Abstract
© 2016 Optical Society of Korea
PDF Article© 2016 Optical Society of Korea
PDF Article
S. K. Gil, “2-step quadrature phase-shifting digital holographic optical encryption using orthogonal polarization and error analysis,” J. Opt. Soc. Korea 16, 354-364 (2012).
[Crossref]
J.-P. Liu, T.-C. Poon, G.-S. Jhou, and P.-J. Chen, “Comparison of two-, three, and four-exposure guadrature phase-shifting holography,” Appl. Opt. 50, 2443-2450 (2011).
[Crossref]
S. H. Jeon and S. K. Gil, “2-step phase-shifting digital holographic optical encryption and error analysis,” J. Opt. Soc. Korea 15, 244-251 (2011).
[Crossref]
S. H. Jeon and S. K. Gil, “QPSK modulation based optical image cryptosystem using phase-shifting digital holography,” J. Opt. Soc. Korea 14, 97-103 (2010).
[Crossref]
S. H. Jeon, Y. G. Hwang, and S. K. Gil, “Optical encryption of gray-level image using on-axis and 2-f digital holography with two-step phase-shifting method,” Opt. Rev. 15, 181-186 (2008).
[Crossref]
T. Nomura, A. Okazaki, M. Kameda, and Y. Morimoto, “Image reconstruction from compressed encrypted digital hologram,” Opt. Eng. 44, 2313-2320 (2005).
B. Schneider, “Two-factor authentication: too little, too late,” ACM Commun. 48, 136 (2005).
G-S. Lin, H. T. Chang, W.-N. Lie, and C.-H. Chuang, “Public-key-based optical image cryptosystem based on data embedding techniques,” Opt. Eng. 42, 2331-2339 (2003).
[Crossref]
R. Arizaga and R. Torroba, “Validation through a binary key code and a polarization sensitive digital technique,” Opt. Comm. 215, 31-36 (2003).
[Crossref]
B. Javidi and T. Nomura, “Securing information by means of digital holography,” Opt. Lett. 25, 28-30 (2000).
[Crossref]
G. Unnikrishnan and K. Singh, “Double random fractional Fourier domain encoding for optical security,” Opt. Eng. 39, 2853-2859 (2000).
[Crossref]
D. Weber and J. Trolinger, “Novel implementation of nonlinear joint transform correlators in optical security and validation,” Opt. Eng. 38, 62-68 (1999).
[Crossref]
B. Javidi, A. Sergent, and E. Ahouzi, “Performance of double phase encoding encryption technique using binarized encrypted images,” Opt. Eng. 37, 565-569 (1998).
[Crossref]
I. Yamaguchi and T. Zhang, “Phase-shifting digital holography,” Opt. Lett. 22, 610-612 (1998).
J. F. Heanue, M. C. Bashaw, and L. Hesselink, “Encrypted holographic data storage based on orthogonal-phase-code multiplexing,” Appl. Opt. 34, 6012-6015 (1995).
[Crossref]
P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767-769 (1995).
[Crossref]
B. Javidi and J. L. Horner, “Optical pattern recognition for validation and security verification,” Opt. Eng. 33, 1752-1756 (1994).
[Crossref]
B. Javidi, A. Sergent, and E. Ahouzi, “Performance of double phase encoding encryption technique using binarized encrypted images,” Opt. Eng. 37, 565-569 (1998).
[Crossref]
R. Arizaga and R. Torroba, “Validation through a binary key code and a polarization sensitive digital technique,” Opt. Comm. 215, 31-36 (2003).
[Crossref]
D. McDonald, R. Atkinson, and Craig Mets, “One-time passwords in everything (OPIE): Experiences with building and using stronger authentication,” in Proc. the 5th USENIX Security Symposium (Salt Lake City, Utah, USA, Jun. 1995), vol. 5 pp. 16-16.
J. F. Heanue, M. C. Bashaw, and L. Hesselink, “Encrypted holographic data storage based on orthogonal-phase-code multiplexing,” Appl. Opt. 34, 6012-6015 (1995).
[Crossref]
S. K. Gil, H. J. Byun, H. J. Lee, S. H. Jeon, and J. R. Jeong, “Optical encryption of binary data information with 2-step phase-shifting digital holography,” Proc. SPIE 6488, 648812 (2007).
G-S. Lin, H. T. Chang, W.-N. Lie, and C.-H. Chuang, “Public-key-based optical image cryptosystem based on data embedding techniques,” Opt. Eng. 42, 2331-2339 (2003).
[Crossref]
J.-P. Liu, T.-C. Poon, G.-S. Jhou, and P.-J. Chen, “Comparison of two-, three, and four-exposure guadrature phase-shifting holography,” Appl. Opt. 50, 2443-2450 (2011).
[Crossref]
G-S. Lin, H. T. Chang, W.-N. Lie, and C.-H. Chuang, “Public-key-based optical image cryptosystem based on data embedding techniques,” Opt. Eng. 42, 2331-2339 (2003).
[Crossref]
S. K. Gil, “2-step quadrature phase-shifting digital holographic optical encryption using orthogonal polarization and error analysis,” J. Opt. Soc. Korea 16, 354-364 (2012).
[Crossref]
S. H. Jeon and S. K. Gil, “2-step phase-shifting digital holographic optical encryption and error analysis,” J. Opt. Soc. Korea 15, 244-251 (2011).
[Crossref]
S. H. Jeon and S. K. Gil, “QPSK modulation based optical image cryptosystem using phase-shifting digital holography,” J. Opt. Soc. Korea 14, 97-103 (2010).
[Crossref]
S. H. Jeon, Y. G. Hwang, and S. K. Gil, “Optical encryption of gray-level image using on-axis and 2-f digital holography with two-step phase-shifting method,” Opt. Rev. 15, 181-186 (2008).
[Crossref]
S. K. Gil, H. J. Byun, H. J. Lee, S. H. Jeon, and J. R. Jeong, “Optical encryption of binary data information with 2-step phase-shifting digital holography,” Proc. SPIE 6488, 648812 (2007).
S. K. Gil, S. H. Jeon, N. Kim, and J. R. Jeong, “Successive encryption and transmission with phase-shifting digital holography,” Proc. SPIE 6136, 339-346 (2006).
S. K. Gil, S. H. Jeon, and J. R. Jeong, “Security enhanced optical one-time password authentication method by using digital holography,” Proc. SPIE 9386, 93860U (2015).
P. Hariharan, “Digital phase-shifting interferometry: a simple error compensating phase calculation algorithm,” Appl. Opt. 26, 2504-0505 (1987).
[Crossref]
J. F. Heanue, M. C. Bashaw, and L. Hesselink, “Encrypted holographic data storage based on orthogonal-phase-code multiplexing,” Appl. Opt. 34, 6012-6015 (1995).
[Crossref]
J. F. Heanue, M. C. Bashaw, and L. Hesselink, “Encrypted holographic data storage based on orthogonal-phase-code multiplexing,” Appl. Opt. 34, 6012-6015 (1995).
[Crossref]
B. Javidi and J. L. Horner, “Optical pattern recognition for validation and security verification,” Opt. Eng. 33, 1752-1756 (1994).
[Crossref]
S. H. Jeon, Y. G. Hwang, and S. K. Gil, “Optical encryption of gray-level image using on-axis and 2-f digital holography with two-step phase-shifting method,” Opt. Rev. 15, 181-186 (2008).
[Crossref]
B. Javidi and T. Nomura, “Securing information by means of digital holography,” Opt. Lett. 25, 28-30 (2000).
[Crossref]
B. Javidi, A. Sergent, and E. Ahouzi, “Performance of double phase encoding encryption technique using binarized encrypted images,” Opt. Eng. 37, 565-569 (1998).
[Crossref]
P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767-769 (1995).
[Crossref]
B. Javidi and J. L. Horner, “Optical pattern recognition for validation and security verification,” Opt. Eng. 33, 1752-1756 (1994).
[Crossref]
S. H. Jeon and S. K. Gil, “2-step phase-shifting digital holographic optical encryption and error analysis,” J. Opt. Soc. Korea 15, 244-251 (2011).
[Crossref]
S. H. Jeon and S. K. Gil, “QPSK modulation based optical image cryptosystem using phase-shifting digital holography,” J. Opt. Soc. Korea 14, 97-103 (2010).
[Crossref]
S. H. Jeon, Y. G. Hwang, and S. K. Gil, “Optical encryption of gray-level image using on-axis and 2-f digital holography with two-step phase-shifting method,” Opt. Rev. 15, 181-186 (2008).
[Crossref]
S. K. Gil, H. J. Byun, H. J. Lee, S. H. Jeon, and J. R. Jeong, “Optical encryption of binary data information with 2-step phase-shifting digital holography,” Proc. SPIE 6488, 648812 (2007).
S. K. Gil, S. H. Jeon, N. Kim, and J. R. Jeong, “Successive encryption and transmission with phase-shifting digital holography,” Proc. SPIE 6136, 339-346 (2006).
S. K. Gil, S. H. Jeon, and J. R. Jeong, “Security enhanced optical one-time password authentication method by using digital holography,” Proc. SPIE 9386, 93860U (2015).
S. K. Gil, S. H. Jeon, and J. R. Jeong, “Security enhanced optical one-time password authentication method by using digital holography,” Proc. SPIE 9386, 93860U (2015).
S. K. Gil, S. H. Jeon, N. Kim, and J. R. Jeong, “Successive encryption and transmission with phase-shifting digital holography,” Proc. SPIE 6136, 339-346 (2006).
S. K. Gil, H. J. Byun, H. J. Lee, S. H. Jeon, and J. R. Jeong, “Optical encryption of binary data information with 2-step phase-shifting digital holography,” Proc. SPIE 6488, 648812 (2007).
J.-P. Liu, T.-C. Poon, G.-S. Jhou, and P.-J. Chen, “Comparison of two-, three, and four-exposure guadrature phase-shifting holography,” Appl. Opt. 50, 2443-2450 (2011).
[Crossref]
T. Nomura, A. Okazaki, M. Kameda, and Y. Morimoto, “Image reconstruction from compressed encrypted digital hologram,” Opt. Eng. 44, 2313-2320 (2005).
S. K. Gil, S. H. Jeon, N. Kim, and J. R. Jeong, “Successive encryption and transmission with phase-shifting digital holography,” Proc. SPIE 6136, 339-346 (2006).
S. K. Gil, H. J. Byun, H. J. Lee, S. H. Jeon, and J. R. Jeong, “Optical encryption of binary data information with 2-step phase-shifting digital holography,” Proc. SPIE 6488, 648812 (2007).
G-S. Lin, H. T. Chang, W.-N. Lie, and C.-H. Chuang, “Public-key-based optical image cryptosystem based on data embedding techniques,” Opt. Eng. 42, 2331-2339 (2003).
[Crossref]
G-S. Lin, H. T. Chang, W.-N. Lie, and C.-H. Chuang, “Public-key-based optical image cryptosystem based on data embedding techniques,” Opt. Eng. 42, 2331-2339 (2003).
[Crossref]
J.-P. Liu, T.-C. Poon, G.-S. Jhou, and P.-J. Chen, “Comparison of two-, three, and four-exposure guadrature phase-shifting holography,” Appl. Opt. 50, 2443-2450 (2011).
[Crossref]
D. McDonald, R. Atkinson, and Craig Mets, “One-time passwords in everything (OPIE): Experiences with building and using stronger authentication,” in Proc. the 5th USENIX Security Symposium (Salt Lake City, Utah, USA, Jun. 1995), vol. 5 pp. 16-16.
D. McDonald, R. Atkinson, and Craig Mets, “One-time passwords in everything (OPIE): Experiences with building and using stronger authentication,” in Proc. the 5th USENIX Security Symposium (Salt Lake City, Utah, USA, Jun. 1995), vol. 5 pp. 16-16.
T. Nomura, A. Okazaki, M. Kameda, and Y. Morimoto, “Image reconstruction from compressed encrypted digital hologram,” Opt. Eng. 44, 2313-2320 (2005).
T. Nomura, A. Okazaki, M. Kameda, and Y. Morimoto, “Image reconstruction from compressed encrypted digital hologram,” Opt. Eng. 44, 2313-2320 (2005).
B. Javidi and T. Nomura, “Securing information by means of digital holography,” Opt. Lett. 25, 28-30 (2000).
[Crossref]
T. Nomura, A. Okazaki, M. Kameda, and Y. Morimoto, “Image reconstruction from compressed encrypted digital hologram,” Opt. Eng. 44, 2313-2320 (2005).
J.-P. Liu, T.-C. Poon, G.-S. Jhou, and P.-J. Chen, “Comparison of two-, three, and four-exposure guadrature phase-shifting holography,” Appl. Opt. 50, 2443-2450 (2011).
[Crossref]
P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767-769 (1995).
[Crossref]
B. Schneider, “Two-factor authentication: too little, too late,” ACM Commun. 48, 136 (2005).
B. Javidi, A. Sergent, and E. Ahouzi, “Performance of double phase encoding encryption technique using binarized encrypted images,” Opt. Eng. 37, 565-569 (1998).
[Crossref]
G. Unnikrishnan and K. Singh, “Double random fractional Fourier domain encoding for optical security,” Opt. Eng. 39, 2853-2859 (2000).
[Crossref]
R. Arizaga and R. Torroba, “Validation through a binary key code and a polarization sensitive digital technique,” Opt. Comm. 215, 31-36 (2003).
[Crossref]
D. Weber and J. Trolinger, “Novel implementation of nonlinear joint transform correlators in optical security and validation,” Opt. Eng. 38, 62-68 (1999).
[Crossref]
G. Unnikrishnan and K. Singh, “Double random fractional Fourier domain encoding for optical security,” Opt. Eng. 39, 2853-2859 (2000).
[Crossref]
D. Weber and J. Trolinger, “Novel implementation of nonlinear joint transform correlators in optical security and validation,” Opt. Eng. 38, 62-68 (1999).
[Crossref]
I. Yamaguchi and T. Zhang, “Phase-shifting digital holography,” Opt. Lett. 22, 610-612 (1998).
I. Yamaguchi and T. Zhang, “Phase-shifting digital holography,” Opt. Lett. 22, 610-612 (1998).
B. Schneider, “Two-factor authentication: too little, too late,” ACM Commun. 48, 136 (2005).
J. F. Heanue, M. C. Bashaw, and L. Hesselink, “Encrypted holographic data storage based on orthogonal-phase-code multiplexing,” Appl. Opt. 34, 6012-6015 (1995).
[Crossref]
P. Hariharan, “Digital phase-shifting interferometry: a simple error compensating phase calculation algorithm,” Appl. Opt. 26, 2504-0505 (1987).
[Crossref]
J.-P. Liu, T.-C. Poon, G.-S. Jhou, and P.-J. Chen, “Comparison of two-, three, and four-exposure guadrature phase-shifting holography,” Appl. Opt. 50, 2443-2450 (2011).
[Crossref]
S. H. Jeon and S. K. Gil, “QPSK modulation based optical image cryptosystem using phase-shifting digital holography,” J. Opt. Soc. Korea 14, 97-103 (2010).
[Crossref]
S. H. Jeon and S. K. Gil, “2-step phase-shifting digital holographic optical encryption and error analysis,” J. Opt. Soc. Korea 15, 244-251 (2011).
[Crossref]
S. K. Gil, “2-step quadrature phase-shifting digital holographic optical encryption using orthogonal polarization and error analysis,” J. Opt. Soc. Korea 16, 354-364 (2012).
[Crossref]
R. Arizaga and R. Torroba, “Validation through a binary key code and a polarization sensitive digital technique,” Opt. Comm. 215, 31-36 (2003).
[Crossref]
T. Nomura, A. Okazaki, M. Kameda, and Y. Morimoto, “Image reconstruction from compressed encrypted digital hologram,” Opt. Eng. 44, 2313-2320 (2005).
B. Javidi and J. L. Horner, “Optical pattern recognition for validation and security verification,” Opt. Eng. 33, 1752-1756 (1994).
[Crossref]
B. Javidi, A. Sergent, and E. Ahouzi, “Performance of double phase encoding encryption technique using binarized encrypted images,” Opt. Eng. 37, 565-569 (1998).
[Crossref]
D. Weber and J. Trolinger, “Novel implementation of nonlinear joint transform correlators in optical security and validation,” Opt. Eng. 38, 62-68 (1999).
[Crossref]
G. Unnikrishnan and K. Singh, “Double random fractional Fourier domain encoding for optical security,” Opt. Eng. 39, 2853-2859 (2000).
[Crossref]
G-S. Lin, H. T. Chang, W.-N. Lie, and C.-H. Chuang, “Public-key-based optical image cryptosystem based on data embedding techniques,” Opt. Eng. 42, 2331-2339 (2003).
[Crossref]
P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767-769 (1995).
[Crossref]
B. Javidi and T. Nomura, “Securing information by means of digital holography,” Opt. Lett. 25, 28-30 (2000).
[Crossref]
I. Yamaguchi and T. Zhang, “Phase-shifting digital holography,” Opt. Lett. 22, 610-612 (1998).
S. H. Jeon, Y. G. Hwang, and S. K. Gil, “Optical encryption of gray-level image using on-axis and 2-f digital holography with two-step phase-shifting method,” Opt. Rev. 15, 181-186 (2008).
[Crossref]
S. K. Gil, S. H. Jeon, and J. R. Jeong, “Security enhanced optical one-time password authentication method by using digital holography,” Proc. SPIE 9386, 93860U (2015).
S. K. Gil, S. H. Jeon, N. Kim, and J. R. Jeong, “Successive encryption and transmission with phase-shifting digital holography,” Proc. SPIE 6136, 339-346 (2006).
S. K. Gil, H. J. Byun, H. J. Lee, S. H. Jeon, and J. R. Jeong, “Optical encryption of binary data information with 2-step phase-shifting digital holography,” Proc. SPIE 6488, 648812 (2007).
D. McDonald, R. Atkinson, and Craig Mets, “One-time passwords in everything (OPIE): Experiences with building and using stronger authentication,” in Proc. the 5th USENIX Security Symposium (Salt Lake City, Utah, USA, Jun. 1995), vol. 5 pp. 16-16.
OSA participates in Crossref's Cited-By Linking service. Citing articles from OSA journals and other participating publishers are listed here.