Optical image compression and encryption methods
Ayman Alfalou,Christian Brosseau +1 more
TLDR
Optical processing methodologies, based on filtering, are described that are applicable to transmission and/or data storage and the advantages and limitations of a set of optical compression and encryption methods are discussed.Abstract:
Over the years extensive studies have been carried out to apply coherent optics methods in real-time communications and image transmission. This is especially true when a large amount of information needs to be processed, e.g., in high-resolution imaging. The recent progress in data-processing networks and communication systems has considerably increased the capacity of information exchange. However, the transmitted data can be intercepted by nonauthorized people. This explains why considerable effort is being devoted at the current time to data encryption and secure transmission. In addition, only a small part of the overall information is really useful for many applications. Consequently, applications can tolerate information compression that requires important processing when the transmission bit rate is taken into account. To enable efficient and secure information exchange, it is often necessary to reduce the amount of transmitted information. In this context, much work has been undertaken using the principle of coherent optics filtering for selecting relevant information and encrypting it. Compression and encryption operations are often carried out separately, although they are strongly related and can influence each other. Optical processing methodologies, based on filtering, are described that are applicable to transmission and/or data storage. Finally, the advantages and limitations of a set of optical compression and encryption methods are discussed.read more
Citations
More filters
Journal Article
Fourier-transform method of fringe-pattern analysis for computer-based topography and interferometry
TL;DR: In this article, a fast Fourier transform method of topography and interferometry is proposed to discriminate between elevation and depression of the object or wave-front form, which has not been possible by the fringe-contour generation techniques.
Journal ArticleDOI
Advances in optical security systems
TL;DR: This paper presents a review of optical technologies for information security, and theoretical principles and implementation examples are presented to illustrate each optical security system.
Journal ArticleDOI
Roadmap on optical security
Bahram Javidi,Artur Carnicer,Masahiro Yamaguchi,Takanori Nomura,Elisabet Pérez-Cabré,María S. Millán,Naveen K. Nishchal,Roberto Torroba,John Fredy Barrera,Wenqi He,Xiang Peng,Adrian Stern,Yair Rivenson,Ayman Alfalou,Christian Brosseau,Changliang Guo,John T. Sheridan,Guohai Situ,Makoto Naruse,Tsutomu Matsumoto,Ignasi Juvells,Enrique Tajahuerce,Jesús Lancis,Wen Chen,Xudong Chen,Pepijn W. H. Pinkse,Allard Mosk,Adam Markman +27 more
TL;DR: An overview of the potential, recent advances, and challenges of optical security and encryption using free space optics is presented, highlighting the need for more specialized hardware and image processing algorithms.
Journal ArticleDOI
A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms
TL;DR: Analyzing the security of a recently proposed asymmetric cryptosystem that based on the phase-truncated Fourier transforms (PTFTs) implies that some appropriate measurements should be made to enhance the resistance of the PTFT-based cryptos system against the specific attack when it is used as a public-key cryptosSystem.
Journal ArticleDOI
Optical image encryption via ptychography.
TL;DR: Ptychography is combined with optical image encryption for the first time and their complex-amplitude functions can serve as a kind of secret keys that lead to the enlarged key space and the enhanced system security.
References
More filters
Journal ArticleDOI
A method for obtaining digital signatures and public-key cryptosystems
TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Journal ArticleDOI
Introduction to Fourier Optics
Joseph W. Goodman,Mary E. Cox +1 more
TL;DR: The second edition of this respected text considerably expands the original and reflects the tremendous advances made in the discipline since 1968 as discussed by the authors, with a special emphasis on applications to diffraction, imaging, optical data processing, and holography.
Book
Introduction to Fourier optics
TL;DR: The second edition of this respected text considerably expands the original and reflects the tremendous advances made in the discipline since 1968 as discussed by the authors, with a special emphasis on applications to diffraction, imaging, optical data processing, and holography.
Journal ArticleDOI
Independent component analysis, a new concept?
TL;DR: An efficient algorithm is proposed, which allows the computation of the ICA of a data matrix within a polynomial time and may actually be seen as an extension of the principal component analysis (PCA).
Journal ArticleDOI
Independent component analysis: algorithms and applications
Aapo Hyvärinen,Erkki Oja +1 more
TL;DR: The basic theory and applications of ICA are presented, and the goal is to find a linear representation of non-Gaussian data so that the components are statistically independent, or as independent as possible.
Related Papers (5)
Optical image encryption based on input plane and Fourier plane random encoding.
Philippe Réfrégier,Bahram Javidi +1 more