Abstract

Recent development in the digital system shows that data security is most important and that optical encryption can be used not only to keep signals confidential but also to authenticate information. By integrating sparsity constraint with optical encryption, the reconstructed decoder image is not always visually recognizable, but can be authenticated using optical correlation means methods. Traditional optical encryption methods can add an extra layer of security to this design as it authenticates without leaking primary signal information. This paper discusses advances in optical authentication and includes theoretical principles and implementation examples to demonstrate the workings of typical authentication systems. Benchmarking and upcoming possibilities are discussed and it is hoped that this review work useful in advancing the field of optical safety.

Highlights

  • The goal of preserving or transmitting information safely sparked the rise of information technology and prompted a multitude of scholarly work on the examination of encryption schemes [1]

  • Optical encryption methods have been of considerable importance as they enable speed efficiency is parallel processing of image information to be concealed in various parameters, like phase, wavelength, frequency of spatial, and polarization of light [3]

  • In a joint transform correlator (JTC)-based cryptosystem, the plaintext input associated with random phase masks (RPMs) is placed next to the encryption key on the plane and the power distribution of the joint power spectrum (JPS), because the encrypted information can be written with a mutual power-law sensor, like charge-coupled device (CCD) [7]

Read more

Summary

Introduction

The goal of preserving or transmitting information safely sparked the rise of information technology and prompted a multitude of scholarly work on the examination of encryption schemes [1]. The encrypted image obtained using the DRPE system is a complex matrix that includes amplitude and phase information, and the encrypted data must be registered for holographic [6]. This means that the DRPE system requires precise optical position, that is tough to achieve in practice. A modern scheme for generating biometric keys based on digital holographic technologies includes the use of optical encryption to secure information [8]. In another instance, Ghost Imaging (GI), identified as correlated imaging, is dynamic. Get the original plain image from the decrypted image by performing the decoding process

Previous Works
Performance Analysis
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call