The United States Government has certain rights in this invention pursuant to Contract No. DE-AC04-94AL85000 between the United States Department of Energy and the Sandia Corporation for the operation of the Sandia National Laboratory.
Number | Name | Date | Kind |
---|---|---|---|
4435835 | Sakow et al. | Mar 1984 | A |
4934846 | Gilham | Jun 1990 | A |
4948955 | Lee et al. | Aug 1990 | A |
5091966 | Bloomberg et al. | Feb 1992 | A |
5128525 | Sterns et al. | Jul 1992 | A |
5168147 | Bloomberg | Dec 1992 | A |
5221833 | Hecht | Jun 1993 | A |
5337361 | Wang et al. | Aug 1994 | A |
5337362 | Gormish et al. | Aug 1994 | A |
5449896 | Hecht et al. | Sep 1995 | A |
5471533 | Wang et al. | Nov 1995 | A |
5506697 | Li et al. | Apr 1996 | A |
5521368 | Adachi | May 1996 | A |
5644408 | Li et al. | Jul 1997 | A |
5764774 | Liu | Jun 1998 | A |
5811787 | Schuessler et al. | Sep 1998 | A |
5835639 | Honsinger et al. | Nov 1998 | A |
5862270 | Lopresti et al. | Jan 1999 | A |
5940135 | Petrovic et al. | Aug 1999 | A |
5974200 | Zhou et al. | Oct 1999 | A |
6082619 | Ma et al. | Jul 2000 | A |
6115508 | Lopresti et al. | Sep 2000 | A |
6182901 | Hecht et al. | Feb 2001 | B1 |
6418244 | Zhou et al. | Jul 2002 | B2 |
Entry |
---|
Javidi (1997), “Securing Information with Optical Technologies,” Physics Today 50:27-32. |
Javidi et al. (1996), “Experimental Demonstration of the Random Phase Encoding Technique for Image Encryption and Security Verification,” Opt. Eng. 35(9):2506-2512. |
Javidi et al. (1998), “Performance of Double Phase Encoding Encryption Technique Using Binarized Encrypted Images,” Opt. Eng. 37(2):565-569. |
Nomura et al. (2000), “Optical Encryption Using a Joint Transform Correlator Architecture,” Opt. Eng. 39:2031-2035. |
Refregier et al. (1995), “Optical Image Encryption Based on Input Plane and Fourier Plane Random Encoding,” Opt. Lett. 20(7):767-769. |
Unnikrishnan et al. (2000), “Double Random Fractional Fourier-Domain Encoding for Optical Security,” Opt. Eng. 39:2853-2859. |
Yamazaki et al. (2001), “Optimization of Encrypted Holograms in Optical Security Systems,” Opt. Eng. 40(1):132-137. |
Yang et al. (1996), “Practical Image Encryption Scheme by Real-Valued Data,” Opt. Eng. 35(9):2473-2478. |