Optical Data Encryption

[1]  José A Rodrigo,et al.  Programmable two-dimensional optical fractional Fourier processor. , 2009, Optics express.

[2]  Bahram Javidi,et al.  Fully phase encoded key and biometrics for security verification , 1997 .

[3]  Osamu Matoba,et al.  Optical Techniques for Information Security , 2009, Proceedings of the IEEE.

[4]  Bahram Javidi,et al.  Resistance of the double random phase encryption against various attacks. , 2007, Optics express.

[5]  Jingjuan Zhang,et al.  Double random-phase encoding in the Fresnel domain. , 2004, Optics letters.

[6]  Dafne Amaya,et al.  Digital color encryption using a multi-wavelength approach and a joint transform correlator , 2008 .

[7]  Jingjuan Zhang,et al.  Multiple-image encryption by wavelength multiplexing. , 2005, Optics letters.

[8]  John T. Sheridan,et al.  Optical encryption and the space bandwidth product , 2005 .

[9]  Unnikrishnan Gopinathan,et al.  A known-plaintext heuristic attack on the Fourier plane encryption algorithm. , 2006, Optics express.

[10]  Bahram Javidi,et al.  CHAPTER 4 – Nonlinear Joint Transform Correlators , 1994 .

[11]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[12]  Bahram Javidi,et al.  Fully phase encrypted image processor , 1999 .

[13]  Bahram Javidi,et al.  Influence of a perturbation in a double phase-encoding system , 1998 .

[14]  Lu Xi,et al.  Information hiding based on double random-phase encoding and public-key cryptography. , 2009, Optics express.

[15]  B Javidi,et al.  Encrypted optical memory system using three-dimensional keys in the Fresnel domain. , 1999, Optics letters.

[16]  Arturo Carnicer,et al.  Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. , 2005, Optics letters.

[17]  Peng Zhang,et al.  Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain. , 2006, Optics letters.

[18]  G Unnikrishnan,et al.  Optical encryption system that uses phase conjugation in a photorefractive crystal. , 1998, Applied optics.

[19]  Bahram Javidi,et al.  Encrypted optical memory using double-random phase encoding. , 1997 .

[20]  G. Unnikrishnan,et al.  Optical encryption by double-random phase encoding in the fractional Fourier domain. , 2000, Optics letters.

[21]  X. F. Meng,et al.  Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain , 2007 .

[22]  B. Javidi,et al.  Encrypted optical storage with wavelength-key and random phase codes. , 1999, Applied optics.

[23]  Bahram Javidi,et al.  Near infrared multifactor identification tags. , 2007, Optics express.

[24]  Bahram Javidi,et al.  Design of Distortion-Invariant Optical ID Tags for Remote Identification and Verification of Objects , 2007 .

[25]  Bahram Javidi,et al.  Optical pattern recognition for validation and security verification , 1994 .

[26]  A. J. Sant,et al.  Comparison of surface scattering between identical, randomly rough metal and dielectric diffusers. , 1989, Optics letters.

[27]  Bahram Javidi,et al.  Optical encryption using a joint transform correlator architecture , 2000 .

[28]  Peng Zhang,et al.  Known-plaintext attack on optical encryption based on double random phase keys. , 2006, Optics letters.

[29]  Bahram Javidi,et al.  Multifactor authentication reinforces optical security. , 2006, Optics letters.

[30]  B. Javidi Securing Information with Optical Technologies , 1997 .

[31]  L. O'Gorman,et al.  Comparing passwords, tokens, and biometrics for user authentication , 2003, Proceedings of the IEEE.

[32]  María S. Millán,et al.  Dual nonlinear correlator based on computer controlled joint transform processor: Digital analysis and optical results , 1997 .

[33]  Bahram Javidi Real-time Remote Identification and Verification of Objects Using Optical ID Tags , 2003 .

[34]  Jingjuan Zhang,et al.  Position multiplexing for multiple-image encryption , 2006 .

[35]  J Rosen Learning in correlators based on projections onto constraint sets. , 1993, Optics letters.

[36]  Bahram Javidi,et al.  Scale and rotation Invariant optical ID tags for automatic vehicle identification and authentication , 2005, IEEE Transactions on Vehicular Technology.

[37]  Chris Chatwin,et al.  Random phase encoding for optical security , 1996 .