SIOM OpenIR  > 信息光学与光电技术实验室
Roadmap on optical security
Javidi, Bahram; Carnicer, Artur; Yamaguchi, Masahiro; Nomura, Takanori; Perez-Cabre, Elisabet; Millan, Maria S.; Nishchal, Naveen K.; Torroba, Roberto; Barrera, John Fredy; He, Wenqi; Peng, Xiang; Stern, Adrian; Rivenson, Yair; Alfalou, A.; Brosseau, C.;;
Source PublicationJ. Opt.
AbstractInformation security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information security, encryption, and authentication. The main motivation for using optics and photonics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make information encryption more secure and more difficult to attack. This roadmap article presents an overview of the potential, recent advances, and challenges of optical security and encryption using free space optics. The roadmap on optical security is comprised of six categories that together include 16 short sections written by authors who have made relevant contributions in this field. The first category of this roadmap describes novel encryption approaches, including secure optical sensing which summarizes double random phase encryption applications and flaws [Yamaguchi], the digital holographic encryption in free space optical technique which describes encryption using multidimensional digital holography [Nomura], simultaneous encryption of multiple signals [Perez-Cabre], asymmetric methods based on information truncation [Nishchal], and dynamic encryption of video sequences [Torroba]. Asymmetric and one-way cryptosystems are analyzed by Peng. The second category is on compression for encryption. In their respective contributions, Alfalou and Stern propose similar goals involving compressed data and compressive sensing encryption. The very important area of cryptanalysis is the topic of the third category with two sections: Sheridan reviews phase retrieval algorithms to perform different attacks, whereas Situ discusses nonlinear optical encryption techniques and the development of a rigorous optical information security theory. The fourth category with two contributions reports how encryption could be implemented at the nano- or micro-scale. Naruse discusses the use of nanostructures in security applications and Carnicer proposes encoding information in a tightly focused beam. In the fifth category, encryption based on ghost imaging using single-pixel detectors is also considered. In particular, the authors [Chen, Tajahuerce] emphasize the need for more specialized hardware and image processing algorithms. Finally, in the sixth category, Mosk and Javidi analyze in their corresponding papers how quantum imaging can benefit optical encryption systems. Sources that use few photons make encryption systems much more difficult to attack, providing a secure method for authentication.
Funding OrganizationHoneywell ; Honeywell ; Honeywell ; Honeywell
Indexed BySCI
Funding OrganizationHoneywell ; Honeywell ; Honeywell ; Honeywell
WOS IDWOS:000390218100001
Citation statistics
Cited Times:199[WOS]   [WOS Record]     [Related Records in WOS]
Document Type期刊论文
Recommended Citation
GB/T 7714
Javidi, Bahram,Carnicer, Artur,Yamaguchi, Masahiro,et al. Roadmap on optical security[J]. J. Opt.,2016,18(8).
APA Javidi, Bahram.,Carnicer, Artur.,Yamaguchi, Masahiro.,Nomura, Takanori.,Perez-Cabre, Elisabet.,...& on optical security.J. Opt.,18(8).
MLA Javidi, Bahram,et al."Roadmap on optical security".J. Opt. 18.8(2016).
Files in This Item:
There are no files associated with this item.
Related Services
Recommend this item
Usage statistics
Export to Endnote
Google Scholar
Similar articles in Google Scholar
[Javidi, Bahram]'s Articles
[Carnicer, Artur]'s Articles
[Yamaguchi, Masahiro]'s Articles
Baidu academic
Similar articles in Baidu academic
[Javidi, Bahram]'s Articles
[Carnicer, Artur]'s Articles
[Yamaguchi, Masahiro]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Javidi, Bahram]'s Articles
[Carnicer, Artur]'s Articles
[Yamaguchi, Masahiro]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.