2021
DOI: 10.1088/2040-8986/ac2463
|View full text |Cite
|
Sign up to set email alerts
|

A review of single and multiple optical image encryption techniques

Abstract: Secure communication is of great importance in the modern world. Many methods, techniques, and systems are used for secure communication, many of which cannot be used in applications due to various reasons. Optical methods have been developed for secure communication in the last 25 years. In this study, optical encryption methods are examined in three sections. In the first section, single image optical encryption techniques are analyzed, while in the second section, multiple-image optical encryption technique… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 39 publications
(14 citation statements)
references
References 101 publications
0
9
0
Order By: Relevance
“…The Optical Encryption (OE) process treats the image directly as a twodimensional (2D) object and therefore, it does not use image digitization as done in the Digital Encryption (DE) counterpart [5] [6]. Further, OE methods have some characteristic features due to the used optical devices [7] [8]. For example, the amplitude and phase information of all image pixels can be processed simultaneously.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The Optical Encryption (OE) process treats the image directly as a twodimensional (2D) object and therefore, it does not use image digitization as done in the Digital Encryption (DE) counterpart [5] [6]. Further, OE methods have some characteristic features due to the used optical devices [7] [8]. For example, the amplitude and phase information of all image pixels can be processed simultaneously.…”
Section: Introductionmentioning
confidence: 99%
“…Further, image encryption can be processed in various matrix spaces such as phase and polarization, which offers additional security level and reliability. The general structure of OE schemes consists of lasers, spatial light modulators (SLMs), lenses, beam splitters, and detectors [7] as shown in Fig. 1.…”
Section: Introductionmentioning
confidence: 99%
“…The rapid growth of the consumer market raises a problem for protecting personal information and goods from counterfeiting, thus forming a new direction in material science and digital technology to encrypt the information. One of the promising solutions, combining new materials and encryption technologies, is optical information encryption, since it is a quite fast, remote, safe (including for human health), and low-energy-consumptive approach. In most cases, optically active or photoluminescent inorganic, organic, and hybrid materials are utilized for optical encryption through a change in their color or photoluminescent (PL) signal. However, the design and fabrication of the optical security marks on arbitrary surfaces with PL decoding, allowing also a human contact, is still in its infancy.…”
Section: Introductionmentioning
confidence: 99%
“…[2] It is very necessary to encrypt the text image for security protection. [3,4] To our knowledge, there are three typical ways to achieve image encryption, including fluorescent material-based encryption, [5][6][7][8] computer cryptology, [9][10][11][12][13] and optical encryption, [14][15][16][17][18][19][20][21] while these techniques hardly satisfy the high-speed encryption requirements of information acquisition and online communication. The information encryption using fluorescent materials is limited to hard copy such as paper-based images.…”
Section: Introductionmentioning
confidence: 99%
“…[6,22,23] Although computer cryptology is effective to encrypt digital images, the efficiency is easily limited by the computer and algorithm. [9][10][11][12][13] Because most of the optical encryption techniques strongly rely on precision equipment or micro-/nanofabrication techniques, it is very difficult to integrate the setups with mobile devices [15] or fabricate micro-/nanostructures. [16][17][18][19] Therefore, it has been much desired to develop a simple and rapid way to encrypt digital images efficiently.…”
Section: Introductionmentioning
confidence: 99%