[1]
|
Refregier, P. and Javidi, B. (1995) Optical Image Encryption Based on Input Plane and Fourier Plane Random Encoding. Optics Letters, 20, 767-769. http://dx.doi.org/10.1364/OL.20.000767
|
[2]
|
Liu, S.T., Mi, Q.L. and Zhu, B.H. (2001) Optical Image Encryption with Multistage and Multichannel Fractional Fourier-Domain Filtering. Optics Letters, 26, 1242-1244. http://dx.doi.org/10.1364/OL.26.001242
|
[3]
|
Mogensen, P.C., Eriksen, R.L. and Gluckstad, J. (2001) High Capacity Optical Encryption System Using Ferro-Electric Spatial Light Modulators. Journal of Optics A: Pure and Applied Optics, 3, 10-15.
http://dx.doi.org/10.1088/1464-4258/3/1/302
|
[4]
|
Peng, X., Cui, Z.Y. and Tan, T.N. (2002) Information Encryption with Virtual-Optics Imaging System. Optics Communications, 212, 235-245. http://dx.doi.org/10.1016/S0030-4018(02)02003-5
|
[5]
|
Situ, G.H. and Zhang, J. (2004) Double Random-Phase Encoding in the Fresnel Domain. Optics Letters, 29, 1584- 1586. http://dx.doi.org/10.1364/OL.29.001584
|
[6]
|
Barrera, J.F., Henao, R., Tebaldi, M., Torroba, R. and Bolognini, N. (2006) Multiplexing Encrypted Data by Using Polarized Light. Optics Communications, 260, 109-112. http://dx.doi.org/10.1016/j.optcom.2005.10.053
|
[7]
|
Chen, L.F. and Zhao, D.M. (2006) Optical Image Encryption with Hartley Transforms. Optics Letters, 31, 3438-3440.
http://dx.doi.org/10.1364/OL.31.003438
|
[8]
|
Zhou, N., Wang, Y. and Gong, L. (2011) Novel Optical Image Encryption Scheme Based on Fractional Mellin Transform. Optics Communications, 284, 3234-3242. http://dx.doi.org/10.1016/j.optcom.2011.02.065
|
[9]
|
He, W.Q., Peng, X., Qin, W. and Meng, X.F. (2010) The Keyed Optical Hash Function Based on Cascaded Phase- Truncated Fourier Transforms. Optics Communications, 283, 2328-2332.
http://dx.doi.org/10.1016/j.optcom.2009.11.060
|
[10]
|
Carnicer, A., Montes-Usategui, M., Arcos, S. and Juvells, I. (2005) Vulnerability to Chosen-Ciphertext Attacks of Optical Encryption Schemes Based on Double Random Phase Keys. Optics Letters, 30, 1644-1646.
http://dx.doi.org/10.1364/OL.30.001644
|
[11]
|
Peng, X., Wei, H.Z. and Zhang, P. (2006) Known-Plaintext Attack on Optical Encryption Based on Double Random Phase Keys. Optics Letters, 31, 1044-1046. http://dx.doi.org/10.1364/OL.31.001044
|
[12]
|
Frauel, Y., Castro, A., Naughton, T.J. and Javidi, B. (2007) Resistance of the Double Random Phase Encryption against Various Attacks. Optics Express, 15, 10253-10265. http://dx.doi.org/10.1364/OE.15.010253
|
[13]
|
Situ, G., Gopinathan, U., Monaghan, D.S. and Sheridan, J.T. (2007) Cryptanalysis of Optical Security Systems with Significant Output Images. Applied Optics, 46, 5257-5262. http://dx.doi.org/10.1364/AO.46.005257
|
[14]
|
Tashima, H., Takeda, M., Suzuki, H., Obi, T., Yamaguchi, M. and Ohyama, N. (2010) Known Plaintext Attack on Double Random Phase Encoding Using Fingerprint as Key and a Method for Avoiding the Attack. Optics Express, 18, 13772-13781. http://dx.doi.org/10.1364/OE.18.013772
|
[15]
|
Meng, X.F., Cai, L.Z. and Wang, Y.R. (2007) Hierarchical Image Encryption Based on Cascaded Iterative Phase Retrieval Algorithm in the Fresnel Domain. Journal of Optics A: Pure and Applied Optics, 9, 1070-1075.
http://dx.doi.org/10.1088/1464-4258/9/11/017
|
[16]
|
Zhang, Y. and Wang, B. (2008) Optical Image Encryption Based on Interference. Optics Letters, 33, 2443-2445.
http://dx.doi.org/10.1364/OL.33.002443
|
[17]
|
Wang, B. and Zhang, Y. (2009) Double Images Hiding Based on Optical Interference. Optics Communications, 282, 3439-3443. http://dx.doi.org/10.1016/j.optcom.2009.05.050
|
[18]
|
Zhu, N., Wang, Y.T., Liu, J., Xie, J.H. and Zhang, H. (2009) Optical Image Encryption Based on Interference of Polarized Light. Optics Express, 17, 13418-13424. http://dx.doi.org/10.1364/OE.17.013418
|
[19]
|
Han, Y.J. and Zhang, Y.H. (2010) Optical Image Encryption Based on Two Beams’ Interference. Optics Communications, 283, 1690-1692. http://dx.doi.org/10.1016/j.optcom.2009.12.060
|
[20]
|
Tay, C.J., Quan, C., Chen, W. and Fu, Y. (2010) Color Image Encryption Based on Interference and Virtual Optics. Optics & Laser Technology, 42, 409-415. http://dx.doi.org/10.1016/j.optlastec.2009.08.016
|
[21]
|
Kumar, P., Joseph, J. and Singh, K. (2011) Optical Image Encryption Using a Jigsaw Transform for Silhouette Removal in Interference-Based Methods and Decryption with a Single Spatial Light Modulator. Applied Optics, 50, 1805- 1811. http://dx.doi.org/10.1364/AO.50.001805
|
[22]
|
Weng, D.D., Zhu, N., Wang, Y.T., Xie, J.H. and Liu, J.A. (2011) Experimental Verification of Optical Image Encryption Based on Interference. Optics Communications, 284, 2485-2487. http://dx.doi.org/10.1016/j.optcom.2011.01.039
|
[23]
|
Yang, B., Liu, Z., Wang, B., Zhang, Y. and Liu, S. (2011) Optical Stream-Cipher-Like System for Image Encryption Based on Michelson Interferometer. Optics Express, 19, 2634-2642. http://dx.doi.org/10.1364/OE.19.002634
|
[24]
|
Yuan, S., Yao, S.X., Xin, Y.H. and Liu, M.T. (2011) Information Hiding Based on the Optical Interference Principle. Optics Communications, 284, 5078-5083. http://dx.doi.org/10.1016/j.optcom.2011.07.015
|
[25]
|
He, W.Q., Peng, X. and Meng, X.F. (2012) Optical Mul-tiple-Image Hiding Based on Interference and Grating Modulation. Journal of Optics, 14, Article ID: 075401. http://dx.doi.org/10.1088/2040-8978/14/7/075401
|
[26]
|
Schneier, B. (1996) Applied Cryptography: Protocols, Algorithms, and Source Code in C. 2nd Edition, John Wiley & Sons, Hoboken.
|