References
- T. V. Vu, N. Kim, J. An, and S. Hong, "Experimental demonstration of kinogram-based single-phase decryption technique for information security," Appl. Opt. 46, 7662-7669 (2007). https://doi.org/10.1364/AO.46.007662
- S. H. Jeon and S. K. Gil, "2-step phase-shifting digital holographic optical encryption and error analysis," J. Opt. Soc. Korea 15, 244-251 (2011). https://doi.org/10.3807/JOSK.2011.15.3.244
- P. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995). https://doi.org/10.1364/OL.20.000767
- H. J. Lee and S. K. Gil, "Error analysis for optical security by means of 4-step phase-shifting digital holography," J. Opt. Soc. Korea 10, 118-123 (2006). https://doi.org/10.3807/JOSK.2006.10.3.118
- L. Shen, J. Li, and H. Chang, "Double-image encryption based on joint transform correlation and phase-shifting interferometry," Chinese Opt. Lett. 5, 687-689 (2007).
- J. P. Liu and T. C. Poon, "Two-step-only quadrature phase-shifting digital holography," Opt. Lett. 34, 250-252 (2009). https://doi.org/10.1364/OL.34.000250
- S. Kishk and B. Javidi, "Information hiding technique with double phase encoding," Appl. Opt. 41, 5462- 5470 (2002). https://doi.org/10.1364/AO.41.005462
- S. Kishk and B. Javidi, "Watermarking of threedimensional objects by digital holography," Opt. Lett. 28, 167-169 (2003). https://doi.org/10.1364/OL.28.000167
- Y. Shi, G. Situ, and J. Zhang, "Multiple-image hiding in the Fresnel domain," Opt. Lett. 32, 1914-1916 (2007). https://doi.org/10.1364/OL.32.001914
- M. Z. He, L. Z. Cai, Q. Liu, X. C. Wang, and X. F. Meng, "Multiple image encryption and watermarking by random phase matching," Opt. Commun. 247, 29-37 (2005). https://doi.org/10.1016/j.optcom.2004.11.034
- G. Situ and J. Zhang, "Multiple-image encryption by wavelength multiplexing," Opt. Lett. 30, 1306-1308 (2005). https://doi.org/10.1364/OL.30.001306
- Z. Liu and S. Liu, "Double image encryption based on iterative fractional Fourier transform," Opt. Commun. 275, 324-329 (2007). https://doi.org/10.1016/j.optcom.2007.03.039
- Z. Liu, Y. Zhang, H. Zhao, M. A. Ahmad, and S. Liu, "Optical multi-image encryption based on frequency shift," Optik 122, 1010-1013 (2011). https://doi.org/10.1016/j.ijleo.2010.06.039
- H. T. Chang, H. E. Hwang, C. L. Lee, and M. T. Lee, "Wavelength multiplexing multiple-image encryption using cascaded phase-only masks in the Fresnel transform domain," Appl. Opt. 50, 710-716 (2011). https://doi.org/10.1364/AO.50.000710
- Y. Zhang and B. Wang, "Optical image encryption based on interference," Opt. Lett. 33, 2443-2445 (2008). https://doi.org/10.1364/OL.33.002443
- X. Wang and D. Zhao, "Optical image hiding with silhouette removal based on the optical interference principle," Appl. Opt. 51, 686-691 (2012). https://doi.org/10.1364/AO.51.000686
- P. Kumar, J. Joseph, and K. Singh, "Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator," Appl. Opt. 50, 1805-1811 (2011). https://doi.org/10.1364/AO.50.001805
- W. Jia, F. J. Wen, Y. T. Chow, and C. Zhou, "Binary image encryption based on interference of two phaseonly masks," Appl. Opt. 51, 5253-5258 (2012). https://doi.org/10.1364/AO.51.005253
- J. W. Goodman, Introduction to Fourier Optics, 2nd ed. (McGraw-Hill, San Francisco, CA, USA, 1996).
Cited by
- Multiple-3D-object secure information system based on phase shifting method and single interference vol.55, pp.15, 2016, https://doi.org/10.1364/AO.55.004052
- Multiple-image encryption based on triple interferences for flexibly decrypting high-quality images vol.54, pp.11, 2015, https://doi.org/10.1364/AO.54.003273
- Multiple-3D-object decryption based on one interference using two phase-only functions vol.56, pp.22, 2017, https://doi.org/10.1364/AO.56.006214