Optical Double Binary Amplitude Mask Structure for Security Authentication
A novel method for jointly designing two binary amplitude masks (BAMs) that allow for secure authentication is proposed. The speckle-noise diffraction pattern generated numerically from the input secret image encrypted by a random phase is binarized and further compressed. The resulting BAM can be s...
Ausführliche Beschreibung
Autor*in: |
Xiaogang Wang [verfasserIn] Guoquan Zhou [verfasserIn] Chaoqing Dai [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2016 |
---|
Schlagwörter: |
---|
Übergeordnetes Werk: |
In: IEEE Photonics Journal - IEEE, 2015, 8(2016), 6, Seite 7 |
---|---|
Übergeordnetes Werk: |
volume:8 ; year:2016 ; number:6 ; pages:7 |
Links: |
---|
DOI / URN: |
10.1109/JPHOT.2016.2628798 |
---|
Katalog-ID: |
DOAJ007058462 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | DOAJ007058462 | ||
003 | DE-627 | ||
005 | 20230309212159.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230225s2016 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1109/JPHOT.2016.2628798 |2 doi | |
035 | |a (DE-627)DOAJ007058462 | ||
035 | |a (DE-599)DOAJ84a02b02e1714e40a7e0a8da8859ef69 | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
050 | 0 | |a TA1501-1820 | |
050 | 0 | |a QC350-467 | |
100 | 0 | |a Xiaogang Wang |e verfasserin |4 aut | |
245 | 1 | 0 | |a Optical Double Binary Amplitude Mask Structure for Security Authentication |
264 | 1 | |c 2016 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a A novel method for jointly designing two binary amplitude masks (BAMs) that allow for secure authentication is proposed. The speckle-noise diffraction pattern generated numerically from the input secret image encrypted by a random phase is binarized and further compressed. The resulting BAM can be separated into two desired BAMs, each of which does not visually render the primary information when applied for verification. Simulation results are presented to verify the validity and effectiveness of the proposed method. | ||
650 | 4 | |a Optical encryption and authentication | |
650 | 4 | |a sparsity constraints | |
650 | 4 | |a image analysis | |
653 | 0 | |a Applied optics. Photonics | |
653 | 0 | |a Optics. Light | |
700 | 0 | |a Guoquan Zhou |e verfasserin |4 aut | |
700 | 0 | |a Chaoqing Dai |e verfasserin |4 aut | |
773 | 0 | 8 | |i In |t IEEE Photonics Journal |d IEEE, 2015 |g 8(2016), 6, Seite 7 |w (DE-627)600310272 |w (DE-600)2495610-7 |x 19430655 |7 nnns |
773 | 1 | 8 | |g volume:8 |g year:2016 |g number:6 |g pages:7 |
856 | 4 | 0 | |u https://doi.org/10.1109/JPHOT.2016.2628798 |z kostenfrei |
856 | 4 | 0 | |u https://doaj.org/article/84a02b02e1714e40a7e0a8da8859ef69 |z kostenfrei |
856 | 4 | 0 | |u https://ieeexplore.ieee.org/document/7744599/ |z kostenfrei |
856 | 4 | 2 | |u https://doaj.org/toc/1943-0655 |y Journal toc |z kostenfrei |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_DOAJ | ||
912 | |a GBV_ILN_20 | ||
912 | |a GBV_ILN_22 | ||
912 | |a GBV_ILN_23 | ||
912 | |a GBV_ILN_24 | ||
912 | |a GBV_ILN_39 | ||
912 | |a GBV_ILN_40 | ||
912 | |a GBV_ILN_60 | ||
912 | |a GBV_ILN_62 | ||
912 | |a GBV_ILN_63 | ||
912 | |a GBV_ILN_65 | ||
912 | |a GBV_ILN_69 | ||
912 | |a GBV_ILN_70 | ||
912 | |a GBV_ILN_73 | ||
912 | |a GBV_ILN_95 | ||
912 | |a GBV_ILN_105 | ||
912 | |a GBV_ILN_110 | ||
912 | |a GBV_ILN_151 | ||
912 | |a GBV_ILN_161 | ||
912 | |a GBV_ILN_170 | ||
912 | |a GBV_ILN_213 | ||
912 | |a GBV_ILN_230 | ||
912 | |a GBV_ILN_285 | ||
912 | |a GBV_ILN_293 | ||
912 | |a GBV_ILN_370 | ||
912 | |a GBV_ILN_602 | ||
912 | |a GBV_ILN_2003 | ||
912 | |a GBV_ILN_2014 | ||
912 | |a GBV_ILN_4012 | ||
912 | |a GBV_ILN_4037 | ||
912 | |a GBV_ILN_4112 | ||
912 | |a GBV_ILN_4125 | ||
912 | |a GBV_ILN_4126 | ||
912 | |a GBV_ILN_4249 | ||
912 | |a GBV_ILN_4305 | ||
912 | |a GBV_ILN_4306 | ||
912 | |a GBV_ILN_4307 | ||
912 | |a GBV_ILN_4313 | ||
912 | |a GBV_ILN_4322 | ||
912 | |a GBV_ILN_4323 | ||
912 | |a GBV_ILN_4324 | ||
912 | |a GBV_ILN_4325 | ||
912 | |a GBV_ILN_4335 | ||
912 | |a GBV_ILN_4338 | ||
912 | |a GBV_ILN_4367 | ||
912 | |a GBV_ILN_4700 | ||
951 | |a AR | ||
952 | |d 8 |j 2016 |e 6 |h 7 |
author_variant |
x w xw g z gz c d cd |
---|---|
matchkey_str |
article:19430655:2016----::piadulbnrapiueaktutrfreu |
hierarchy_sort_str |
2016 |
callnumber-subject-code |
TA |
publishDate |
2016 |
allfields |
10.1109/JPHOT.2016.2628798 doi (DE-627)DOAJ007058462 (DE-599)DOAJ84a02b02e1714e40a7e0a8da8859ef69 DE-627 ger DE-627 rakwb eng TA1501-1820 QC350-467 Xiaogang Wang verfasserin aut Optical Double Binary Amplitude Mask Structure for Security Authentication 2016 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier A novel method for jointly designing two binary amplitude masks (BAMs) that allow for secure authentication is proposed. The speckle-noise diffraction pattern generated numerically from the input secret image encrypted by a random phase is binarized and further compressed. The resulting BAM can be separated into two desired BAMs, each of which does not visually render the primary information when applied for verification. Simulation results are presented to verify the validity and effectiveness of the proposed method. Optical encryption and authentication sparsity constraints image analysis Applied optics. Photonics Optics. Light Guoquan Zhou verfasserin aut Chaoqing Dai verfasserin aut In IEEE Photonics Journal IEEE, 2015 8(2016), 6, Seite 7 (DE-627)600310272 (DE-600)2495610-7 19430655 nnns volume:8 year:2016 number:6 pages:7 https://doi.org/10.1109/JPHOT.2016.2628798 kostenfrei https://doaj.org/article/84a02b02e1714e40a7e0a8da8859ef69 kostenfrei https://ieeexplore.ieee.org/document/7744599/ kostenfrei https://doaj.org/toc/1943-0655 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2003 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 8 2016 6 7 |
spelling |
10.1109/JPHOT.2016.2628798 doi (DE-627)DOAJ007058462 (DE-599)DOAJ84a02b02e1714e40a7e0a8da8859ef69 DE-627 ger DE-627 rakwb eng TA1501-1820 QC350-467 Xiaogang Wang verfasserin aut Optical Double Binary Amplitude Mask Structure for Security Authentication 2016 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier A novel method for jointly designing two binary amplitude masks (BAMs) that allow for secure authentication is proposed. The speckle-noise diffraction pattern generated numerically from the input secret image encrypted by a random phase is binarized and further compressed. The resulting BAM can be separated into two desired BAMs, each of which does not visually render the primary information when applied for verification. Simulation results are presented to verify the validity and effectiveness of the proposed method. Optical encryption and authentication sparsity constraints image analysis Applied optics. Photonics Optics. Light Guoquan Zhou verfasserin aut Chaoqing Dai verfasserin aut In IEEE Photonics Journal IEEE, 2015 8(2016), 6, Seite 7 (DE-627)600310272 (DE-600)2495610-7 19430655 nnns volume:8 year:2016 number:6 pages:7 https://doi.org/10.1109/JPHOT.2016.2628798 kostenfrei https://doaj.org/article/84a02b02e1714e40a7e0a8da8859ef69 kostenfrei https://ieeexplore.ieee.org/document/7744599/ kostenfrei https://doaj.org/toc/1943-0655 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2003 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 8 2016 6 7 |
allfields_unstemmed |
10.1109/JPHOT.2016.2628798 doi (DE-627)DOAJ007058462 (DE-599)DOAJ84a02b02e1714e40a7e0a8da8859ef69 DE-627 ger DE-627 rakwb eng TA1501-1820 QC350-467 Xiaogang Wang verfasserin aut Optical Double Binary Amplitude Mask Structure for Security Authentication 2016 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier A novel method for jointly designing two binary amplitude masks (BAMs) that allow for secure authentication is proposed. The speckle-noise diffraction pattern generated numerically from the input secret image encrypted by a random phase is binarized and further compressed. The resulting BAM can be separated into two desired BAMs, each of which does not visually render the primary information when applied for verification. Simulation results are presented to verify the validity and effectiveness of the proposed method. Optical encryption and authentication sparsity constraints image analysis Applied optics. Photonics Optics. Light Guoquan Zhou verfasserin aut Chaoqing Dai verfasserin aut In IEEE Photonics Journal IEEE, 2015 8(2016), 6, Seite 7 (DE-627)600310272 (DE-600)2495610-7 19430655 nnns volume:8 year:2016 number:6 pages:7 https://doi.org/10.1109/JPHOT.2016.2628798 kostenfrei https://doaj.org/article/84a02b02e1714e40a7e0a8da8859ef69 kostenfrei https://ieeexplore.ieee.org/document/7744599/ kostenfrei https://doaj.org/toc/1943-0655 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2003 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 8 2016 6 7 |
allfieldsGer |
10.1109/JPHOT.2016.2628798 doi (DE-627)DOAJ007058462 (DE-599)DOAJ84a02b02e1714e40a7e0a8da8859ef69 DE-627 ger DE-627 rakwb eng TA1501-1820 QC350-467 Xiaogang Wang verfasserin aut Optical Double Binary Amplitude Mask Structure for Security Authentication 2016 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier A novel method for jointly designing two binary amplitude masks (BAMs) that allow for secure authentication is proposed. The speckle-noise diffraction pattern generated numerically from the input secret image encrypted by a random phase is binarized and further compressed. The resulting BAM can be separated into two desired BAMs, each of which does not visually render the primary information when applied for verification. Simulation results are presented to verify the validity and effectiveness of the proposed method. Optical encryption and authentication sparsity constraints image analysis Applied optics. Photonics Optics. Light Guoquan Zhou verfasserin aut Chaoqing Dai verfasserin aut In IEEE Photonics Journal IEEE, 2015 8(2016), 6, Seite 7 (DE-627)600310272 (DE-600)2495610-7 19430655 nnns volume:8 year:2016 number:6 pages:7 https://doi.org/10.1109/JPHOT.2016.2628798 kostenfrei https://doaj.org/article/84a02b02e1714e40a7e0a8da8859ef69 kostenfrei https://ieeexplore.ieee.org/document/7744599/ kostenfrei https://doaj.org/toc/1943-0655 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2003 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 8 2016 6 7 |
allfieldsSound |
10.1109/JPHOT.2016.2628798 doi (DE-627)DOAJ007058462 (DE-599)DOAJ84a02b02e1714e40a7e0a8da8859ef69 DE-627 ger DE-627 rakwb eng TA1501-1820 QC350-467 Xiaogang Wang verfasserin aut Optical Double Binary Amplitude Mask Structure for Security Authentication 2016 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier A novel method for jointly designing two binary amplitude masks (BAMs) that allow for secure authentication is proposed. The speckle-noise diffraction pattern generated numerically from the input secret image encrypted by a random phase is binarized and further compressed. The resulting BAM can be separated into two desired BAMs, each of which does not visually render the primary information when applied for verification. Simulation results are presented to verify the validity and effectiveness of the proposed method. Optical encryption and authentication sparsity constraints image analysis Applied optics. Photonics Optics. Light Guoquan Zhou verfasserin aut Chaoqing Dai verfasserin aut In IEEE Photonics Journal IEEE, 2015 8(2016), 6, Seite 7 (DE-627)600310272 (DE-600)2495610-7 19430655 nnns volume:8 year:2016 number:6 pages:7 https://doi.org/10.1109/JPHOT.2016.2628798 kostenfrei https://doaj.org/article/84a02b02e1714e40a7e0a8da8859ef69 kostenfrei https://ieeexplore.ieee.org/document/7744599/ kostenfrei https://doaj.org/toc/1943-0655 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2003 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 8 2016 6 7 |
language |
English |
source |
In IEEE Photonics Journal 8(2016), 6, Seite 7 volume:8 year:2016 number:6 pages:7 |
sourceStr |
In IEEE Photonics Journal 8(2016), 6, Seite 7 volume:8 year:2016 number:6 pages:7 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
Optical encryption and authentication sparsity constraints image analysis Applied optics. Photonics Optics. Light |
isfreeaccess_bool |
true |
container_title |
IEEE Photonics Journal |
authorswithroles_txt_mv |
Xiaogang Wang @@aut@@ Guoquan Zhou @@aut@@ Chaoqing Dai @@aut@@ |
publishDateDaySort_date |
2016-01-01T00:00:00Z |
hierarchy_top_id |
600310272 |
id |
DOAJ007058462 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">DOAJ007058462</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230309212159.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230225s2016 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1109/JPHOT.2016.2628798</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)DOAJ007058462</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DOAJ84a02b02e1714e40a7e0a8da8859ef69</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TA1501-1820</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QC350-467</subfield></datafield><datafield tag="100" ind1="0" ind2=" "><subfield code="a">Xiaogang Wang</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Optical Double Binary Amplitude Mask Structure for Security Authentication</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2016</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">A novel method for jointly designing two binary amplitude masks (BAMs) that allow for secure authentication is proposed. The speckle-noise diffraction pattern generated numerically from the input secret image encrypted by a random phase is binarized and further compressed. The resulting BAM can be separated into two desired BAMs, each of which does not visually render the primary information when applied for verification. Simulation results are presented to verify the validity and effectiveness of the proposed method.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Optical encryption and authentication</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">sparsity constraints</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">image analysis</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Applied optics. Photonics</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Optics. Light</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Guoquan Zhou</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Chaoqing Dai</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">In</subfield><subfield code="t">IEEE Photonics Journal</subfield><subfield code="d">IEEE, 2015</subfield><subfield code="g">8(2016), 6, Seite 7</subfield><subfield code="w">(DE-627)600310272</subfield><subfield code="w">(DE-600)2495610-7</subfield><subfield code="x">19430655</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:8</subfield><subfield code="g">year:2016</subfield><subfield code="g">number:6</subfield><subfield code="g">pages:7</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1109/JPHOT.2016.2628798</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doaj.org/article/84a02b02e1714e40a7e0a8da8859ef69</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ieeexplore.ieee.org/document/7744599/</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">https://doaj.org/toc/1943-0655</subfield><subfield code="y">Journal toc</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_DOAJ</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_39</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_105</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_161</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_170</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_213</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_230</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_285</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_293</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_602</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2003</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4012</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4126</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4249</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4306</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4323</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4325</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4335</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4338</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4367</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">8</subfield><subfield code="j">2016</subfield><subfield code="e">6</subfield><subfield code="h">7</subfield></datafield></record></collection>
|
callnumber-first |
T - Technology |
author |
Xiaogang Wang |
spellingShingle |
Xiaogang Wang misc TA1501-1820 misc QC350-467 misc Optical encryption and authentication misc sparsity constraints misc image analysis misc Applied optics. Photonics misc Optics. Light Optical Double Binary Amplitude Mask Structure for Security Authentication |
authorStr |
Xiaogang Wang |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)600310272 |
format |
electronic Article |
delete_txt_mv |
keep |
author_role |
aut aut aut |
collection |
DOAJ |
remote_str |
true |
callnumber-label |
TA1501-1820 |
illustrated |
Not Illustrated |
issn |
19430655 |
topic_title |
TA1501-1820 QC350-467 Optical Double Binary Amplitude Mask Structure for Security Authentication Optical encryption and authentication sparsity constraints image analysis |
topic |
misc TA1501-1820 misc QC350-467 misc Optical encryption and authentication misc sparsity constraints misc image analysis misc Applied optics. Photonics misc Optics. Light |
topic_unstemmed |
misc TA1501-1820 misc QC350-467 misc Optical encryption and authentication misc sparsity constraints misc image analysis misc Applied optics. Photonics misc Optics. Light |
topic_browse |
misc TA1501-1820 misc QC350-467 misc Optical encryption and authentication misc sparsity constraints misc image analysis misc Applied optics. Photonics misc Optics. Light |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
cr |
hierarchy_parent_title |
IEEE Photonics Journal |
hierarchy_parent_id |
600310272 |
hierarchy_top_title |
IEEE Photonics Journal |
isfreeaccess_txt |
true |
familylinks_str_mv |
(DE-627)600310272 (DE-600)2495610-7 |
title |
Optical Double Binary Amplitude Mask Structure for Security Authentication |
ctrlnum |
(DE-627)DOAJ007058462 (DE-599)DOAJ84a02b02e1714e40a7e0a8da8859ef69 |
title_full |
Optical Double Binary Amplitude Mask Structure for Security Authentication |
author_sort |
Xiaogang Wang |
journal |
IEEE Photonics Journal |
journalStr |
IEEE Photonics Journal |
callnumber-first-code |
T |
lang_code |
eng |
isOA_bool |
true |
recordtype |
marc |
publishDateSort |
2016 |
contenttype_str_mv |
txt |
container_start_page |
7 |
author_browse |
Xiaogang Wang Guoquan Zhou Chaoqing Dai |
container_volume |
8 |
class |
TA1501-1820 QC350-467 |
format_se |
Elektronische Aufsätze |
author-letter |
Xiaogang Wang |
doi_str_mv |
10.1109/JPHOT.2016.2628798 |
author2-role |
verfasserin |
title_sort |
optical double binary amplitude mask structure for security authentication |
callnumber |
TA1501-1820 |
title_auth |
Optical Double Binary Amplitude Mask Structure for Security Authentication |
abstract |
A novel method for jointly designing two binary amplitude masks (BAMs) that allow for secure authentication is proposed. The speckle-noise diffraction pattern generated numerically from the input secret image encrypted by a random phase is binarized and further compressed. The resulting BAM can be separated into two desired BAMs, each of which does not visually render the primary information when applied for verification. Simulation results are presented to verify the validity and effectiveness of the proposed method. |
abstractGer |
A novel method for jointly designing two binary amplitude masks (BAMs) that allow for secure authentication is proposed. The speckle-noise diffraction pattern generated numerically from the input secret image encrypted by a random phase is binarized and further compressed. The resulting BAM can be separated into two desired BAMs, each of which does not visually render the primary information when applied for verification. Simulation results are presented to verify the validity and effectiveness of the proposed method. |
abstract_unstemmed |
A novel method for jointly designing two binary amplitude masks (BAMs) that allow for secure authentication is proposed. The speckle-noise diffraction pattern generated numerically from the input secret image encrypted by a random phase is binarized and further compressed. The resulting BAM can be separated into two desired BAMs, each of which does not visually render the primary information when applied for verification. Simulation results are presented to verify the validity and effectiveness of the proposed method. |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2003 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 |
container_issue |
6 |
title_short |
Optical Double Binary Amplitude Mask Structure for Security Authentication |
url |
https://doi.org/10.1109/JPHOT.2016.2628798 https://doaj.org/article/84a02b02e1714e40a7e0a8da8859ef69 https://ieeexplore.ieee.org/document/7744599/ https://doaj.org/toc/1943-0655 |
remote_bool |
true |
author2 |
Guoquan Zhou Chaoqing Dai |
author2Str |
Guoquan Zhou Chaoqing Dai |
ppnlink |
600310272 |
callnumber-subject |
TA - General and Civil Engineering |
mediatype_str_mv |
c |
isOA_txt |
true |
hochschulschrift_bool |
false |
doi_str |
10.1109/JPHOT.2016.2628798 |
callnumber-a |
TA1501-1820 |
up_date |
2024-07-04T00:06:44.741Z |
_version_ |
1803604831493947392 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">DOAJ007058462</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230309212159.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230225s2016 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1109/JPHOT.2016.2628798</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)DOAJ007058462</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DOAJ84a02b02e1714e40a7e0a8da8859ef69</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TA1501-1820</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QC350-467</subfield></datafield><datafield tag="100" ind1="0" ind2=" "><subfield code="a">Xiaogang Wang</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Optical Double Binary Amplitude Mask Structure for Security Authentication</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2016</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">A novel method for jointly designing two binary amplitude masks (BAMs) that allow for secure authentication is proposed. The speckle-noise diffraction pattern generated numerically from the input secret image encrypted by a random phase is binarized and further compressed. The resulting BAM can be separated into two desired BAMs, each of which does not visually render the primary information when applied for verification. Simulation results are presented to verify the validity and effectiveness of the proposed method.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Optical encryption and authentication</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">sparsity constraints</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">image analysis</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Applied optics. Photonics</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Optics. Light</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Guoquan Zhou</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Chaoqing Dai</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">In</subfield><subfield code="t">IEEE Photonics Journal</subfield><subfield code="d">IEEE, 2015</subfield><subfield code="g">8(2016), 6, Seite 7</subfield><subfield code="w">(DE-627)600310272</subfield><subfield code="w">(DE-600)2495610-7</subfield><subfield code="x">19430655</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:8</subfield><subfield code="g">year:2016</subfield><subfield code="g">number:6</subfield><subfield code="g">pages:7</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1109/JPHOT.2016.2628798</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doaj.org/article/84a02b02e1714e40a7e0a8da8859ef69</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ieeexplore.ieee.org/document/7744599/</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">https://doaj.org/toc/1943-0655</subfield><subfield code="y">Journal toc</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_DOAJ</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_39</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_105</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_161</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_170</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_213</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_230</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_285</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_293</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_602</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2003</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4012</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4126</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4249</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4306</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4323</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4325</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4335</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4338</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4367</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">8</subfield><subfield code="j">2016</subfield><subfield code="e">6</subfield><subfield code="h">7</subfield></datafield></record></collection>
|
score |
7.4001293 |