Chinese Journal of Lasers, Volume. 27, Issue 10, 903(2000)

Implementation of Information Decomposing Using CGH and Its Application in Optical Image Encryption

[in Chinese], [in Chinese], [in Chinese], [in Chinese], and [in Chinese]
Author Affiliations
  • [in Chinese]
  • show less
    References(4)

    [1] [1] Bahram Javidi, Joseph L. Horner. Optical pattern recognition for validation and security verification. Opt. Eng., 1994, 33(6):1752~1756

    [2] [2] Bahram Javidi, Guanshen Zhang, Jian Li. Experimental demonstration of the random phase encoding technique for image encryption and security verification. Opt. Eng., 1996, 35(9):2506~2512

    [3] [3] Ruikang K. Wang, Lan A. Watson, Chris Chatwin. Random phase encoding for optical security. Opt. Eng., 1996, 35(9):2464~2469

    [4] [4] Yu Zuliang, Jin Guofan. Computer Generated Hologram. Beijing: Publishing House of Tsinghua University, 1984. 41~44 (in Chinese)

    Tools

    Get Citation

    Copy Citation Text

    [in Chinese], [in Chinese], [in Chinese], [in Chinese], [in Chinese]. Implementation of Information Decomposing Using CGH and Its Application in Optical Image Encryption[J]. Chinese Journal of Lasers, 2000, 27(10): 903

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category: holography and information processing

    Received: Apr. 26, 1999

    Accepted: --

    Published Online: Aug. 9, 2006

    The Author Email:

    DOI:

    Topics