Optical Security using the Double-Random-Phase Encryption with Photon-Counting

[1]  N. Fisher,et al.  Statistical Analysis of Circular Data , 1993 .

[2]  Bahram Javidi,et al.  Resistance of the double random phase encryption against various attacks. , 2007, Optics express.

[3]  Naveen K. Nishchal,et al.  Flexible optical encryption with multiple users and multiple security levels , 2011 .

[4]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[5]  Roberto Torroba,et al.  Optical encryption and QR codes: secure and noise-free information retrieval. , 2013, Optics express.

[6]  Tom Dowling,et al.  Introducing secure modes of operation for optical encryption. , 2008, Journal of the Optical Society of America. A, Optics, image science, and vision.

[7]  Hiroyuki Suzuki,et al.  Experimental evaluation of fingerprint verification system based on double random phase encoding. , 2006, Optics express.

[8]  Arvind Kumar,et al.  Impulse attack free double-random-phase encryption scheme with randomized lens-phase functions. , 2009, Optics letters.

[9]  B. Javidi Securing Information with Optical Technologies , 1997 .

[10]  Soontorn Oraintara,et al.  On the distributions of the relative phase of complex wavelet coefficients , 2009, 2009 IEEE International Symposium on Circuits and Systems.

[11]  Hirotsugu Yamamoto,et al.  Hiding an image with a light-scattering medium and use of a contrast-discrimination method for readout. , 2004, Applied optics.

[12]  L Hesselink,et al.  Encrypted holographic data storage based on orthogonal-phase-code multiplexing. , 1995, Applied optics.

[13]  Guanshen Zhang,et al.  Encrypted optical memory using double random phase encoding , 1996, Conference Proceedings LEOS'96 9th Annual Meeting IEEE Lasers and Electro-Optics Society.

[14]  Myungjin Cho,et al.  Information authentication using photon-counting double-random-phase encrypted images. , 2011, Optics letters.

[15]  G. Unnikrishnan,et al.  Optical encryption by double-random phase encoding in the fractional Fourier domain. , 2000, Optics letters.

[16]  B. Javidi,et al.  Photon-Counting Security Tagging and Verification Using Optically Encoded QR Codes , 2014, IEEE Photonics Journal.

[17]  Y Li,et al.  Security and encryption optical systems based on a correlator with significant output images. , 2000, Applied optics.

[18]  Thomas Hofmann,et al.  Pattern Recognition, Statistical , 2006 .

[19]  F Dubois Automatic spatial frequency selection algorithm for pattern recognition by correlation. , 1993, Applied optics.

[20]  Bahram Javidi,et al.  Secure optical data storage with random phase key codes by use of a configuration of a joint transform correlator. , 2003, Applied optics.

[21]  Hiroshi Hanaizumi,et al.  Barcode readers using the camera device in mobile phones , 2004, 2004 International Conference on Cyberworlds.

[22]  Hiroyuki Suzuki,et al.  Known plaintext attack on double random phase encoding using fingerprint as key and a method for avoiding the attack. , 2010, Optics express.

[23]  R. Muise,et al.  Object Specific Image Reconstruction using a Compressive Sensing Architecture for Application in Surveillance Systems , 2009, IEEE Transactions on Aerospace and Electronic Systems.

[24]  F. Massey The Kolmogorov-Smirnov Test for Goodness of Fit , 1951 .

[25]  Xudong Chen,et al.  Optical image encryption based on diffractive imaging. , 2010, Optics letters.

[26]  Bahram Javidi,et al.  Photon-counting double-random-phase encoding for secure image verification and retrieval , 2012 .

[27]  B Javidi,et al.  Basic properties of nonlinear global filtering techniques and optimal discriminant solutions. , 1995, Applied optics.

[28]  Bahram Javidi,et al.  Three-dimensional photon counting integral imaging reconstruction using penalized maximum likelihood expectation maximization. , 2011, Optics express.

[29]  Wen Chen,et al.  Space-based optical image encryption. , 2010, Optics express.

[30]  E G Johnson,et al.  Phase encryption of biometrics in diffractive optical elements. , 1996, Optics letters.

[31]  B Javidi,et al.  Encrypted optical memory system using three-dimensional keys in the Fresnel domain. , 1999, Optics letters.

[32]  S. Shapiro,et al.  An Analysis of Variance Test for Normality (Complete Samples) , 1965 .

[33]  Myrian Tebaldi,et al.  Multiplexing encrypted data by using polarized light , 2006 .

[34]  Kenjiro Watanabe,et al.  Novel Encryption Method Using Multi Reference Patterns in Coaxial Holographic Data Storage , 2007 .

[35]  Arturo Carnicer,et al.  Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. , 2005, Optics letters.

[36]  Y. Sakai,et al.  Image encipherment based on optical parallel processing using spatial light modulators , 1991, IEEE Photonics Technology Letters.

[37]  David A. Huffman,et al.  A method for the construction of minimum-redundancy codes , 1952, Proceedings of the IRE.

[38]  Bahram Javidi,et al.  Polarization encoding for optical security systems , 2000 .

[39]  Ryu Sasaki,et al.  Probability distributions and coherent states of , and algebras , 1997 .

[40]  Bahram Javidi,et al.  Optical encryption using a joint transform correlator architecture , 2000 .

[41]  J. C. Dainty,et al.  I The Statistics of Speckle Patterns , 1977 .

[42]  Osamu Matoba,et al.  Optical Techniques for Information Security , 2009, Proceedings of the IEEE.

[43]  B Javidi,et al.  Optical security and encryption with totally incoherent light. , 2001, Optics letters.

[44]  Bahram Javidi,et al.  Three dimensional visualization by photon counting computational Integral Imaging. , 2008, Optics express.

[45]  Bahram Javidi,et al.  Design of filters to detect a noisy target in nonoverlapping background noise , 1994 .

[46]  O Matoba,et al.  Secure optical memory system with polarization encryption. , 2001, Applied optics.

[47]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[48]  Ayman Alfalou,et al.  Optical image compression and encryption methods , 2009 .

[49]  B Javidi,et al.  Encrypted optical storage with angular multiplexing. , 1999, Applied optics.

[50]  Philippe Réfrégier,et al.  Maximum-likelihood estimation of an astronomical image from a sequence at low photon levels , 1998 .

[51]  Myrian Tebaldi,et al.  Multiplexing encryption–decryption via lateral shifting of a random phase mask , 2006 .

[52]  B. Javidi,et al.  Encrypting three-dimensional information with digital holography. , 2000, Applied optics.

[53]  Chris Chatwin,et al.  Random phase encoding for optical security , 1996 .

[54]  A. Stern,et al.  Phase-Modulated Optical System With Sparse Representation for Information Encoding and Authentication , 2013, IEEE Photonics Journal.

[55]  Bahram Javidi,et al.  Full-phase photon-counting double-random-phase encryption. , 2014, Journal of the Optical Society of America. A, Optics, image science, and vision.

[56]  B. Javidi Nonlinear joint power spectrum based optical correlation. , 1989, Applied optics.

[57]  Oded Agam,et al.  Statistics of speckle patterns , 2006 .

[58]  Myungjin Cho,et al.  Three-dimensional photon counting double-random-phase encryption. , 2013, Optics letters.

[59]  Kehar Singh,et al.  Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator. , 2011, Applied optics.

[60]  Bahram Javidi,et al.  Optical encryption using multiple intensity samplings in the axial domain. , 2013, Journal of the Optical Society of America. A, Optics, image science, and vision.

[61]  Bahram Javidi,et al.  Fully phase encrypted image processor , 1999 .

[62]  Jesús Lancis,et al.  Optical encryption based on computational ghost imaging. , 2010, Optics letters.

[63]  Ross Anderson,et al.  Serpent: A Proposal for the Advanced Encryption Standard , 1998 .

[64]  B. Javidi,et al.  Encrypted optical storage with wavelength-key and random phase codes. , 1999, Applied optics.

[65]  Aaas News,et al.  Book Reviews , 1893, Buffalo Medical and Surgical Journal.

[66]  Isha Mehra,et al.  Collision in Fresnel domain asymmetric cryptosystem using phase truncation and authentication verification , 2013 .

[67]  Shuai Yuan Sensitivity, noise and quantitative model of Laser Speckle Contrast Imaging , 2008 .

[68]  Bahram Javidi,et al.  Influence of a perturbation in a double phase-encoding system , 1998 .

[69]  David Hinkley,et al.  Bootstrap Methods: Another Look at the Jackknife , 2008 .

[70]  Bahram Javidi,et al.  Optical pattern recognition for validation and security verification , 1994, Defense, Security, and Sensing.