.
[2] Bo Wang,et al. Optical image encryption based on interference. , 2008, Optics letters.
[3] G. Unnikrishnan,et al. Optical encryption by double-random phase encoding in the fractional Fourier domain. , 2000, Optics letters.
[4] B Javidi,et al. Optoelectronic information encryption with phase-shifting interferometry. , 2000, Applied optics.
[5] Juan Liu,et al. Experimental verification of optical image encryption based on interference , 2011 .
[6] Yongtian Wang,et al. Optical image encryption based on interference of polarized light. , 2009, Optics express.
[7] Isha Mehra,et al. Optical image encryption using equal modulus decomposition and multiple diffractive imaging , 2016 .
[8] B Javidi,et al. Securing information by use of digital holography. , 2000, Optics letters.
[9] Chenggen Quan,et al. Optical color image encryption based on Arnold transform and interference method , 2009 .
[10] Kyu B. Doh,et al. Computer Generated Holographic Image Processing for Information Security , 2004, PDCAT.
[11] B Javidi,et al. Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.
[12] Naveen K Nishchal,et al. Image encryption based on interference that uses fractional Fourier domain asymmetric keys. , 2012, Applied optics.
[13] Linfei Chen,et al. Phase retrieval encryption in an enhanced optical interference by key phase constraint. , 2015, Applied optics.
[14] B Javidi,et al. Three-dimensional object recognition by use of digital holography. , 2000, Optics letters.
[15] Yan Zhang,et al. Enhancement of image hiding by exchanging two phase masks , 2009 .
[16] Kehar Singh,et al. Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator. , 2011, Applied optics.
[17] C. Niu,et al. An encryption method with multiple encrypted keys based on interference principle. , 2010, Optics express.
[18] T-C Poon,et al. Fast numerical generation and encryption of computer-generated Fresnel holograms. , 2011, Applied optics.
[19] Bahram Javidi,et al. Information hiding technique with double phase encoding. , 2002, Applied optics.
[20] Wen Chen,et al. Security-enhanced interference-based optical image encryption , 2013 .
[21] L Z Cai,et al. Two-step phase-shifting interferometry and its application in image encryption. , 2006, Optics letters.
[22] Xudong Chen,et al. Optical multiple-image encryption based on multiplane phase retrieval and interference , 2011 .
[23] Xiaogang Wang,et al. Optical image hiding with silhouette removal based on the optical interference principle. , 2012, Applied optics.
[24] Juan Liu,et al. Holographic projection based on interference and analytical algorithm , 2010 .
[25] Yujing Han,et al. Optical image encryption based on two beams' interference , 2010 .
[26] Ayman Alfalou,et al. Implementing compression and encryption of phase-shifting digital holograms for three-dimensional object reconstruction , 2013 .
[27] Bahram Javidi,et al. Three-dimensional scene encryption and display based on computer-generated holograms. , 2016, Applied optics.
[28] Ming Lei,et al. Asymmetric optical cryptosystem based on coherent superposition and equal modulus decomposition. , 2015, Optics letters.