2017
DOI: 10.1364/ol.42.002774
|View full text |Cite
|
Sign up to set email alerts
|

Low photon count based digital holography for quadratic phase cryptography

Abstract: Recently, the vulnerability of the linear canonical transform-based double random phase encryption system to attack has been demonstrated. To alleviate this, we present for the first time, to the best of our knowledge, a method for securing a two-dimensional scene using a quadratic phase encoding system operating in the photon-counted imaging (PCI) regime. Position-phase-shifting digital holography is applied to record the photon-limited encrypted complex samples. The reconstruction of the complex wavefront in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
16
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
1
1

Relationship

2
6

Authors

Journals

citations
Cited by 30 publications
(16 citation statements)
references
References 21 publications
0
16
0
Order By: Relevance
“…To note, the RPMs apply the random phases 𝑒π‘₯𝑝{𝑗2πœ‹π‘› 1 (π‘₯, 𝑦)} and 𝑒π‘₯𝑝{𝑗2πœ‹π‘› 2 (π‘₯, 𝑦)} which are statistically independent but uniformly distributed in [0, 1]. Mathematically, the encrypted (output) image 𝐸(πœ”, πœ‘) can be expressed as follows [14]:…”
Section: Linear Canonical Transform Based Double Random Phase Encodingmentioning
confidence: 99%
See 1 more Smart Citation
“…To note, the RPMs apply the random phases 𝑒π‘₯𝑝{𝑗2πœ‹π‘› 1 (π‘₯, 𝑦)} and 𝑒π‘₯𝑝{𝑗2πœ‹π‘› 2 (π‘₯, 𝑦)} which are statistically independent but uniformly distributed in [0, 1]. Mathematically, the encrypted (output) image 𝐸(πœ”, πœ‘) can be expressed as follows [14]:…”
Section: Linear Canonical Transform Based Double Random Phase Encodingmentioning
confidence: 99%
“…Since it's initial inception, DRPE i.e., Fourier transform based encryption, several other variations have also been examined that includes Fresnel transform (FST) [8], Fractional Fourier transform (FrFT) [9], Hartley Transform (HT) [10], and Linear Canonical Transform (LCT) [11]. In addition to these, some new types of encryption systems have also been demonstrated such as compressive sensingbased encryption [12], 4D light field based microscopic encryption [13], and photons-counting imaging based optical encryption [14], to cite a few. In general, it is known that the robustness of a crypto system relies on the secret key that is being used and the randomness of ciphertext it generates.…”
Section: Introductionmentioning
confidence: 99%
“…Thus, by employing inverse keys i.e., O * 1 (βˆ’x, βˆ’y) and O * 2 (βˆ’x, βˆ’y) and input image f(x,y) can be retrieved without a loss. To record a complex encrypted data an optical holographic imaging setup is preferred [14,4].…”
Section: Double Random Phase Encodingmentioning
confidence: 99%
“…Since the first inception of the classical DRPE i.e., Fourier transform based encryption, several variations have also been proposed that includes Fresnel transform (FST) [8], Fractional Fourier transform (FrFT) [9], Hartley Transform (HT) [10], and Linear Canonical Transform (LCT) [11]. In addition to this, some new types of encryption systems such as compressive sensing based encryption [12], 4D light field based microscopic encryption [13], and photons-counting imaging based optical encryption [14] have also been demonstrated.…”
Section: Introductionmentioning
confidence: 99%
“…Meanwhile, various optical transforms such as fractional Fourier transform, Fresnel transform, gyrator transform, and other means have been applied, where additional parameters can be considered the secret keys to enhance the level of security [16][17][18][19][20][21][22][23][24][25][26][27][28]. Due to its novel physical characteristics such as the complexity of its optical parameters, the ghost imaging technique can provide a promising alternative for the optical cryptosystem [29][30][31][32][33].…”
Section: Introductionmentioning
confidence: 99%