optical encryption
Recently Published Documents


TOTAL DOCUMENTS

343
(FIVE YEARS 88)

H-INDEX

37
(FIVE YEARS 6)

2021 ◽  
Vol 12 (1) ◽  
pp. 406
Author(s):  
Pavel Cheremkhin ◽  
Nikolay Evtikhiev ◽  
Vitaly Krasnov ◽  
Ilya Ryabcev ◽  
Anna Shifrina ◽  
...  

The necessity of the correction of errors emerging during the optical encryption process led to the extensive use of data containers such as QR codes. However, due to specifics of optical encryption, QR codes are not very well suited for the task, which results in low error correction capabilities in optical experiments mainly due to easily breakable QR code’s service elements and byte data structure. In this paper, we present optical implementation of information optical encryption system utilizing new multilevel customizable digital data containers with high data density. The results of optical experiments demonstrate efficient error correction capabilities of the new data container.


2021 ◽  
Author(s):  
John alexis jaramillo osorio ◽  
Alejandro Velez-Zea ◽  
Humberto Cabrera ◽  
J J Niemela ◽  
John Fredy Barrera-Ramírez ◽  
...  

Abstract We present the implementation of an experimental optical encryption configuration in the Fresnel domain using the thermal lens effect to modulate the phase of the illumination beam. We corroborate the basic performance of our cryptosystem by performing the encryption-decryption procedure of a single object. Then, we test the tolerance of the proposed scheme to decrypt decryption with keys registered for different modulations of the illumination beam induced by the phase generated due to thermal lens effect. These different phase modulations are obtained by introducing axial displacements of a sample, where the thermal lens effect is induced by an excitation beam. Considering the phase modulation changes in the illumination due to sample displacements, we propose an undercover procedure to further protect the target information using decoy data. The key associated with the target information is obtained when the probe and excitation beams are focused on the same point of the sample, while the decoy object key is registered when the beams are not focused on the same region of the sample. Finally, we analyzed the resistance of the undercover ciphertext to some of the attacks reported in the literature. All experimental results presented in this work demonstrate the basic capabilities, viability, and versatility of our proposals.


2021 ◽  
Author(s):  
Feng Jun ◽  
Wei Huang ◽  
Shuming Jiao ◽  
Xiaopeng Wang

2021 ◽  
pp. 127558
Author(s):  
Xing Bai ◽  
LuoZhi Zhang ◽  
Jinxi Li ◽  
Zhan Yu ◽  
Zhongzhuo Yang ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document