Optical Security using the Double-Random-Phase Encryption with Photon-Counting
暂无分享,去创建一个
[1] N. Fisher,et al. Statistical Analysis of Circular Data , 1993 .
[2] Bahram Javidi,et al. Resistance of the double random phase encryption against various attacks. , 2007, Optics express.
[3] Naveen K. Nishchal,et al. Flexible optical encryption with multiple users and multiple security levels , 2011 .
[4] B Javidi,et al. Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.
[5] Roberto Torroba,et al. Optical encryption and QR codes: secure and noise-free information retrieval. , 2013, Optics express.
[6] Tom Dowling,et al. Introducing secure modes of operation for optical encryption. , 2008, Journal of the Optical Society of America. A, Optics, image science, and vision.
[7] Hiroyuki Suzuki,et al. Experimental evaluation of fingerprint verification system based on double random phase encoding. , 2006, Optics express.
[8] Arvind Kumar,et al. Impulse attack free double-random-phase encryption scheme with randomized lens-phase functions. , 2009, Optics letters.
[9] B. Javidi. Securing Information with Optical Technologies , 1997 .
[10] Soontorn Oraintara,et al. On the distributions of the relative phase of complex wavelet coefficients , 2009, 2009 IEEE International Symposium on Circuits and Systems.
[11] Hirotsugu Yamamoto,et al. Hiding an image with a light-scattering medium and use of a contrast-discrimination method for readout. , 2004, Applied optics.
[12] L Hesselink,et al. Encrypted holographic data storage based on orthogonal-phase-code multiplexing. , 1995, Applied optics.
[13] Guanshen Zhang,et al. Encrypted optical memory using double random phase encoding , 1996, Conference Proceedings LEOS'96 9th Annual Meeting IEEE Lasers and Electro-Optics Society.
[14] Myungjin Cho,et al. Information authentication using photon-counting double-random-phase encrypted images. , 2011, Optics letters.
[15] G. Unnikrishnan,et al. Optical encryption by double-random phase encoding in the fractional Fourier domain. , 2000, Optics letters.
[16] B. Javidi,et al. Photon-Counting Security Tagging and Verification Using Optically Encoded QR Codes , 2014, IEEE Photonics Journal.
[17] Y Li,et al. Security and encryption optical systems based on a correlator with significant output images. , 2000, Applied optics.
[18] Thomas Hofmann,et al. Pattern Recognition, Statistical , 2006 .
[19] F Dubois. Automatic spatial frequency selection algorithm for pattern recognition by correlation. , 1993, Applied optics.
[20] Bahram Javidi,et al. Secure optical data storage with random phase key codes by use of a configuration of a joint transform correlator. , 2003, Applied optics.
[21] Hiroshi Hanaizumi,et al. Barcode readers using the camera device in mobile phones , 2004, 2004 International Conference on Cyberworlds.
[22] Hiroyuki Suzuki,et al. Known plaintext attack on double random phase encoding using fingerprint as key and a method for avoiding the attack. , 2010, Optics express.
[23] R. Muise,et al. Object Specific Image Reconstruction using a Compressive Sensing Architecture for Application in Surveillance Systems , 2009, IEEE Transactions on Aerospace and Electronic Systems.
[24] F. Massey. The Kolmogorov-Smirnov Test for Goodness of Fit , 1951 .
[25] Xudong Chen,et al. Optical image encryption based on diffractive imaging. , 2010, Optics letters.
[26] Bahram Javidi,et al. Photon-counting double-random-phase encoding for secure image verification and retrieval , 2012 .
[27] B Javidi,et al. Basic properties of nonlinear global filtering techniques and optimal discriminant solutions. , 1995, Applied optics.
[28] Bahram Javidi,et al. Three-dimensional photon counting integral imaging reconstruction using penalized maximum likelihood expectation maximization. , 2011, Optics express.
[29] Wen Chen,et al. Space-based optical image encryption. , 2010, Optics express.
[30] E G Johnson,et al. Phase encryption of biometrics in diffractive optical elements. , 1996, Optics letters.
[31] B Javidi,et al. Encrypted optical memory system using three-dimensional keys in the Fresnel domain. , 1999, Optics letters.
[32] S. Shapiro,et al. An Analysis of Variance Test for Normality (Complete Samples) , 1965 .
[33] Myrian Tebaldi,et al. Multiplexing encrypted data by using polarized light , 2006 .
[34] Kenjiro Watanabe,et al. Novel Encryption Method Using Multi Reference Patterns in Coaxial Holographic Data Storage , 2007 .
[35] Arturo Carnicer,et al. Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. , 2005, Optics letters.
[36] Y. Sakai,et al. Image encipherment based on optical parallel processing using spatial light modulators , 1991, IEEE Photonics Technology Letters.
[37] David A. Huffman,et al. A method for the construction of minimum-redundancy codes , 1952, Proceedings of the IRE.
[38] Bahram Javidi,et al. Polarization encoding for optical security systems , 2000 .
[39] Ryu Sasaki,et al. Probability distributions and coherent states of , and algebras , 1997 .
[40] Bahram Javidi,et al. Optical encryption using a joint transform correlator architecture , 2000 .
[41] J. C. Dainty,et al. I The Statistics of Speckle Patterns , 1977 .
[42] Osamu Matoba,et al. Optical Techniques for Information Security , 2009, Proceedings of the IEEE.
[43] B Javidi,et al. Optical security and encryption with totally incoherent light. , 2001, Optics letters.
[44] Bahram Javidi,et al. Three dimensional visualization by photon counting computational Integral Imaging. , 2008, Optics express.
[45] Bahram Javidi,et al. Design of filters to detect a noisy target in nonoverlapping background noise , 1994 .
[46] O Matoba,et al. Secure optical memory system with polarization encryption. , 2001, Applied optics.
[47] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[48] Ayman Alfalou,et al. Optical image compression and encryption methods , 2009 .
[49] B Javidi,et al. Encrypted optical storage with angular multiplexing. , 1999, Applied optics.
[50] Philippe Réfrégier,et al. Maximum-likelihood estimation of an astronomical image from a sequence at low photon levels , 1998 .
[51] Myrian Tebaldi,et al. Multiplexing encryption–decryption via lateral shifting of a random phase mask , 2006 .
[52] B. Javidi,et al. Encrypting three-dimensional information with digital holography. , 2000, Applied optics.
[53] Chris Chatwin,et al. Random phase encoding for optical security , 1996 .
[54] A. Stern,et al. Phase-Modulated Optical System With Sparse Representation for Information Encoding and Authentication , 2013, IEEE Photonics Journal.
[55] Bahram Javidi,et al. Full-phase photon-counting double-random-phase encryption. , 2014, Journal of the Optical Society of America. A, Optics, image science, and vision.
[56] B. Javidi. Nonlinear joint power spectrum based optical correlation. , 1989, Applied optics.
[57] Oded Agam,et al. Statistics of speckle patterns , 2006 .
[58] Myungjin Cho,et al. Three-dimensional photon counting double-random-phase encryption. , 2013, Optics letters.
[59] Kehar Singh,et al. Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator. , 2011, Applied optics.
[60] Bahram Javidi,et al. Optical encryption using multiple intensity samplings in the axial domain. , 2013, Journal of the Optical Society of America. A, Optics, image science, and vision.
[61] Bahram Javidi,et al. Fully phase encrypted image processor , 1999 .
[62] Jesús Lancis,et al. Optical encryption based on computational ghost imaging. , 2010, Optics letters.
[63] Ross Anderson,et al. Serpent: A Proposal for the Advanced Encryption Standard , 1998 .
[64] B. Javidi,et al. Encrypted optical storage with wavelength-key and random phase codes. , 1999, Applied optics.
[65] Aaas News,et al. Book Reviews , 1893, Buffalo Medical and Surgical Journal.
[66] Isha Mehra,et al. Collision in Fresnel domain asymmetric cryptosystem using phase truncation and authentication verification , 2013 .
[67] Shuai Yuan. Sensitivity, noise and quantitative model of Laser Speckle Contrast Imaging , 2008 .
[68] Bahram Javidi,et al. Influence of a perturbation in a double phase-encoding system , 1998 .
[69] David Hinkley,et al. Bootstrap Methods: Another Look at the Jackknife , 2008 .
[70] Bahram Javidi,et al. Optical pattern recognition for validation and security verification , 1994, Defense, Security, and Sensing.