Secure information encryption via acousto-optic (AO) chaos with profiled optical beams indicates substantially better performance in terms of system robustness. This paper examines encryption of static and time-varying (video) images onto AO chaotic carriers using Gaussian-profile beams with diffracted data numerically generated using transfer functions. The use of profiled beams leads to considerable improvement in the encrypted signal. While static image encryption exhibits parameter tolerances within about ±10% for uniform optical beams, profiled beams reduce the tolerance to less than 1%, thereby vastly improving both the overall security of the transmitted information as well as the quality of the image retrieval
In communication systems, there are different coding schemes such as linear predictive coding, block...
ABSTRACT: This paper presents an alternative to secure exchange of encrypted information through pub...
Modern day communication techniques are often prone to hacking and disturbances in the communication...
Digital images are encrypted onto a chaotic carrier in a Bragg cell under hybrid nonlinear feedback ...
Using intensity feedback, the closed-loop behavior of an acousto-optic hybrid device under profiled ...
In recent work, the propagation of a profiled optical beam through an open-loop acousto-optic Bragg ...
Modern day electronic communication is often prone to hacking within the communication system. Signa...
We discuss the design of an acousto-optic cell based free space optical communication link where the...
Security of information transfer has a higher priority in this era of communication, and hence the i...
Using external signal modulation of the diffracted light from a hybrid acousto-optic device under ch...
Generation of chaos from acousto-optic (A-O)Bragg cell modulators with an electronic feedback has be...
In recent work, low-frequency AC signal encryption, decryption and retrieval using system-parameter ...
Zeroth-order chaos modulation in a Bragg cell is examined such that tracking problems due to spatial...
A series of recent studies involving hybrid acousto-optic (AO) scattering in the Bragg domain under ...
Electrocardiography (ECG) signals are used for both medical purposes and identifying individuals. It...
In communication systems, there are different coding schemes such as linear predictive coding, block...
ABSTRACT: This paper presents an alternative to secure exchange of encrypted information through pub...
Modern day communication techniques are often prone to hacking and disturbances in the communication...
Digital images are encrypted onto a chaotic carrier in a Bragg cell under hybrid nonlinear feedback ...
Using intensity feedback, the closed-loop behavior of an acousto-optic hybrid device under profiled ...
In recent work, the propagation of a profiled optical beam through an open-loop acousto-optic Bragg ...
Modern day electronic communication is often prone to hacking within the communication system. Signa...
We discuss the design of an acousto-optic cell based free space optical communication link where the...
Security of information transfer has a higher priority in this era of communication, and hence the i...
Using external signal modulation of the diffracted light from a hybrid acousto-optic device under ch...
Generation of chaos from acousto-optic (A-O)Bragg cell modulators with an electronic feedback has be...
In recent work, low-frequency AC signal encryption, decryption and retrieval using system-parameter ...
Zeroth-order chaos modulation in a Bragg cell is examined such that tracking problems due to spatial...
A series of recent studies involving hybrid acousto-optic (AO) scattering in the Bragg domain under ...
Electrocardiography (ECG) signals are used for both medical purposes and identifying individuals. It...
In communication systems, there are different coding schemes such as linear predictive coding, block...
ABSTRACT: This paper presents an alternative to secure exchange of encrypted information through pub...
Modern day communication techniques are often prone to hacking and disturbances in the communication...