2013
DOI: 10.1088/2040-8978/15/12/125403
|View full text |Cite
|
Sign up to set email alerts
|

Experimental imaging coding system using three-dimensional subjective speckle structures

Abstract: We propose, and experimentally demonstrate, an optical encoding system employing a three-dimensional subjective speckle distribution as a secure information carrier. An image mask (containing the information to be sent) is illuminated by randomly distributed light. The outgoing wavefront reaches a lens, and thus three-dimensional subjective speckle distributions are generated in the normal direction of the scattering plane. These speckle structures are sampled by registering consecutive planes along the optica… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

2
11
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
5

Relationship

2
3

Authors

Journals

citations
Cited by 6 publications
(13 citation statements)
references
References 10 publications
2
11
0
Order By: Relevance
“…matches experimental results previously reported in [24,25] for the phase. Moreover, we studied the robustness of the system simulating information loss by partially occluding some of the image set composing the delocalized cyphertext.…”
Section: Simulated and Experimental Resultssupporting
confidence: 92%
See 4 more Smart Citations
“…matches experimental results previously reported in [24,25] for the phase. Moreover, we studied the robustness of the system simulating information loss by partially occluding some of the image set composing the delocalized cyphertext.…”
Section: Simulated and Experimental Resultssupporting
confidence: 92%
“…There exists an equivalence between the speckle patterns produced by the focus tunable lens at the plane of the CCD sensor and those registered at different positions in a free-space propagation. Therefore, the resistance to brute-force attacks of this architecture is analogous to the one appearing in [24]. Otherwise, the security will be compromised, like in other conventional systems [11][12][13][14][15][16][17][18], if an intruder has access to a subset of images belonging to the cyphertext and the optical parameters sent by different transmission channels as discussed in [24,25].…”
Section: Simulated and Experimental Resultsmentioning
confidence: 96%
See 3 more Smart Citations