Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/107004
PIRA download icon_1.1View/Download Full Text
DC FieldValueLanguage
dc.contributorDepartment of Electrical and Electronic Engineering-
dc.creatorJavidi, Ben_US
dc.creatorCarnicer, Aen_US
dc.creatorYamaguchi, Men_US
dc.creatorNomura, Ten_US
dc.creatorPérezCabré, Een_US
dc.creatorMillán, MSen_US
dc.creatorNishchal, NKen_US
dc.creatorTorroba, Ren_US
dc.creatorBarrera, JFen_US
dc.creatorHe, Wen_US
dc.creatorPeng, Xen_US
dc.creatorStern, Aen_US
dc.creatorRivenson, Yen_US
dc.creatorAlfalou, Aen_US
dc.creatorBrosseau, Cen_US
dc.creatorGuo, Cen_US
dc.creatorSheridan, JTen_US
dc.creatorSitu, Gen_US
dc.creatorNaruse, Men_US
dc.creatorMatsumoto, Ten_US
dc.creatorJuvells, Ien_US
dc.creatorTajahuerce, Een_US
dc.creatorLancis, Jen_US
dc.creatorChen, Wen_US
dc.creatorChen, Xen_US
dc.creatorPinkse, PWHen_US
dc.creatorMosk, APen_US
dc.creatorMarkman, Aen_US
dc.date.accessioned2024-06-07T00:59:34Z-
dc.date.available2024-06-07T00:59:34Z-
dc.identifier.issn2040-8978en_US
dc.identifier.urihttp://hdl.handle.net/10397/107004-
dc.language.isoenen_US
dc.publisherInstitute of Physics Publishing Ltd.en_US
dc.rights© 2016 IOP Publishing Ltden_US
dc.rightsThis is the Accepted Manuscript version of an article accepted for publication in Journal of Optics. IOP Publishing Ltd is not responsible for any errors or omissions in this version of the manuscript or any version derived from it. The Version of Record is available online at is available at https://doi.org/10.1088/2040-8978/18/8/083001.en_US
dc.rightsThis manuscript version is made available under the CC-BY-NC-ND 4.0 license (https://creativecommons.org/licenses/by-nc-nd/4.0/)en_US
dc.titleRoadmap on optical securityen_US
dc.typeJournal/Magazine Articleen_US
dc.identifier.volume18en_US
dc.identifier.issue8en_US
dc.identifier.doi10.1088/2040-8978/18/8/083001en_US
dcterms.abstractInformation security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information security, encryption, and authentication. The main motivation for using optics and photonics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make information encryption more secure and more difficult to attack. This roadmap article presents an overview of the potential, recent advances, and challenges of optical security and encryption using free space optics. The roadmap on optical security is comprised of six categories that together include 16 short sections written by authors who have made relevant contributions in this field. The first category of this roadmap describes novel encryption approaches, including secure optical sensing which summarizes double random phase encryption applications and flaws [Yamaguchi], the digital holographic encryption in free space optical technique which describes encryption using multidimensional digital holography [Nomura], simultaneous encryption of multiple signals [Pérez-Cabré], asymmetric methods based on information truncation [Nishchal], and dynamic encryption of video sequences [Torroba]. Asymmetric and one-way cryptosystems are analyzed by Peng. The second category is on compression for encryption. In their respective contributions, Alfalou and Stern propose similar goals involving compressed data and compressive sensing encryption. The very important area of cryptanalysis is the topic of the third category with two sections: Sheridan reviews phase retrieval algorithms to perform different attacks, whereas Situ discusses nonlinear optical encryption techniques and the development of a rigorous optical information security theory. The fourth category with two contributions reports how encryption could be implemented at the nano- or micro-scale. Naruse discusses the use of nanostructures in security applications and Carnicer proposes encoding information in a tightly focused beam. In the fifth category, encryption based on ghost imaging using single-pixel detectors is also considered. In particular, the authors [Chen, Tajahuerce] emphasize the need for more specialized hardware and image processing algorithms. Finally, in the sixth category, Mosk and Javidi analyze in their corresponding papers how quantum imaging can benefit optical encryption systems. Sources that use few photons make encryption systems much more difficult to attack, providing a secure method for authentication.-
dcterms.accessRightsopen accessen_US
dcterms.bibliographicCitationJournal of optics, Aug. 2016, v. 18, no. 8, 083001en_US
dcterms.isPartOfJournal of opticsen_US
dcterms.issued2016-08-
dc.identifier.scopus2-s2.0-84980329381-
dc.identifier.eissn2040-8986en_US
dc.identifier.artn083001en_US
dc.description.validate202405 bcch-
dc.description.oaAccepted Manuscripten_US
dc.identifier.FolderNumberEIE-0836-
dc.description.fundingSourceSelf-fundeden_US
dc.description.pubStatusPublisheden_US
dc.identifier.OPUS6665366-
dc.description.oaCategoryGreen (AAM)en_US
Appears in Collections:Journal/Magazine Article
Files in This Item:
File Description SizeFormat 
Chen_Roadmap_Optical_Security.pdfPre-Published version2.54 MBAdobe PDFView/Open
Open Access Information
Status open access
File Version Final Accepted Manuscript
Access
View full-text via PolyU eLinks SFX Query
Show simple item record

Page views

5
Citations as of Jun 30, 2024

Downloads

3
Citations as of Jun 30, 2024

SCOPUSTM   
Citations

372
Citations as of Jun 21, 2024

WEB OF SCIENCETM
Citations

337
Citations as of Jun 27, 2024

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.