Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 3 de 3
Filter
Add more filters











Database
Language
Publication year range
1.
Opt Lett ; 37(14): 2895-7, 2012 Jul 15.
Article in English | MEDLINE | ID: mdl-22825170

ABSTRACT

In this Letter, we present to the best of our knowledge a new all-optical technique for multiple-image encryption and multiplexing, based on fractal encrypting masks. The optical architecture is a joint transform correlator. The multiplexed encrypted data are stored in a photorefractive crystal. The fractal parameters of the key can be easily tuned to lead to a multiplexing operation without cross talk effects. Experimental results that support the potential of the method are presented.

2.
Appl Opt ; 48(11): 2099-104, 2009 Apr 10.
Article in English | MEDLINE | ID: mdl-19363548

ABSTRACT

We show that multiple secure data recording under a wavelength multiplexing technique is possible in a joint transform correlator (JTC) arrangement. We evaluate both the performance of the decrypting procedure and the influence of the input image size when decrypting with a wavelength different from that employed in the encryption step. This analysis reveals that the wavelength is a valid parameter to conduct image multiplexing encoding with the JTC architecture. In addition, we study the influence of the minimum wavelength change that prevents decoding cross talk. Computer simulations confirm the performance of the proposed technique.

3.
Appl Opt ; 47(31): 5903-7, 2008 Nov 01.
Article in English | MEDLINE | ID: mdl-19122732

ABSTRACT

We propose a multichanneling encryption method by using multiple random-phase mask apertures in the input plane based on a joint transform correlation scheme. In the proposal, this multiple aperture arrangement is changed as different input objects are inserted and stored. Then, during the decryption step, the appropriate use of the random-phase mask apertures can ensure the retrieval of different information. This approach provides different access levels. Computer simulations show the potential of the technique and experimental results verify the feasibility of this method.

SELECTION OF CITATIONS
SEARCH DETAIL