Literature DB >> 18059771

Securing information by use of digital holography.

B Javidi, T Nomura.   

Abstract

An information security method that uses a digital holographic technique is presented. An encrypted image is stored as a digital hologram. The decryption key is also stored as a digital hologram. The encrypted image can be electrically decrypted by use of the digital hologram of the key. This security technique provides secure storage and data transmission. Experimental results are presented to demonstrate the proposed method.

Year:  2000        PMID: 18059771     DOI: 10.1364/ol.25.000028

Source DB:  PubMed          Journal:  Opt Lett        ISSN: 0146-9592            Impact factor:   3.776


  9 in total

1.  Dual-channel in-line digital holographic double random phase encryption.

Authors:  Bhargab Das; Chandra S Yelleswarapu; D V G L N Rao
Journal:  Opt Commun       Date:  2012-10-01       Impact factor: 2.310

2.  Efficient text encryption and hiding with double-random phase-encoding.

Authors:  Jun Sang; Shenggui Ling; Mohammad S Alam
Journal:  Sensors (Basel)       Date:  2012-10-01       Impact factor: 3.576

3.  Multicolor 3D meta-holography by broadband plasmonic modulation.

Authors:  Xiong Li; Lianwei Chen; Yang Li; Xiaohu Zhang; Mingbo Pu; Zeyu Zhao; Xiaoliang Ma; Yanqin Wang; Minghui Hong; Xiangang Luo
Journal:  Sci Adv       Date:  2016-11-04       Impact factor: 14.136

4.  Optical cryptography with biometrics for multi-depth objects.

Authors:  Aimin Yan; Yang Wei; Zhijuan Hu; Jingtao Zhang; Peter Wai Ming Tsang; Ting-Chung Poon
Journal:  Sci Rep       Date:  2017-10-11       Impact factor: 4.379

5.  Information Security Scheme Based on Computational Temporal Ghost Imaging.

Authors:  Shan Jiang; Yurong Wang; Tao Long; Xiangfeng Meng; Xiulun Yang; Rong Shu; Baoqing Sun
Journal:  Sci Rep       Date:  2017-08-09       Impact factor: 4.379

6.  Holographic imaging of electromagnetic fields via electron-light quantum interference.

Authors:  I Madan; G M Vanacore; E Pomarico; G Berruto; R J Lamb; D McGrouther; T T A Lummen; T Latychevskaia; F J García de Abajo; F Carbone
Journal:  Sci Adv       Date:  2019-05-03       Impact factor: 14.136

7.  Comprehensive deep learning model for 3D color holography.

Authors:  Alim Yolalmaz; Emre Yüce
Journal:  Sci Rep       Date:  2022-02-15       Impact factor: 4.379

8.  Asymmetric cryptosystem based on optical scanning cryptography and elliptic curve algorithm.

Authors:  Xiangyu Chang; Wei Li; Aimin Yan; Peter Wai Ming Tsang; Ting-Chung Poon
Journal:  Sci Rep       Date:  2022-05-11       Impact factor: 4.379

9.  Broadband decoupling of intensity and polarization with vectorial Fourier metasurfaces.

Authors:  Qinghua Song; Arthur Baroni; Pin Chieh Wu; Sébastien Chenot; Virginie Brandli; Stéphane Vézian; Benjamin Damilano; Philippe de Mierry; Samira Khadir; Patrick Ferrand; Patrice Genevet
Journal:  Nat Commun       Date:  2021-06-15       Impact factor: 14.919

  9 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.