scispace - formally typeset
Open AccessJournal ArticleDOI

Optical image compression and encryption methods

TLDR
Optical processing methodologies, based on filtering, are described that are applicable to transmission and/or data storage and the advantages and limitations of a set of optical compression and encryption methods are discussed.
Abstract
Over the years extensive studies have been carried out to apply coherent optics methods in real-time communications and image transmission. This is especially true when a large amount of information needs to be processed, e.g., in high-resolution imaging. The recent progress in data-processing networks and communication systems has considerably increased the capacity of information exchange. However, the transmitted data can be intercepted by nonauthorized people. This explains why considerable effort is being devoted at the current time to data encryption and secure transmission. In addition, only a small part of the overall information is really useful for many applications. Consequently, applications can tolerate information compression that requires important processing when the transmission bit rate is taken into account. To enable efficient and secure information exchange, it is often necessary to reduce the amount of transmitted information. In this context, much work has been undertaken using the principle of coherent optics filtering for selecting relevant information and encrypting it. Compression and encryption operations are often carried out separately, although they are strongly related and can influence each other. Optical processing methodologies, based on filtering, are described that are applicable to transmission and/or data storage. Finally, the advantages and limitations of a set of optical compression and encryption methods are discussed.

read more

Citations
More filters
Journal Article

Fourier-transform method of fringe-pattern analysis for computer-based topography and interferometry

TL;DR: In this article, a fast Fourier transform method of topography and interferometry is proposed to discriminate between elevation and depression of the object or wave-front form, which has not been possible by the fringe-contour generation techniques.
Journal ArticleDOI

Advances in optical security systems

TL;DR: This paper presents a review of optical technologies for information security, and theoretical principles and implementation examples are presented to illustrate each optical security system.
Journal ArticleDOI

A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms

TL;DR: Analyzing the security of a recently proposed asymmetric cryptosystem that based on the phase-truncated Fourier transforms (PTFTs) implies that some appropriate measurements should be made to enhance the resistance of the PTFT-based cryptos system against the specific attack when it is used as a public-key cryptosSystem.
Journal ArticleDOI

Optical image encryption via ptychography.

TL;DR: Ptychography is combined with optical image encryption for the first time and their complex-amplitude functions can serve as a kind of secret keys that lead to the enlarged key space and the enhanced system security.
References
More filters
Journal ArticleDOI

A method for obtaining digital signatures and public-key cryptosystems

TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Journal ArticleDOI

Introduction to Fourier Optics

Joseph W. Goodman, +1 more
- 01 Apr 1969 - 
TL;DR: The second edition of this respected text considerably expands the original and reflects the tremendous advances made in the discipline since 1968 as discussed by the authors, with a special emphasis on applications to diffraction, imaging, optical data processing, and holography.
Book

Introduction to Fourier optics

TL;DR: The second edition of this respected text considerably expands the original and reflects the tremendous advances made in the discipline since 1968 as discussed by the authors, with a special emphasis on applications to diffraction, imaging, optical data processing, and holography.
Journal ArticleDOI

Independent component analysis, a new concept?

Pierre Comon
- 01 Apr 1994 - 
TL;DR: An efficient algorithm is proposed, which allows the computation of the ICA of a data matrix within a polynomial time and may actually be seen as an extension of the principal component analysis (PCA).
Journal ArticleDOI

Independent component analysis: algorithms and applications

TL;DR: The basic theory and applications of ICA are presented, and the goal is to find a linear representation of non-Gaussian data so that the components are statistically independent, or as independent as possible.
Related Papers (5)