References
- A. Menezes, T. Okamoto, and S. Vanstone, "Reducing elliptic curve logarithms to logarithms in a finite field," IEEE Tran. on Info. Th. 39, 1639-1646 (1993). https://doi.org/10.1109/18.259647
- C. Rackoff and D. Simon, "Noninteractive zero-knowledge proof of knowledge and chosen ciphertext attack," Proc. Crypto' 91, 433-444 (1991).
- S. Tsuji and T. Itoh, "An ID-based cryptosystem based on the discrete logarithm problem," IEEE Journal on Selected Areas in Communication 7, 467-473 (1989). https://doi.org/10.1109/49.17709
- H. Tanaka, "A realization scheme for the identity-based cryptosystem," in Proc. Crypto' 87 (Santa Barbara, USA, 1987), pp. 341-349.
- P. Refregier and B. Javidi, "Optical-image encryption based on input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995). https://doi.org/10.1364/OL.20.000767
- O. Matoba and B. Javidi, "Encrypted optical storage with angular multiplexing," Appl. Opt. 38, 7288-7293 (1999). https://doi.org/10.1364/AO.38.007288
- T. Nomura and B. Javidi, "Optical encryption system with a binary key code," Appl. Opt. 39, 4783-4787 (2000). https://doi.org/10.1364/AO.39.004783
- M. Singh, A. Kumar, and K. Singh, "Secure optical system that uses fully phase-based encryption and lithium niobate crystal as phase contrast filter for decryption," Opt. Laser Technol. 40, 619-624 (2008). https://doi.org/10.1016/j.optlastec.2007.09.007
- Z. Liu, S. Li, M. Yang, W. Liu, and S. Liu, "Image encryption based on the random rotation operation in the fractional Fourier transform domains," Opt. Lasers Eng. 50, 1352-1358 (2012). https://doi.org/10.1016/j.optlaseng.2012.05.021
- M. Joshi, C. Shakher, and K. Singh, "Fractional Fourier transform based image multiplexing and encryption technique for four-color images using input images as keys," Opt. Commun. 283, 2496-2505 (2010). https://doi.org/10.1016/j.optcom.2010.02.024
- Z. Liu, S. L. Xu, C. Lin, J. Dai, and S. Liu, "Image encryption scheme by using iterative random phase encoding in gyrator transform domains," Opt. Lasers Eng. 49, 542-546 (2011). https://doi.org/10.1016/j.optlaseng.2010.12.005
- D. S. Monaghan, U. Gopinathan, T. J. Naughton, and J. T. Sheridan, "Key-space analysis of double random phase encryption technique," Appl. Opt. 46, 6641-6647 (2007). https://doi.org/10.1364/AO.46.006641
- E. Perez-Cabre, M. Cho, and B. Javidi, "Information authentication using photon-counting double-random-phase encrypted images," Opt. Lett. 36, 22-24 (2011). https://doi.org/10.1364/OL.36.000022
- T. Sarkadi and P. Koppa, "Quantitative security evaluation of optical encryption using hybrid phase- and amplitude-modulated keys," Appl. Opt. 51, 745-750 (2012). https://doi.org/10.1364/AO.51.000745
- T. Ujvari, P. Koppa, M. Lovasz, P. Varhegyi, S. Sajti, E. Lorincz, and P. Richter, "A secure data storage system based on phase-encoded thin polarization holograms," J. Opt. Pure Appl. Opt. 6, 401-411 (2004). https://doi.org/10.1088/1464-4258/6/4/017
- P. Koppa, "Phase-to-amplitude data page conversion for holographic storage and optical encryption," Appl. Opt. 46, 3561-3571 (2007). https://doi.org/10.1364/AO.46.003561
- Z. Liu, M. Yang, W. Liu, S. Li, M. Gong, W. Liu, and S. Liu, "Image encryption algorithm based on the random local phase encoding in gyrator transform domains," Opt. Commun. 285, 3921-3925 (2012). https://doi.org/10.1016/j.optcom.2012.05.061
- J. W. Goodman, Statistical Optics (Wiley & Sons, Inc., New York, USA, 1985).
- G. M. Morris, "Scene matching using photon-limited images," J. Opt. Soc. Am. A 1, 482-488 (1984). https://doi.org/10.1364/JOSAA.1.000482
- E. A. Watson and G. M. Morris, "Imaging thermal objects with photon-counting detector," Appl. Opt. 31, 4751-4757 (1990).
- F. Xiong, Digital Modulation Technique (Artech House, Norwood, USA, 2000).
- M. Patzold, Mobile Fading Channels (John Wiley & Sons, New York, USA, 2002).
- J. G. Proakis and M. Salehi, Digital Communications (McGraw-Hill, New York, USA, 2008).
- B. Javidi, "Nonlinear matched filter based optical correlation," Appl. Opt. 28, 4518-4520 (1989). https://doi.org/10.1364/AO.28.004518
- S.-H. Hong, J.-S. Jang, and B. Javidi, "Three-dimensional volumetric object reconstruction using computational integral imaging," Opt. Express 12, 483-491 (2004). https://doi.org/10.1364/OPEX.12.000483
- M. Cho and B. Javidi, "Three-dimensional photon counting double-random-phase encryption," Opt. Lett. 38, 3198-3201 (2013). https://doi.org/10.1364/OL.38.003198
- S. Yeom, Y.-H. Woo, and W.-W. Baek, "Distance extraction by means of photon-counting passive sensing," J. Opt. Soc. Korea 15, 357-361 (2011). https://doi.org/10.3807/JOSK.2011.15.4.357
- J. Kim, J.-H. Jung, J. Hong, J. Yeom, and B. Lee, "Elemental image generation method with the correction of mismatch error by sub-pixel," J. Opt. Soc. Korea 16, 29-35 (2012). https://doi.org/10.3807/JOSK.2012.16.1.029
Cited by
- Encryption and volumetric 3D object reconstruction using multispectral computational integral imaging vol.53, pp.27, 2014, https://doi.org/10.1364/AO.53.000G25
- A multi-secret sharing scheme for 3D solid objects vol.42, pp.4, 2015, https://doi.org/10.1016/j.eswa.2014.10.035
- Image Authentication Using Only Partial Phase Information from a Double-Random-Phase-Encrypted Image in the Fresnel Domain vol.19, pp.3, 2015, https://doi.org/10.3807/JOSK.2015.19.3.241
- Statistics-based reconstruction method with high random-error tolerance for integral imaging vol.54, pp.28, 2015, https://doi.org/10.1364/AO.54.00E176
- Three-dimensional image authentication scheme using sparse phase information in double random phase encoded integral imaging vol.56, pp.15, 2017, https://doi.org/10.1364/AO.56.004381
- Multiple-3D-object decryption based on one interference using two phase-only functions vol.56, pp.22, 2017, https://doi.org/10.1364/AO.56.006214
- Interferometry based multispectral photon-limited 2D and 3D integral image encryption employing the Hartley transform vol.23, pp.12, 2015, https://doi.org/10.1364/OE.23.015907
- Multiple-3D-object secure information system based on phase shifting method and single interference vol.55, pp.15, 2016, https://doi.org/10.1364/AO.55.004052
- 3D medical data security protection vol.54, 2016, https://doi.org/10.1016/j.eswa.2016.02.001
- Information Authentication of Three-Dimensional Photon Counting Double Random Phase Encryption Using Nonlinear Maximum Average Correlation Height Filter vol.20, pp.2, 2016, https://doi.org/10.3807/JOSK.2016.20.2.228
- Double random phase encoding with a Poisson-multinomial distribution for efficient colorful image authentication pp.1573-7721, 2018, https://doi.org/10.1007/s11042-018-6844-1