• Acta Optica Sinica
  • Vol. 36, Issue 3, 307001 (2016)
Lin Chao1、*, Shen Xueju1, Lei Ming2, Dou Shuaifeng1, and Zou Xiao3
Author Affiliations
  • 1[in Chinese]
  • 2[in Chinese]
  • 3[in Chinese]
  • show less
    DOI: 10.3788/aos201636.0307001 Cite this Article Set citation alerts
    Lin Chao, Shen Xueju, Lei Ming, Dou Shuaifeng, Zou Xiao. Optical Security Validation Based on Orthogonal Polarization Multiplexing in Three-Dimensional Space[J]. Acta Optica Sinica, 2016, 36(3): 307001 Copy Citation Text show less
    References

    [1] Refregier P, Javidi B. Optical image encryption based on input plane and Fourier plane random encoding[J]. Opt Lett, 1995, 20(7): 767-769.

    [2] Javidi B, Horner J L. Optical pattern recognition for validation and security verification[J]. Opt Eng, 1994, 33(6): 1752-1756.

    [3] Chen W, Javidi B, Chen X. Advances in optical security systems[J]. Adv Opt Photon, 2014, 6(2): 120-155.

    [4] Shen X, Lin C, Zou X, et al.. Nonlinear optical cryptosystem based on joint Fresnel transform under vector wave illumination [J]. Journal of Optics, 2015, 17(5): 055701.

    [5] Qin W, Peng X. Asymmetric cryptosystem based on phase truncated Fourier transforms[J]. Opt Lett, 2010, 35(2): 118-120.

    [6] Wei Hengzheng, Peng Xiang. Known-plaintext attack on optical cryptosystem based on project-onto-constraint-sets algorithm and a 4f correlator[J]. Acta Optica Sinica, 2008, 28(3): 429-434.

    [7] Peng Xiang, Tang Hongqiao, Tian Jindong. Ciphertext-only attack on double random phase encoding optical encryption system[J]. Acta Physica Sinica, 2007, 56(5): 2629-2636.

    [8] Wang Hongjuan, Wang Zhipeng, Zhang Yingying, et al.. Using QR codes in multi-image optical interference encryption system to reconstruct high quality original information[J]. Acta Optica Sinica, 2014, 34(9): 0907001.

    [9] Liu Zhen, Bai Taotao, Lu Peng. Encrypted holographic watermarking technology with decrypted image superposed no noise [J]. Acta Optica Sinica, 2015, 35(2): 0209002.

    [10] Hou Junfeng, Huang Sujuan, Situ Guohai. Nonlinear optical image encryption[J]. Acta Optica Sinica, 2015, 35(8): 0807001.

    [11] Wang Hongjuan, Wang Zhipeng, Hai Tao, et al.. Lossless binary image reconstruction in diffractive encryption system with redundant data[J]. Chinese J Lasers, 2015, 42(7): 0709002.

    [12] Shen Xueju, Liu Xumin, Cai Ning. Nonlinear image encryption system based on JTC and its removing noise and resisting attack properties research[J]. Chinese J Lasers, 2015, 42(7): 0709003.

    [13] Volodin B L, Kippelen B, Meerholz K, et al.. A polymeric optical pattern-recognition system for security verification[J]. Nature, 1996, 383(5): 58-60.

    [14] Weng D, Zhu N, Wang Y, et al.. Experimental verification of optical image encryption based on interference[J]. Opt Commun, 2011, 284(10-11): 2485-2487.

    [15] Barrera J F, Agudelo A M, Torroba R. Experimental QR code optical encryption: noise-free data recovering[J]. Opt Lett, 2014, 39(10): 3074-3077.

    [16] Zhang Y, Wang B. Optical image encryption based on interference[J]. Opt Lett, 2008, 33(21): 2443-2445.

    [17] Wang B, Zhang Y. Double images hiding based on optical interference[J]. Opt Commun, 2009, 282(17): 3439-3443.

    [18] Chen W, Chen X, Sheppard C J R. Optical image encryption based on phase retrieval combined with three-dimensional particle-like distribution[J]. Journal of Optics, 2012, 14(7): 075402.

    [19] Wang X, Zhao D. Optical image hiding with silhouette removal based on the optical interference principle[J]. Appl Opt, 2012, 51(6): 686-691.

    [20] He W, Peng X, Meng X, et al.. Collision in optical image encryption based on interference and a method for avoiding this security leak[J]. Optics & Laser Technology, 2013, 47(1): 31-36.

    [21] Niu C, Wang X, Lü N, et al.. An encryption method with multiple encrypted keys based on interference principle[J]. Opt Express, 2010, 18(8): 7827-7834.

    [22] Chen W, Chen X. Security-enhanced interference-based optical image encryption[J]. Opt Commun, 2013, 286(1): 123-129.

    [23] Ying C, Pang H, Fan C, et al.. New method for the design of a phase-only computer hologram for multiplane reconstruction [J]. Opt Eng, 2011, 50(5): 055802.

    CLP Journals

    [1] Wang Yanchao, Guo Jingbo, Zhou Liyan. Image Hash Algorithm Based on Data Dimension Reduction and Symmetric Binary Pattern[J]. Laser & Optoelectronics Progress, 2017, 54(2): 21004

    Lin Chao, Shen Xueju, Lei Ming, Dou Shuaifeng, Zou Xiao. Optical Security Validation Based on Orthogonal Polarization Multiplexing in Three-Dimensional Space[J]. Acta Optica Sinica, 2016, 36(3): 307001
    Download Citation