期刊文献+
共找到29篇文章
< 1 2 >
每页显示 20 50 100
Optical encryption scheme based on spread spectrum ghost imaging
1
作者 刘进芬 董玥 +1 位作者 王乐 赵生妹 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第7期375-381,共7页
An optical encryption(OE) scheme based on the spread spectrum ghost imaging(SSGI), named as SSGI-OE, is proposed to obtain a high security with a smaller key. In the scheme, the randomly selected row number of a Hadam... An optical encryption(OE) scheme based on the spread spectrum ghost imaging(SSGI), named as SSGI-OE, is proposed to obtain a high security with a smaller key. In the scheme, the randomly selected row number of a Hadamard matrix of order N is used as the secure key, and shared with the authorized user, Bob, through a private channel. Each corresponding row vector of the order-N Hadamard matrix is then used as the direct sequence code to modulate a speckle pattern for the ghost imaging system, and an image is encrypted with the help of the SSGI. The measurement results from the bucket detector, named as ciphertext, are then transmitted to Bob through a public channel. The illuminating speckle patterns are also shared with Bob by the public channel. With the correct secure key, Bob could reconstruct the image with the aid of the SSGI system, whereas the unauthorized user, Eve, could not obtain any useful information of the encrypted image. The numerical simulations and experimental results show that the proposed scheme is feasible with a higher security and a smaller key. For the 32 × 32 pixels image, the number of bits sent from Alice to Bob by using SSGIOE(M = 1024, N = 2048) scheme is only 0.0107 times over a computational ghost imaging optical encryption scheme.When the eavesdropping ratio(ER) is less than 40%, the eavesdropper cannot acquire any information of the encrypted image. The extreme circumstance for the proposed SSGI-OE scheme is also discussed, where the eavesdropper begins to extract the information when ER is up to 15%. 展开更多
关键词 optical encryption ghost imaging spread spectrum correlated imaging
原文传递
Programmable optical encryption using thicknesscontrolled stretchable chiral liquid crystal elastomers
2
作者 Seungmin Nam Seohyun Woo +1 位作者 Ji Yoon Park Su Seok Choi 《Light(Science & Applications)》 2025年第5期1398-1409,共12页
The growing demand for cryptographic security encourages the innovation of advanced materials with unique optical properties to secure information using light.Structural colors with soft materials exhibit dynamically ... The growing demand for cryptographic security encourages the innovation of advanced materials with unique optical properties to secure information using light.Structural colors with soft materials exhibit dynamically tunable optical properties in response to external stimuli,making them ideal for multi-level photonic encryption.However,most previous studies on structural color-based photonic encryption have predominantly focused on single-wavelength tuning while employing inadequate triggering methods for practical device applications.Here,we propose a chiral liquid crystal elastomer(CLCE)designed for stretching-induced multi-wavelength control to enhance photonic encryption functionality.By employing a heterogeneous configuration with thickness-modulated CLCE,we achieve multi-photonic band wavelength control under mechanical deformation.Furthermore,this method extends the tunable wavelength range beyond the visible spectrum into the infrared region and integrates a discrete multi-pixel array structure,enabling advanced spatial and spectral control for complex encryption schemes.This multi-wavelength modulation method is expected to provide significant potential for applications in photonic encryption,adaptive optics,and next-generation information security systems. 展开更多
关键词 optical properties multi wavelength control thickness controlled stretchable chiral liquid crystal elastomers advanced materials unique optical properties soft materials cryptographic security programmable optical encryption photonic encryption
原文传递
High-dimensional Poincarébeams generated through cascaded metasurfaces for high-security optical encryption 被引量:1
3
作者 Jitao Ji Chen Chen +9 位作者 Jiacheng Sun Xin Ye Zhizhang Wang Jian Li Junyi Wang Wange Song Chunyu Huang Kai Qiu Shining Zhu Tao Li 《PhotoniX》 2024年第1期499-511,共13页
Optical encryption plays an increasingly important role in the field of information security owing to its parallel processing capability and low power consumption.Employing the ultrathin metasurfaces in optical encryp... Optical encryption plays an increasingly important role in the field of information security owing to its parallel processing capability and low power consumption.Employing the ultrathin metasurfaces in optical encryption has promoted the miniaturization and multifunctionality of encryption systems.Nevertheless,with the few number of degrees of freedom(DoFs)multiplexed by single metasurface,both key space and encoding space are limited.To address this issue,we propose a high-security and large-capacity optical encryption scheme based on perfect high-dimensional Poincare beams with expanded DoFs.By cascading two arrayed metasurfaces,more beam properties can be independently engineered,which gives rise to the extensively expanded key and encoding spaces.Our work provides a promising strategy for optical encryption with high security level and large information capacity and might facilitate the applications of Poincare beams in optical communications and quantum information. 展开更多
关键词 Poincare beams Cascaded metasurfaces optical encryption
在线阅读 下载PDF
Three-channel robust optical encryption via engineering coherence Stokes vector of partially coherent light
4
作者 Yonglei Liu Zhen Dong +4 位作者 Yimeng Zhu Haiyun Wang Fei Wang Yahong Chen Yangjian Cai 《PhotoniX》 2024年第1期587-604,共18页
Optical encryption strategies utilizing fully coherent light have been widely explored but often face challenges such as speckle noise and beam instabilities.In this work,we introduce a novel protocol for multi-channe... Optical encryption strategies utilizing fully coherent light have been widely explored but often face challenges such as speckle noise and beam instabilities.In this work,we introduce a novel protocol for multi-channel optical information encoding and encryption using vectorial spatial coherence engineering of a partially coherent light beam.By characterizing the beam’s spatial coherence structure with a 2×2 coherence matrix,we demonstrate independent control over the three components of the coherence Stokes vector.This allows for three-channel optical information encoding and encryption,with applications in color image representation.Unlike existing methods based on fully coherent light modulations,our approach utilizes a two-point dependent coherence Stokes vector,proving resilient to random noise in experimental scenarios.Our findings provide a robust foundation for higher-dimensional optical encoding and encryption,addressing limitations associated with partially coherent light in complex environments. 展开更多
关键词 optical encryption Partially coherent light Spatial coherence engineering Coherence Stokes vector Color image encoding
在线阅读 下载PDF
Deep-learning-based ciphertext-only attack on optical double random phase encryption 被引量:11
5
作者 Meihua Liao Shanshan Zheng +4 位作者 Shuixin Pan Dajiang Lu Wenqi He Guohai Situ Xiang Peng 《Opto-Electronic Advances》 SCIE 2021年第5期12-23,共12页
Optical cryptanalysis is essential to the further investigation of more secure optical cryptosystems.Learning-based at-tack of optical encryption eliminates the need for the retrieval of random phase keys of optical e... Optical cryptanalysis is essential to the further investigation of more secure optical cryptosystems.Learning-based at-tack of optical encryption eliminates the need for the retrieval of random phase keys of optical encryption systems but it is limited for practical applications since it requires a large set of plaintext-ciphertext pairs for the cryptosystem to be at-tacked.Here,we propose a two-step deep learning strategy for ciphertext-only attack(COA)on the classical double ran-dom phase encryption(DRPE).Specifically,we construct a virtual DRPE system to gather the training data.Besides,we divide the inverse problem in COA into two more specific inverse problems and employ two deep neural networks(DNNs)to respectively learn the removal of speckle noise in the autocorrelation domain and the de-correlation operation to retrieve the plaintext image.With these two trained DNNs at hand,we show that the plaintext can be predicted in real-time from an unknown ciphertext alone.The proposed learning-based COA method dispenses with not only the retrieval of random phase keys but also the invasive data acquisition of plaintext-ciphertext pairs in the DPRE system.Numerical simulations and optical experiments demonstrate the feasibility and effectiveness of the proposed learning-based COA method. 展开更多
关键词 optical encryption random phase encoding ciphertext-only attack deep learning
在线阅读 下载PDF
Cascaded liquid crystal holography for optical encryption 被引量:4
6
作者 王泽宇 张涵 +5 位作者 刘筱姮 窦韵洁 段薇 陈伟 马玲玲 陆延青 《Chinese Optics Letters》 SCIE EI CAS CSCD 2023年第12期11-18,共8页
Cascaded holography coupled with the secret-sharing scheme has recently gained considerable attention due to its enhanced information processing and encryption capabilities.Here,we propose a new holographic iterative ... Cascaded holography coupled with the secret-sharing scheme has recently gained considerable attention due to its enhanced information processing and encryption capabilities.Here,we propose a new holographic iterative algorithm and present the implementation of cascaded liquid crystal(LC)holography for optical encryption.Each LC layer acts as the secret key and can generate a distinct holographic image.By cascading two LC elements,a new holographic image is formed.Additionally,we showcase the dynamic optical encryption achieved by electrically switching LCs with combined electric keys.This work may offer promising applications in optical cryptography,all-optical computing,and data storage. 展开更多
关键词 liquid crystals HOLOGRAPHY optical encryption
原文传递
Metal−Organic Framework-Based Ultrafast Logic Gates for High-Security Optical Encryption
7
作者 Junhong Yu Yadong Han +7 位作者 Longyu Wang Yibing Liu Hang Zhang Xuan Chen Xuezhi Liu Zhengbang Wang Jianbo Hu 《Ultrafast Science》 2023年第4期35-42,共8页
Optical logic gates call for materials with giant optical nonlinearity to break the current performance bottleneck.Metal–organic frameworks(MOFs)provide an intriguing route to achieve superior optical nonlinearity be... Optical logic gates call for materials with giant optical nonlinearity to break the current performance bottleneck.Metal–organic frameworks(MOFs)provide an intriguing route to achieve superior optical nonlinearity benefitting from structural diversity and design flexibility.However,the potential of MOFs for optoelectronics has been largely overlooked and their applications in optical logic have not been exploited.Here,through temporally manipulating the nonlinear optical absorption process in porphyrin-based MOFs,we have successfully developed AND and XOR logic gates with an ultrafast speed approaching 1 THz and an on–off ratio above 90%.On this basis,all-optical information encryption is further demonstrated using transmittance as primary codes,which shows vast prospects in avoiding the disclosure of security information.To the best of our knowledge,this is the first exploration of MOFs for applications in ultrafast optical logic devices and information encryption. 展开更多
关键词 Metal-organic framework Ultrafast Logic gate optical encryption Nonlinear optics Carrier dynamics
原文传递
Multiuser computational imaging encryption and authentication with OFDM-assisted key management
8
作者 Hongran Zeng Ping Lu +7 位作者 Xiaowei Li Lingling Huang Chaoyun Song Dahai Li In-kwon Lee Seok-Tae Kim Qiong-Hua Wang Yiguang Liu 《Advanced Photonics Nexus》 2024年第5期162-173,共12页
Single-pixel imaging(SPI)enables an invisible target to be imaged onto a photosensitive surface without a lens,emerging as a promising way for indirect optical encryption.However,due to its linear and broadcast imagin... Single-pixel imaging(SPI)enables an invisible target to be imaged onto a photosensitive surface without a lens,emerging as a promising way for indirect optical encryption.However,due to its linear and broadcast imaging principles,SPI encryption has been confined to a single-user framework for the long term.We propose a multi-image SPI encryption method and combine it with orthogonal frequency division multiplexing-assisted key management,to achieve a multiuser SPI encryption and authentication framework.Multiple images are first encrypted as a composite intensity sequence containing the plaintexts and authentication information,simultaneously generating different sets of keys for users.Then,the SPI keys for encryption and authentication are asymmetrically isolated into independent frequency carriers and encapsulated into a Malus metasurface,so as to establish an individually private and content-independent channel for each user.Users can receive different plaintexts privately and verify the authenticity,eliminating the broadcast transparency of SPI encryption.The improved linear security is also verified by simulating attacks.By the combination of direct key management and indirect image encryption,our work achieves the encryption and authentication functionality under a multiuser computational imaging framework,facilitating its application in optical communication,imaging,and security. 展开更多
关键词 computational imaging optical encryption optical authentication key management
在线阅读 下载PDF
Neuromorphic encryption:combining speckle correlography and event data for enhanced security
9
作者 Shuo Zhu Chutian Wang +3 位作者 Jianqing Huang Pei Zhang Jing Han Edmund Y.Lam 《Advanced Photonics Nexus》 2024年第5期38-47,共10页
Leveraging an optical system for image encryption is a promising approach to information security since one can enjoy parallel,high-speed transmission,and low-power consumption encryption features.However,most existin... Leveraging an optical system for image encryption is a promising approach to information security since one can enjoy parallel,high-speed transmission,and low-power consumption encryption features.However,most existing optical encryption systems involve a critical issue that the dimension of the ciphertexts is the same as the plaintexts,which may result in a cracking process with identical plaintextciphertext forms.Inspired by recent advances in computational neuromorphic imaging(CNI)and speckle correlography,a neuromorphic encryption technique is proposed and demonstrated through proof-ofprinciple experiments.The original images can be optically encrypted into event-stream ciphertext with a high-level information conversion form.To the best of our knowledge,the proposed method is the first implementation for event-driven optical image encryption.Due to the high level of encryption data with the CNI paradigm and the simple optical setup with a complex inverse scattering process,our solution has great potential for practical security applications.This method gives impetus to the image encryption of the visual information and paves the way for the CNI-informed applications of speckle correlography. 展开更多
关键词 optical encryption computational neuromorphic imaging speckle correlography deep learning
在线阅读 下载PDF
Attack on Optical Double Random Phase Encryption Based on the Principle of Ptychographical Imaging 被引量:2
10
作者 李拓 史祎诗 《Chinese Physics Letters》 SCIE CAS CSCD 2016年第1期63-66,共4页
The principle of ptychography is applied in known plain text attack on the double random phase encoding (DRPE) system. We find that with several pairs of plain texts and cipher texts, the model of attack on DRPE can... The principle of ptychography is applied in known plain text attack on the double random phase encoding (DRPE) system. We find that with several pairs of plain texts and cipher texts, the model of attack on DRPE can be converted to the model of ptyehographical imaging. Owing to the inherent merits of the ptyehographical imaging, the DRPE system can be breached totally in a fast and nearly perfect way, which is unavailable for currently existing attack methods. Further, since the decryption keys can be seen as an object to be imaged from the perspective of imaging, the ptychographical technique may be a kind of new direction to further analysis of the security of other encryption systems based on double random keys. 展开更多
关键词 of as for it Attack on optical Double Random Phase encryption Based on the Principle of Ptychographical Imaging in IS on
原文传递
Optical image encryption algorithm based on a new four-dimensional memristive hyperchaotic system and compressed sensing
11
作者 都洋 隆国强 +2 位作者 蒋东华 柴秀丽 韩俊鹤 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第11期426-445,共20页
Some existing image encryption schemes use simple low-dimensional chaotic systems, which makes the algorithms insecure and vulnerable to brute force attacks and cracking. Some algorithms have issues such as weak corre... Some existing image encryption schemes use simple low-dimensional chaotic systems, which makes the algorithms insecure and vulnerable to brute force attacks and cracking. Some algorithms have issues such as weak correlation with plaintext images, poor image reconstruction quality, and low efficiency in transmission and storage. To solve these issues,this paper proposes an optical image encryption algorithm based on a new four-dimensional memristive hyperchaotic system(4D MHS) and compressed sensing(CS). Firstly, this paper proposes a new 4D MHS, which has larger key space, richer dynamic behavior, and more complex hyperchaotic characteristics. The introduction of CS can reduce the image size and the transmission burden of hardware devices. The introduction of double random phase encoding(DRPE) enables this algorithm has the ability of parallel data processing and multi-dimensional coding space, and the hyperchaotic characteristics of 4D MHS make up for the nonlinear deficiency of DRPE. Secondly, a construction method of the deterministic chaotic measurement matrix(DCMM) is proposed. Using DCMM can not only save a lot of transmission bandwidth and storage space, but also ensure good quality of reconstructed images. Thirdly, the confusion method and diffusion method proposed are related to plaintext images, which require both four hyperchaotic sequences of 4D MHS and row and column keys based on plaintext images. The generation process of hyperchaotic sequences is closely related to the hash value of plaintext images. Therefore, this algorithm has high sensitivity to plaintext images. The experimental testing and comparative analysis results show that proposed algorithm has good security and effectiveness. 展开更多
关键词 MEMRISTOR hyperchaotic system compressed sensing fractional Fourier transform optical image encryption
原文传递
Full-dimensional complex coherence properties tomography for multi-cipher information security
12
作者 Yonglei Liu Siting Dai +4 位作者 Yimeng Zhu Yahong Chen Peipei Peng Yangjian Cai Fei Wang 《Opto-Electronic Advances》 2025年第8期54-66,共13页
Optical coherence is a fundamental property of light,playing a key role in understanding interference,propagation,and light-matter interactions for both classical and quantum light.Measuring the coherence properties o... Optical coherence is a fundamental property of light,playing a key role in understanding interference,propagation,and light-matter interactions for both classical and quantum light.Measuring the coherence properties of an optical field is crucial for a wide range of applications.However,despite many proposed measurement schemes,significant challenges still remain.In this work,we present a protocol to measure the full-dimensional coherence properties of a partially coherent beam.The method is based on tomographing the complex coherent modes of the partially coherent field within its coherence time.Once the complex coherent modes are reconstructed,all coherence properties including field correlation and its higher-order correlations(e.g.,intensity correlation)can be recovered for beams that are either spatially uniformly or non-uniformly correlated.We perform a proof-of-principle experiment to measure the complex field correlation and intensity correlation of a structured partially coherent beam synthesized by random modes.Additionally,we discuss the application of full-dimensional complex coherence function tomography in coherence-based multi-cipher information security.The robustness of our system in complex environments is also evaluated. 展开更多
关键词 partially coherent light complex coherence measurement optical encryption structured light
在线阅读 下载PDF
An encryption scheme based on phase-shifting digital holography and amplitude-phase disturbance 被引量:2
13
作者 花丽丽 徐宁 杨庚 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第6期206-211,共6页
In this paper, we propose an encryption scheme based on phase-shifting digital interferometry. According to the original system framework, we add a random amplitude mask and replace the Fourier transform by the Fresne... In this paper, we propose an encryption scheme based on phase-shifting digital interferometry. According to the original system framework, we add a random amplitude mask and replace the Fourier transform by the Fresnel transform. We develop a mathematical model and give a discrete formula based on the scheme, which makes it easy to implement the scheme in computer programming. The experimental results show that the improved system has a better performance in security than the original encryption method. Moreover, it demonstrates a good capability of anti-noise and anti-shear robustness. 展开更多
关键词 optical encryption phase-shifting holography SECURITY ROBUSTNESS
原文传递
A new distribution scheme of decryption keys used in optical verification system with multiple-wavelength information 被引量:2
14
作者 牛春晖 张岩 顾本源 《Chinese Physics B》 SCIE EI CAS CSCD 2005年第10期1996-2003,共8页
A new distribution scheme of decryption keys used in optical verification systems is proposed. The encryption procedure is digitally implemented with the use of an iteration algorithm in computer. Three target images ... A new distribution scheme of decryption keys used in optical verification systems is proposed. The encryption procedure is digitally implemented with the use of an iteration algorithm in computer. Three target images corresponding to three wavelengths are encoded into three sets of phase-only masks (POMs) by a special distributing method. These three sets of POMs are assigned to three authorized users as the personal identification. A lensless optical system is used as the verification system. In the verification procedure, every two of the three authorized users can pass the verification procedure cooperatively, but only one user cannot do. Numerical simulation shows that the proposed distribution scheme of decryption keys not only can improve the security level of verification system, but also can bring convenience and flexibility for authorized users. 展开更多
关键词 optical encryption technique multiple-wavelength information diffractive optical system
原文传递
Secure and Robust Optical Multi-Stage Medical Image Cryptosystem 被引量:1
15
作者 Walid El-Shafai Moustafa H.Aly +2 位作者 Abeer D.Algarni Fathi E.Abd El-Samie Naglaa F.Soliman 《Computers, Materials & Continua》 SCIE EI 2022年第1期895-913,共19页
Due to the rapid growth of telemedicine and healthcare services,color medical image security applications have been expanded precipitously.In this paper,an asymmetric PTFrFT(Phase Truncated Fractional Fourier Transfor... Due to the rapid growth of telemedicine and healthcare services,color medical image security applications have been expanded precipitously.In this paper,an asymmetric PTFrFT(Phase Truncated Fractional Fourier Transform)-based color medical image cryptosystem is suggested.Two different phases in the fractional Fourier and output planes are provided as deciphering keys.Accordingly,the ciphering keys will not be employed for the deciphering procedure.Thus,the introduced PTFrFT algorithm comprises asymmetric ciphering and deciphering processes in contrast to the traditional optical symmetric OSH(Optical Scanning Holography)and DRPE(Double Random Phase Encoding)algorithms.One of the principal impacts of the introduced asymmetric cryptosystem is that it eliminates the onedimensionality aspects of the related symmetric cryptosystems due to its remarkable feature of phase nonlinear truncation components.More comparisons on various colormedical images are examined and analyzed to substantiate the cryptosystem efficacy.The achieved experimental outcomes ensure that the introduced cryptosystem is robust and secure.It has terrific cryptography performance compared to conventional cryptography algorithms,even in the presence of noise and severe channel attacks. 展开更多
关键词 optical encryption medical image security symmetric and asymmetric encryption OSH DRPE PTFrFT
在线阅读 下载PDF
Measurement of optical coherence structures of random optical fields using generalized Arago spot experiment 被引量:1
16
作者 Xin Liu Qian Chen +2 位作者 Jun Zeng Yangjian Cai Chunhao Liang 《Opto-Electronic Science》 2023年第2期27-35,共9页
The optical coherence structures of random optical fields can determine beam propagation behavior,light–matter interactions,etc.Their performance makes a light beam robust against turbulence,scattering,and distortion... The optical coherence structures of random optical fields can determine beam propagation behavior,light–matter interactions,etc.Their performance makes a light beam robust against turbulence,scattering,and distortion.Recently,we proposed optical coherence encryption and robust far-field optical imaging techniques.All related applications place a high demand on precision in the experimental measurements of complex optical coherence structures,including their real and imaginary parts.Past studies on these measurements have mainly adopted theoretical mathematical approximations,limited to Gaussian statistic involving speckle statistic(time-consuming),or used complicated and delicate optical systems in the laboratory.In this study,we provide:a robust,convenient,and fast protocol to measure the optical coherence structures of random optical fields via generalized Arago(or Poisson)spot experiments with rigorous mathematical solutions.Our proposal only requires to capture the intensity thrice,and is applicable to any optical coherence structures,regardless of their type or optical statistics.The theoretical and experimental results demonstrated that the real and imaginary parts of the structures could be simultaneously recovered with high precision.We believe that such a protocol can be widely employed in phase measurement,optical imaging,and image transfer. 展开更多
关键词 optical coherence statistical optics Arago spot optical encryption optical imaging
在线阅读 下载PDF
Deep-learning-based cryptanalysis of two types of nonlinear optical cryptosystems
17
作者 Xiao-Gang Wang Hao-Yu Wei 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第9期293-300,共8页
The two types of nonlinear optical cryptosystems(NOCs)that are respectively based on amplitude-phase retrieval algorithm(APRA)and phase retrieval algorithm(PRA)have attracted a lot of attention due to their unique mec... The two types of nonlinear optical cryptosystems(NOCs)that are respectively based on amplitude-phase retrieval algorithm(APRA)and phase retrieval algorithm(PRA)have attracted a lot of attention due to their unique mechanism of encryption process and remarkable ability to resist common attacks.In this paper,the securities of the two types of NOCs are evaluated by using a deep-learning(DL)method,where an end-to-end densely connected convolutional network(DenseNet)model for cryptanalysis is developed.The proposed DL-based method is able to retrieve unknown plaintexts from the given ciphertexts by using the trained DenseNet model without prior knowledge of any public or private key.The results of numerical experiments with the DenseNet model clearly demonstrate the validity and good performance of the proposed the DL-based attack on NOCs. 展开更多
关键词 optical encryption nonlinear optical cryptosystem deep learning phase retrieval algorithm
原文传递
Opto-Video Encryption Based on Logistic Adjusted Sine map in FrFT
18
作者 Osama S.Faragallah Ashraf Afifi +4 位作者 Ibrahim F.Elashry Ensherah A.Naeem Heba M.El-Hoseny Ahmed I.Sallam Hala S.El-sayed 《Computers, Materials & Continua》 SCIE EI 2022年第8期3651-3663,共13页
In the last few years,videos became the most common form of information transmitted over the internet,and a lot of the traffic is confidential and must be protected and delivered safely to its intended users.This intr... In the last few years,videos became the most common form of information transmitted over the internet,and a lot of the traffic is confidential and must be protected and delivered safely to its intended users.This introduces the challenges of presenting encryption systems that can encode videos securely and efficiently at the same time.This paper presents an efficient opto-video encryption system using Logistic Adjusted Sine map(LASM)in the Fractional Fourier Transform(FrFT).In the presented opto-video LASM-based FrFT scheme,the encoded video is split into distinct frames and transformed into optical signals utilizing an optical supply.Each of the developed optical video frames is ciphered by utilizing the LASM in optical FrFT system using two-phase modulation forms on the video frame,the first in the time-domain and the second in the FrFT domain.In the end,the ciphervideo frame is spotted utilizing a CCD digital camera and transformed into a digital structure that can be managed using a computer.We test the proposed opto-video LASM-based FrFT scheme using various security tools.The outcomes demonstrate that the presented scheme can effectively encrypt and decrypt video signals.In addition,it encrypts videos with a high level of encryption qualitywithout sacrificing its resistance to noise immunity.Finally,the test outcomes demonstrate that the presented scheme is immune to known attacks. 展开更多
关键词 optical encryption FrFT logistic-adjusted sine map
在线阅读 下载PDF
Chiral photonic micro-particles enabling circularly polarized luminescence for NIR-II optical anti-counterfeiting
19
作者 Jiang Huang Xuefeng Yang +2 位作者 Xue Jin Hongchao Yang Pengfei Duan 《Nano Research》 2025年第7期63-69,共7页
The second near-infrared(NIR-II,1000-1700 nm)circularly polarized light holds significant untapped potential in areas such as optical anti-counterfeiting and information encryption due to its deeply covert nature.Howe... The second near-infrared(NIR-II,1000-1700 nm)circularly polarized light holds significant untapped potential in areas such as optical anti-counterfeiting and information encryption due to its deeply covert nature.However,the typically low luminescence dissymmetry factor(glum)of circularly polarized luminescence(CPL)materials,particularly in NIR CPL materials,limits their practical application.Addressing this challenge,it is crucial to develop NIR CPL materials with enhanced glum.In this study,we present a series of chiral photonic micro-particles(CPMPs)with tunable chiral photonic bandgaps in the NIR-II range,capable of modulating NIR-II luminescent quantum dots to produce NIR CPL.These CPMPs not only impart chirality to the quantum dots,but also act as carriers,minimizing luminescence quenching from external environments.The tunable chiral photonic bandgap in CPMPs enables the generation of NIR CPL with a high|glum|value of up to 0.81,facilitating the advanced application in covert optical anti-counterfeiting.This work offers a straightforward and viable strategy for the development of NIR CPL materials,broadening their use in invisible information encryption and optical anti-counterfeiting technologies. 展开更多
关键词 circularly polarized luminescence near-infrared luminescence chiral photonic crystal optical encryption quantum dots
原文传递
High performance dual-band Bi_(2)O_(2)Se/CdS heterojunction photodetector for encrypted optical communication
20
作者 Qicheng Zhang Qiuhong Tan +4 位作者 Jun Ding Xiaobo Feng Peizhi Yang Yingkai Liu Qianjin Wang 《Nano Research》 2025年第8期1068-1077,共10页
Layered Bi_(2)O_(2)Se nanosheets,characterized by a low bandgap,high electron mobility,and good air stability,have garnered significant attention for their potential applications in electronics and photonics.However,t... Layered Bi_(2)O_(2)Se nanosheets,characterized by a low bandgap,high electron mobility,and good air stability,have garnered significant attention for their potential applications in electronics and photonics.However,the relatively low photocurrent generated by single Bi_(2)O_(2)Se nanosheet photodetectors results in diminished switching ratios and responsiveness,thereby limiting the overall performance of Bi_(2)O_(2)Se-based photodetectors.In this study,we report a dual-band heterostructure photodetector constructed from high-quality Bi_(2)O_(2)Se nanosheets and CdS nanobelts.This device demonstrates exceptional photodetection performance in both the visible(450 nm)and near-infrared(1150 nm)regions,featuring a high switching ratio,increased responsivity,elevated specific detectivity,large external quantum efficiency,and rapid response speed.Notably,these key parameters exceed those reported in most Bi_(2)O_(2)Se-based photodetectors.Importantly,the Bi_(2)O_(2)Se/CdS heterostructure photodetector showcases impressive high-resolution imaging capabilities.These findings highlight the promising potential of this device for applications in image sensing and encrypted optical communication. 展开更多
关键词 Bi_(2)O_(2)Se nanosheets CdS nanobelts dual-band photodetector high-resolution imaging encrypted optical communication
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部