基于三维空间正交偏振态复用的光学认证技术研究
[1] Refregier P, Javidi B. Optical image encryption based on input plane and Fourier plane random encoding[J]. Opt Lett, 1995, 20(7): 767-769.
[2] Javidi B, Horner J L. Optical pattern recognition for validation and security verification[J]. Opt Eng, 1994, 33(6): 1752-1756.
[3] Chen W, Javidi B, Chen X. Advances in optical security systems[J]. Adv Opt Photon, 2014, 6(2): 120-155.
[4] Shen X, Lin C, Zou X, et al.. Nonlinear optical cryptosystem based on joint Fresnel transform under vector wave illumination [J]. Journal of Optics, 2015, 17(5): 055701.
[5] Qin W, Peng X. Asymmetric cryptosystem based on phase truncated Fourier transforms[J]. Opt Lett, 2010, 35(2): 118-120.
[6] 位恒政, 彭翔. 约束集投影算法和4f 相关器的光学密码系统的已知明文攻击[J]. 光学学报, 2008, 28(3): 429-434.
[7] 彭翔, 汤红乔, 田劲东. 双随机相位编码光学加密系统的唯密文攻击[J]. 物理学报, 2007, 56(5): 2629-2636.
Peng Xiang, Tang Hongqiao, Tian Jindong. Ciphertext-only attack on double random phase encoding optical encryption system[J]. Acta Physica Sinica, 2007, 56(5): 2629-2636.
[8] 王红娟, 王志鹏, 张颖颖, 等. 利用QR 码在光学干涉多图像加密系统中实现信息高质量恢复[J]. 光学学报, 2014, 34(9): 0907001.
[9] 刘真, 白韬韬, 卢鹏. 一种解密图像无背景噪声的加密全息数字水印技术[J]. 光学学报, 2015, 35(2): 0209002.
[10] 侯俊峰, 黄素娟, 司徒国海. 非线性光学图像加密[J]. 光学学报, 2015, 35(8): 0807001.
[11] 王红娟, 王志鹏, 海涛, 等. 利用冗余数据在衍射加密系统中实现二值图像无损恢复[J]. 中国激光, 2015, 42(7): 0709002.
[12] 沈学举, 刘旭敏, 蔡宁. 非线性JTC 光学图像加密系统及其消噪音和抗攻击特性研究[J]. 中国激光, 2015, 42(7): 0709003.
[13] Volodin B L, Kippelen B, Meerholz K, et al.. A polymeric optical pattern-recognition system for security verification[J]. Nature, 1996, 383(5): 58-60.
[14] Weng D, Zhu N, Wang Y, et al.. Experimental verification of optical image encryption based on interference[J]. Opt Commun, 2011, 284(10-11): 2485-2487.
[15] Barrera J F, Agudelo A M, Torroba R. Experimental QR code optical encryption: noise-free data recovering[J]. Opt Lett, 2014, 39(10): 3074-3077.
[16] Zhang Y, Wang B. Optical image encryption based on interference[J]. Opt Lett, 2008, 33(21): 2443-2445.
[17] Wang B, Zhang Y. Double images hiding based on optical interference[J]. Opt Commun, 2009, 282(17): 3439-3443.
[18] Chen W, Chen X, Sheppard C J R. Optical image encryption based on phase retrieval combined with three-dimensional particle-like distribution[J]. Journal of Optics, 2012, 14(7): 075402.
[19] Wang X, Zhao D. Optical image hiding with silhouette removal based on the optical interference principle[J]. Appl Opt, 2012, 51(6): 686-691.
[20] He W, Peng X, Meng X, et al.. Collision in optical image encryption based on interference and a method for avoiding this security leak[J]. Optics & Laser Technology, 2013, 47(1): 31-36.
[21] Niu C, Wang X, Lü N, et al.. An encryption method with multiple encrypted keys based on interference principle[J]. Opt Express, 2010, 18(8): 7827-7834.
[22] Chen W, Chen X. Security-enhanced interference-based optical image encryption[J]. Opt Commun, 2013, 286(1): 123-129.
[23] Ying C, Pang H, Fan C, et al.. New method for the design of a phase-only computer hologram for multiplane reconstruction [J]. Opt Eng, 2011, 50(5): 055802.
林超, 沈学举, 雷鸣, 窦帅风, 邹效. 基于三维空间正交偏振态复用的光学认证技术研究[J]. 光学学报, 2016, 36(3): 0307001. Lin Chao, Shen Xueju, Lei Ming, Dou Shuaifeng, Zou Xiao. Optical Security Validation Based on Orthogonal Polarization Multiplexing in Three-Dimensional Space[J]. Acta Optica Sinica, 2016, 36(3): 0307001.