2013
DOI: 10.1364/ol.38.001425
|View full text |Cite
|
Sign up to set email alerts
|

Optical image encryption via ptychography

Abstract: Ptychography is combined with optical image encryption for the first time. Due to the nature of ptychography, not only is the interferometric optical setup that is usually adopted not required any more, but also the encryption for a complex-valued image is achievable. Considering that the probes overlapping with each other is the crucial factor in ptychography, their complex-amplitude functions can serve as a kind of secret keys that lead to the enlarged key space and the enhanced system security. Further, sin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
57
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 196 publications
(58 citation statements)
references
References 11 publications
0
57
0
Order By: Relevance
“…Optical encryption techniques have attracted significant interest because optical systems can offer the possibility of high speed processing and provide many degrees of freedom to handle optical parameters such as amplitude, phase, wavelength and polarization (1)(2)(3)(4)(5). A popular optical encryption technique is based on double-random-phase encoding in a well-known 4-f coherent system (6), and many other optical encryption techniques, such as the use of fractional Fourier transform (7,8), Fresnel transform (9,10), gyrator transform (11,12), polarization (13) and diffractive imaging (14), have been investigated.…”
Section: Introductionmentioning
confidence: 99%
“…Optical encryption techniques have attracted significant interest because optical systems can offer the possibility of high speed processing and provide many degrees of freedom to handle optical parameters such as amplitude, phase, wavelength and polarization (1)(2)(3)(4)(5). A popular optical encryption technique is based on double-random-phase encoding in a well-known 4-f coherent system (6), and many other optical encryption techniques, such as the use of fractional Fourier transform (7,8), Fresnel transform (9,10), gyrator transform (11,12), polarization (13) and diffractive imaging (14), have been investigated.…”
Section: Introductionmentioning
confidence: 99%
“…The main motivation for using optics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make information encryption more secure and more difficult to attack. Several methods for optical image encryption have been proposed such as those based on digital holography [11,12], virtual optics [13], diffractive imaging [14], ghost imaging [15], ptychography [16], interferometry [17], polarization [18,19], photon-counting [20], etc. In 1995, Refrégier and Javidi [21], proposed the 'double random phase encoding' (DRPE) scheme.…”
Section: Introductionmentioning
confidence: 99%
“…Especially since the double random-phase encryption method [1] was proposed, all kinds of random-phase encoding (RPE) schemes based on diffraction or interference principles have been booming [2][3][4][5][6][7][8][9][10][11][12][13]. As the accompanying complementary opposites, the corresponding security analyses have also been carried out and have promoted the further development of optical encryption techniques [14][15][16][17][18].…”
Section: Introductionmentioning
confidence: 99%