• Chinese Journal of Lasers
  • Vol. 36, Issue s2, 312 (2009)
Pan Wu*, Wu Wenwen, and Zhang Xuelian
Author Affiliations
  • [in Chinese]
  • show less
    DOI: 10.3788/cjl200936s2.0312 Cite this Article Set citation alerts
    Pan Wu, Wu Wenwen, Zhang Xuelian. Encryption Algorithm of Virtual Optical Based on Computer-Generated Hologram and Double Random Phase[J]. Chinese Journal of Lasers, 2009, 36(s2): 312 Copy Citation Text show less
    References

    [1] B. Javidi,J. L. Horner. Optical pattern recognition for validations and security verification[J]. Opt. Eng.,1994,33(6):1752-1760

    [2] P. Refregier,B. javidi. Optical image encryption based on input plane and Fourier plane random encoding[J]. Opt. Lett.,1995,20(7):767-769

    [3] B. Javidi,G. Zhang,J. Li. Experimental demonstration of the random phase encoding technique for image encryption and security verification[J]. Opt. Eng.,1996,35(9):2506-2518

    [4] B. Javidi,A. Sergent,G. Zhang et al.. Fault tolerance properties of a double phase encoding encryption technique[J]. Opt. Eng.,1997,36(4):992-1002

    [5] X. Peng,Z. Cai,T. Tan. Information encryption with virtual optics imaging system[J]. Opt. Commun.,2002,212(4-6):235-245

    [6] X. Peng,Z. Cai,T. Tan. Image encryption with virtual optics[C]. SPIE,2002,4929:96-104

    [7] Y. Frauel,A. Castro,T. J. Naughton. Security analysis of optical encryption[C]. SPIE,2005,5986:25-34

    [8] A. Carnicer,M. Montes-Usategui,S. Arcos et al.. Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys[J]. Opt. Lett.,2005,30(13):1644-1646

    [9] Wei Hengzheng,Peng Xiang,Zhang Peng et al.. Chosen-plaintext attack on double phase encoding encryption technique[J]. Acta Optica Sinica,2007,27(5):824-829

    [10] Peng Xiang,Tang Hongqiao,Tian Jindong. Ciphertext-only attack on double random phase encoding optical encryption system[J]. Acta Physica Sinica,2007,56(5):2629-2636

    [11] G. H. Situ,J. J. Zhang. Double random-phase encoding in the Fresnel domain[J]. Opt. Lett.,2004,29(14):1584-1586

    [12] G. H. Situ,J. J. Zhang. Multiple-image encryption by wavelength multiplexing[J]. Opt. Lett.,2005,30(11):1306-1308

    [13] Sun Liujie,Zhuang Songlin. Digital watermarking of encrypted in-line holography[J]. Optics and Precision Engineering,2007,15(1):131-137

    [14] Zhong Liyun,Zhang Yimo,Lv Xiaoxu et al.. Analysis of some fundamental issue about digital hologram[J]. Acta Optica Sinica,2004,24(4):465-471

    [15] Wu Kenan,Hu Jiasheng,Lin Yong. A novel method of key design in optical encryption system based on JTC architecture[J]. Optics and Precision Engineering,2007,15(4):577-581

    CLP Journals

    [1] Tu Qianguang, Hao Zengzhou, Pan Delu, Gong Fang. Dust Automatic Detection over Ocean Using MTSAT Data[J]. Acta Optica Sinica, 2011, 31(12): 1228001

    [2] Guo Miaojun, Wu Jinze, Huang Jingbo, Wang Hongli, Zhou Haitao, Gao Jiangrui, Zhang Junxiang. Experimental Measurements and Accurate Simulation of the Optical Thickness of the Cesium Atom Vapor[J]. Acta Optica Sinica, 2013, 33(10): 1002001

    Pan Wu, Wu Wenwen, Zhang Xuelian. Encryption Algorithm of Virtual Optical Based on Computer-Generated Hologram and Double Random Phase[J]. Chinese Journal of Lasers, 2009, 36(s2): 312
    Download Citation