2015
DOI: 10.1364/ol.40.000135
|View full text |Cite
|
Sign up to set email alerts
|

Security authentication using phase-encoded nanoparticle structures and polarized light

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
27
0
1

Year Published

2016
2016
2023
2023

Publication Types

Select...
6
1

Relationship

3
4

Authors

Journals

citations
Cited by 54 publications
(28 citation statements)
references
References 21 publications
0
27
0
1
Order By: Relevance
“…In practical applications, random phase masks attached to the image to be secured make the information inaccessible once the light interacting with the sample is propagated. These devices display a distinctive behavior under polarized light and consequently, the use of illuminating sources with different polarizations increase the degrees of freedom of the cryptosystem resulting in gadget which is more complex and difficult to attack [5][6][7][8].…”
Section: Introductionmentioning
confidence: 99%
“…In practical applications, random phase masks attached to the image to be secured make the information inaccessible once the light interacting with the sample is propagated. These devices display a distinctive behavior under polarized light and consequently, the use of illuminating sources with different polarizations increase the degrees of freedom of the cryptosystem resulting in gadget which is more complex and difficult to attack [5][6][7][8].…”
Section: Introductionmentioning
confidence: 99%
“…This area of research includes image encryption [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15], authentication [16][17][18][19][20][21][22][23][24], and compression or secure storage [25,26]. Authenticating sensitive information is critical to discovering tampering caused by a miscreant.…”
Section: Introductionmentioning
confidence: 99%
“…Authenticating sensitive information is critical to discovering tampering caused by a miscreant. Methodologies for image authentication includes both optical [16][17][18][19][20][21] and simulated [22,23] authentication schemes.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations