2009
DOI: 10.1109/jproc.2009.2018367
|View full text |Cite
|
Sign up to set email alerts
|

Optical Techniques for Information Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
167
0
2

Year Published

2010
2010
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 312 publications
(169 citation statements)
references
References 67 publications
0
167
0
2
Order By: Relevance
“…(4) In a more general approach, the RPMs represented by t 2b x ( ) and t 2n u ( ) can be used as additional authenticators. Therefore, up to four factors can be authenticated by comparing the set of four primary images contained in the encrypted function with the set of four input images in pairs [3][4][28][29].…”
Section: Multifactor Optical Encryption Authentication (Moea)mentioning
confidence: 99%
See 2 more Smart Citations
“…(4) In a more general approach, the RPMs represented by t 2b x ( ) and t 2n u ( ) can be used as additional authenticators. Therefore, up to four factors can be authenticated by comparing the set of four primary images contained in the encrypted function with the set of four input images in pairs [3][4][28][29].…”
Section: Multifactor Optical Encryption Authentication (Moea)mentioning
confidence: 99%
“…Optical processing systems have been proposed for a number of security applications, including encryptiondecryption, authentication, and anti-counterfeiting of a number of primary images, from one in the most common case, up to four in the case of multifactor authentication [1][2][3][4][5][6]. They benefit from parallel processing, multiple degrees of freedom (such as amplitude, phase, wavelength, and polarization of light), high storage capacity and use of biometrics data such as, for instance, fingerprints, iris and retina.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…DRPE is an optical symmetric-key encryption technique in which an optical image is encrypted by multiplying two random phase masks in the spatial and Fourier or Fresnel planes. To obtain an optically-encrypted image, digital holography (DH) [7]- [10] is commonly employed. DH makes it possible to not only capture an optical wavefront as holographic data, but also to reconstruct various styles of optical wavefront computationally from the holographic data.…”
Section: Introductionmentioning
confidence: 99%
“…The perceptual-level image encryption methods intend to transform an image into a unrecognized one using a fast algorithm, e.g. selective encryption techniques [8], [9], [10] and optical encryption techniques [11], [12], [13]. In this case, images are believed to be valuable only within a certain time period e.g.…”
Section: Introductionmentioning
confidence: 99%