Design of cascaded phase keys for a hierarchical security system
暂无分享,去创建一个
[1] Eun-Soo Kim,et al. Optical image encryption based on XOR operations , 1999 .
[2] R. Gerchberg. Super-resolution through Error Energy Reduction , 1974 .
[3] Chin-Chen Chang,et al. A virtual image cryptosystem based upon vector quantization , 1998, IEEE Trans. Image Process..
[4] J R Fienup,et al. Phase retrieval algorithms: a comparison. , 1982, Applied optics.
[5] B Javidi,et al. Optoelectronic information encryption with phase-shifting interferometry. , 2000, Applied optics.
[6] Mark A. Neifeld,et al. Digital wavefront reconstruction and its application to image encryption , 2000 .
[7] A. Papoulis. A new algorithm in spectral analysis and band-limited extrapolation. , 1975 .
[8] Xiang Peng,et al. Parameterized multi-dimensional data encryption by digital optics , 2002 .
[9] O. Bryngdahl,et al. Iterative Fourier-transform algorithm applied to computer holography , 1988 .
[10] Chris Chatwin,et al. Random phase encoding for optical security , 1996 .
[11] James R. Fienup,et al. Iterative Method Applied To Image Reconstruction And To Computer-Generated Holograms , 1980 .
[12] Y Li,et al. Security and encryption optical systems based on a correlator with significant output images. , 2000, Applied optics.
[13] J Rosen. Learning in correlators based on projections onto constraint sets. , 1993, Optics letters.
[14] M. Hayes. The reconstruction of a multidimensional sequence from the phase or magnitude of its Fourier transform , 1982 .
[15] B Javidi,et al. Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.
[16] Bahram Javidi,et al. Fully phase encrypted image processor , 1999 .