References
- J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kim, "Optical image encrypion based on XOR operations," Opt. Eng., Vol. 38, No. 1, pp. 47-54, 1999. https://doi.org/10.1117/1.602060
- P. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett., vol. 20, pp. 767-769, 1995. https://doi.org/10.1364/OL.20.000767
- T. Nomura and B. Javidi, "Optical encryption using a joint transform correlator architecture," Opt. Eng., Vol. 39, No. 8, pp. 2031-2035, 2000. https://doi.org/10.1117/1.1304844
- L. G. Neto, "Implementation of image encryption using the phase-contrast technique," Proceedings of SPIE, Vol. 3386, pp. 284-290, 1998.
- P. Stepien, R. Gajda, and T. Szoplik, "Distributed kinoforms in optical security applications," Opt. Eng., Vol. 35, No. 9, pp. 2453-2458, 1996. https://doi.org/10.1117/1.600847
- T. Sasaki, H. Togo, J. Tnida, and Y. Ichioka, "Stream cipher based on pseudorandom number generation with optical transformation," Applied Optics, Vol. 39, No. 14, pp. 2340-2346, 2000. https://doi.org/10.1364/AO.39.002340
- G. Unnikrishnan, K. Singh, "Double random fractional Fourier-domain encoding for optical security," Opt. Eng. Vol. 39, pp. 2853-2859, 2000. https://doi.org/10.1117/1.1313498
- J. Y. Kim, S. J. Park, C. S. Kim, J. K. Bae, and S. J. Kim, "Optical image encryption using interferometrybased phase masks," Electron. Lett., Vol. 36, No. 10, pp. 874-875, 2000. https://doi.org/10.1049/el:20000674
- I. Yamaguchi and T. Zhang, "Phase-shifting digital holography," Opt. Lett., vol. 22, pp. 610-612, 1998.
- S.K. Gil, S.H. Jeon, N. Kim and J.R. Jeong, "Successive encryption and transmission with phase-shifting digital holography," Proceedings of SPIE, Vol. 6136, 2006.