2011
DOI: 10.1364/oe.19.005706
|View full text |Cite
|
Sign up to set email alerts
|

All-optical encrypted movie

Abstract: We introduce for the first time the concept of an all-optical encrypted movie. This movie joints several encrypted frames corresponding to a time evolving situation employing the same encoding mask. Thanks to a multiplexing operation we compact the encrypted movie information into a single package. But the decryption of this single package implies the existence of cross-talk if we do not adequately pre-process the encoded information before multiplexing. In this regard, we introduce a grating modulation to eac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
46
0
5

Year Published

2012
2012
2017
2017

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 56 publications
(51 citation statements)
references
References 7 publications
0
46
0
5
Order By: Relevance
“…2, we sequentially show (a) the input object, (b) the encrypted object, (c) the result of decrypting but using an invalid key, and (d) the correct recovered object observing the inherent speckle noise all over the image. Obviously, the speckle noise is unavoidable when employing optical encryption with DRPE under any architecture, domain, or protocol [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19]. …”
Section: Optical Encryptionmentioning
confidence: 99%
See 1 more Smart Citation
“…2, we sequentially show (a) the input object, (b) the encrypted object, (c) the result of decrypting but using an invalid key, and (d) the correct recovered object observing the inherent speckle noise all over the image. Obviously, the speckle noise is unavoidable when employing optical encryption with DRPE under any architecture, domain, or protocol [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19]. …”
Section: Optical Encryptionmentioning
confidence: 99%
“…Either one or more input objects were analyzed developing what is called multiplexing alternatives [9][10][11][12]. Even the developing of an encrypted movie was addressed in theta modulation [13] or another alternative [14]. Validation and watermarking were also branches derived from the encrypting proposals [15,16].…”
Section: Introductionmentioning
confidence: 99%
“…Transferring information from sender to receiver has needed to be very confidential so encryption has become essential [1]. Optical techniques have appeared as effective practical tools in validating and securing information [2,3]. One of the most attractive advantages of optical systems is the possibility of providing many degrees of freedom to handle parameters such as phase, amplitude, and wavelength [4].…”
Section: Introductionmentioning
confidence: 99%
“…To overcome noise effects, several approaches have been proposed. In particular Henao et al [13] proposed a hybrid optodigital method, in which the position of the recovered object at the exit plane can be fully controlled, avoiding the background noise resulting from superposition of non-decrypted data over the recovered image. In addition, some efforts have been already made to provide techniques to efficiently reduce the amount of transmitted information avoiding cross talk, as required for modern applications.…”
mentioning
confidence: 99%
“…A FZP is a zone plate with a fractal structure constructed from a specific polyadic Cantor set [13]. As shown in Fig.…”
mentioning
confidence: 99%