• Acta Optica Sinica
  • Vol. 29, Issue 10, 2709 (2009)
He Mingzhao*, Cao Liangcai, Tan Qiaofeng, He qingsheng, and Jin Guofan
Author Affiliations
  • [in Chinese]
  • show less
    DOI: 10.3788/aos20092910.2709 Cite this Article Set citation alerts
    He Mingzhao, Cao Liangcai, Tan Qiaofeng, He qingsheng, Jin Guofan. Digital Watermarking Technique Based on Cascaded Fractional Fourier Transform System[J]. Acta Optica Sinica, 2009, 29(10): 2709 Copy Citation Text show less
    References

    [1] Sun Shenghe,Lu Zheming,Niu Xiamu. Digital watermarking technique and application [M]. Beijing:Science Press,2004,32-36

    [2] Peng Xiang,Wei Hengzheng,Zhang Peng. Introduction to optical information security [M]. Beijing:Science Press,2008,1-11

    [3] Peng Xiang,Zhang Peng,Niu hanben. 3D spatial digital watermarking system based on virtual optics[J]. Acta Optica Sinica,2004,24(11):1507-1510

    [4] Yuchi Liang,Gu Jihua,Liu Wei et al.. An image digital watermark technique based on digital holography and discrete cosine transform[J]. Acta Optica Sinica,2006,26(3):355-361

    [5] Liu Zhengjun,Zhao Haifa,Zhu Banghe et al.. Fractional Fourier Domain Digital Watermarking[J]. Acta Photonica Sinica,2003,32(3):332-335

    [6] Peng Xiang,Bai Weidong,Tian Jindong. Digital watermarking with half-tone encoded computer-generated hologram[J]. Acta Optica Sinica,2007,27(6):1011-1017

    [7] Sun Liujie,Zhuang Songlin. Anti-fake technique by double random phase encrypted holographic mark[J]. Acta Optica Sinica,2007,27(1):31-34

    [8] Sun Liujie,Zhuang Songlin. Identification mark of encrypted in-line fresnel holography[J]. Chinese J. Lasers,2007,34(3):402-405

    [9] Shannon C E. Communication theory of secrecy system[J]. Bell. Syst. Tech.,1949,28:656-715

    [10] Hans Delfs,Helmut Knebl. Introduction to cryptography[M]. Springer,2007,1-6

    [11] Yang Bo. Modern Cryptography [M]. Beijing:Tsinghua Univ. Press,2007. 1-11

    [12] Ji Jin,Huang Fei,Wang Liang et al.. Information encryption based on digital holography and phase retrieve algorithm[J]. Chinese J. Lasers,2007,34(10):1408-1412

    [13] Bahram Javidi. Optical and digital techniques for information security[M]. Springer,2005,113-134

    [14] Namias V. The fractional order Fourier transform and its application to quantum mechanics[J]. IMA J. Appl. Maths.,1980,25(1):241-265

    [15] Mendlovic D,Ozakatas H. M. Fractional fourier transforms and their optical implementation[J]. J. Opt. Soc. Am. A,1993,10:1875-1881

    [16] Aysegul Sahin,Haldun M. Ozaktas,David Mendlovic. Optical implementations of two-dimensional fractional Fourier transforms and linear canonical transforms with arbitrary parameters[J]. Appl. Opt.,1998,37(11):2130-2141

    [17] A. W. Lohmann. Image rotation,Wigner rotation,and fractional Fourier transform[J]. J. Opt. Soc. Am. A,1993,10(10):2181-2186

    [18] G. Unnikrishnan,J. Joseph,K. Singh. Optical encryption by double-random phase encoding in the fractional Fourier domain [J]. Opt. Lett.,2000,25(12):887-889

    CLP Journals

    [1] Chen Daqing, Zhou Hao, Tao Zhi, Gu Jihua. Fourier Computer-Generated Hologram Digital Watermarking with Nonlinear Amplitude Limiting[J]. Acta Optica Sinica, 2011, 31(2): 207002

    He Mingzhao, Cao Liangcai, Tan Qiaofeng, He qingsheng, Jin Guofan. Digital Watermarking Technique Based on Cascaded Fractional Fourier Transform System[J]. Acta Optica Sinica, 2009, 29(10): 2709
    Download Citation