Roadmap on optical security
Abstract Information security and authentication are important challenges facing society.
Recent attacks by hackers on the databases of large commercial and financial companies have …
Recent attacks by hackers on the databases of large commercial and financial companies have …
[BOOK][B] Optical cryptosystems
NK Nishchal - 2019 - iopscience.iop.org
… [13] Javidi B et al 2016 Roadmap on optical security J. Opt. … [13] Javidi B et al 2016 Roadmap
on optical security J. Opt. 18 … [8] Javidi B et al 2016 Roadmap on optical security J. Opt. 18 …
on optical security J. Opt. 18 … [8] Javidi B et al 2016 Roadmap on optical security J. Opt. 18 …
Advanced 4f-based free-space optical system
Here, we introduce a framework leveraging a free-space optical system based on the 4f
configuration, inspired by the SWIFFT algorithms, designed to significantly enhance the …
configuration, inspired by the SWIFFT algorithms, designed to significantly enhance the …
Optical security and authentication using nanoscale and thin-film structures
A Carnicer, B Javidi - Advances in Optics and Photonics, 2017 - opg.optica.org
Authentication of encoded information is a popular current trend in optical security. Recent
research has proposed the production of secure unclonable ID tags and devices with the use …
research has proposed the production of secure unclonable ID tags and devices with the use …
[PDF][PDF] Roadmap on optical security: Optical encryption by computational ghost imaging
E Tajahuerce, J Lancis - 2016 - repositori.uji.es
… The roadmap on optical security is comprised of six categories that together include 16
short sections written by authors who have made relevant contributions in this field. The first …
short sections written by authors who have made relevant contributions in this field. The first …
Optical information authentication using optical encryption and sparsity constraint
Recent advances indicate that optical encryption can be used not only for signal secrecy but
also for information authentication. By integrating optical encryption with a sparsity constraint…
also for information authentication. By integrating optical encryption with a sparsity constraint…
Secure Optical Encryption Technique for Real Time Security Related Applications-A Review
L Anusree, MA Rahiman - Turkish Journal of Computer and …, 2021 - search.proquest.com
Recent development in the digital system shows that data security is most important and that
optical encryption can be used not only to keep signals confidential but also to authenticate …
optical encryption can be used not only to keep signals confidential but also to authenticate …
Research on optical security based on simulated noise induced encryption scheme
S Wang, Z Zou, T Xing, J Wang, Z Wang… - Journal of Physics …, 2019 - iopscience.iop.org
The security of a noise-induced optical encryption scheme with two dimensional keys is
examined by a series of statistical analysis. We introduce the cross correlation function (CCF) …
examined by a series of statistical analysis. We introduce the cross correlation function (CCF) …
[CITATION][C] Roadmap on Optical Security
A Alfalou, C Brosseau - Journal of Optics, 2015 - hal.science
Roadmap on Optical Security - Archive ouverte HAL …
Experimental research on optical image encryption system based on joint Fresnel transform correlator
S Dou, X Shen, B Zhou, L Wang, C Lin - Optics & Laser Technology, 2019 - Elsevier
Optical image encryption system based on joint Fresnel transform correlator is experimentally
researched. Factors affecting decrypted image quality are analyzed, and measures of …
researched. Factors affecting decrypted image quality are analyzed, and measures of …
Related searches
- ghost imaging roadmap on optical security
- optical security verification
- near field processes optical security
- encryption scheme optical security
- special section optical security
- thin film optical security
- optical layer security
- optical cryptography security enhancement
- physical layer security evolving optical networks
- information security optical and digital techniques
- information security optical image encryption techniques
- optical access networks security issues