Optical Techniques for Information Security

被引:325
作者
Matoba, Osamu [1 ]
Nomura, Takanori [2 ]
Perez-Cabre, Elisabet [3 ]
Millan, Maria S. [3 ]
Javidi, Bahram [4 ]
机构
[1] Kobe Univ, Dept Comp Sci & Syst Engn, Wakayama 6578510, Japan
[2] Wakayama Univ, Dept Optomechatron, Wakayama 6408510, Japan
[3] Univ Politecn Cataluna, Opt & Optometry Dept, Terrassa 08222, Spain
[4] Univ Connecticut, Dept Elect & Comp Engn, Storrs, CT 06269 USA
关键词
Authentication; digital holography; ID tag; information security; optical encryption; phase modulation; DATA-STORAGE; DIGITAL HOLOGRAPHY; FREQUENCY-ANALYSIS; PHASE ENCRYPTION; MEMORY SYSTEM; IMAGE; TRANSFORM; IDENTIFICATION; KEY;
D O I
10.1109/JPROC.2009.2018367
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents an overview of the potential of free space optical technology in information security, encryption, and authentication. Optical waveform posses many degrees of freedom such as amplitude, phase, polarization, spectral content, and multiplexing which can be combined in different ways to make the information encoding more secure. This paper reviews optical techniques for encryption and security of two-dimensional and three-dimensional data. Interferometric methods are used to record and retrieve data by either optical or digital holography for security applications. Digital holograms are widely used in recording and processing three dimensional data, and are attractive for securing three dimensional data. Also, we review optical authentication techniques applied to ID tags with visible and near infrared imaging. A variety of images and signatures, including biometrics, random codes, and primary images can be combined in an optical ID tag for security and authentication.
引用
收藏
页码:1128 / 1148
页数:21
相关论文
共 70 条
[1]  
[Anonymous], 2000, Holographic Data Storage
[2]  
*ATRWG, 1986, ATRWG PUBL
[3]   Parallel quasi-phase-shifting digital holography [J].
Awatsuji, Y ;
Sasada, M ;
Kubota, T .
APPLIED PHYSICS LETTERS, 2004, 85 (06) :1069-1071
[4]   Multiplexing encrypted data by using polarized light [J].
Barrera, JF ;
Henao, R ;
Tebaldi, M ;
Torroba, R ;
Bolognini, N .
OPTICS COMMUNICATIONS, 2006, 260 (01) :109-112
[5]   Multiplexing encryption-decryption via lateral shifting of a random phase mask [J].
Barrera, JF ;
Henao, R ;
Tebaldi, M ;
Torroba, R ;
Bolognini, N .
OPTICS COMMUNICATIONS, 2006, 259 (02) :532-536
[6]  
Bennett C. H., 1992, Journal of Cryptology, V5, P3, DOI 10.1007/BF00191318
[7]   HOLOGRAPHIC READ-WRITE MEMORY AND CAPACITY ENHANCEMENT BY 3-D STORAGE [J].
DAURIA, L ;
HUIGNARD, JP ;
SPITZ, E .
IEEE TRANSACTIONS ON MAGNETICS, 1973, MAG9 (02) :83-94
[8]   Automated vehicle detection in forward-looking infrared imagery [J].
Der, S ;
Chan, A ;
Nasrabadi, N ;
Kwon, H .
APPLIED OPTICS, 2004, 43 (02) :333-348
[9]   Extended focused image in microscopy by digital holography [J].
Ferraro, P ;
Grilli, S ;
Alfieri, D ;
De Nicola, S ;
Finizio, A ;
Pierattini, G ;
Javidi, B ;
Coppola, G ;
Striano, V .
OPTICS EXPRESS, 2005, 13 (18) :6738-6749
[10]   POLARIZATION-SELECTIVE COMPUTER-GENERATED HOLOGRAMS [J].
FORD, JE ;
XU, F ;
URQUHART, K ;
FAINMAN, Y .
OPTICS LETTERS, 1993, 18 (06) :456-458