2011
DOI: 10.1016/j.optcom.2011.01.052
|View full text |Cite
|
Sign up to set email alerts
|

Experimental multiplexing approach via code key rotations under a joint transform correlator scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
13
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 20 publications
(13 citation statements)
references
References 11 publications
0
13
0
Order By: Relevance
“…Figure 2c, d shows the decrypted binary images that were obtained by performing the "perfect" decryption process, i.e., without wavelength, propagation, and random phase mask errors. To evaluate the image quality, the twodimensional (2D) cross-correlation was calculated between both pairs of original and decrypted images as follows (Situ and Zhang 2004;Rueda et al 2011). …”
Section: Optical Encryption Of Multiple Images and Imbalance In The Imentioning
confidence: 99%
See 1 more Smart Citation
“…Figure 2c, d shows the decrypted binary images that were obtained by performing the "perfect" decryption process, i.e., without wavelength, propagation, and random phase mask errors. To evaluate the image quality, the twodimensional (2D) cross-correlation was calculated between both pairs of original and decrypted images as follows (Situ and Zhang 2004;Rueda et al 2011). …”
Section: Optical Encryption Of Multiple Images and Imbalance In The Imentioning
confidence: 99%
“…Optical encryption technologies have been extended through the emergence of various multiplexing schemes, including wavelength multiplexing (Situ and Zhang 2005), spatial shifting (Situ and Zhang 2006;Fredy Barrera et al 2006), low-correlation phase masks (Rueda et al 2011), modulated amplitude masks (Barrera et al 2006a), and polarization multiplexing (Barrera et al 2006b). …”
mentioning
confidence: 99%
“…This master key will be an additional security coding-mask when included in a conventional JTC encrypting architecture. In order to probe the potentiality of this new concept, in the next sections we will develop the optodigital procedure to carry out an encrypting protocol using the concept of master key; next we present two applications of the master key in a multiplexing procedure [17] and a subsampling technique [18].…”
Section: Master Keymentioning
confidence: 99%
“…We include a theoretical supporting section, along with a technical description of the method. Finally, we present two practical applications in encryption: one in a multiplexing process [17] and the other in a subsampling operation [18].…”
Section: Introductionmentioning
confidence: 99%
“…However, additional hardware is mandatory within certain systems, for example, multiplexing systems using multiple-wavelength illumination require multiple light source which may increase the system complexity and cost. Furthermore, mechanical or manual movements such as rotation multiplexing [13], angular multiplexing [14] etc. are unavoidable in some multiplexing techniques.…”
Section: Introductionmentioning
confidence: 99%