1994
DOI: 10.1117/12.169427
|View full text |Cite
|
Sign up to set email alerts
|

<title>Optical pattern recognition for validation and security verification</title>

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
28
0

Year Published

2005
2005
2017
2017

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(28 citation statements)
references
References 0 publications
0
28
0
Order By: Relevance
“…Information security using optical technology is becoming increasingly important and has drawn a lot of attention, due to its inherent nature of high-speed and multidimensional capabilities of optical signal processing [1][2][3][4]. Since Refregier and Javidi proposed the double random phase encoding (DRPE) [5], optical technologies have been widely studied and applied for securing information.…”
Section: Introductionmentioning
confidence: 99%
“…Information security using optical technology is becoming increasingly important and has drawn a lot of attention, due to its inherent nature of high-speed and multidimensional capabilities of optical signal processing [1][2][3][4]. Since Refregier and Javidi proposed the double random phase encoding (DRPE) [5], optical technologies have been widely studied and applied for securing information.…”
Section: Introductionmentioning
confidence: 99%
“…Optical encryption of images has been an attractive research area over recent decades [1][2][3]. Most of the encryption methods use the double random phase encoding (DRPE) scheme [4], which consists of encoding the phase of the optical wave to generate random images.…”
Section: Introductionmentioning
confidence: 99%
“…Optics provides useful resources for remote, real-time, automatic and reliable signal verification as it has been reported by a large number of papers published in the last decades. [1][2][3] Complex operations such as authenticator selection, signature encoding, encryption, identity tags, remote readout, decryption, hybrid processors, pattern recognition, resistance to degradations, identification, (multifactor) validation, and authentication are involved in the broad area of security systems. New methods have been reported for information encryption and designing identification (ID) tags for object surveillance or tracking.…”
Section: Introductionmentioning
confidence: 99%