2014
DOI: 10.1364/josaa.31.000394
|View full text |Cite
|
Sign up to set email alerts
|

Full-phase photon-counting double-random-phase encryption

Abstract: We investigate a full-phase-based photon-counting double-random-phase encryption (PC-DRPE) method. A PC technique is applied during the encryption process, creating sparse images. The statistical distribution of the PC decrypted data for full-phase encoding and amplitude-phase encoding are derived, and their statistical parameters are used for authentication. The performance of the full-phase PC-DRPE is compared with the amplitude-based PC-DRPE method. The PC decrypted images make it difficult to visually auth… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
42
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 51 publications
(42 citation statements)
references
References 41 publications
0
42
0
Order By: Relevance
“…In the field of optical encryption [20] phase masks are a popular physical encryption device that can be secure under specific conditions [21]. However, in contrast to PUFs, a phase mask can be easily replicated.…”
Section: Summary and Discussionmentioning
confidence: 99%
“…In the field of optical encryption [20] phase masks are a popular physical encryption device that can be secure under specific conditions [21]. However, in contrast to PUFs, a phase mask can be easily replicated.…”
Section: Summary and Discussionmentioning
confidence: 99%
“…A digital counterpart of the conventional DRPE system is vulnerable to some organized attacks [9][10][11][12] . Thereafter, many studies for instance, pixel scrambling [13][14][15][16] , random permutation technique 17 and photon-counting approaches [18][19][20] that associated with the classical encryption system, regarded as enhancing the information security. It however is widely accepted that the security of any encryption system depends on the keys used and therefore the larger the key-space the more the security will be 5 .…”
Section: Introductionmentioning
confidence: 99%
“…This area of research includes image encryption [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15], authentication [16][17][18][19][20][21][22][23][24], and compression or secure storage [25,26]. Authenticating sensitive information is critical to discovering tampering caused by a miscreant.…”
Section: Introductionmentioning
confidence: 99%
“…Authenticating sensitive information is critical to discovering tampering caused by a miscreant. Methodologies for image authentication includes both optical [16][17][18][19][20][21] and simulated [22,23] authentication schemes.…”
Section: Introductionmentioning
confidence: 99%