3D object hiding using three-dimensional ptychography
暂无分享,去创建一个
Tuo Li | Yishi Shi | Wang Zhibo | An Pan | Zhang Jun | Wang Yali | An Pan | Tuo Li | Yali Wang | Jun Zhang | Yishi Shi | Zhibo Wang
[1] Joseph Rosen,et al. Review of three-dimensional holographic imaging by multiple-viewpoint-projection based methods. , 2009, Applied optics.
[2] A. G. Cullis,et al. Transmission microscopy without lenses for objects of unlimited size. , 2007, Ultramicroscopy.
[3] Roberto Torroba,et al. Three-dimensional joint transform correlator cryptosystem. , 2016, Optics letters.
[4] Jun Zhang,et al. Analytic known-plaintext attack on a phase-shifting interferometry-based cryptosystem. , 2015, Applied optics.
[5] J. Rodenburg,et al. A phase retrieval algorithm for shifting illumination , 2004 .
[6] Qiong Gong,et al. Diffractive-imaging-based optical image encryption with simplified decryption from single diffraction pattern. , 2014, Applied optics.
[7] J. Rodenburg,et al. An improved ptychographical phase retrieval algorithm for diffractive imaging. , 2009, Ultramicroscopy.
[8] B. Javidi,et al. Encrypting three-dimensional information with digital holography. , 2000, Applied optics.
[9] Bahram Javidi,et al. 3D object watermarking by a 3D hidden object. , 2003, Optics express.
[10] J R Fienup,et al. Phase retrieval algorithms: a comparison. , 1982, Applied optics.
[11] O. Bunk,et al. High-Resolution Scanning X-ray Diffraction Microscopy , 2008, Science.
[12] Tuo Li,et al. Security risk of diffractive-imaging-based optical cryptosystem. , 2015, Optics express.
[13] Christophe Martinez,et al. Complementary computer generated holography for aesthetic watermarking. , 2012, Optics express.
[14] Hyun Kim,et al. Optimal watermarking of digital hologram of 3-D object. , 2005, Optics express.
[15] J. Rodenburg,et al. Ptychographic microscope for three-dimensional imaging. , 2014, Optics express.
[16] Tuo Li,et al. Vulnerability of impulse attack-free four random phase mask cryptosystems to chosen-plaintext attack , 2016 .
[17] Tuo Li,et al. Attack on Optical Double Random Phase Encryption Based on the Principle of Ptychographical Imaging , 2016 .
[18] Jingjuan Zhang,et al. Multiple-image hiding by information prechoosing. , 2008, Optics letters.
[19] Yi Qin,et al. Simplified optical image encryption approach using single diffraction pattern in diffractive-imaging-based scheme. , 2014, Optics express.
[20] Jingjuan Zhang,et al. Multiple-image hiding in the Fresnel domain. , 2007, Optics letters.
[21] Bahram Javidi,et al. Watermarking of three-dimensional objects by digital holography. , 2003, Optics letters.
[22] A. G. Cullis,et al. Hard-x-ray lensless imaging of extended objects. , 2007, Physical review letters.
[23] J. Rodenburg,et al. Ptychographic transmission microscopy in three dimensions using a multi-slice approach. , 2012, Journal of the Optical Society of America. A, Optics, image science, and vision.
[24] Byoungho Kim,et al. Encryption and volumetric 3D object reconstruction using multispectral computational integral imaging. , 2014, Applied optics.
[25] Tuo Li,et al. Optical encryption of unlimited-size images based on ptychographic scanning digital holography. , 2014, Applied optics.
[26] J. Rodenburg. Ptychography and Related Diffractive Imaging Methods , 2008 .
[27] Rong Li,et al. Optical image encryption and hiding based on a modified Mach-Zehnder interferometer. , 2014, Optics express.
[28] H M L Faulkner,et al. Error tolerance of an iterative phase retrieval algorithm for moveable illumination microscopy. , 2005, Ultramicroscopy.
[29] Hsuan T Chang,et al. Image watermarking by use of digital holography embedded in the discrete-cosine-transform domain. , 2005, Applied optics.
[30] Liren Liu,et al. Hiding an image in cascaded Fresnel digital holograms , 2006 .
[31] Chi-Ching Chang,et al. Three-dimensional information encryption and anticounterfeiting using digital holography. , 2015, Applied optics.
[32] Bahram Javidi,et al. Information hiding technique with double phase encoding. , 2002, Applied optics.
[33] Myrian Tebaldi,et al. Known-plaintext attack on a joint transform correlator encrypting system. , 2010, Optics letters.
[34] Sanguo Zhang,et al. Optical image encryption via ptychography. , 2013, Optics letters.