• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4643723)   Today's Articles (464)   Subscriber (50639)
For: Rosen J, Javidi B. Hidden images in halftone pictures. Appl Opt 2001;40:3346-3353. [PMID: 18360358 DOI: 10.1364/ao.40.003346] [Citation(s) in RCA: 7] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/26/2023]
Number Cited by Other Article(s)
1
Çiftci E, Sümer E. A novel steganography method for binary and color halftone images. PeerJ Comput Sci 2022;8:e1062. [PMID: 36091978 PMCID: PMC9455272 DOI: 10.7717/peerj-cs.1062] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/28/2022] [Accepted: 07/18/2022] [Indexed: 06/15/2023]
2
Nakano K, Takeda M, Suzuki H, Yamaguchi M. Encrypted imaging based on algebraic implementation of double random phase encoding. APPLIED OPTICS 2014;53:2956-2963. [PMID: 24922013 DOI: 10.1364/ao.53.002956] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 01/09/2014] [Accepted: 04/04/2014] [Indexed: 06/03/2023]
3
Chen YY, Wang JH, Lin CC, Hwang HE. Lensless optical data hiding system based on phase encoding algorithm in the Fresnel domain. APPLIED OPTICS 2013;52:5247-5255. [PMID: 23872773 DOI: 10.1364/ao.52.005247] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 02/20/2013] [Accepted: 05/20/2013] [Indexed: 06/02/2023]
4
Martinez C, Laulagnet F, Lemonnier O. Gray tone image watermarking with complementary computer generated holography. OPTICS EXPRESS 2013;21:15438-15451. [PMID: 23842332 DOI: 10.1364/oe.21.015438] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/02/2023]
5
Nakano K, Takeda M, Suzuki H, Yamaguchi M. Evaluations of phase-only double random phase encoding based on key-space analysis. APPLIED OPTICS 2013;52:1276-1283. [PMID: 23435000 DOI: 10.1364/ao.52.001276] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/31/2012] [Accepted: 01/24/2013] [Indexed: 06/01/2023]
6
Efficient text encryption and hiding with double-random phase-encoding. SENSORS 2012. [PMID: 23202003 PMCID: PMC3545574 DOI: 10.3390/s121013441] [Citation(s) in RCA: 6] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Indexed: 12/03/2022]
7
Hwang HE, Chang HT, Lie WN. Lensless optical data embedding system using concealogram and cascaded digital Fresnel hologram. JOURNAL OF THE OPTICAL SOCIETY OF AMERICA. A, OPTICS, IMAGE SCIENCE, AND VISION 2011;28:1453-1461. [PMID: 21734745 DOI: 10.1364/josaa.28.001453] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/31/2023]
8
Sheng Y, Xin Z, Alam MS, Xi L, Xiao-Feng L. Information hiding based on double random-phase encoding and public-key cryptography. OPTICS EXPRESS 2009;17:3270-3284. [PMID: 19259163 DOI: 10.1364/oe.17.003270] [Citation(s) in RCA: 6] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/27/2023]
9
Situ G, Gopinathan U, Monaghan DS, Sheridan JT. Cryptanalysis of optical security systems with significant output images. APPLIED OPTICS 2007;46:5257-62. [PMID: 17676139 DOI: 10.1364/ao.46.005257] [Citation(s) in RCA: 6] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/16/2023]
10
Meng XF, Cai LZ, Yang XL, Shen XX, Dong GY. Information security system by iterative multiple-phase retrieval and pixel random permutation. APPLIED OPTICS 2006;45:3289-97. [PMID: 16676034 DOI: 10.1364/ao.45.003289] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/09/2023]
11
Meng XF, Cai LZ, He MZ, Dong GY, Shen XX. Cross-talk-free double-image encryption and watermarking with amplitude–phase separate modulations. ACTA ACUST UNITED AC 2005. [DOI: 10.1088/1464-4258/7/11/002] [Citation(s) in RCA: 35] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/11/2022]
12
Abookasis D, Montal O, Abramson O, Rosen J. Watermarks encrypted in a concealogram and deciphered by a modified joint-transform correlator. APPLIED OPTICS 2005;44:3019-23. [PMID: 15929293 DOI: 10.1364/ao.44.003019] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/02/2023]
13
Kishk S, Javidi B. Watermarking of three-dimensional objects by digital holography. OPTICS LETTERS 2003;28:167-169. [PMID: 12656320 DOI: 10.1364/ol.28.000167] [Citation(s) in RCA: 14] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/24/2023]
14
Kishk S, Javidi B. Information hiding technique with double phase encoding. APPLIED OPTICS 2002;41:5462-5470. [PMID: 12224768 DOI: 10.1364/ao.41.005462] [Citation(s) in RCA: 40] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/23/2023]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA