참고문헌
- P. Refregier and B. Javidi, "Optical-image encryption based on input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995). https://doi.org/10.1364/OL.20.000767
- Y. Frauel, A. Castro, T. Naughton, and B. Javidi, "Resistance of the double random phase encryption against various attacks," Opt. Express 15, 10253-10265 (2007). https://doi.org/10.1364/OE.15.010253
- I.-H. Lee and M. Cho, "Optical encryption and information authentication of 3D objects considering wireless channel characteristics," J. Opt. Soc. Korea 17, 494-499 (2013). https://doi.org/10.3807/JOSK.2013.17.6.494
- M. Cho and B. Javidi, "Three-dimensional photon counting double random phase encryption," Opt. Lett. 38, 3198-3201 (2013). https://doi.org/10.1364/OL.38.003198
- I.-H. Lee and M. Cho, "Double random phase encryption based orthogonal encoding technique for color images," J. Opt. Soc. Korea 18, 129-133 (2014). https://doi.org/10.3807/JOSK.2014.18.2.129
- D. N. Klyshko, "Combine EPR and two-slit experiments: Interference of advanced waves," Phys. Lett. A 132, 199-304 (1999).
- M. Tanha, S. Ahmadi-Kandjani, R. Kheradmand, and H. Ghanbari, "Computational fluorescence ghost imaging," Eur. Phys. J. D 67, 44 (2013).
- O. Katz, Y. Bromberg, and Y. Silberberg, "Compressive ghost imaging," Appl. Phys. Lett. 95, 131110-131113 (2009). https://doi.org/10.1063/1.3238296
- V. Katkovnik and J. Astola, "Compressive sensing computational ghost imaging," J. Opt. Soc. Korea A 29, 1556-1567 (2012). https://doi.org/10.1364/JOSAA.29.001556
- J. H. Shapiro and R. W. Boyd, "The physics of ghost imaging," Quantum. Inf. Process. 11, 949-993 (2012). https://doi.org/10.1007/s11128-011-0356-5
- J. Garnier, "Ghost imaging in the random paraxial regime," Inverse Probl. Imaging 10, 409-432 (2017).
- S. Yuan, J. Yao, X. Liu, X. Zhou, and Z. Li, "Cryptanalysis and security enhancement of optical cryptography based on computational ghost imaging," Opt. Commun. 365, 180-185 (2016). https://doi.org/10.1016/j.optcom.2015.12.013
- Y Wang and Y Liu, "High speed computational ghost imaging via spatial sweeping," Sci Rep. 7, 45325 (2017). https://doi.org/10.1038/srep45325
- J. J. Wu, Z. W. Xie, Z. J. Liu, W. Liu, Y. Zhang, and S. T. Liu, "Multipleimage encryption based on computational ghost imaging," Opt. Commun. 359, 38-43 (2016). https://doi.org/10.1016/j.optcom.2015.09.039
- I.-H. Lee and M. Cho, "Double random phase encryption using orthogonal encoding for multipleimage transmission," J. Opt. Soc. Korea 18, 201-206 (2014). https://doi.org/10.3807/JOSK.2014.18.3.201
- X. Li, X. Meng, X. Yang, Y. Yin, Y. Wang, X. Peng, W. He, G. Dong, and H. Chen, "Multiple-image encryption based on compressive ghost imaging and coordinate sampling," IEEE Photon. J. 8, 900511 (2016).
- J. Wu, Z. Xie, Z. Liu, W. Liu, Y. Zhang, and S. Liu, "Multiple-image encryption based on computational ghost imaging," Opt. Commun. 359, 38-43 (2016). https://doi.org/10.1016/j.optcom.2015.09.039
- S. Yuan, X. Liu, X. Zhou, and Z. Li, "Multiple-image encryption scheme with a single-pixel detector," J. Mod. Opt. 63, 1457-1465 (2016). https://doi.org/10.1080/09500340.2016.1154196
- W. Chen and X. Chen, "Ghost imaging for three-dimensional optical security," Appl. Phys. Lett. 103, 221106 (2013). https://doi.org/10.1063/1.4836995
- Z. Liu, C. Shen, J. Tan, and S. Liu, "A recovery method of double random phase encoding system with a parallel phase retrieval," IEEE Photon. J. 8, 7801807 (2016).