References
- B. Javidi and J. L. Homer, 'Optical pattern recognition for validatio and security verification,' Opt. Eng., vol. 33, pp. 1752-1756, 1994 https://doi.org/10.1117/12.170736
- R. K. Wang, I. A. Watson, and C. Chatwin, 'Random phase enceoding for optical security,' Opt. Eng., vol. 35, pp. 2464-2469, 1996 https://doi.org/10.1117/1.600849
- P. Refregier and B. Javidi, 'Optical image encryption based on input plane and Fourier plane random encoding,' Opt. Lett., vol. 20, pp. 767-769, 1995 https://doi.org/10.1364/OL.20.000767
- B. Javidi, G. Zhang, and Jian Li, 'Experimental demonstration of the random phase encoding technique for image encryption and security verification,' Opt. Eng., vol. 35, pp. 2506-2512, 1996 https://doi.org/10.1117/1.600854
- B. Javidi and E. Ahouzi, 'Optical security system with Fourier plane encoding,' Appl. Opt., vol. 37, pp. 6247-6255, 1998 https://doi.org/10.1364/AO.37.006247
- B. Javidi, A. Sergent, G. Zhang, and L. Guibert, 'Fault tolerance properties of a double phase encoding encryption technique,' Opt. Eng. vol. 36, pp. 992-998, 1997 https://doi.org/10.1117/1.601144
- B. Javidi, A. Sergent, and E. Ahouzi, 'Performance of double phase encoding encryption technique using binarized encrypted images,' Opt. Eng., vol. 37, pp. 565-570, 1998 https://doi.org/10.1117/1.601645
- B. Wang, C. C. Sun, W. C. Su, and A. E. T. Chiou, 'Shift-tolerance property of an optical double-random phase-encoding encryption system,' Appl. Opt., vol. 39, pp. 4788-4793, 2000 https://doi.org/10.1364/AO.39.004788
- N. Towghi, B. Javidi, and Z. Luo, 'Fully phase encrypted image processor,' J. Opt. Soc. Am. A, vol. 16, pp. 1915-1927, 1999 https://doi.org/10.1364/JOSAA.16.001915
- X.Tan, O. Matoba, T. Shinura, K. Kuroda, and B. Javidi, 'Secure optical storage that uses fully phase encryption,' Appl. Opt., vol. 39, pp. 6689-6694, 2000 https://doi.org/10.1364/AO.39.006689
- P. C. Mogensen and J. Gluckstad, 'Phase-only optical encryption,' Opt. Lett., vol. 25, pp. 566-568, 2000 https://doi.org/10.1364/OL.25.000566
- P. C. Mogensen and J. Gluckstad, 'Phase-only optical decryption of a fixed mask,' Appl. Opt., vol. 40, pp. 1226-1235, 2001 https://doi.org/10.1364/AO.40.001226
- J. Ohtsubo and A. Fujimoto, 'Practical image encryption and decryption by phase-coding technique for optical security systems,' Appl. Opt. vol. 41, pp. 4848-4855, 2002 https://doi.org/10.1364/AO.41.004848
- T. Nomura and B. Javidi, 'Optical encryption using a joint transform correlator architecture,' Opt. Eng., vol. 39, pp. 2031-2035, 2000. https://doi.org/10.1117/1.1304844
- T. Nomura and B. Javidi, 'Optical encryption system with a binary key code,' Appl.Opt., vol. 39, pp. 4783-4787, 2000 https://doi.org/10.1364/AO.39.004783
- M. Yamazaki and J. Ohtsubo, 'Optimization of encrypted holograms in optical security systems,' Opt. Eng., vol. 40, pp. 132-137, 2001 https://doi.org/10.1117/1.1334947
- H. T. Chang, 'Image encryption using separable amplitude-based virtual image and iteratively retrieved phase information,' Opt. Eng., vol. 40, pp. 2165-2171, 2001 https://doi.org/10.1117/1.1402124
- L. G. Neto, D. Roberge, and Y. Sheng, 'Full-range, continuous, complex modulation by the use of two coupled-mode liquid-crystal televisions,' Appl. Opt., vol. 35, pp. 4567-4576, 1996. https://doi.org/10.1364/AO.35.004567
- C. lemmi, S. Ledesma, J. Campos, and M. Villarreal, 'Gray-level computer-generated hologram filters for multiple-object correlation,' Appl. Opt., vol. 39, pp. 1233-1240, 2000 https://doi.org/10.1364/AO.39.001233