Optical authentication via photon-synthesized ghost imaging using optical nonlinear correlation
Tài liệu tham khảo
Refregier, 1995, Optical image encryption based on input plane and Fourier plane random encoding, Opt Lett, 20, 767, 10.1364/OL.20.000767
Volodin, 1996, A polymeric optical pattern-recognition system for security verification, Nature, 383, 58, 10.1038/383058a0
Javidi, 1997, Securing information with optical technologies, Phys Today, 50, 27, 10.1063/1.881691
Matoba, 2000, Encrypted optical memory systems based on multidimensional keys for secure data storage and communications, IEEE Circuits Devices Mag, 16, 8, 10.1109/101.876899
Matoba, 2009, Optical techniques for information security, Proc IEEE, 97, 1128, 10.1109/JPROC.2009.2018367
Monaghan, 2008, Role of phase key in the double random phase encoding technique: an error analysis, Appl Opt, 47, 3808, 10.1364/AO.47.003808
Chen, 2013, Phase-modulated optical system with sparse representation for information encoding and authentication, IEEE Photon J, 5, 6900113, 10.1109/JPHOT.2013.2258144
Shi, 2013, Optical image encryption via ptychography, Opt Lett, 38, 1425, 10.1364/OL.38.001425
Wang, 2012, Double images encryption method with resistance against the specific attack based on an asymmetric algorithm, Opt Express, 20, 11994, 10.1364/OE.20.011994
Meng, 2006, Two-step phase-shifting interferometry and its application in image encryption, Opt Lett, 31, 1414, 10.1364/OL.31.001414
He, 2009, Security enhanced optical encryption system by random phase key and permutation key, Opt Express, 17, 22462, 10.1364/OE.17.022462
Rivenson, 2010, Single exposure super-resolution compressive imaging by double phase encoding, Opt Express, 18, 15094, 10.1364/OE.18.015094
Javidi, 2000, Securing information by use of digital holography, Opt Lett, 25, 28, 10.1364/OL.25.000028
Chen, 2010, Optical image encryption based on diffractive imaging, Opt Lett, 35, 3817, 10.1364/OL.35.003817
Peng, 2006, Known-plaintext attack on optical encryption based on double random phase keys, Opt Lett, 31, 1044, 10.1364/OL.31.001044
Frauel, 2007, Resistance of the double random phase encryption against various attacks, Opt Express, 15, 10253, 10.1364/OE.15.010253
Erkmen, 2010, Ghost imaging: from quantum to classical to computational, Adv Opt Photon, 2, 405, 10.1364/AOP.2.000405
Shapiro, 2008, Computational ghost imaging, Phys Rev A, 78, 061802, 10.1103/PhysRevA.78.061802
Erkmen, 2012, Computational ghost imaging for remote sensing, J Opt Soc Am A, 29, 782, 10.1364/JOSAA.29.000782
Ferri, 2010, Differential ghost imaging, Phys Rev Lett, 104, 253603, 10.1103/PhysRevLett.104.253603
Chan, 2012, Role of photon statistics of light source in ghost imaging, Opt Lett, 37, 2739, 10.1364/OL.37.002739
Clemente, 2010, Optical encryption based on computational ghost imaging, Opt Lett, 35, 2391, 10.1364/OL.35.002391
Tanha, 2012, Gray-scale and color optical encryption based on computational ghost imaging, Appl Phys Lett, 101, 101108, 10.1063/1.4748875
Sadjadi, 2007
Markman, 2014, Photon-counting security tagging and verification using optically encoded QR codes, IEEE Photon J, 6, 6800609, 10.1109/JPHOT.2013.2294625
Pérez-Cabré, 2011, Information authentication using photon-counting double-random-phase encrypted images, Opt Lett, 36, 22, 10.1364/OL.36.000022
Javidi, 1989, Nonlinear joint power spectrum based optical correlation, Appl Opt, 28, 2358, 10.1364/AO.28.002358
Cho, 2013, Three-dimensional photon counting double-random-phase encryption, Opt Lett, 38, 3198, 10.1364/OL.38.003198
Markman, 2014, Full-phase photon-counting double-random-phase encryption, J Opt Soc Am A, 31, 394, 10.1364/JOSAA.31.000394
Chen, 2013, Ghost imaging for three-dimensional optical security, Appl Phys Lett, 103, 221106, 10.1063/1.4836995
Chen, 2014, Advances in optical security systems, Adv Opt Photon, 6, 120, 10.1364/AOP.6.000120
Chen, 2014, Marked ghost imaging, Appl Phys Lett, 104, 251109, 10.1063/1.4879843
Monaghan, 2009, Analysis of phase encoding for optical encryption, Opt Commun, 282, 482, 10.1016/j.optcom.2008.10.047
Sun, 2013, A simple optical encryption based on shape merging technique in periodic diffraction correlation imaging, Opt Express, 21, 19395, 10.1364/OE.21.019395
He, 2012, Optical hierarchical authentication based on interference and hash function, Appl Opt, 51, 7750, 10.1364/AO.51.007750