2014
DOI: 10.1364/aop.6.000120
|View full text |Cite
|
Sign up to set email alerts
|

Advances in optical security systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
199
0
3

Year Published

2015
2015
2023
2023

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 463 publications
(208 citation statements)
references
References 95 publications
0
199
0
3
Order By: Relevance
“…using Equation (6). The sparse pixels x i selected by this operation, that is, those with non-zero photons l i ≠ 0 ( ), are also those whose phase value ϕ ψ x i ; n ( ) will be taken with n -bit resolution to generate a phase-only photon-limited encrypted function ψ ph x ( ) .…”
Section: Photon-counting Imaging Techniquementioning
confidence: 99%
See 2 more Smart Citations
“…using Equation (6). The sparse pixels x i selected by this operation, that is, those with non-zero photons l i ≠ 0 ( ), are also those whose phase value ϕ ψ x i ; n ( ) will be taken with n -bit resolution to generate a phase-only photon-limited encrypted function ψ ph x ( ) .…”
Section: Photon-counting Imaging Techniquementioning
confidence: 99%
“…Optical processing systems have been proposed for a number of security applications, including encryptiondecryption, authentication, and anti-counterfeiting of a number of primary images, from one in the most common case, up to four in the case of multifactor authentication [1][2][3][4][5][6]. They benefit from parallel processing, multiple degrees of freedom (such as amplitude, phase, wavelength, and polarization of light), high storage capacity and use of biometrics data such as, for instance, fingerprints, iris and retina.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…[1][2][3][4][5][6][7][8] Optical security includes numerous parameters for encryption including wavelength, phase information, spatial frequency and polarization of light. Several optical encryption techniques have been suggested with the aim to broaden the research area of information security 3,4,5,6 . Among them, Réfrégier and Javidi proposed a forefather optical encryption method based on a double random phase encoding (DRPE) 7 .…”
Section: Introductionmentioning
confidence: 99%
“…Especially since the double random-phase encryption method [1] was proposed, all kinds of random-phase encoding (RPE) schemes based on diffraction or interference principles have been booming [2][3][4][5][6][7][8][9][10][11][12][13]. As the accompanying complementary opposites, the corresponding security analyses have also been carried out and have promoted the further development of optical encryption techniques [14][15][16][17][18].…”
Section: Introductionmentioning
confidence: 99%