IEEE/CAA Journal of Automatica Sinica
Citation: | Chao Han and Yuzhen Shen, "Three-Dimensional Scene Encryption Algorithm Based on Phase Iteration Algorithm of the Angular-Spectral Domain," IEEE/CAA J. Autom. Sinica, vol. 7, no. 4, pp. 1074-1080, July 2020. doi: 10.1109/JAS.2019.1911726 |
[1] |
P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Optics Letters, vol. 20, no. 7, pp. 767–769, Apr. 1995. doi: 10.1364/OL.20.000767
|
[2] |
G. Situ and J. Zhang, “Double random-phase encoding in the Fresnel domain,” Optics Letters, vol. 29, no. 14, pp. 1584–1586, Aug. 2004. doi: 10.1364/OL.29.001584
|
[3] |
G. Situ and J. Zhang, “A lensless optical security system based on computer-generated phase only masks,” Optics Communications, vol. 232, no. 1–6, pp. 115–122, Mar. 2004. doi: 10.1016/j.optcom.2004.01.002
|
[4] |
H. Hwang, H. Chang, and W. Lie, “Fast double-phase retrieval in Fresnel domain using modified Gerchberg-Saxton algorithm for lensless optical security systems,” Optics Express, vol. 17, no. 16, pp. 13700–13710, Aug. 2009. doi: 10.1364/OE.17.013700
|
[5] |
S. Xi, X. Sun, B. Liu, et al., “New image encryption technology of image based on computer generated hologram,” Laser&Optoelectronics Progress, vol. 49, no. 040902, pp. 1–6, Jan. 2012.
|
[6] |
O. Matoba and B. Javidi, “Encrypted optical memory system using three-dimensional keys in the Fresnel domain,” Optics Letters, vol. 24, no. 11, pp. 762–764, Jun. 1999. doi: 10.1364/OL.24.000762
|
[7] |
S. Liu, Q. Mi, and B. Zhu, “Optical image encryption with multistage and multichannel fractional Fourier-domain filtering,” Optics Letters, vol. 26, no. 16, pp. 1242–1244, Aug. 2001. doi: 10.1364/OL.26.001242
|
[8] |
Y. Zhang, CH. Zheng, and N. Tanno, “Optical encryption based on iterative fractional Fourier transform,” Optics Communications, vol. 202, no. 4-6, pp. 277–285, Feb. 2002. doi: 10.1016/S0030-4018(02)01113-6
|
[9] |
A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys,” Optics Letters, vol. 30, no. 13, pp. 1644–1646, Jul. 2005. doi: 10.1364/OL.30.001644
|
[10] |
X. Peng, H. Wei, and P. Zhang, “Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain,” Optics Letters, vol. 31, no. 22, pp. 3261–3263, Nov. 2006. doi: 10.1364/OL.31.003261
|
[11] |
X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-plaintext attack on optical encryption based on double random phase keys,” Optics Letters, vol. 31, no. 8, pp. 1044–1046, Nov. 2006. doi: 10.1364/OL.31.001044
|
[12] |
Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance of the double random phase encryption against various attacks,” Optics Express, vol. 15, no. 16, pp. 10253–10265, Aug. 2007. doi: 10.1364/OE.15.010253
|
[13] |
J. Chen, Y. Zhang, and L. Zhang, “Security enhancement of double random phase encoding using rear-mounted phase masking,” Optics and Lasers in Engineering, vol. 101, pp. 51–59, Feb. 2018. doi: 10.1016/j.optlaseng.2017.09.019
|
[14] |
R. K. Wang, I. A. Watson, and C. R. Chatwin, “Random phase encoding for optical security,” Optical Engineering, vol. 35, no. 09, pp. 2464–2469, Sept. 1996. doi: 10.1117/1.600849
|
[15] |
Y. Li, K. Kreske, and J. Rosen, “Security and encryption optical systems based on a correlator with significant output images,” Applied Optics, vol. 39, no. 29, pp. 5295–5301, Oct. 2000. doi: 10.1364/AO.39.005295
|
[16] |
J. Hou, R. Xi, P. Liu, and T. Liu, “The switching fractional order chaotic system and its application to image encryption,” IEEE/CAA J. Autom. Sinica, vol. 4, no. 2, pp. 381–388, Apr. 2017. doi: 10.1109/JAS.2016.7510127
|
[17] |
G. Situ and J. Zhang, “Multiple-image encryption by wavelength multiplexing,” Optics Letters, vol. 30, no. 11, pp. 1306–1308, Jun. 2005. doi: 10.1364/OL.30.001306
|
[18] |
Y. Shi, G. Situ, and J. Zhang, “Multiple-image hiding in the Fresnel domain,” Optics Letters, vol. 32, no. 13, pp. 1914–1916, Jul. 2007. doi: 10.1364/OL.32.001914
|
[19] |
J.-J. Huang, H.-E. Hwang, C.-Y. Chen, and C.-M. Chen, “Lensless multiple-image optical encryption based on improved phase retrieval algorithm,” Applied Optics, vol. 51, no. 13, pp. 2388–2394, Apr. 2012. doi: 10.1364/AO.51.002388
|
[20] |
S. Y. Yao, L. F. Chen, G. J. Chang, and B. Y. He, “A new optical encryption system for image transformation,” Optics and Laser Technology, vol. 97, pp. 234–241, Dec. 2017. doi: 10.1016/j.optlastec.2017.07.005
|
[21] |
L. Zhang, X. Yuan, D. Zhang, and J. Chen, “Research on multiple-image encryption scheme based on Fourier transform and Ghost imaging algorithm,” Current Optics and Photonics, vol. 2, no. 4, pp. 315–323, Aug. 2018.
|
[22] |
X. Chen, Q. Liu, J. Wang, and Q. Wang, “Asymmetric encryption of multi-image based on compressed sensing and feature fusion with high quality image reconstruction,” Optics&Laser Technology, vol. 107, pp. 302–312, Nov. 2018.
|
[23] |
Y. Zhao, L. Cao, H. Zhang, D. Kong, and G. Jin, “Accurate calculation of computer-generated holograms using angular-spectrum layer-oriented method,” Optics Express, vol. 23, no. 20, pp. 25440–25449, Oct. 2015. doi: 10.1364/OE.23.025440
|
[24] |
D. Kong, L. Cao, G. Jin, and B. Javidi, “Three-dimensional scene encryption and display based on computer-generated holograms,” Applied Optics, vol. 55, no. 29, pp. 8296–8300, Oct. 2016. doi: 10.1364/AO.55.008296
|
[25] |
D. Kong, L. Cao, X. Shen, H. Zhang, and G. Jin, “Image encryption based on interleaved computer-generated holograms,” IEEE Trans. Industrial Informatics, vol. 14, no. 2, pp. 673–678, Feb. 2018. doi: 10.1109/TII.2017.2714261
|
[26] |
D. S. Monaghan, U. Gopinathan, T. J. Naughton, and J. T. Sheridan,, “Key-space analysis of double random phase encryption technique,” Applied Optics, vol. 46, no. 26, pp. 6641–6647, Sept. 2007. doi: 10.1364/AO.46.006641
|