Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Optical techniques for information security
This paper presents an overview of the potential of free space optical technology in
information security, encryption, and authentication. Optical waveform posses many degrees …
information security, encryption, and authentication. Optical waveform posses many degrees …
Optical encryption by double-random phase encoding in the fractional Fourier domain
We propose an optical architecture that encodes a primary image to stationary white noise
by using two statistically independent random phase codes. The encoding is done in the …
by using two statistically independent random phase codes. The encoding is done in the …
Optical encryption and QR codes: secure and noise-free information retrieval
We introduce for the first time the concept of an information “container” before a standard
optical encrypting procedure. The “container” selected is a QR code which offers the main …
optical encrypting procedure. The “container” selected is a QR code which offers the main …
Double random fractional Fourier domain encoding for optical security
We propose a new optical encryption technique using the fractional Fourier transform. In this
method, the data are encrypted to a stationary white noise by two statistically independent …
method, the data are encrypted to a stationary white noise by two statistically independent …
A known-plaintext heuristic attack on the Fourier plane encryption algorithm
The Fourier plane encryption algorithm is subjected to a known-plaintext attack. The
simulated annealing heuristic algorithm is used to estimate the key, using a known plaintext …
simulated annealing heuristic algorithm is used to estimate the key, using a known plaintext …
A technique for image encryption using digital signature
We propose a new technique to encrypt an image for secure image transmission. The digital
signature of the original image is added to the encoded version of the original image. The …
signature of the original image is added to the encoded version of the original image. The …
Encrypted optical storage with angular multiplexing
We present the first, to our knowledge, demonstration of an encrypted optical storage based
on double-random phase encoding by using angular multiplexing in a photorefractive …
on double-random phase encoding by using angular multiplexing in a photorefractive …
Image encryption using fractional integral transforms: Vulnerabilities, threats, and future scope
With the enormous usage of digital media in almost every sphere from education to
entertainment, the security of sensitive information has been a concern. As images are the …
entertainment, the security of sensitive information has been a concern. As images are the …
Multi-user nonlinear optical cryptosystem based on polar decomposition and fractional vortex speckle patterns
In this paper, we propose a new multiuser nonlinear optical cryptosystem using fractional-
order vortex speckle (FOVS) patterns as security keys. In conventional optical cryptosystems …
order vortex speckle (FOVS) patterns as security keys. In conventional optical cryptosystems …
Space-variant polarization manipulation
One of the important properties of an optical wavefront is the transverse field distribution of
the beam, that is, the distribution of its amplitude and phase as well as its polarization state …
the beam, that is, the distribution of its amplitude and phase as well as its polarization state …