Citation: | HUANG Jing, ZHENG Zhen-zhu. Encryption for optoelectronic devices[J]. Journal of Applied Optics, 2011, 32(3): 456-459. |
[1]NOMURA T. Optical encryption using a joint tra-nsform correlator architecture[J]. Opt. Eng.,2000,39(8):2031-2035.
[2]UNNIKISHNAN G, JOSEPH J, SINGH K. Optical encryption by double random phase encoding in the fractional Fourier domain[J]. Opt. Lett.,1995,25:887-889. [3]位恒政,彭翔,张鹏,等. 双随机相位加密系统的选择明文攻击[J].光学学报,2007,27(5):824-829. WEI Heng-zheng,PENG Xiang,ZHANG Peng, et al. Chosen-Plain text attack ondouble phase encoding encryption eechniqu[J]. Acta Optica Sinica, 2007,27(5):824-829.(in Chinese with an English abstract) [4]于斌,彭翔.基于级联相位恢复算法的光学图像加密[J].光学学报,2005,25(7):881-884. YU Bing, PENG Xiang. Optical image encryption based on cascaded phase retrieval algorithm[J]. Acta Optica Sinica,2005,25(7):881-884.(in Chinese with an English abstract)[5]HE M Z, CAI L Z. Phase-only encryption and wa-termarking based on phase-shifting interfer-ometry[J]. Appl. Opt., 2005,44(13):2600-2606. [6]JONG W H, CHOON S P, DAE H R, et al. Optical image encryption based on XOR operations[J]. Opt. Eng.,1999,38(1):47-54. [7]黄静,郑珍珠.一种基于位平面加密的图像加密方法[J].通信技术,2008,41(10):127-129. HANG Jing, ZHEN Zhen-zhu.Optical image encryption based on bit plane division[J].Communications Technology,2008,41(10):127-129.(in Chinese with an English abstract) |
[1] | ZHANG Yuetong, CHEN Wenliang, WANG Xiangjun, LIU Feng, WANG Meiyi. FDM printing trajectory measurement and quality evaluation method based on infrared imaging[J]. Journal of Applied Optics, 2024, 45(5): 1008-1018. DOI: 10.5768/JAO202445.0503003 |
[2] | WANG Jie, CHEN Manlong, LI Kui, YANG Fan, YAN Lizhi. Thread image evaluation method based on machine vision[J]. Journal of Applied Optics, 2022, 43(5): 904-912. DOI: 10.5768/JAO202243.0502004 |
[3] | Huang Cheng, Zhu Jinshan. Screening of light environment evaluation indices for ship night navigation[J]. Journal of Applied Optics, 2017, 38(5): 804-809. DOI: 10.5768/JAO201738.0503005 |
[4] | Wang Zhi-peng, Wang Hong-juan, Jiang Hua-long, Qin Yi. Single-intensity-recording optical encryption technology based on phase retrieval algorithm[J]. Journal of Applied Optics, 2015, 36(1): 64-70. DOI: 10.5768/JAO201536.0102003 |
[5] | HAO Ming. Image encryption algorithm based on combined chaos and bit operations[J]. Journal of Applied Optics, 2014, 35(3): 420-426. |
[6] | LIAN Li-quan, ZHOU Tao-geng, ZHANG Peng-song, SHA Ding-guo. Digital camera synthetic evaluation system[J]. Journal of Applied Optics, 2012, 33(4): 756-760. |
[7] | CHEN Jie-chun, ZHAO Li-ping, GUO ming. Uncertainty evaluation of corner detection[J]. Journal of Applied Optics, 2011, 32(3): 477-481. |
[8] | LI Chuan-qi, YI Wan-yi, ZHOU Yuan-yuan, ZHANG Yuan. Research on security of optical CDMA system[J]. Journal of Applied Optics, 2010, 31(3): 423-426. |
[9] | MA Yun-bin, HU Zhi-xin, YANG Jing, MA Jun-peng. Oil pipeline security monitoring system based on fiber Bragg grating sensor[J]. Journal of Applied Optics, 2009, 30(3): 505-509. |
[10] | HE Wei-li, GUO Wei-ling, GAO Wei, SHI Chen, CHEN Xi, WU Juan, CHEN Jian-xin. Test method of life-time and reliability evaluation for high-power LED[J]. Journal of Applied Optics, 2008, 29(4): 533-536. |