References
- P. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995). https://doi.org/10.1364/OL.20.000767
- I. Moon, F. Yi, Y. H. Lee, and B. Javidi, "Avalanche and bit independence characteristics of double random phase encoding in the Fourier and Fresnel domains," J. Opt. Soc. Am. A 31, 1104-1111 (2014). https://doi.org/10.1364/JOSAA.31.001104
- R. Tao, Y. Xin, and Y. Wang, "Double image encryption based on random phase encoding in the fractional Fourier domain," Opt. Express 15, 16067-16079 (2007). https://doi.org/10.1364/OE.15.016067
- Z. Liu, Y. Zhang, S. Li, W. Liu, W. Liu, Y. Wang, and S. Liu, "Double image encryption scheme by using random phase encoding and pixel exchanging in the gyrator transform domains," Opt. Lasers Technol. 47, 152-158 (2013). https://doi.org/10.1016/j.optlastec.2012.09.007
- G. Unnikrishnan, J. Joseph, and K. Singh, "Optical encryption by double-random phase encoding in the fractional Fourier domain," Opt. Lett. 25, 887-889 (2000). https://doi.org/10.1364/OL.25.000887
- W. Chen, "Multiple-wavelength double random phase encoding with CCD-plane sparse-phase multiplexing for optical information verification," Appl. Opt. 54, 10711-10716 (2015). https://doi.org/10.1364/AO.54.010711
- F. Yi, Y. Jeoung, and I. Moon, "Three-dimensional image authentication scheme using sparse phase information in double random phase encoded integral imaging," Appl. Opt. 56, 4381-4387 (2017). https://doi.org/10.1364/AO.56.004381
- X. Wang, W. Chen, and X. Chen, "Optical information authentication using compressed double-random-phase-encoded images and quick-response codes," Opt. Express 23, 6239- 6253 (2015). https://doi.org/10.1364/OE.23.006239
- Z. Leihong, Y. Xiao, Z. Dawei, and C. Jian, "Research on multiple-image encryption scheme based on Fourier transform and ghost imaging algorithm," Curr. Opt. Photon. 2, 315-323 (2018). https://doi.org/10.3807/COPP.2018.2.4.315
- J. Chen, N. Bao, L. Y. Zhang, and Z. Zhu, "Optical information authentication using optical encryption and sparsity constraint," Opt. Lasers Eng. 107, 352-363 (2018). https://doi.org/10.1016/j.optlaseng.2018.04.009
- Z. Shao, Y. Shang, Q. Tong, H. Ding, X. Zhao, and X. Fu, "Multiple color image encryption and authentication based on phase retrieval and partial decryption in quaternion gyrator domain," Multimed. Tools Appl. 77, 25821-25840 (2018). https://doi.org/10.1007/s11042-018-5818-7
- G. Luan, A. Li, D. Zhang, and D. Wang, "Asymmetric image encryption and authentication based on equal modulus decomposition in the Fresnel transform domain," IEEE Photon. J. 11, 6900207 (2019).
- S. Liu, B. M. Hennelly, C. Guo, and J. T. Sheridan, "Robustness of double random phase encoding spread-space spread-spectrum watermarking technique," Sig. Process. 109, 345-361 (2015). https://doi.org/10.1016/j.sigpro.2014.06.024
- S. Gholami, K. Jaferzadeh, S. Shin, and I. Moon, "An efficient image-based verification scheme by fusion of double random phase encoding and dynamic chaotic map," Multimed. Tools Appl. 78, 25001-25018 (2019). https://doi.org/10.1007/s11042-019-7714-1
- A. V. Zea, J. F. Barrera, and R. Torroba, "Cryptographic salting for security enhancement of double random phase encryption schemes," J. Opt. 19, 105703 (2017). https://doi.org/10.1088/2040-8986/aa8738
- X. Liu, J. Wu, W. He, M. Liao, C. Zhang, and X. Peng, "Vulnerability to ciphertext-only attack of optical encryption scheme based on double random phase encoding," Opt. Express 23, 18955-18968 (2015). https://doi.org/10.1364/OE.23.018955
- Y. Frauel, A. Castro, T. Naughton, and B. Javidi, "Resistance of the double random phase encryption against various attacks," Opt. Express 15, 10253-10265 (2007). https://doi.org/10.1364/OE.15.010253
- F. Yi, I. Moon, and Y. H. Lee, "A Multispectral photoncounting double random phase encoding scheme for image authentication," Sensors 14, 8877-8894 (2014). https://doi.org/10.3390/s140508877
- I. Moon, F. Yi, M. Han, and J. Lee, "Efficient asymmetric image authentication schemes based on photon countingdouble random phase encoding and RSA algorithms," Appl. Opt. 55, 4328-4335 (2016). https://doi.org/10.1364/AO.55.004328
- E. Perez-Cabre, M. Cho, and B. Javidi, "Information authentication using photon-counting double-random-phase encrypted images," Opt. Lett 36, 22-24 (2011). https://doi.org/10.1364/OL.36.000022
- E. Perez-Cabre, H. C. Abril, M. S. Millan, and B. Javidi, "Photon-counting double-random-phase encoding for secure image verification and retrieval," J. Opt. 14, 094001 (2012). https://doi.org/10.1088/2040-8978/14/9/094001
- F. Yi, Y. Jeoung, and I. Moon, "Three-dimensional image authentication scheme using sparse phase information in double random phase encoded integral imaging," Appl. Opt. 56, 4381-4387 (2017). https://doi.org/10.1364/AO.56.004381
- S. K. Rajput, D. Kumar, and N. K. Nishchal, "Photon counting imaging and phase mask multiplexing for multiple images authentication and digital hologram security," Appl. Opt. 54, 1657-1666 (2015). https://doi.org/10.1364/AO.54.001657
- J. Lee, N. Sultana, F. Yi, and I. Moon, "Avalanche and bit independence properties of photon-counting double random phase encoding in gyrator domain," Curr. Opt. Photon. 2, 368-377 (2018). https://doi.org/10.3807/COPP.2018.2.4.368
- Y. Wiseman, "The still image lossy compression standard-JPEG," in Encyclopedia of Information Science and Technology, D. B. A. M. Khosrow-Pour, ed. 3rd ed. (IGI Global, PA, 2015).
- P. Schelkens, A. Skodras, and T. Ebrahimi, The JPEG 2000 Suite (John Wiley & Sons, NY, 2009).
- D. Santa-Cruz, T. Ebrahimi, J. Askelof, M. Larsson, and C. Christopoulos, "JPEG 2000 still image coding versus other standards," Proc. SPIE 4115, 446-454 (2000).
- A. N. Skodras, C. A. Christopoulos, and T. Ebrahimi, "JPEG2000: the upcoming still image compression standard," Pattern Recogn. Lett. 22, 1337-1345 (2001). https://doi.org/10.1016/S0167-8655(01)00079-4
- D. Santa-Cruz, R. Grosbois, and T. Ebrahimi, "JPEG 2000 performance evaluation and assessment," Signal Process. Image Commun. 17, 113-130 (2002). https://doi.org/10.1016/S0923-5965(01)00025-X
- S. N. Sivanandam, A. Pasumpon, and P. Rani, "Lossy still image compression standards: JPEG and JPEG2000 - a survey," Int. J. Comput., Internet Manage. 17, 69-84 (2009).
- A. Skodras, C. Christopoulos, and T. Ebrahimi, "The JPEG 2000 still image compression standard," IEEE Signal Process. Mag. 18, 36-58 (2001). https://doi.org/10.1109/79.952804
- G. K. Wallace, "The JPEG still picture compression standard," IEEE Trans. Consum. Electron. 38, xviii-xxxiv (1992). https://doi.org/10.1109/30.125072
- K. Jaferzadeh, S. Gholami, and I. Moon, "Lossless and lossy compression of quantitative phase images of red blood cells obtained by digital holographic imaging," Appl. Opt. 55, 10409-10416 (2016). https://doi.org/10.1364/AO.55.010409
- P. Li and K. T. Lo, "A content-adaptive joint image compression and encryption scheme," IEEE Trans. Multimedia 20, 1960-1972 (2018). https://doi.org/10.1109/TMM.2017.2786860
- V. Itier, P. Puteaux, and W. Puech, "Recompression of JPEG crypto-compressed images without a key," IEEE Trans. Circuits Syst. Video Technol. (to be published).