• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4602597)   Today's Articles (184)   Subscriber (49368)
For: Li Y, Kreske K, Rosen J. Security and encryption optical systems based on a correlator with significant output images. Appl Opt 2000;39:5295-5301. [PMID: 18354525 DOI: 10.1364/ao.39.005295] [Citation(s) in RCA: 16] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/26/2023]
Number Cited by Other Article(s)
1
Broadband decoupling of intensity and polarization with vectorial Fourier metasurfaces. Nat Commun 2021;12:3631. [PMID: 34131125 PMCID: PMC8206126 DOI: 10.1038/s41467-021-23908-0] [Citation(s) in RCA: 20] [Impact Index Per Article: 6.7] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/04/2021] [Accepted: 05/20/2021] [Indexed: 02/05/2023]  Open
2
Georgi P, Wei Q, Sain B, Schlickriede C, Wang Y, Huang L, Zentgraf T. Optical secret sharing with cascaded metasurface holography. SCIENCE ADVANCES 2021;7:7/16/eabf9718. [PMID: 33853788 PMCID: PMC8046362 DOI: 10.1126/sciadv.abf9718] [Citation(s) in RCA: 48] [Impact Index Per Article: 16.0] [Reference Citation Analysis] [Abstract] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/02/2020] [Accepted: 02/25/2021] [Indexed: 05/19/2023]
3
Zhao T, Chi Y. Modified Gerchberg-Saxton (G-S) Algorithm and Its Application. ENTROPY 2020;22:e22121354. [PMID: 33266143 PMCID: PMC7760810 DOI: 10.3390/e22121354] [Citation(s) in RCA: 9] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 10/30/2020] [Revised: 11/25/2020] [Accepted: 11/28/2020] [Indexed: 11/16/2022]
4
Chen W. Computer-generated hologram marked by correlated photon imaging. APPLIED OPTICS 2018;57:1196-1201. [PMID: 29469864 DOI: 10.1364/ao.57.001196] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/30/2017] [Accepted: 01/11/2018] [Indexed: 06/08/2023]
5
Lin X, Huang Y, Shimura T, Fujimura R, Tanaka Y, Endo M, Nishimoto H, Liu J, Li Y, Liu Y, Tan X. Fast non-interferometric iterative phase retrieval for holographic data storage. OPTICS EXPRESS 2017;25:30905-30915. [PMID: 29245770 DOI: 10.1364/oe.25.030905] [Citation(s) in RCA: 14] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/22/2017] [Accepted: 11/17/2017] [Indexed: 06/07/2023]
6
Kumar M, Vijayakumar A, Rosen J. Incoherent digital holograms acquired by interferenceless coded aperture correlation holography system without refractive lenses. Sci Rep 2017;7:11555. [PMID: 28912489 PMCID: PMC5599627 DOI: 10.1038/s41598-017-11731-x] [Citation(s) in RCA: 32] [Impact Index Per Article: 4.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/20/2017] [Accepted: 08/29/2017] [Indexed: 11/09/2022]  Open
7
Wang Y, Markman A, Quan C, Javidi B. Double-random-phase encryption with photon counting for image authentication using only the amplitude of the encrypted image. JOURNAL OF THE OPTICAL SOCIETY OF AMERICA. A, OPTICS, IMAGE SCIENCE, AND VISION 2016;33:2158-2165. [PMID: 27857432 DOI: 10.1364/josaa.33.002158] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/06/2023]
8
Wang Y, Quan C, Tay CJ. New method of attack and security enhancement on an asymmetric cryptosystem based on equal modulus decomposition. APPLIED OPTICS 2016;55:679-686. [PMID: 26836068 DOI: 10.1364/ao.55.000679] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/05/2023]
9
Pan X, Meng X, Yang X, Wang Y, Peng X, He W, Dong G, Chen H. Triple-image encryption based on phase-truncated Fresnel transform and basic vector operation. APPLIED OPTICS 2015;54:8485-8493. [PMID: 26479627 DOI: 10.1364/ao.54.008485] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/05/2023]
10
Zhao T, Ran Q, Yuan L, Chi Y. Manipulative attack using the phase retrieval algorithm for double random phase encoding. APPLIED OPTICS 2015;54:7115-7119. [PMID: 26368384 DOI: 10.1364/ao.54.007115] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/05/2023]
11
Shi X, Chen Z, Zhao D, Mao H, Chen L. Phase retrieval encryption in an enhanced optical interference by key phase constraint. APPLIED OPTICS 2015;54:3197-3203. [PMID: 25967303 DOI: 10.1364/ao.54.003197] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/04/2023]
12
Fan D, Meng X, Wang Y, Yang X, Pan X, Peng X, He W, Dong G, Chen H. Multiple-image authentication with a cascaded multilevel architecture based on amplitude field random sampling and phase information multiplexing. APPLIED OPTICS 2015;54:3204-3215. [PMID: 25967304 DOI: 10.1364/ao.54.003204] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/04/2023]
13
Maluenda D, Carnicer A, Martínez-Herrero R, Juvells I, Javidi B. Optical encryption using photon-counting polarimetric imaging. OPTICS EXPRESS 2015;23:655-666. [PMID: 25835825 DOI: 10.1364/oe.23.000655] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/04/2023]
14
Carnicer A, Hassanfiroozi A, Latorre-Carmona P, Huang YP, Javidi B. Security authentication using phase-encoded nanoparticle structures and polarized light. OPTICS LETTERS 2015;40:135-138. [PMID: 25679827 DOI: 10.1364/ol.40.000135] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/04/2023]
15
Markman A, Javidi B. Full-phase photon-counting double-random-phase encryption. JOURNAL OF THE OPTICAL SOCIETY OF AMERICA. A, OPTICS, IMAGE SCIENCE, AND VISION 2014;31:394-403. [PMID: 24562039 DOI: 10.1364/josaa.31.000394] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/03/2023]
16
Fan D, Meng X, Wang Y, Yang X, Peng X, He W, Dong G, Chen H. Optical identity authentication scheme based on elliptic curve digital signature algorithm and phase retrieval algorithm. APPLIED OPTICS 2013;52:5645-5652. [PMID: 23938413 DOI: 10.1364/ao.52.005645] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/29/2013] [Accepted: 07/12/2013] [Indexed: 06/02/2023]
17
Chen YY, Wang JH, Lin CC, Hwang HE. Lensless optical data hiding system based on phase encoding algorithm in the Fresnel domain. APPLIED OPTICS 2013;52:5247-5255. [PMID: 23872773 DOI: 10.1364/ao.52.005247] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 02/20/2013] [Accepted: 05/20/2013] [Indexed: 06/02/2023]
18
Qin Y, Gong Q. Interference-based multiple-image encryption with silhouette removal by position multiplexing. APPLIED OPTICS 2013;52:3987-3992. [PMID: 23759846 DOI: 10.1364/ao.52.003987] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/02/2013] [Accepted: 05/13/2013] [Indexed: 06/02/2023]
19
Chen W, Chen X. Interference-based optical image encryption using three-dimensional phase retrieval. APPLIED OPTICS 2012;51:6076-6083. [PMID: 22945153 DOI: 10.1364/ao.51.006076] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/30/2012] [Accepted: 08/01/2012] [Indexed: 06/01/2023]
20
Huang JJ, Hwang HE, Chen CY, Chen CM. Lensless multiple-image optical encryption based on improved phase retrieval algorithm. APPLIED OPTICS 2012;51:2388-2394. [PMID: 22614416 DOI: 10.1364/ao.51.002388] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/20/2011] [Accepted: 02/12/2012] [Indexed: 06/01/2023]
21
Deng X, Zhao D. Single-channel color image encryption using a modified Gerchberg-Saxton algorithm and mutual encoding in the Fresnel domain. APPLIED OPTICS 2011;50:6019-6025. [PMID: 22086029 DOI: 10.1364/ao.50.006019] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/31/2023]
22
Chen W, Chen X, Sheppard CJR. Optical double-image cryptography based on diffractive imaging with a laterally-translated phase grating. APPLIED OPTICS 2011;50:5750-5757. [PMID: 22015370 DOI: 10.1364/ao.50.005750] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/31/2023]
23
Hwang HE, Chang HT, Lie WN. Lensless optical data embedding system using concealogram and cascaded digital Fresnel hologram. JOURNAL OF THE OPTICAL SOCIETY OF AMERICA. A, OPTICS, IMAGE SCIENCE, AND VISION 2011;28:1453-1461. [PMID: 21734745 DOI: 10.1364/josaa.28.001453] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/31/2023]
24
Qin W, Peng X, Meng X, Gao BZ. Vulnerability to chosen-plaintext attack of optoelectronic information encryption with phase-shifting interferometry. OPTICAL ENGINEERING (REDONDO BEACH, CALIF.) 2011;50:065601. [PMID: 23894214 PMCID: PMC3721417 DOI: 10.1117/1.3590725] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/02/2023]
25
Shi X, Zhao D. Color image hiding based on the phase retrieval technique and Arnold transform. APPLIED OPTICS 2011;50:2134-2139. [PMID: 21556114 DOI: 10.1364/ao.50.002134] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/30/2023]
26
Chang HT, Hwang HE, Lee CL, Lee MT. Wavelength multiplexing multiple-image encryption using cascaded phase-only masks in the Fresnel transform domain. APPLIED OPTICS 2011;50:710-716. [PMID: 21343993 DOI: 10.1364/ao.50.000710] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/30/2023]
27
Niu CH, Wang XL, Lv NG, Zhou ZH, Li XY. An encryption method with multiple encrypted keys based on interference principle. OPTICS EXPRESS 2010;18:7827-7834. [PMID: 20588624 DOI: 10.1364/oe.18.007827] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/29/2023]
28
Qin W, Peng X. Asymmetric cryptosystem based on phase-truncated Fourier transforms. OPTICS LETTERS 2010;35:118-120. [PMID: 20081940 DOI: 10.1364/ol.35.000118] [Citation(s) in RCA: 14] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/28/2023]
29
Zhang Y, Wang B, Dong Z. Enhancement of image hiding by exchanging two phase masks. ACTA ACUST UNITED AC 2009. [DOI: 10.1088/1464-4258/11/12/125406] [Citation(s) in RCA: 60] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/11/2022]
30
Hwang HE, Chang HT, Lie WN. Fast double-phase retrieval in Fresnel domain using modified Gerchberg-Saxton algorithm for lensless optical security systems. OPTICS EXPRESS 2009;17:13700-13710. [PMID: 19654778 DOI: 10.1364/oe.17.013700] [Citation(s) in RCA: 6] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/28/2023]
31
Yong-Liang X, Xin Z, Sheng Y, Qiang L, Yang-Cong L. Multiple-image optical encryption: an improved encoding approach. APPLIED OPTICS 2009;48:2686-2692. [PMID: 19424389 DOI: 10.1364/ao.48.002686] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/27/2023]
32
Qin W, Peng X. Vulnerability to known-plaintext attack of optical encryption schemes based on two fractional Fourier transform order keys and double random phase keys. ACTA ACUST UNITED AC 2009. [DOI: 10.1088/1464-4258/11/7/075402] [Citation(s) in RCA: 57] [Impact Index Per Article: 3.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/11/2022]
33
Zhang Y, Wang B. Optical image encryption based on interference. OPTICS LETTERS 2008;33:2443-5. [PMID: 18978881 DOI: 10.1364/ol.33.002443] [Citation(s) in RCA: 10] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/21/2023]
34
Meng XF, Cai LZ, Wang YR, Yang XL, Xu XF, Dong GY, Shen XX, Zhang H, Cheng XC. Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain. ACTA ACUST UNITED AC 2007. [DOI: 10.1088/1464-4258/9/11/017] [Citation(s) in RCA: 40] [Impact Index Per Article: 2.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/11/2022]
35
Situ G, Gopinathan U, Monaghan DS, Sheridan JT. Cryptanalysis of optical security systems with significant output images. APPLIED OPTICS 2007;46:5257-62. [PMID: 17676139 DOI: 10.1364/ao.46.005257] [Citation(s) in RCA: 6] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/16/2023]
36
Hwang HE, Han P. Fast algorithm of phase masks for image encryption in the Fresnel domain. JOURNAL OF THE OPTICAL SOCIETY OF AMERICA. A, OPTICS, IMAGE SCIENCE, AND VISION 2006;23:1870-4. [PMID: 16835643 DOI: 10.1364/josaa.23.001870] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/10/2023]
37
Shi Y, Situ G, Zhang J. Optical image hiding in the Fresnel domain. ACTA ACUST UNITED AC 2006. [DOI: 10.1088/1464-4258/8/6/012] [Citation(s) in RCA: 22] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/12/2022]
38
Meng XF, Cai LZ, Xu XF, Yang XL, Shen XX, Dong GY, Wang YR. Two-step phase-shifting interferometry and its application in image encryption. OPTICS LETTERS 2006;31:1414-6. [PMID: 16642123 DOI: 10.1364/ol.31.001414] [Citation(s) in RCA: 22] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/08/2023]
39
Meng XF, Cai LZ, Yang XL, Shen XX, Dong GY. Information security system by iterative multiple-phase retrieval and pixel random permutation. APPLIED OPTICS 2006;45:3289-97. [PMID: 16676034 DOI: 10.1364/ao.45.003289] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/09/2023]
40
Tu HY, Cheng CJ, Chen ML. Optical image encryption based on polarization encoding by liquid crystal spatial light modulators. ACTA ACUST UNITED AC 2004. [DOI: 10.1088/1464-4258/6/6/005] [Citation(s) in RCA: 27] [Impact Index Per Article: 1.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/11/2022]
41
Yeh CH, Chang HT, Chien HC, Kuo CJ. Design of cascaded phase keys for a hierarchical security system. APPLIED OPTICS 2002;41:6128-6134. [PMID: 12389981 DOI: 10.1364/ao.41.006128] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/23/2023]
42
Chang HT, Lu WC, Kuo CJ. Multiple-phase retrieval for optical security systems by use of random-phase encoding. APPLIED OPTICS 2002;41:4825-4834. [PMID: 12197649 DOI: 10.1364/ao.41.004825] [Citation(s) in RCA: 14] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/23/2023]
43
Rosen J, Javidi B. Hidden images in halftone pictures. APPLIED OPTICS 2001;40:3346-3353. [PMID: 18360358 DOI: 10.1364/ao.40.003346] [Citation(s) in RCA: 7] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/26/2023]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA