scispace - formally typeset
Search or ask a question

Optical asymmetric double-image encryption and authentication in an interference-based scheme using sparse representation. Optica Applicata? 


Best insight from top research papers

An improved optical asymmetric double-image encryption and authentication scheme based on interference and sparse representation is proposed . The scheme utilizes interference and sparse representation techniques to process the Fresnel spectra of the original images, resulting in two ciphertexts and two pairs of private keys . Each original image is associated with its corresponding private keys, and the decrypted image is authenticated by comparing it with the original plaintext using nonlinear correlation . The proposed scheme ensures that the silhouette and any information about the primary images cannot be recognized, even when using a subset of the masks for decryption . Numerical simulations demonstrate the effectiveness and security of the proposed method .

Answers from top 4 papers

More filters
Papers (4)Insight
The given query does not match the information provided in the text.
The paper discusses an optical scheme for double-image encryption and authentication using interference and sparse representation.
The paper proposes an improved multiple-image authentication scheme based on optical interference by wavelength multiplexing, which has high security and easy optical implementation.
The given text does not provide any information about the paper "Optical asymmetric double-image encryption and authentication in an interference-based scheme using sparse representation" in Optica Applicata.

Related Questions

What are symetric keys in cryptography?5 answersSymmetric keys in cryptography refer to a method where the same cryptographic key is used for both encryption and decryption of data. This key is kept secret and is shared between the communicating parties. Symmetric key cryptography is known for its speed and efficiency in encrypting large amounts of data. It scrambles plaintext information into ciphertext using algorithms and the shared key, ensuring confidentiality and integrity of the message. However, the challenge lies in key management, as securely distributing and storing the key can be complex. Despite its limitations in key management, symmetric key cryptography remains widely used in various cryptographic systems alongside asymmetric key cryptography.
How does Discrete Cosine Transform (DCT) affect the security of quantum-secure iris authentication systems?5 answersThe Discrete Cosine Transform (DCT) plays a crucial role in enhancing the security of iris authentication systems. By utilizing DCT, iris images can be processed and protected through techniques like watermarking, where demographic text is embedded within the iris image using DCT coefficients. Additionally, DCT can be employed in generating cancellable iris templates, ensuring security and non-invertibility of biometric data. This transformation technique not only safeguards the integrity of biometric traits but also mitigates the risks associated with storing or transmitting sensitive biometric data, thereby enhancing the overall security of quantum-secure iris authentication systems.
What are the accessibility issues faced by blind users when using two-factor authentication?5 answersBlind users encounter accessibility challenges with traditional PIN-based and password authentication methods due to the risk of shoulder surfing and limitations of screen readers. These users struggle with locating login elements on websites and face difficulties in entering passwords using standard keyboards. To address these issues, innovative solutions like OneButtonPIN and BraillePassword have been proposed. OneButtonPIN utilizes haptic feedback for PIN entry, enhancing security and usability for blind and low vision users. On the other hand, BraillePassword employs a tactile input method based on Braille characters, reducing the risk of observation attacks while maintaining accessibility on touchscreens. These advancements aim to improve the authentication experience for visually impaired individuals by prioritizing both security and ease of use.
What are the benefits and drawbacks of using optical communication?5 answersOptical communication offers several benefits, including high data rates, low error probability, and high transmission capacity. It is considered a reliable networking choice for achieving reliable, fast, and flexible communication. Optical links have advantages over radio links, such as higher transmission rates and increased security. Additionally, recent progress in electro-optic technologies has made optical communication a promising option for meeting the increasing demands of high-performance computing and communication applications. However, optical communication also has its drawbacks. It can suffer from various types of distortion, such as jitter, which can degrade system performance. Optical networks, while promising, also present their own challenges. Despite these drawbacks, the benefits of optical communication make it an attractive option for high-speed and high-capacity data transfer.
Optical encryption fresnel transform based optical interference with photon counting or with spare represntion?5 answersOptical encryption methods based on the combination of Fresnel transform and photon counting or sparse representation have been proposed in the literature. These methods aim to enhance the security and robustness of optical encryption systems. The use of photon counting imaging with phase-truncated Fresnel transform allows for complete information retrieval and authentication verification, overcoming the weaknesses of previous schemes. Another approach involves encoding the information into the second-order spatial coherence distribution of a structured random light beam using the van Cittert-Zernike theorem. This method offers enhanced security due to the complexity of measuring the spatial coherence distribution and robustness against environmental fluctuations. Additionally, a polarimetric-based optical encoder has been developed for image encryption and verification, utilizing random polarized vector keys and the photon-counting model for enhanced security. The integration of photon counting imaging with multifactor optical encryption authentication provides increased signal hiding capacity and data reduction, while preventing partial disclosure of encrypted factors.
How do identity interference and authenticity relate to each other?5 answersIdentity interference and authenticity are two distinct concepts that relate to each other in the context of different domains. In the study by Brenner, religious identity prominence is found to influence reports of religious attendance, indicating that individuals with a strong religious identity may interpret the attendance question based on their self-view as religious people rather than their actual behavior. On the other hand, in the paper by Marine-Roig, authenticity is described as a concept related to the tourist subject and perceived image, while identity is related to the tourist object and projected image in the construction of destination image. These findings suggest that identity interference and authenticity have different roles in various contexts, with identity prominence influencing self-reported behavior and authenticity influencing the perception of self and others in relation to a particular domain.