Abstract
In the present Teview paper, an overview has been presented of the different optical encryption schemes which have potential to keep the information protected so as to provide secure transmission and storage, and to make accessible the original data to an authorized user. Cryptanalysis of the double random phase encryption (DRPE) scheme provides an insight into its weaknesses, and reasons due to which different types of attacks are able to breach the security of the scheme. Some strategies to circumvent the problems related to the vulnerabilities of the DRPE schemes have been described with an emphasis on making the scheme impulse attack-free. A succinct survey of the iterative algorithm based encryption schemes brings into focus the fact that these schemes are slow due the iterative nature of phase masks generation. Removal of an inherent silhouette problem in the analytically generated phase-only masks with jigsaw transformation has been discussed. A simple alternative method for the optical implementation using a single spatial light modulator has also been implemented. A brief discussion of the holographic security systems has been presented, and enhancement in the security by use of convergent random illumination has been discussed.
Original language | English |
---|---|
Pages (from-to) | 1-49 |
Number of pages | 49 |
Journal | Asian Journal of Spectroscopy |
Issue number | SPEC. ISS. |
State | Published - 2012 |
Externally published | Yes |
Bibliographical note
Funding Information:Acknowledgements This study was funded by the Fisheries Research and Development Corporation (Grant No. 92/06). We thank all those fishers who assisted in the study, in particular S. Huxley, M. Huxley, N. Shilling, P. Andersen, T. Kerslake, S. Tidswell, D. Sprague and S. Turner. We acknowledge Y. Chen for his help in using the PSGS growth model, and D. Worthington for his help in using the program GROTAG. The experiments in this study complied with current Australian laws.
Funding
Acknowledgements This study was funded by the Fisheries Research and Development Corporation (Grant No. 92/06). We thank all those fishers who assisted in the study, in particular S. Huxley, M. Huxley, N. Shilling, P. Andersen, T. Kerslake, S. Tidswell, D. Sprague and S. Turner. We acknowledge Y. Chen for his help in using the PSGS growth model, and D. Worthington for his help in using the program GROTAG. The experiments in this study complied with current Australian laws.
Funders | Funder number |
---|---|
Fisheries Research and Development Corporation | 92/06 |
Keywords
- Double random phase encryption
- Fractional fourier transform
- Holographic security systems
- Optical cryptanalysis
- Optical information security