Digital holography를 이용한 광암호화 기술

  • Published : 2011.06.30

Abstract

Keywords

References

  1. J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kim, "Optical image encrypion based on XOR operations," Opt. Eng., Vol. 38, No. 1, pp. 47-54, 1999. https://doi.org/10.1117/1.602060
  2. P. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett., vol. 20, pp. 767-769, 1995. https://doi.org/10.1364/OL.20.000767
  3. T. Nomura and B. Javidi, "Optical encryption using a joint transform correlator architecture," Opt. Eng., Vol. 39, No. 8, pp. 2031-2035, 2000. https://doi.org/10.1117/1.1304844
  4. L. G. Neto, "Implementation of image encryption using the phase-contrast technique," Proceedings of SPIE, Vol. 3386, pp. 284-290, 1998.
  5. P. Stepien, R. Gajda, and T. Szoplik, "Distributed kinoforms in optical security applications," Opt. Eng., Vol. 35, No. 9, pp. 2453-2458, 1996. https://doi.org/10.1117/1.600847
  6. T. Sasaki, H. Togo, J. Tnida, and Y. Ichioka, "Stream cipher based on pseudorandom number generation with optical transformation," Applied Optics, Vol. 39, No. 14, pp. 2340-2346, 2000. https://doi.org/10.1364/AO.39.002340
  7. G. Unnikrishnan, K. Singh, "Double random fractional Fourier-domain encoding for optical security," Opt. Eng. Vol. 39, pp. 2853-2859, 2000. https://doi.org/10.1117/1.1313498
  8. J. Y. Kim, S. J. Park, C. S. Kim, J. K. Bae, and S. J. Kim, "Optical image encryption using interferometrybased phase masks," Electron. Lett., Vol. 36, No. 10, pp. 874-875, 2000. https://doi.org/10.1049/el:20000674
  9. I. Yamaguchi and T. Zhang, "Phase-shifting digital holography," Opt. Lett., vol. 22, pp. 610-612, 1998.
  10. S.K. Gil, S.H. Jeon, N. Kim and J.R. Jeong, "Successive encryption and transmission with phase-shifting digital holography," Proceedings of SPIE, Vol. 6136, 2006.