The secure managing of sensible data is one of the main challenges nowadays. During the last years several advances have demonstrated the ability of optical encrypting systems to protect information. In spite of these developments, there are some evident issues to be solved. One of the main concerns is the limitation of the experimental cryptosystems in the size of the inputs that can be properly protected and recovered by the encrypting system. In the case of the experimental joint transform correlator (JTC) cryptosystem, the data to be encoded and the key are placed side by side in the input plane. Therefore, the size of the object to be encrypted is limited by the size of the encryption key and the separation between the input and the ke...
In this work, the occlusion and noise test on the encrypted image produced by a joint transform corr...
We present the first experimental technique to encrypt a movie under a joint transform correlator ar...
In this contribution, we implement two techniques to reinforce optical encryption, which we restrict...
We introduce for the first time, to the best of our knowledge, a three-dimensional experimental join...
Coherent optical encryption procedures introduce speckle noise to the output, limiting many practica...
We propose an optical encryption technique where the encrypted field and the decrypting key are obta...
We report, to our knowledge for the first time, the experimental implementation of a quick response ...
In this paper, we present a new protocol for achieving lower noise and consequently a higher dynamic...
Encrypting techniques are currently of interest in the optical domain. A common issue when using coh...
We present a new compact scheme to ensure high performance optical encryption. In this scheme, the e...
We show that multiple secure data recording under a wavelength multiplexing technique is possible in...
We present a novel single optical packaging and encryption (SOPE) procedure for multiple inputs. Thi...
In this work we study the joint transform correlator setup, finding two analytical expressions for t...
We present a new experimental system for optical encryption using a nonlinear joint transform correl...
In experimental optodigital encrypting architectures, the use of a reference wave is essential. In t...
In this work, the occlusion and noise test on the encrypted image produced by a joint transform corr...
We present the first experimental technique to encrypt a movie under a joint transform correlator ar...
In this contribution, we implement two techniques to reinforce optical encryption, which we restrict...
We introduce for the first time, to the best of our knowledge, a three-dimensional experimental join...
Coherent optical encryption procedures introduce speckle noise to the output, limiting many practica...
We propose an optical encryption technique where the encrypted field and the decrypting key are obta...
We report, to our knowledge for the first time, the experimental implementation of a quick response ...
In this paper, we present a new protocol for achieving lower noise and consequently a higher dynamic...
Encrypting techniques are currently of interest in the optical domain. A common issue when using coh...
We present a new compact scheme to ensure high performance optical encryption. In this scheme, the e...
We show that multiple secure data recording under a wavelength multiplexing technique is possible in...
We present a novel single optical packaging and encryption (SOPE) procedure for multiple inputs. Thi...
In this work we study the joint transform correlator setup, finding two analytical expressions for t...
We present a new experimental system for optical encryption using a nonlinear joint transform correl...
In experimental optodigital encrypting architectures, the use of a reference wave is essential. In t...
In this work, the occlusion and noise test on the encrypted image produced by a joint transform corr...
We present the first experimental technique to encrypt a movie under a joint transform correlator ar...
In this contribution, we implement two techniques to reinforce optical encryption, which we restrict...