Abstract
We explain the vulnerability of the phase-only encryption procedure suggested by Seo and Kim [Opt. Lett. 28, 304 (2003)] and clarify issues regarding its robustness and degree of security compared with those of a previously reported phase-only encryption method.
© 2003 Optical Society of America
Full Article | PDF ArticleMore Like This
Dong-Hoan Seo and Soo-Joong Kim
Opt. Lett. 28(13) 1077-1077 (2003)
Dong-Hoan Seo and Soo-Joong Kim
Opt. Lett. 28(5) 304-306 (2003)
José A. Ferrari and Eugenio Garbusi
Opt. Lett. 29(11) 1257-1258 (2004)