2006
DOI: 10.1016/j.optcom.2005.11.055
|View full text |Cite
|
Sign up to set email alerts
|

Multiple image encryption using an aperture-modulated optical system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
21
0
1

Year Published

2009
2009
2023
2023

Publication Types

Select...
6
2
1

Relationship

2
7

Authors

Journals

citations
Cited by 62 publications
(22 citation statements)
references
References 14 publications
0
21
0
1
Order By: Relevance
“…It is the latter that will be investigated here. These encryption techniques originate in the optical image processing community and continue to pose many challenges in several areas [71][72][73][74][75][76][77][78][79][80][81][82][83][84][85][86][87][88][89], e.g., double random phase, digital holography in the Fourier and Fresnel domains, multiplexing, polarized light, and interferometric techniques.…”
Section: Optical Image Encryption Methodsmentioning
confidence: 99%
“…It is the latter that will be investigated here. These encryption techniques originate in the optical image processing community and continue to pose many challenges in several areas [71][72][73][74][75][76][77][78][79][80][81][82][83][84][85][86][87][88][89], e.g., double random phase, digital holography in the Fourier and Fresnel domains, multiplexing, polarized light, and interferometric techniques.…”
Section: Optical Image Encryption Methodsmentioning
confidence: 99%
“…Su gran confiabilidad se basa principalmente en la utilización de un difusor (vidrio despulido que es un elemento aleatorio y físico), ya que a este tipo de llaves no se le pueden definir parámetros como el tamaño de píxel o el número de píxeles, y no presentan un número definido y limitado de variaciones de fase. Además, los grados de libertad del sistema experimental pueden actuar como llaves de seguridad adicionales; se ha demostrado que longitud de onda (Matoba & Javidi, 1999), la pupila del sistema óptico (Barrera, et al, 2006b) o la polarización (Barrera, et al, 2006a) hacen las veces de llaves complementarias. Por lo tanto, para recuperar la información original un usuario autorizado deberá poseer la información de la llave aleatoria y física, y las llaves de seguridad adicionales, estas últimas permitiendo que la seguridad global del sistema se incremente.…”
Section: Introductionunclassified
“…This procedure brings the chance for storing multiple messages in a single recording medium. As examples of applications in the classical 4f scheme, we may mention many multiplexing techniques to store multitude of images, for instance into a single crystal, without crosstalk, including angular [3], wavelength [4], shift [5], polarization [6], and multi-aperture multiplexing [7]. We also find an interesting encryption proposal using an in-plane rotation of random phase diffusers constituting a sandwich diffuser at the Fourier plane of a 4f encoding system [8].…”
Section: Introductionmentioning
confidence: 99%