2017
DOI: 10.1016/j.optcom.2017.06.046
|View full text |Cite
|
Sign up to set email alerts
|

Encryption method based on pseudo random spatial light modulation for single-fibre data transmission

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 38 publications
0
3
0
Order By: Relevance
“…Signal encryption is particularly important for secure signal transmission in the communication field. [ 50 ] Benefiting from the high sensitivity of the NPTs, a promising application as UV light encoders is explored. Figure a shows the schematic diagram of light encryption process of the UV light encoder.…”
Section: Resultsmentioning
confidence: 99%
“…Signal encryption is particularly important for secure signal transmission in the communication field. [ 50 ] Benefiting from the high sensitivity of the NPTs, a promising application as UV light encoders is explored. Figure a shows the schematic diagram of light encryption process of the UV light encoder.…”
Section: Resultsmentioning
confidence: 99%
“…As for encryption of time-varying signals, the spatial DRPE technique and its variations need time-to-space and space-totime coupling [19][20][21][22][23], or conversion of time-varying signals to spatial images [24], which induces relatively larger system complexity, insertion loss, and performance instability than pure time-domain schemes. Fortunately, the space-time duality [25] provides a framework to design temporal counterparts [26][27][28][29] of those spatial optical encryption schemes specifically for protection of time-varying signals, by replacing thin lenses, free-space diffractions, and plane masks with time lenses, dispersion elements, and time masks, respectively.…”
Section: Introductionmentioning
confidence: 99%
“…Most of these applications perform over public networks, while some of these data are effective or very important in terms of the user point of view [10]. Therefore, security techniques are very important to protect data from unauthorized users [11]. The standard solutions for the data security are cryptography and steganography.…”
Section: Introductionmentioning
confidence: 99%