Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Three-dimensional imaging and processing using computational holographic imaging
Y Frauel, TJ Naughton, O Matoba… - Proceedings of the …, 2006 - ieeexplore.ieee.org
Digital holography is a technique that permits digital capture of holograms and subsequent
processing on a digital computer. This paper reviews various applications of this technique …
processing on a digital computer. This paper reviews various applications of this technique …
Roadmap on optical security
Abstract Information security and authentication are important challenges facing society.
Recent attacks by hackers on the databases of large commercial and financial companies …
Recent attacks by hackers on the databases of large commercial and financial companies …
A known-plaintext heuristic attack on the Fourier plane encryption algorithm
The Fourier plane encryption algorithm is subjected to a known-plaintext attack. The
simulated annealing heuristic algorithm is used to estimate the key, using a known plaintext …
simulated annealing heuristic algorithm is used to estimate the key, using a known plaintext …
Reduction of speckle in digital holography by discrete Fourier filtering
We present a digital signal processing technique that reduces the speckle content in
reconstructed digital holograms. The method is based on sequential sampling of the discrete …
reconstructed digital holograms. The method is based on sequential sampling of the discrete …
Key-space analysis of double random phase encryption technique
We perform a numerical analysis on the double random phase encryption∕ decryption
technique. The key-space of an encryption technique is the set of possible keys that can be …
technique. The key-space of an encryption technique is the set of possible keys that can be …
Optical image encryption technique based on deterministic phase masks
The double-random phase encoding (DRPE) scheme, which is based on a 4 f optical
correlator system, is considered as a reference for the optical encryption field. We propose a …
correlator system, is considered as a reference for the optical encryption field. We propose a …
Advances in optical image compression and encryption methods
Y Qin, T Man, Y Wan, X Wang - Laser & Optoelectronics Progress, 2023 - researching.cn
Optical waves as information carriers can process two-dimensional information in parallel
with high speed and have many degrees of freedom (eg, wavelength, amplitude, phase, and …
with high speed and have many degrees of freedom (eg, wavelength, amplitude, phase, and …
Encryption quality analysis of the RC5 block cipher algorithm for digital images
HEH Ahmed, HM Kalash… - Optical Engineering, 2006 - spiedigitallibrary.org
We investigate the implementation and application of the RC5 block cipher algorithm for
digital images and provide testing, verification, and encryption efficiency of the RC5 block …
digital images and provide testing, verification, and encryption efficiency of the RC5 block …
Compression of interference patterns with application to phase-shifting digital holography
E Darakis, JJ Soraghan - Applied optics, 2006 - opg.optica.org
A compression method of phase-shifting digital holographic data is presented. Three
interference patterns are recorded, and holographic information is extracted from them by …
interference patterns are recorded, and holographic information is extracted from them by …
Compression of digital holograms of three-dimensional objects using wavelets
We present the results of what we believe is the first application of wavelet analysis to the
compression of complex-valued digital holograms of three-dimensional real-world objects …
compression of complex-valued digital holograms of three-dimensional real-world objects …