Optical cryptosystem based on phase-truncated Fresnel diffraction and transport of intensity equation.
暂无分享,去创建一个
Chenggong Zhang | Wenqi He | Xiang Peng | Jiachen Wu | Xiang Peng | Jiachen Wu | W. He | Chenggong Zhang
[1] A. Asundi,et al. High-speed transport-of-intensity phase microscopy with an electrically tunable lens. , 2013, Optics express.
[2] James R Fienup,et al. Phase retrieval algorithms: a personal tour [Invited]. , 2013, Applied optics.
[3] Myrian Tebaldi,et al. Known-plaintext attack on a joint transform correlator encrypting system. , 2010, Optics letters.
[4] Wenqi He,et al. The keyed optical Hash function based on cascaded phase-truncated Fourier transforms , 2010 .
[5] Myrian Tebaldi,et al. Chosen-plaintext attack on a joint transform correlator encrypting system , 2010 .
[6] J R Fienup,et al. Phase retrieval algorithms: a comparison. , 1982, Applied optics.
[7] Leslie J. Allen,et al. Phase retrieval from series of images obtained by defocus variation , 2001 .
[8] Yixiang Chen,et al. Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform. , 2014, Applied optics.
[9] Bahram Javidi,et al. Resistance of the double random phase encryption against various attacks. , 2007, Optics express.
[10] Arturo Carnicer,et al. Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. , 2005, Optics letters.
[11] Unnikrishnan Gopinathan,et al. A known-plaintext heuristic attack on the Fourier plane encryption algorithm. , 2006, Optics express.
[12] Xiang Peng,et al. Cryptanalysis of optical encryption schemes based on joint transform correlator architecture , 2011 .
[13] Peng Zhang,et al. Known-plaintext attack on optical encryption based on double random phase keys. , 2006, Optics letters.
[14] Xiang Peng,et al. Universal and special keys based on phase-truncated Fourier transform. , 2011, Optical engineering.
[15] Wenqi He,et al. Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang-Gu algorithm: comment. , 2013, Optics letters.
[16] Chenggong Zhang,et al. Ciphertext-only attack on a joint transform correlator encryption system. , 2013, Optics express.
[17] M. Teague. Deterministic phase retrieval: a Green’s function solution , 1983 .
[18] Xiaogang Wang,et al. A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms , 2012 .
[19] B. Javidi. Securing Information with Optical Technologies , 1997 .
[20] Bahram Javidi,et al. Optical encryption using a joint transform correlator architecture , 2000 .
[21] Bahram Javidi,et al. Advances in optical security systems , 2014 .
[22] Xiang Peng,et al. Asymmetric cryptosystem based on phase-truncated Fourier transforms. , 2010, Optics letters.
[23] Daomu Zhao,et al. Double images encryption method with resistance against the specific attack based on an asymmetric algorithm. , 2012, Optics express.
[24] Qian Chen,et al. Transport-of-intensity phase imaging using Savitzky-Golay differentiation filter--theory and applications. , 2013, Optics express.
[25] Zhengjun Liu,et al. Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang-Gu algorithm. , 2013, Optics letters.
[26] Bahram Javidi,et al. Polarization encoding for optical security systems , 2000 .
[27] Xiaoli Liu,et al. Cryptanalysis of optical encryption with a reference wave in a joint transform correlator architecture , 2013 .
[28] B Javidi,et al. Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.