Chinese Journal of Lasers, Volume. 27, Issue 10, 903(2000)
Implementation of Information Decomposing Using CGH and Its Application in Optical Image Encryption
[1] [1] Bahram Javidi, Joseph L. Horner. Optical pattern recognition for validation and security verification. Opt. Eng., 1994, 33(6):1752~1756
[2] [2] Bahram Javidi, Guanshen Zhang, Jian Li. Experimental demonstration of the random phase encoding technique for image encryption and security verification. Opt. Eng., 1996, 35(9):2506~2512
[3] [3] Ruikang K. Wang, Lan A. Watson, Chris Chatwin. Random phase encoding for optical security. Opt. Eng., 1996, 35(9):2464~2469
[4] [4] Yu Zuliang, Jin Guofan. Computer Generated Hologram. Beijing: Publishing House of Tsinghua University, 1984. 41~44 (in Chinese)
Get Citation
Copy Citation Text
[in Chinese], [in Chinese], [in Chinese], [in Chinese], [in Chinese]. Implementation of Information Decomposing Using CGH and Its Application in Optical Image Encryption[J]. Chinese Journal of Lasers, 2000, 27(10): 903